- ROTE: Rollback Protection for Trusted Execution
http://www.tredisec.eu/content/rote-rollback-protection-trusted-execution
Name of the conference: USENIX Security 2017 - Securing Cloud Data under Key Exposure
http://www.tredisec.eu/content/securing-cloud-data-under-key-exposure
Name of the conference: IEEE Transactions on Cloud Computing - A Leakage-abuse Attack Against ult-User Searchable Encryption
http://www.tredisec.eu/content/leakage-abuse-attack-against-ult-user-searchable-encryption
Name of the conference: The 17th Privacy Enhancing Technologies Symposium - Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud
http://www.tredisec.eu/content/mirror-enabling-proofs-data-replication-and-retrievability-cloud
Name of the conference: USENIX Security 2016 - Transparent Data Deduplication in the Cloud
http://www.tredisec.eu/content/transparent-data-deduplication-cloud
Name of the conference:ACM CCS 2015 - Efficient Techniques for Publicly Verifiable Delegation of Computation
http://www.tredisec.eu/content/efficient-techniques-publicly-verifiable-delegation-computation
Name of the conference: ASIACCS´16