Jan Vossaert

According to our database1, Jan Vossaert authored at least 21 papers between 2010 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Using Android Devices as Mobile Extensible HMIs.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

Developing Maintainable Application-Centric IoT Ecosystems.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

2017
A logic-based framework for the security analysis of Industrial Control Systems.
Autom. Control. Comput. Sci., 2017

Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems.
Proceedings of the Computer Network Security, 2017

Development of an Embedded Platform for Secure CPS Services.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Security Evaluation of Cyber-Physical Systems Using Automatically Generated Attack Trees.
Proceedings of the Critical Information Infrastructures Security, 2017

Security Analysis of Cordova Applications in Google Play.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices.
Secur. Commun. Networks, 2016

An Assessment of Security Analysis Tools for Cyber-Physical Systems.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Comparing performance parameters of mobile app development strategies.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

2015
Secure remote access to an industrial generator with mobile devices.
Proceedings of the 2015 World Congress on Industrial Control Systems Security, 2015

A Quantitative Assessment of Performance in Mobile App Development Tools.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based System.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

2014
Hardware-Backed Identity Management Systems; Systemen voor identiteitsbeheer met hardwareondersteuning.
PhD thesis, 2014

Trusted Computing to Increase Security and Privacy in eID Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

2013
User-centric identity management using trusted modules.
Math. Comput. Model., 2013

Client-Side Biometric Verification Based on Trusted Computing.
Proceedings of the Communications and Multimedia Security, 2013

2012
Claim-Based versus Network-Based Identity Management: A Hybrid Approach.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012

2011
Using a Smartphone to Access Personalized Web Services on a Workstation.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
A Smart Card Based Solution for User-Centric Identity Management.
Proceedings of the Privacy and Identity Management for Life, 2010

Personalized Mobile Services with Lightweight Security in a Sports Association.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010


  Loading...