Stefaan Seys

According to our database1, Stefaan Seys authored at least 16 papers between 2002 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
The Energy Budget for Wireless Security: Extended Version.
IACR Cryptol. ePrint Arch., 2015

2014
inShopnito: An Advanced yet Privacy-Friendly Mobile Shopping Application.
Proceedings of the 2014 IEEE World Congress on Services, 2014

2013
Secure JTAG Implementation Using Schnorr Protocol.
J. Electron. Test., 2013

2012
A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems.
IEEE Trans. Inf. Forensics Secur., 2012

Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs.
Pers. Ubiquitous Comput., 2012

2011
Analysis of Biometric Authentication Protocols in the Blackbox Model
CoRR, 2011

The communication and computation cost of wireless security: extended abstract.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Hierarchical ECC-Based RFID Authentication Protocol.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

2010
Privacy-Preserving ECC-Based Grouping Proofs for RFID.
Proceedings of the Information Security - 13th International Conference, 2010

2009
ARM: anonymous routing protocol for mobile ad hoc networks.
Int. J. Wirel. Mob. Comput., 2009

User Privacy in RFID Networks.
Proceedings of the ISSE 2009, 2009

2008
The security of mass transport ticketing systems.
Proceedings of the ISSE 2008, 2008

2005
Power consumption evaluation of efficient digital signature schemes for low power devices.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

2002
Towards Measuring Anonymity.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002


  Loading...