Filter
Conference contribution

Search results

  • 2020

    Performance analysis of multilayer perceptron in profiling side-channel analysis

    Weissbart, L., 2020, Applied Cryptography and Network Security Workshops : ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA. Zhou, J., Ahmed, C. M., Conti, M., Losiouk, E., Au, M. H., Batina, L., Li, Z., Lin, J., Luo, B., Majumdar, S., Meng, W., Ochoa, M., Picek, S., Portokalidis, G., Wang, C. & Zhang, K. (eds.). Cham: Springer, p. 198-216 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12418 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Post-quantum adaptor signatures and payment channel networks

    Esgin, M. F., Ersoy, O. & Erkin, Z., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings: 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Part II ed. Cham: Springer, p. 378-397 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    12 Citations (Scopus)
    80 Downloads (Pure)
  • PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model

    Ugwuoke, C., Erkin, Z., Reinders, M. & Lagendijk, R., 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Carminati, B. & Kantarcioglu, M. (eds.). Association for Computing Machinery (ACM), p. 329-340 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    92 Downloads (Pure)
  • Quality Evaluation of Cyber Threat Intelligence Feeds

    Griffioen, H., Booij, T. & Doerr, C., 2020, Applied Cryptography and Network Security. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Part II ed. Cham: Springer, p. 277-296 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12147 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    23 Citations (Scopus)
  • Scaling website fingerprinting

    Ghiette, V. & Doerr, C., 2020, 2020 IFIP Networking Conference (Networking): Proceedings. IEEE, p. 199-207 9 p. 9142795

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • The Robust Malware Detection Challenge and Greedy Random Accelerated Multi-Bit Search

    Verwer, S. E., Nadeem, A., Hammerschmidt, C. A., Bliek, L., Al-Dujaili, A. & O’Reilly, U-M., 2020, Workshop on artificial intelligence and security. New York: Association for Computing Machinery (ACM), p. 61-70 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    8 Citations (Scopus)
    199 Downloads (Pure)
  • Towards an evolutionary-based approach for natural language processing

    Manzoni, L., Jakobovic, D., Mariot, L., Picek, S. & Castelli, M., 2020, GECCO 2020 : Proceedings of the 2020 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 985-993 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    53 Downloads (Pure)
  • Using datasets from industrial control systems for cyber security research and education

    Lin, Q., Verwer, S., Kooij, R. & Mathur, A., 2020, Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Revised Selected Papers. Nadjm-Tehrani, S. (ed.). Springer, Vol. 11777. p. 122-133 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11777 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    37 Downloads (Pure)
  • What Is Your MOVE: Modeling Adversarial Network Environments

    Knezevic, K., Picek, S., Jakobovic, D. & Hernandez-Castro, J., 2020, Applications of Evolutionary Computation : 23rd European Conference, EvoApplications 2020, Held as Part of EvoStar 2020, Proceedings. Castillo, P. A., Jiménez Laredo, J. L. & Fernández de Vega, F. (eds.). Cham: Springer, p. 260-275 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12104 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    83 Downloads (Pure)
  • 2019

    A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement Enforcement

    Zhou, H., Ouyang, X., Ren, Z., Su, J., de Laat, C. & Zhao, Z., 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. Piscataway, NJ: IEEE, p. 1567-1575 9 p. 8737580

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    75 Citations (Scopus)
  • A Blockchain Consensus Protocol with Horizontal Scalability

    Cong, K., Ren, Z. & Pouwelse, J., 2019, 2018 IFIP Networking Conference (IFIP Networking) and Workshops : Proceedings. Stiller, B. (ed.). Piscataway, NJ, USA: IEEE, p. 424-432 9 p. 8696555

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    12 Citations (Scopus)
  • A characterisation of S-box fitness landscapes in cryptography

    Jakobovic, D., Picek, S., Martins, M. S. R. & Wagner, M., 2019, GECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference: Proceedings of the 2019 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 285-293 9 p. (GECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • A novel approach for data packing: Using trapdoor knapsack

    Nateghizad, M., Erkin, Z. & Lagendijk, R. L., 2019, 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Kumar, A., Yuen, P. C. & Huang, J. (eds.). Piscataway: IEEE, p. 1-6 6 p. 8630769

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller

    Uetake, Y., Yoshimoto, K., Kodera, Y., Weissbart, L., Kusaka, T. & Nogami, Y., 2019, Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019. Institute of Electrical and Electronics Engineers (IEEE), p. 225-231 7 p. 8958444

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • C3PO: Cipher Construction with Cartesian genetic PrOgramming

    Picek, S., Knezevic, K., Jakobovic, D. & Derek, A., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 1625-1633 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Challenges in deep learning-based profiled side-channel analysis

