An Braeken
Orcid: 0000-0002-9965-915X
According to our database1,
An Braeken
authored at least 181 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
iVFAS: An Improved Vehicle-to-Fog Authentication System for Secure and Efficient Fog-Based Road Condition Monitoring.
IEEE Trans. Veh. Technol., September, 2024
Blockchain-Based Secure Authentication and Authorization Framework for Robust 5G Network Slicing.
IEEE Trans. Netw. Serv. Manag., August, 2024
Sensors, July, 2024
Sensors, February, 2024
Blockchain-Based Group Key Management Scheme for IoT With Anonymity of Group Members.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Sensors, 2024
Proceedings of the IEEE Vehicular Networking Conference, 2024
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2024
2023
Distributed-Proof-of-Sense: Blockchain Consensus Mechanisms for Detecting Spectrum Access Violations of the Radio Spectrum.
IEEE Trans. Cogn. Commun. Netw., October, 2023
μTesla-Based Authentication for Reliable and Secure Broadcast Communications in IoD Using Blockchain.
IEEE Internet Things J., October, 2023
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications.
Int. J. Crit. Infrastructure Prot., September, 2023
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing.
J. Supercomput., July, 2023
J. Inf. Secur. Appl., June, 2023
Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model.
Wirel. Networks, April, 2023
IEEE Trans. Sustain. Comput., 2023
Highly Efficient Bidirectional Multifactor Authentication and Key Agreement for Real-Time Access to Sensor Data.
IEEE Internet Things J., 2023
IEEE Access, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
A Blockchain-based Authentication Protocol for Metaverse Environments using a Zero Knowledge Proof.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Proceedings of the IEEE Latin-American Conference on Communications, 2023
Proceedings of the 6th IEEE International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, 2023
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
2022
J. Supercomput., 2022
Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing.
IEEE Trans. Ind. Informatics, 2022
Symmetric-Key-Based Authentication among the Nodes in a Wireless Sensor and Actuator Network.
Sensors, 2022
Time-Slotted Spreading Factor Hopping for Mitigating Blind Spots in LoRa-Based Networks.
Sensors, 2022
Flexible and Efficient Security Framework for Many-to-Many Communication in a Publish/Subscribe Architecture.
Sensors, 2022
Traffic Aware Scheduler for Time-Slotted Channel-Hopping-Based IPv6 Wireless Sensor Networks.
Sensors, 2022
In-depth energy analysis of security algorithms and protocols for the Internet of Things.
J. Cryptogr. Eng., 2022
Public key versus symmetric key cryptography in client-server authentication protocols.
Int. J. Inf. Sec., 2022
Future Gener. Comput. Syst., 2022
Comput. Networks, 2022
Experiences with on-premise open source cloud infrastructure with network performance validation.
Proceedings of the IECON 2022, 2022
Proceedings of the IECON 2022, 2022
2021
Pairing Free Certified Common Asymmetric Group Key Agreement Protocol for Data Sharing Among Users with Different Access Rights.
Wirel. Pers. Commun., 2021
Wirel. Networks, 2021
J. Supercomput., 2021
Highly efficient key agreement for remote patient monitoring in MEC-enabled 5G networks.
J. Supercomput., 2021
Time Slotted Channel Hopping and ContikiMAC for IPv6 Multicast-Enabled Wireless Sensor Networks.
Sensors, 2021
Secur. Commun. Networks, 2021
IEEE Open J. Comput. Soc., 2021
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain.
J. Netw. Comput. Appl., 2021
J. Inf. Secur. Appl., 2021
Privacy Protected Blockchain Based Architecture and Implementation for Sharing of Students' Credentials.
Inf. Process. Manag., 2021
Comput. Networks, 2021
oneVFC - A Vehicular Fog Computation Platform for Artificial Intelligence in Internet of Vehicles.
IEEE Access, 2021
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
2020
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020
Symmetric Key-Based Secure Storage and Retrieval of IoT Data on a Semi-trusted Cloud Server.
Wirel. Pers. Commun., 2020
Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak.
Sensors, 2020
J. Sensors, 2020
A Middleware based on Service Oriented Architecture for Heterogeneity Issues within the Internet of Things (MSOAH-IoT).
J. King Saud Univ. Comput. Inf. Sci., 2020
Inf. Technol. Manag., 2020
Elliptic curve-based proxy re-signcryption scheme for secure data storage on the cloud.
Concurr. Comput. Pract. Exp., 2020
Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability.
Comput. Networks, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Multi-Access Edge Computing and Blockchain-based Secure Telehealth System Connected with 5G and IoT.
Proceedings of the IEEE Global Communications Conference, 2020
Efficient Mobile User Authentication Service with Privacy Preservation and User Untraceability.
Proceedings of the 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, 2020
Proceedings of the 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, 2020
Proceedings of the 2nd 6G Wireless Summit, 2020
2019
Wirel. Pers. Commun., 2019
CABE: A Cloud-Based Acoustic Beamforming Emulator for FPGA-Based Sound Source Localization.
Sensors, 2019
Design Exploration and Performance Strategies towards Power-Efficient FPGA-Based Architectures for Sound Source Localization.
J. Sensors, 2019
Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates.
KSII Trans. Internet Inf. Syst., 2019
Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks.
Comput., 2019
Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement.
IEEE Access, 2019
Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks.
