1. Two Cents for Strong Anonymity: The Anonymous Post-office Protocol;Cryptology and Network Security;2018
2. On the limits of provable anonymity;Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society;2013-11-04
3. Relations among privacy notions;ACM Transactions on Information and System Security;2011-05
4. Evaluating Adversarial Partitions;Computer Security – ESORICS 2010;2010