An Braeken

Orcid: 0000-0002-9965-915X

According to our database1, An Braeken authored at least 181 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
iVFAS: An Improved Vehicle-to-Fog Authentication System for Secure and Efficient Fog-Based Road Condition Monitoring.
IEEE Trans. Veh. Technol., September, 2024

Overview of Embedded Rust Operating Systems and Frameworks.
Sensors, September, 2024

Blockchain-Based Secure Authentication and Authorization Framework for Robust 5G Network Slicing.
IEEE Trans. Netw. Serv. Manag., August, 2024

Trustworthy Environmental Monitoring Using Hardware-Assisted Security Mechanisms.
Sensors, July, 2024

Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors.
Sensors, February, 2024

Blockchain-Based Group Key Management Scheme for IoT With Anonymity of Group Members.
IEEE Trans. Inf. Forensics Secur., 2024

Private Electronic Road Pricing Using Bulletproofs With Vector Commitments.
IEEE Trans. Dependable Secur. Comput., 2024

Evaluation of 6LoWPAN Generic Header Compression in the Context of a RPL Network.
Sensors, 2024

Toward Viable Security Solution for VRUs in V2X Communication.
Proceedings of the IEEE Vehicular Networking Conference, 2024

Trusted Computing Architectures for IoT Devices.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2024

2023
Distributed-Proof-of-Sense: Blockchain Consensus Mechanisms for Detecting Spectrum Access Violations of the Radio Spectrum.
IEEE Trans. Cogn. Commun. Netw., October, 2023

μTesla-Based Authentication for Reliable and Secure Broadcast Communications in IoD Using Blockchain.
IEEE Internet Things J., October, 2023

AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications.
Int. J. Crit. Infrastructure Prot., September, 2023

Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing.
J. Supercomput., July, 2023

PROVE: Provable remote attestation for public verifiability.
J. Inf. Secur. Appl., June, 2023

Open RAN security: Challenges and opportunities.
J. Netw. Comput. Appl., May, 2023

Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model.
Wirel. Networks, April, 2023

An Enhanced Cross-Network-Slice Authentication Protocol for 5G.
IEEE Trans. Sustain. Comput., 2023

Highly Efficient Bidirectional Multifactor Authentication and Key Agreement for Real-Time Access to Sensor Data.
IEEE Internet Things J., 2023

Blockchain Regulated Verifiable and Automatic Key Refreshment Mechanism for IoT.
IEEE Access, 2023

A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

A Novel Blockchain-based Decentralized Multi-party Certificate Management Framework.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

A Blockchain-based Authentication Protocol for Metaverse Environments using a Zero Knowledge Proof.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Breaking Chains, Empowering IoT: A Comparative Study of Holochain and Blockchain.
Proceedings of the IEEE Latin-American Conference on Communications, 2023

Authentication Protocol for RFID Systems: A Survey.
Proceedings of the 6th IEEE International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, 2023

A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
Authenticated key agreement protocols for dew-assisted IoT systems.
J. Supercomput., 2022

Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing.
IEEE Trans. Ind. Informatics, 2022

Symmetric-Key-Based Authentication among the Nodes in a Wireless Sensor and Actuator Network.
Sensors, 2022

Time-Slotted Spreading Factor Hopping for Mitigating Blind Spots in LoRa-Based Networks.
Sensors, 2022

Flexible and Efficient Security Framework for Many-to-Many Communication in a Publish/Subscribe Architecture.
Sensors, 2022

Traffic Aware Scheduler for Time-Slotted Channel-Hopping-Based IPv6 Wireless Sensor Networks.
Sensors, 2022

In-depth energy analysis of security algorithms and protocols for the Internet of Things.
J. Cryptogr. Eng., 2022

Public key versus symmetric key cryptography in client-server authentication protocols.
Int. J. Inf. Sec., 2022

SHA 3 and Keccak variants computation speeds on constrained devices.
Future Gener. Comput. Syst., 2022

Pairing free asymmetric group key agreement protocol.
Comput. Commun., 2022

An improved and provably secure symmetric-key based 5G-AKA Protocol.
Comput. Networks, 2022

Circuitree: A Datalog Reasoner in Zero-Knowledge.
IEEE Access, 2022

Experiences with on-premise open source cloud infrastructure with network performance validation.
Proceedings of the IECON 2022, 2022

A multi-cloud service mesh approach applied to Internet of Things.
Proceedings of the IECON 2022, 2022

2021
Pairing Free Certified Common Asymmetric Group Key Agreement Protocol for Data Sharing Among Users with Different Access Rights.
Wirel. Pers. Commun., 2021

Lightweight PUF based authentication scheme for fog architecture.
Wirel. Networks, 2021

