1. Methods of Attacking and Defending Cryptosystems;Information Security Management Handbook on CD-ROM, 2006 Edition;2006-04-06
2. High Performance Internet Traffic Generators;The Journal of Supercomputing;2006-01
3. On The Security of Key Derivation Functions;Lecture Notes in Computer Science;2004
4. A Secure Workflow System for Dynamic Collaboration;IFIP Advances in Information and Communication Technology;2001
5. A Global PMI for Electronic Content Distribution;Selected Areas in Cryptography;2001