Dave Singelée
Orcid: 0000-0001-9084-698X
According to our database1,
Dave Singelée
authored at least 57 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE Vehicular Networking Conference, 2024
Proceedings of the IEEE Symposium on Computers and Communications, 2024
2023
IEEE Internet Things J., 2023
ACM Comput. Surv., 2023
Proceedings of the IEEE Secure Development Conference, 2023
Encrypted Traffic Classification for Early-Stage Anomaly Detection in Power Grid Communication Network.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
In-depth energy analysis of security algorithms and protocols for the Internet of Things.
J. Cryptogr. Eng., 2022
Future Gener. Comput. Syst., 2022
T-HIBE: A Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT Systems.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
2020
Poster: Securing IoT Through Coverage-Bounding Wireless Communication With Visible Light.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020
Proceedings of the ESSE 2020: 2020 European Symposium on Software Engineering, 2020
2019
On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
2018
The Impact of Pulsed Electromagnetic Fault Injection on True Random Number Generators.
Proceedings of the 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Digital signatures and signcryption schemes on embedded devices: a trade-off between computation and storage.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018
HeComm: End-to-end secured communication in a heterogeneous IoT environment via fog computing.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
2017
Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Proceedings of the 21th IEEE European Test Symposium, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, 2016
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
IACR Cryptol. ePrint Arch., 2015
2013
Ad Hoc Sens. Wirel. Networks, 2013
2012
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs.
Pers. Ubiquitous Comput., 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
2010
Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Ad Hoc Sens. Wirel. Networks, 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the Mobile Lightweight Wireless Systems, 2010
Proceedings of the Information Security - 13th International Conference, 2010
2009
2008
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008
2007
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
2006
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006
2005
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005
2004
Proceedings of the Communications and Multimedia Security, 2004