Toward the inclusion of end-to-end security in the OM2M platform.
J. Supercomput., 2021

Highly efficient key agreement for remote patient monitoring in MEC-enabled 5G networks.
J. Supercomput., 2021

Time Slotted Channel Hopping and ContikiMAC for IPv6 Multicast-Enabled Wireless Sensor Networks.
Sensors, 2021

XCycles Backprojection Acoustic Super-Resolution.
Sensors, 2021

Proximity Measurement for Hierarchical Categorical Attributes in Big Data.
Secur. Commun. Networks, 2021

Security Enhanced Emergency Situation Detection System for Ambient Assisted Living.
IEEE Open J. Comput. Soc., 2021

A Highly Efficient ECC-Based Authentication Protocol for RFID.
J. Sensors, 2021

Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain.
J. Netw. Comput. Appl., 2021

ECQV-IBI: Identity-based identification with implicit certification.
J. Inf. Secur. Appl., 2021

Privacy Protected Blockchain Based Architecture and Implementation for Sharing of Students' Credentials.
Inf. Process. Manag., 2021

Device-to-device group authentication compatible with 5G AKA protocol.
Comput. Networks, 2021

oneVFC - A Vehicular Fog Computation Platform for Artificial Intelligence in Internet of Vehicles.
IEEE Access, 2021

RESERVE: Remote Attestation of Intermittent IoT devices.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

Detection of evil flies: securing air-ground aviation communication.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

2020
Reliable Control and Data Planes for Softwarized Networks.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020

Symmetric Key-Based Secure Storage and Retrieval of IoT Data on a Semi-trusted Cloud Server.
Wirel. Pers. Commun., 2020

Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak.
Sensors, 2020

Optimizations for FPGA-Based Ultrasound Multiple-Access Spread Spectrum Ranging.
J. Sensors, 2020

A Middleware based on Service Oriented Architecture for Heterogeneity Issues within the Internet of Things (MSOAH-IoT).
J. King Saud Univ. Comput. Inf. Sci., 2020

AGE: authentication in gadget-free healthcare environments.
Inf. Technol. Manag., 2020

Elliptic curve-based proxy re-signcryption scheme for secure data storage on the cloud.
Concurr. Comput. Pract. Exp., 2020

Blockchain and Cyberphysical Systems.
Computer, 2020

Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability.
Comput. Networks, 2020

BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks.
IEEE Access, 2020

Blockchain-based Automated Certificate Revocation for 5G IoT.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Multi-Access Edge Computing and Blockchain-based Secure Telehealth System Connected with 5G and IoT.
Proceedings of the IEEE Global Communications Conference, 2020

Efficient Mobile User Authentication Service with Privacy Preservation and User Untraceability.
Proceedings of the 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, 2020

ESSMAR: Edge Supportive Secure Mobile Augmented Reality Architecture for Healthcare.
Proceedings of the 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, 2020

The Role of Blockchain in 6G: Challenges, Opportunities and Research Directions.
Proceedings of the 2nd 6G Wireless Summit, 2020

2019
Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA).
Wirel. Pers. Commun., 2019

CABE: A Cloud-Based Acoustic Beamforming Emulator for FPGA-Based Sound Source Localization.
Sensors, 2019

Design Exploration and Performance Strategies towards Power-Efficient FPGA-Based Architectures for Sound Source Localization.
J. Sensors, 2019

Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates.
KSII Trans. Internet Inf. Syst., 2019

Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks.
Comput., 2019

Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement.
IEEE Access, 2019

Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks.
IEEE Access, 2019

Holistic Air Protection Scheme of ADS-B Communication.
IEEE Access, 2019

SEC-BlockEdge: Security Threats in Blockchain-Edge based Industrial IoT Networks.
Proceedings of the 11th International Workshop on Resilient Networks Design and Modeling, 2019

Integration of oneM2M in Inter-IoT's platform of platforms.
Proceedings of the IEEE International Symposium on Local and Metropolitan Area Networks, 2019

Towards Energy Efficient LoRa Multihop Networks.
Proceedings of the IEEE International Symposium on Local and Metropolitan Area Networks, 2019

Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Demonstration of a Multimode SoC FPGA-Based Acoustic Camera.
Proceedings of the 29th International Conference on Field Programmable Logic and Applications, 2019

Probabilistic Performance Modelling when Using Partial Reconfiguration to Accelerate Streaming Applications with Non-deterministic Task Scheduling.
Proceedings of the Applied Reconfigurable Computing - 15th International Symposium, 2019

2018
An efficient anonymous authentication protocol in multiple server communication networks (EAAM).
J. Supercomput., 2018

PUF Based Authentication Protocol for IoT.
Symmetry, 2018

Efficiency analysis methodology of FPGAs based on lost frequencies, area and cycles.
J. Parallel Distributed Comput., 2018

Exploiting Partial Reconfiguration through PCIe for a Microphone Array Network Emulator.
Int. J. Reconfigurable Comput., 2018

CoderLabs: A cloud-based platform for real-time online labs with user collaboration.
Concurr. Comput. Pract. Exp., 2018

AAA - autonomous anonymous user authentication and its application in V2G.
Concurr. Comput. Pract. Exp., 2018

FPGA-Based Architectures for Acoustic Beamforming with Microphone Arrays: Trends, Challenges and Research Opportunities.
Comput., 2018

A Multimode SoC FPGA-Based Acoustic Camera for Wireless Sensor Networks.
Proceedings of the 13th International Symposium on Reconfigurable Communication-centric Systems-on-Chip, 2018

Glycos: The Basis for a Peer-to-Peer, Private Online Social Network.
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018

Horizontal Integration of CoAP and MQTT on Internet Protocol - based LoRaMotes.
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018

Multi-radio Solution for Improving Reliability in RPL.
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018

Blockchain Utilization in Healthcare: Key Requirements and Challenges.
Proceedings of the 20th IEEE International Conference on e-Health Networking, 2018

Secure and Efficient Data Accessibility in Blockchain Based Healthcare Systems.
Proceedings of the IEEE Global Communications Conference, 2018

Storage and computation optimization of public-key schemes on embedded devices.
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018

Heterogeneous Cloud Computing: Design Methodology to Combine Hardware Accelerators.
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018

Cloud-Based Acoustic Beamforming Emulator for FPGA-Based Sound Source Localization.
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018

DTLS Integration in oneM2M based on Zolertia RE-motes.
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018

Design and implementation of a smart gateway for IoT applications using heterogeneous smart objects.
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018

Digital signatures and signcryption schemes on embedded devices: a trade-off between computation and storage.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

A Low-Power FPGA-Based Architecture for Microphone Arrays in Wireless Sensor Networks.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2018

5G Privacy: Scenarios and Solutions.
Proceedings of the IEEE 5G World Forum, 2018

2017
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things.
Wirel. Pers. Commun., 2017

An Improved E-Payment System and Its Extension to a Payment System for Visually Impaired and Blind People with User Anonymity.
Wirel. Pers. Commun., 2017

Anonymous Secure Framework in Connected Smart Home Environments.
IEEE Trans. Inf. Forensics Secur., 2017

Design Considerations When Accelerating an FPGA-Based Digital Microphone Array for Sound-Source Localization.
J. Sensors, 2017

Secure communication channel architecture for Software Defined Mobile Networks.
Comput. Networks, 2017

BMRF: Bidirectional Multicast RPL Forwarding.
Ad Hoc Networks, 2017

Enabling RPL multihop communications based on LoRa.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017

Enabling dual-band operation with the RPL routing protocol.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

HEPPA: Highly Efficient Privacy Preserving Authentication for ITS.
Proceedings of the Computer Network Security, 2017

An AAL-oriented measurement-based evaluation of different HTTP-based data transport protocols.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Lightweight signcryption scheme based on discrete Chebyshev maps.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Identity privacy preserving biometric based authentication scheme for Naked healthcare environment.
Proceedings of the IEEE International Conference on Communications, 2017

Demonstration of a partial reconfiguration based microphone array network emulator.
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017

A partial reconfiguration based microphone array network emulator.
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017

From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges.
Proceedings of the 2017 European Conference on Networks and Communications, 2017

2016
Secure and Efficient Reactive Video Surveillance for Patient Monitoring.
Sensors, 2016

eDAAAS: Efficient distributed anonymous authentication and access in smart homes.
Int. J. Distributed Sens. Networks, 2016

A runtime reconfigurable FPGA-based microphone array for sound source localization.
Proceedings of the 26th International Conference on Field Programmable Logic and Applications, 2016

Runtime reconfigurable beamforming architecture for real-time sound-source localization.
Proceedings of the 26th International Conference on Field Programmable Logic and Applications, 2016

A Lost Cycles Analysis for Performance Prediction using High-Level Synthesis.
Proceedings of the Applied Reconfigurable Computing - 12th International Symposium, 2016

2015
An Ultrasonic Multiple-Access Ranging Core Based on Frequency Shift Keying Towards Indoor Localization.
Sensors, 2015

Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications.
IEEE Access, 2015

Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Secure and Efficient Automatic Ruling in Three-Level Network Architecture.
Proceedings of the ICT Innovations 2015, 2015

Proxy-based end-to-end key establishment protocol for the Internet of Things.
Proceedings of the IEEE International Conference on Communication, 2015

Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Study on impact of adding security in a 6LoWPAN based network.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

DynamIA: Dynamic Hardware Reconfiguration in Industrial Applications.
Proceedings of the Applied Reconfigurable Computing - 11th International Symposium, 2015

2014
Ultrasonic Multiple-Access Ranging System Using Spread Spectrum and MEMS Technology for Indoor Localization.
Sensors, 2014

Creation and Evaluation of Educational Tools for E-Learning Based on Videomodels.
Int. J. Eng. Pedagog., 2014

2013
Extending the IEEE 802.15.4 Security Suite with a Compact Implementation of the NIST P-192/B-163 Elliptic Curves.
Sensors, 2013

Performance Modeling for FPGAs: Extending the Roofline Model with High-Level Synthesis Tools.
Int. J. Reconfigurable Comput., 2013

Reconfigurable and Modular Mobile Robotics Platform for Remote Experiments.
Int. J. Online Eng., 2013

Secure event logging in sensor networks.
Comput. Math. Appl., 2013

Efficient and Location-Private Communication Protocols for WBSNs.
Ad Hoc Sens. Wirel. Networks, 2013

Performance and Resource Modeling for FPGAs using High-Level Synthesis tools.
Proceedings of the Parallel Computing: Accelerating Computational Science and Engineering (CSE), 2013

Leveraging the DSP48E1 block in lightweight cryptographic implementations.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

Comparing and combining GPU and FPGA accelerators in an image processing context.
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013

Compact implementation of CCM and GCM modes of AES using DSP blocks.
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013

Performance and toolchain of a combined GPU/FPGA desktop (abstract only).
Proceedings of the 2013 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2013

A performance comparison study of ECC and AES in commercial and research sensor nodes.
Proceedings of Eurocon 2013, 2013

2012
Sensor Systems Based on FPGAs and Their Applications: A Survey.
Sensors, 2012

Comparative Study of Electronics Visualisation Techniques for E-Learning.
Int. J. Eng. Pedagog., 2012

Performance and Programming Environment of a Combined GPU/FPGA Desktop.
Proceedings of the Transition of HPC Towards Exascale Computing, 2012

Comparative study of electronic visualisation techniques for e-learning.
Proceedings of the IEEE Global Engineering Education Conference, 2012

2011
Secure remote reconfiguration of an FPGA-based embedded system.
Proceedings of the 6th International Workshop on Reconfigurable Communication-centric Systems-on-Chip, 2011

Comparison of SRAM and FF PUF in 65nm Technology.
Proceedings of the Information Security Technology for Applications, 2011

Secure Event Logging in Sensor Networks.
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

2010
Secure remote reconfiguration of FPGAs.
Proceedings of the Dynamically Reconfigurable Architectures, 11.07. - 16.07.2010, 2010

A compact FPGA-based architecture for elliptic curve cryptography over prime fields.
Proceedings of the 21st IEEE International Conference on Application-specific Systems Architectures and Processors, 2010

2009
Secure FPGA technologies and techniques.
Proceedings of the 19th International Conference on Field Programmable Logic and Applications, 2009

2006
Classification of cubic (n-4)-resilient Boolean functions.
IEEE Trans. Inf. Theory, 2006

On Zigzag Functions and Related Objects in New Metric.
IACR Cryptol. ePrint Arch., 2006

On the security of stepwise triangular systems.
Des. Codes Cryptogr., 2006

Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions.
IEEE Trans. Inf. Theory, 2005

On the Algebraic Immunity of Symmetric Boolean Functions.
IACR Cryptol. ePrint Arch., 2005

On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Normality of Vectorial Functions.
Proceedings of the Cryptography and Coding, 2005

Probabilistic Algebraic Attacks.
Proceedings of the Cryptography and Coding, 2005

Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

The ANF of the Composition of Addition and Multiplication mod 2<sup>n</sup> with a Boolean Function.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Error-Set Codes and Related Objects.
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005

2004
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC.
IACR Cryptol. ePrint Arch., 2004

A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes.
IACR Cryptol. ePrint Arch., 2004

Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality.
IACR Cryptol. ePrint Arch., 2004

On Boolean Functions with Generalized Cryptographic Properties.
IACR Cryptol. ePrint Arch., 2004

On Cheating Immune Secret Sharing.
IACR Cryptol. ePrint Arch., 2004

Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties.
IACR Cryptol. ePrint Arch., 2004

Covering Radius of the (n-3)-rd Order Reed-Muller Code in the Set of Resilient Functions.
IACR Cryptol. ePrint Arch., 2004

A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions.
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004

2003
On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions.
Proceedings of the Cryptography and Coding, 2003

A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms.
Proceedings of the Advances in Cryptology, 2003


  Loading...