IEEE Access, 2019
Proceedings of the 11th International Workshop on Resilient Networks Design and Modeling, 2019
Proceedings of the IEEE International Symposium on Local and Metropolitan Area Networks, 2019
Proceedings of the IEEE International Symposium on Local and Metropolitan Area Networks, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the 29th International Conference on Field Programmable Logic and Applications, 2019
Probabilistic Performance Modelling when Using Partial Reconfiguration to Accelerate Streaming Applications with Non-deterministic Task Scheduling.
Proceedings of the Applied Reconfigurable Computing - 15th International Symposium, 2019
2018
An efficient anonymous authentication protocol in multiple server communication networks (EAAM).
J. Supercomput., 2018
J. Parallel Distributed Comput., 2018
Exploiting Partial Reconfiguration through PCIe for a Microphone Array Network Emulator.
Int. J. Reconfigurable Comput., 2018
Concurr. Comput. Pract. Exp., 2018
Concurr. Comput. Pract. Exp., 2018
FPGA-Based Architectures for Acoustic Beamforming with Microphone Arrays: Trends, Challenges and Research Opportunities.
Comput., 2018
Proceedings of the 13th International Symposium on Reconfigurable Communication-centric Systems-on-Chip, 2018
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018
Proceedings of the 20th IEEE International Conference on e-Health Networking, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018
Design and implementation of a smart gateway for IoT applications using heterogeneous smart objects.
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018
Digital signatures and signcryption schemes on embedded devices: a trade-off between computation and storage.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018
A Low-Power FPGA-Based Architecture for Microphone Arrays in Wireless Sensor Networks.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2018
2017
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things.
Wirel. Pers. Commun., 2017
An Improved E-Payment System and Its Extension to a Payment System for Visually Impaired and Blind People with User Anonymity.
Wirel. Pers. Commun., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Design Considerations When Accelerating an FPGA-Based Digital Microphone Array for Sound-Source Localization.
J. Sensors, 2017
Comput. Networks, 2017
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017
Proceedings of the Computer Network Security, 2017
An AAL-oriented measurement-based evaluation of different HTTP-based data transport protocols.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Identity privacy preserving biometric based authentication scheme for Naked healthcare environment.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017
From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges.
Proceedings of the 2017 European Conference on Networks and Communications, 2017
2016
Sensors, 2016
Int. J. Distributed Sens. Networks, 2016
Proceedings of the 26th International Conference on Field Programmable Logic and Applications, 2016
Runtime reconfigurable beamforming architecture for real-time sound-source localization.
Proceedings of the 26th International Conference on Field Programmable Logic and Applications, 2016
Proceedings of the Applied Reconfigurable Computing - 12th International Symposium, 2016
2015
An Ultrasonic Multiple-Access Ranging Core Based on Frequency Shift Keying Towards Indoor Localization.
Sensors, 2015
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications.
IEEE Access, 2015
Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015
Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
Proceedings of the ICT Innovations 2015, 2015
Proceedings of the IEEE International Conference on Communication, 2015
Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the Applied Reconfigurable Computing - 11th International Symposium, 2015
2014
Ultrasonic Multiple-Access Ranging System Using Spread Spectrum and MEMS Technology for Indoor Localization.
Sensors, 2014
Int. J. Eng. Pedagog., 2014
2013
Extending the IEEE 802.15.4 Security Suite with a Compact Implementation of the NIST P-192/B-163 Elliptic Curves.
Sensors, 2013
Performance Modeling for FPGAs: Extending the Roofline Model with High-Level Synthesis Tools.
Int. J. Reconfigurable Comput., 2013
Int. J. Online Eng., 2013
Ad Hoc Sens. Wirel. Networks, 2013
Proceedings of the Parallel Computing: Accelerating Computational Science and Engineering (CSE), 2013
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013
Proceedings of the 2013 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2013
A performance comparison study of ECC and AES in commercial and research sensor nodes.
Proceedings of Eurocon 2013, 2013
2012
Int. J. Eng. Pedagog., 2012
Proceedings of the Transition of HPC Towards Exascale Computing, 2012
Proceedings of the IEEE Global Engineering Education Conference, 2012
2011
Proceedings of the 6th International Workshop on Reconfigurable Communication-centric Systems-on-Chip, 2011
Proceedings of the Information Security Technology for Applications, 2011
Proceedings of the Public Key Infrastructures, Services and Applications, 2011
2010
Proceedings of the Dynamically Reconfigurable Architectures, 11.07. - 16.07.2010, 2010
Proceedings of the 21st IEEE International Conference on Application-specific Systems Architectures and Processors, 2010
2009
Proceedings of the 19th International Conference on Field Programmable Logic and Applications, 2009
2006
IEEE Trans. Inf. Theory, 2006
IACR Cryptol. ePrint Arch., 2006
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions.
IEEE Trans. Inf. Theory, 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
The ANF of the Composition of Addition and Multiplication mod 2<sup>n</sup> with a Boolean Function.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties.
IACR Cryptol. ePrint Arch., 2004
Covering Radius of the (n-3)-rd Order Reed-Muller Code in the Set of Resilient Functions.
IACR Cryptol. ePrint Arch., 2004
A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions.
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004
2003
On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions.
Proceedings of the Cryptography and Coding, 2003
Proceedings of the Advances in Cryptology, 2003