.- Designing Human-centric security protocols.
.- Election Security-by-Design.
.- A Conceptual Framework to Leverage Heuristics for Effective Human-Machine Collaboration in Incident Handling.
.- Locally Verifiable Signature Schemes: A Study of Aggregate and Multi-Signatures.
.- Towards Intelligent User Enumeration Based Profiling.
.- CodeFlowGen: A Generator of Synthetic Source Code with Scalable Control Flow Paths for Evaluating Static Analysis Tools.
.- Cyber Threats to Green Hydrogen Production within a Solar Microgrid.
.-Stateful Fuzzing of OPC UA .
.- Efficiency Analysis of Lightweight Post-Quantum Cryptographic Algorithms.
.- Card-based Arithmetic Operations and Application to Statistical Data Aggregation.
.- Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth.
.- An Evaluation of Post-Quantum and Hybrid Noise Protocol Variants on Mobile Devices.
.- Strengthening Return Address Stack of Rocket Core Against Buffer Overflow Attacks.
.- Parameterizing Time-Memory Trade-off for Flexible Implementation of CRYSTALS-Dilithium.
.- QUICPot. A HTTP/3 Protocol Honeypot.
.- Another Lattice Attack Against an RSA-like Cryptosystem.
.- Hybrid solutions for 2PC: How much do they cost?.
.- 32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC.