2019
Efficient and Privacy-Preserving Cryptographic Key Derivation From Continuous Sources.
IEEE Trans. Inf. Forensics Secur., 2019
2018
Digital signatures and signcryption schemes on embedded devices: a trade-off between computation and storage.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018
2017
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol.
IACR Cryptol. ePrint Arch., 2017
Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
n-Auth: Mobile Authentication Done Right.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs.
IACR Cryptol. ePrint Arch., 2016
Insynd: Improved Privacy-Preserving Transparency Logging.
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons.
IACR Cryptol. ePrint Arch., 2015
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure.
IACR Cryptol. ePrint Arch., 2015
A Survey on Lightweight Entity Authentication with Strong PUFs.
ACM Comput. Surv., 2015
2014
Proper RFID Privacy: Model and Protocols.
IEEE Trans. Mob. Comput., 2014
Realizing Pico: Finally No More Passwords!
IACR Cryptol. ePrint Arch., 2014
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible II.
IACR Cryptol. ePrint Arch., 2014
Collaborative joint content sharing for online social networks.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014
Speedup for European ePassport Authentication.
Proceedings of the BIOSIG 2014, 2014
Shattering the Glass Maze.
Proceedings of the BIOSIG 2014, 2014
When a Bloom Filter is a Doom Filter: Security Assessment of a Novel Iris Biometric Template Protection System.
Proceedings of the BIOSIG 2014, 2014
2013
Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol.
IACR Cryptol. ePrint Arch., 2013
Distributed privacy-preserving transparency logging.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Efficient, secure, private distance bounding without key updates.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication.
Proceedings of the Radio Frequency Identification System Security, 2013
Enhancing Transparency with Distributed Privacy-Preserving Logging.
Proceedings of the ISSE 2013, 2013
Privacy-Friendly Checking of Remote Token Blacklists.
Proceedings of the Policies and Research in Identity Management, 2013
Security considerations on extending PACE to a biometric-based connection establishment.
Proceedings of the 2013 BIOSIG, 2013
2012
Security Architecture for Things That Think (Beveiligingsarchitectuur voor intelligente objecten).
PhD thesis, 2012
Toward More Secure and Reliable Access Control.
IEEE Pervasive Comput., 2012
Wide Strong Private RFID Identification based on Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2012
Private Yoking Proofs: Attacks, Models and New Provable Constructions.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Threshold-Based Location-Aware Access Control.
Int. J. Handheld Comput. Res., 2011
Secure Negotiation for Manual Authentication Protocols.
Proceedings of the Communications and Multimedia Security, 2011
2010
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares.
IACR Cryptol. ePrint Arch., 2010
2009
Threshold things that think: usable authorization for resharing.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Threshold Things That Think: Authorisation for Resharing.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
2008
Cross-Context Delegation through Identity Federation.
Proceedings of the BIOSIG 2008, 2008