1. Archer D.W. Maturity and performance of programmable secure computation. IACR Cryptology ePrint Archive (1039) 2015. Archer D.W. Maturity and performance of programmable secure computation. IACR Cryptology ePrint Archive (1039) 2015.
2. Barlow R. Computational thinking breaks a Logjam: Hariri Institute helps address Boston's male-female pay gap. (Apr. 27 2015); BU Today. Barlow R. Computational thinking breaks a Logjam: Hariri Institute helps address Boston's male-female pay gap. (Apr. 27 2015); BU Today.
3. How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation
4. Boston Women's Workforce Council Report 2016; http://bit.ly/2iR2KhW Boston Women's Workforce Council Report 2016; http://bit.ly/2iR2KhW
5. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance