- ROTE: Rollback Protection for Trusted Execution
Conference: USENIX Security 2017
- Securing Cloud Data under Key Exposure
Conference: IEEE Transactions on Cloud Computing
- A Leakage-abuse Attack Against ult-User Searchable Encryption
Conference: The 17th Privacy Enhancing Technologies Symposium
- Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud
Conference: USENIX Security 2016
- Transparent Data Deduplication in the Cloud
Conference:ACM CCS 2015
- Efficient Techniques for Publicly Verifiable Delegation of Computation
Conference: ASIACCS´16
- "Towards Shared Ownership in the Cloud" paper.
Has been accepted to IEEE transactions on Information Forensics and Data Security (TIFS)