2018, Article in monograph or in proceedings (Lopez, J. (ed.), Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I, pp. 325-345)
2018, Article in monograph or in proceedings (Smith, M. (ed.), EUROS&PW 2018: 3rd IEEE European Symposium on Security and Privacy Workshops. 24–26 April 2018, London, United Kingdom. Proceedings, pp. 11-19)
2018, Article in monograph or in proceedings (Proceedings of the 27th USENIX Security Symposium. August 15–17, 2018 • Baltimore, MD, USA, pp. 1563-1580)
2018, Article in monograph or in proceedings (Inomata, A. (ed.), Advances in Information and Computer Security: 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 127-142)
2017, Article in monograph or in proceedings (ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04 - 08, 2017. Proceedings, pp. 327-338)
2017, Article in monograph or in proceedings (Erdogmus, H. (ed.), SPIN 2017: Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, Santa Barbara, CA, USA — July 13 - 14, 2017, pp. 142-151)
2017, Part of book or chapter of book (Gollmann, D.; Gollmann, D. (ed.), Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, pp. 557-578)
2017, Article in monograph or in proceedings (Karri, R. (ed.), ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates — April 02 - 06, 2017, pp. 743-756)
2016, Part of book or chapter of book (Lecomte, T. (ed.), Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification: First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings, pp. 53-68)
2016, Part of book or chapter of book (Brumley, B.B.; Röning, J. (ed.), Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings, pp. 169-184)
2015, Article in monograph or in proceedings (Kellenberger, P. (ed.), SPW 2015 : 2015 IEEE Security and Privacy Workshops, 21 May 2015, San Jose, California, USA. Proceedings, pp. 125-133)
2015, Part of book or chapter of book (Mangard, S.; Schaumont, P. (ed.), Radio Frequency Identification. Security and Privacy Issues : 11th International Workshop, RFIDsec 2015 New York, NY, USA, June 23–24, 2015, Revised Selected Papers, pp. 122-137)
2015, Part of book or chapter of book (Böhme, R. (ed.), Financial Cryptography and Data Security : 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers, pp. 189-206)
2015, Part of book or chapter of book (Ray, I. (ed.), CCS'15 : Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security, pp. 340-351)
2014, Part of book or chapter of book (Wang, C. (ed.), SPSM '14 : Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale, AZ, USA — November 03 - 07, 2014, pp. 11-20)
2013, Article in monograph or in proceedings (ICSTW 2013 : IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops : proceedings, pp. 461-468)
2012, Part of book or chapter of book (Moedersheim, S. (ed.), Theory of Security and applications : Proceedings of Theory of Security and Applications, TOSCA 2011, 31 March - 1 April 2011, Saarbruecken, Germany, pp. 113-129)
2012, Part of book or chapter of book (Josang, A. (ed.), Secure IT Systems : 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31-November 2, 2012. Proceedings, pp. 1-16)