1. P. Ah-Fat and M. Huth. 2017. Secure Multi-party Computation: Information Flow of Outputs and Game Theory. In POST. 71--92.
2. Optimal Accuracy-Privacy Trade-Off for Secure Computations
3. Protecting Private Inputs;Ah-Fat P.;Bounded Distortion Guarantees With Randomised Approximations. PoPETS,2020
4. P. Ah-Fat and M. Huth. 2020b. Two and Three-Party Digital Goods Auctions: Scalable Privacy Analysis. arXiv preprint arXiv:2009.09524.
5. M. Alvim, K. Chatzikokolakis, A. McIver, C. Morgan, C. Palamidessi, and G. Smith. 2014a. Additive and multiplicative notions of leakage, and their capacities. In IEEE Computer Security Foundations Symposium. 308--322.