1. Understanding Human-Machine Networks;ACM Computing Surveys;2018-01-31
2. Continuous Verification for Cryptographic Protocol Development;Proceedings of the 1st ACM Workshop on the Internet of Safe Things;2017-11-05
3. Axiom;ACM Transactions on Embedded Computing Systems;2017-08-31
4. Secure architectures of future emerging cryptography
SAFEcrypto;Proceedings of the ACM International Conference on Computing Frontiers;2016-05-16
5. Router authentication, key management, and adjacency management for securing inter-router control messages;Computer Networks;2015-03