.- Trust, Anonymity and Identity.
.- DrATC: Dynamic routing Algorithm based on Trust Characteristics.
.- Distributed Dynamic Self-Control Anonymity Management Model.
.- Machines Have Identities Too! Extending NIST's SP 800-63 for Device Identity.
.- Cryptography, Secure Computation and Formal Methods.
.- On ß-separating sets and deterministic factoring.
.- Statistically secure multiparty computation of a biased coin.
.- A Formal Approach For Modelling And Analysing Surgical Procedures.
.- Operating Systems and Application Security.
.- Flexible and Secure Process Confinement with eBPF.
.- Dynamic Analysis for Explainable Fine-grained Android Malware Detection.
.- A portable research honeypot for corporate network.
.- Unleashing AI in Ethical Hacking.