    Picek, S., 1 Jan 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, Vol. 11947. p. 9-12 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel

    Batina, L., Jap, D., Bhasin, S. & Picek, S., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 515-532 18 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    101 Downloads (Pure)
  • Decouples: A Decentralized, Unlinkable and Privacy-preserving Traceability System for the Supply Chain

    El Maouchi, M., Ersoy, O. & Erkin, Z., 2019, Proceedings of the ACM Symposium on Applied Computing: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing . New York, NY, USA: Association for Computing Machinery (ACM), Vol. F147772. p. 364-373 10 p. (Proceedings of the ACM Symposium on Applied Computing; vol. Part F147772).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    17 Citations (Scopus)
  • Designing a Cognitive Agent Connector for Complex Environments: A Case Study with StarCraft

    Koeman, V. J., Griffioen, H. J., Plenge, D. C. & Hindriks, K. V., 2019, Engineering Multi-Agent Systems : 6th International Workshop, EMAS 2018, Revised Selected Papers. Mascardi, V., Weyns, D. & Ricci, A. (eds.). Cham: Springer, p. 302-319 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11375 LNAI).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • DNS Observatory: The big picture of the DNS

    Foremski, P., Gasser, O. & Moura, G. C. M., 21 Oct 2019, IMC'19 : Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery (ACM), p. 87-100 14 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    19 Citations (Scopus)
  • ECONoMy: Ensemble collaborative learning using masking

    Van De Kamp, L., Ugwuoke, C. & Erkin, Z., 1 Sept 2019, 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC Workshops 2019. Institute of Electrical and Electronics Engineers (IEEE), 7 p. 8880822. (2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC Workshops 2019).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Evolutionary algorithms for the design of quantum protocols

    Krawec, W., Picek, S. & Jakobovic, D., 2019, Applications of Evolutionary Computation: 22nd International Conference, EvoApplications 2019, Held as Part of EvoStar 2019. Kaufmann, P. & Castillo, P. A. (eds.). Cham: Springer, p. 220-236 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11454 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Fingerprinting tooling used for SSH compromisation attempts

    Ghiëtte, V., Griffioen, H. & Doerr, C., 2019, RAID 2019 Proceedings : 22nd International Symposium on Research in Attacks, Intrusions and Defenses. USENIX Association, p. 61-71 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    52 Downloads (Pure)
  • Hyper-bent Boolean Functions and Evolutionary Algorithms

    Mariot, L., Jakobovic, D., Leporati, A. & Picek, S., 2019, Genetic Programming : 22nd European Conference, EuroGP 2019, Held as Part of EvoStar 2019, Proceedings. Sekanina, L., Hu, T., Richter, H., García-Sánchez, P. & Lourenço, N. (eds.). Cham: Springer, p. 262-277 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11451 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Improving Side-Channel Analysis Through Semi-Supervised Learning

    Picek, S., Heuser, A., Jovic, A., Knezevic, K. & Richmond, T., 2019, Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Revised Selected Papers. Bilgin, B. & Fischer, J-B. (eds.). Cham: Springer, Vol. 11389. p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11389).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Inadvertently making cyber criminals rich: A comprehensive study of cryptojacking campaigns at internet scale

    Bijmans, H. L. J., Booij, T. M. & Doerr, C., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1627-1644 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    37 Citations (Scopus)
    326 Downloads (Pure)
  • Just the tip of the iceberg: Internet-scale exploitation of routers for cryptojacking

    Bijmans, H. L. J., Booij, T. M. & Doerr, C., 2019, CCS'19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 449-464 16 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    24 Citations (Scopus)
  • Learning optimal classification trees using a binary linear program formulation

    Verwer, S. & Zhang, Y., 2019, Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence . Palo ALto: Association for the Advancement of Artificial Intelligence (AAAI), Vol. 33. p. 1625-1632 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    21 Downloads (Pure)
  • MUSCLE: Authenticated External Data Retrieval from Multiple Sources for Smart Contracts

    van der Laan, B., Ersoy, O. & Erkin, Z., 2019, Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC '19. Hung, C-C. & Papadopoulos, G. A. (eds.). New York, NY: Association for Computing Machinery (ACM), Vol. F147772. p. 382-391 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • One trace is all it takes: machine learning-based side-channel attack on EDDSA

    Weissbart, L., Picek, S. & Batina, L., 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, p. 86-105 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    27 Citations (Scopus)
  • On the design of S-box constructions with genetic programming

    Picek, S. & Jakobovic, D., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 395-396 2 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • On the Statistical Detection of Adversarial Instances over Encrypted Data

