Stefaan Seys
Stefaan Seys
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα esat.kuleuven.be
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Towards measuring anonymity
C Diaz, S Seys, J Claessens, B Preneel
International Workshop on Privacy Enhancing Technologies, 54-68, 2002
9422002
ARM: Anonymous routing protocol for mobile ad hoc networks
S Seys, B Preneel
International Journal of Wireless and Mobile Computing 3 (3), 145-155, 2009
3022009
A framework for analyzing template security and privacy in biometric authentication systems
K Simoens, J Bringer, H Chabanne, S Seys
IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012
1102012
Power consumption evaluation of efficient digital signature schemes for low power devices
S Seys, B Preneel
WiMob'2005), IEEE International Conference on Wireless And Mobile Computing …, 2005
552005
Information theory and anonymity
C Dıaz, J Claessens, S Seys, B Preneel
Proceedings of the 23rd Symposium on Information Theory in the Benelux, 179-186, 2002
532002
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede
Personal and Ubiquitous Computing 16 (3), 323-335, 2012
462012
Secure JTAG implementation using Schnorr protocol
A Das, J Da Rolt, S Ghosh, S Seys, S Dupuis, G Di Natale, ML Flottes, ...
Journal of Electronic Testing 29 (2), 193-209, 2013
352013
Hierarchical ECC-based RFID authentication protocol
L Batina, S Seys, D Singelée, I Verbauwhede
International Workshop on Radio Frequency Identification: Security and …, 2011
322011
Privacy-preserving ECC-based grouping proofs for RFID
L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede
International conference on information security, 159-165, 2010
272010
Efficient cooperative signatures: A novel authentication scheme for sensor networks
S Seys, B Preneel
International Conference on Security in Pervasive Computing, 86-100, 2005
242005
The communication and computation cost of wireless security
D Singelée, S Seys, L Batina, I Verbauwhede
Proceedings of the fourth ACM conference on Wireless network security, 1-4, 2011
212011
Authenticated and efficient key management for wireless ad hoc networks
S Seys, B Preneel
Proceedings of the 24th Symposium on Information Theory in the Benelux, 195-202, 2003
212003
The wandering nodes: Key management for low-power mobile ad hoc networks
S Seys, B Preneel
25th IEEE International Conference on Distributed Computing Systems …, 2005
152005
Key establishment and authentication suite to counter DoS attacks in distributed sensor networks
S Seys, B Preneel
Unpublished manuscript). COSIC, 2002
152002
Challenge-response based secure test wrapper for testing cryptographic circuits
A Das, M Knezevic, S Seys, I Verbauwhede
IEEE European Test Symposium (ETS), 2011
112011
inshopnito: An advanced yet privacy-friendly mobile shopping application
A Put, I Dacosta, M Milutinovic, B De Decker, S Seys, F Boukayoua, ...
2014 IEEE World Congress on Services, 129-136, 2014
72014
Applications requirements for controlled anonymity
J Claessens, C Díaz, S Nikova, B De Win, C Goemans, M Loncke, ...
APES Deliverable D 7, 129, 2003
62003
Security issues for distributed sensor networks
S Seys, B Preneel
IWT, Mefisto-2000/06, 2003
52003
The Energy Budget for Wireless Security: Extended Version.
D Singelée, S Seys, L Batina, I Verbauwhede
IACR Cryptol. ePrint Arch. 2015, 1029, 2015
42015
Public-key Primitives
L Batina, S Seys, B Preneel, I Verbauwhede
Wireless sensor network security, 77-109, 2008
42008
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20