Efficient post-quantum cryptography for building advanced security applications
Efficient algorithms for graph-based decision making under uncertainty
Virtualized information security teaching: an offensive approach
Improvement of the Diceware method for generating safe passwords