Authentication Re-visited: How Public Key Infrastructure Could Yet Prosper, 16th Bled eCommerce Conference eTransformation, pp.632-648, 2003. ,
The Digital Persona and it's Application to Data Surveillance, The Information Society, vol.10, 1994. ,
The Digital Person; technology and privacy in the information age, 2004. ,
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management -A Consolidated Proposal for Terminology, 2008. ,
Defining Profiling: A New Type of Knowledge? Profiling the European Citizen; Cross-Disciplinary Perspectives, pp.17-45, 2008. ,
Do They Know Me? Deconstructing identifiability, Technology Journal, vol.4, 2008. ,
DOI : 10.2139/ssrn.1084878
A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948. ,
DOI : 10.1002/j.1538-7305.1948.tb01338.x
Het semiotisch pragmatisme van Charles S. Peirce. Benjamins, 1991. ,
Semiotics and the Philosophy of Language, 1984. ,
DOI : 10.1007/978-1-349-17338-9
Privacyrecht of privaatrecht? Een privaatrechtelijk alternatief voor de implementatie van de Europese privacyrichtlijn, 2004. ,
Reply: Addressing the Obscurity of Data Clouds Profiling the European Citizen; Cross-Disciplinary Perspectives, pp.293-300, 2008. ,
Googling Security; How much does Google know about you?, 2009. ,