Using Covert Communication to Enhance Systems Security and User Authentication
Planning and Integrating Deception into Computer Security Defenses
Improving Revocation in the SSL/TLS jungle - Firefox Approach
The Case of Using Negative (Deceiving) Information in Data Protection
Truth and Consequences
Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication
Enhancing Password Security Using Deceptive Covert Communication
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- Thesis Defense