    Sheikhalishahi, M., Nateghizad, M., Martinelli, F., Erkin, Z. & Loog, M., 2019, Security and Trust Management - 15th International Workshop, STM 2019, Proceedings. Mauw, S. & Conti, M. (eds.). Springer, Vol. 11738. p. 71-88 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11738 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Poster: Recovering the input of neural networks via single shot side-channel attacks

    Batina, L., Bhasin, S., Jap, D. & Picek, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2657-2659 3 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • Poster: When adversary becomes the guardian - Towards side-channel security with adversarial attacks

    Picek, S., Jap, D. & Bhasin, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2673-2675 3 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Privacy-preserving multi-party access control

    Sheikhalishahi, M., Tillem, G., Erkin, Z. & Zannone, N., 2019, WPES'19: Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society. New York: Association for Computing Machinery (ACM), p. 1-13 13 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Private Data Aggregation in Decentralized Networks

    Setia, P. K., Tillem, G. & Erkin, Z., 2019, 2019 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG). Cetin, A. (ed.). IEEE, p. 76-80 5 p. 8782377

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer

    Karakoç, F., Nateghizad, M. & Erkin, Z., 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019: Proceedings of the 14th International Conference on Availability, Reliability and Security. New York: Association for Computing Machinery (ACM), p. 1-9 9 p. 3339264. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • SoK: ATT&CK techniques and trends in windows malware

    Oosthoek, K. & Doerr, C., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, Vol. 304. p. 406-425 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    25 Citations (Scopus)
  • SoK: On DFA Vulnerabilities of Substitution-Permutation Networks

    Khairallah, M., Hou, X., Najm, Z., Breier, J., Bhasin, S. & Peyrin, T., 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 403-414 12 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Taxonomy and adversarial strategies of random subdomain attacks

    Griffioen, H. & Doerr, C., 2019, 2019 10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019 - Proceedings and Workshop: Proceedings. Piscataway: IEEE, p. 1-5 5 p. 8763820. (2019 10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019 - Proceedings and Workshop).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • The curious case of port 0

    Luchs, M. & Doerr, C., 1 May 2019, 2019 IFIP Networking Conference, IFIP Networking 2019. IEEE, p. 1-9 9 p. 8816853. (2019 IFIP Networking Conference, IFIP Networking 2019).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Tulip: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication

    Ersoy, O., Erkin, Z. & Lagendijk, R. L., 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019: Proceedings. IEEE, p. 396-405 10 p. 8802398. (Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design

    Ren, Z. & Erkin, Z., 2019, Financial Cryptography and Data Security : 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Cham: Springer, Vol. 11598. p. 487-507 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598)(Security and Cryptology; vol. 11598).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    75 Downloads (Pure)
  • Victim-aware adaptive covert channels

    Bortolameotti, R., van Ede, T., Continella, A., Everts, M., Jonker, W., Hartel, P. & Peter, A., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, Vol. 304. p. 450-471 22 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • 2018

    A Blockchain-based Signature Scheme for Dynamic Coalitions

    Sewsingh, R. A., van der Lubbe, J. & de Boer, M. J., 2018, Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux. Spreeuwers, L. & Goseling, J. (eds.). IEEE Benelux Section, Werkgemeenschap voor Informatie- en Communicatietheorie, p. 182-190 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • A computational ontology for cyber operations

    Maathuis, C., Pieters, W. & Van Den Berg, J., 2018, Proceedings of the 17th European Conference on Cyber Warfare and Security, ECCWS 2018. Josang, A. (ed.). IARIA / Curran Associates, Vol. 2018-June. p. 278-287 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • A data-driven behavior generation algorithm in car-following scenarios

    Zhang, Y., Lin, Q., Wang, J., Verwer, S. & Dolan, J. M., 2018, Dynamics of Vehicles on Roads and Tracks: Proceedings of the 25th International Symposium on Dynamics of Vehicles on Roads and Tracks (IAVSD 2017) . Spiryagin, M., Gordon, T., Cole, C. & McSweeney, T. (eds.). Leiden: CRC Press, Vol. 1. p. 1-2 2 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • A Fault-tolerant and Efficient Scheme for Data Aggregation Over Groups in the Smart Grid

    Knirsch, F., Engel, D. & Erkin, Z., 2018, 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017. Piscataway, NJ: IEEE, Vol. 2018-January. p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • AHEad: Privacy-preserving Online Behavioural Advertising using Homomorphic Encryption

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2018, 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017. Piscataway, NJ: IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • An Efficient Privacy-preserving Recommender System for e-Healthcare systems

    Verhaert, D., Nateghizad, M. & Erkin, Z., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 188-199 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review