Roel Peeters

Orcid: 0000-0001-9646-8393

According to our database1, Roel Peeters authored at least 35 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Efficient and Privacy-Preserving Cryptographic Key Derivation From Continuous Sources.
IEEE Trans. Inf. Forensics Secur., 2019

2018
Digital signatures and signcryption schemes on embedded devices: a trade-off between computation and storage.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

2017
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol.
IACR Cryptol. ePrint Arch., 2017

Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

n-Auth: Mobile Authentication Done Right.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs.
IACR Cryptol. ePrint Arch., 2016

Insynd: Improved Privacy-Preserving Transparency Logging.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons.
IACR Cryptol. ePrint Arch., 2015

Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure.
IACR Cryptol. ePrint Arch., 2015

A Survey on Lightweight Entity Authentication with Strong PUFs.
ACM Comput. Surv., 2015

2014
Proper RFID Privacy: Model and Protocols.
IEEE Trans. Mob. Comput., 2014

Realizing Pico: Finally No More Passwords!
IACR Cryptol. ePrint Arch., 2014

Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible II.
IACR Cryptol. ePrint Arch., 2014

Collaborative joint content sharing for online social networks.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

Speedup for European ePassport Authentication.
Proceedings of the BIOSIG 2014, 2014

Shattering the Glass Maze.
Proceedings of the BIOSIG 2014, 2014

When a Bloom Filter is a Doom Filter: Security Assessment of a Novel Iris Biometric Template Protection System.
Proceedings of the BIOSIG 2014, 2014

2013
Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol.
IACR Cryptol. ePrint Arch., 2013

Distributed privacy-preserving transparency logging.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Efficient, secure, private distance bounding without key updates.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

IBIHOP: Proper Privacy Preserving Mutual RFID Authentication.
Proceedings of the Radio Frequency Identification System Security, 2013

Enhancing Transparency with Distributed Privacy-Preserving Logging.
Proceedings of the ISSE 2013, 2013

Privacy-Friendly Checking of Remote Token Blacklists.
Proceedings of the Policies and Research in Identity Management, 2013

Security considerations on extending PACE to a biometric-based connection establishment.
Proceedings of the 2013 BIOSIG, 2013

2012
Security Architecture for Things That Think (Beveiligingsarchitectuur voor intelligente objecten).
PhD thesis, 2012

Toward More Secure and Reliable Access Control.
IEEE Pervasive Comput., 2012

Wide Strong Private RFID Identification based on Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2012

Private Yoking Proofs: Attacks, Models and New Provable Constructions.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012

Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Threshold-Based Location-Aware Access Control.
Int. J. Handheld Comput. Res., 2011

Secure Negotiation for Manual Authentication Protocols.
Proceedings of the Communications and Multimedia Security, 2011

2010
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares.
IACR Cryptol. ePrint Arch., 2010

2009
Threshold things that think: usable authorization for resharing.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Threshold Things That Think: Authorisation for Resharing.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

2008
Cross-Context Delegation through Identity Federation.
Proceedings of the BIOSIG 2008, 2008


  Loading...