Filter
Conference contribution

Search results

  • 2017

    Reliable Machine Learning for Networking: Key Issues and Approaches

    Hammerschmidt, C. A., Garcia, S., Verwer, S. & State, R., 2017, 2017 IEEE 42nd conference on Local Computer Networks, LCN 2017. IEEE, p. 167-170 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Trade-Offs for S-boxes: Cryptographic Properties and Side-Channel Resilience

    Carlet, C., Heuser, A. & Picek, S., 2017, Applied Cryptography and Network Security : 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Cham: Springer, p. 393-414 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • 2016

    A Privacy-Preserving GWAS Computation with Homomorphic Encryption

    Ugwuoke, C., Erkin, Z. & Lagendijk, I., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 166-173 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    102 Downloads (Pure)
  • Behavioral Clustering of Non-Stationary IP Flow Record Data

    Hammerschmidt, C., Marchal, S., State, R. & Verwer, S., Nov 2016, 12th International Conference on Network and Service Management CNSM 2016. Piscataway, NJ: IEEE, p. 253-257 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    10 Citations (Scopus)
  • Cyber Weapons: a Profiling Framework

    Maathuis, C., Pieters, W. & van den Berg, J., 2016, Proceedings of International conference on cyber conflict: Protecting the future. IEEE

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Efficient Learning of Communication Profiles from IP Flow Records

    Hammerschmidt, C., Marchal, S., State, R., Pellegrino, N. & Verwer, S., 2016, Proceedings - 2016 IEEE 41st Conference on Local Computer Networks, LCN 2016. Kellenberger, P. (ed.). Los Alamitos, CA: IEEE, p. 1-4 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    11 Citations (Scopus)
    41 Downloads (Pure)
  • Enhancing privacy of users in eID schemes

    Shrishak, K., Erkin, Z. & Schaar, R., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 158-165 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    61 Downloads (Pure)
  • Enhancing user privacy in federated eID schemes

    Shrishak, K., Erkin, Z. & Schaar, R., 22 Dec 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security ( NTMS). Badra, M., Pau, G. & Vassiliou, V. (eds.). Piscataway: IEEE, p. 1-5 5 p. 7792448

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Flexible State-Merging for learning (P)DFAs in Python

    Hammerschmidt, C., Loos, B., State, R., Engel, T. & Verwer, S., 2016, Proceedings of The 13th International Conference on Grammatical Inference: The JMLR Workshop and Conference, The Sequence PredictIction ChallengE (SPiCe). Verwer, S., van Zaanen, M. & Smetsers, R. (eds.). JMLR, Vol. 57. p. 154-159 6 p. (JMLR: Workshop and Conference Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Learning Algorithms for Digital Reconstruction of Van Gogh’s Drawings

    Zeng, Y., Tang, J., van der Lubbe, J. & Loog, M., 2016, EuroMed 2016 - 6th International Conference - Proceedings: Digital Heritage - Progress in Cultural Heritage: Documentation, Preservation, and Protection. Ioannides, M., Vink, E., Moropoulou, A., Hagedorn-Saupe, M., Fresa, A., Liestøl, G., Rajcic, V. & Grussenmeyer, P. (eds.). Cham: Springer, Vol. 1. p. 322-333 12 p. (Lecture Notes in Computer Science; vol. 10058).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Learning Complex Uncertain States Changes via Asymmetric Hidden Markov Models: An Industrial Case

    Bueno, M. L. P., Hommersom, A., Lucas, P. J. F., Verwer, S. & Linard, A., 2016, Proceedings of the Eighth International Conference on Probabilistic Graphical Models : The JMLR Workshop and Conference PGM 2016. Antonucci, A., Corani, G. & de Campos, C. P. (eds.). JMLR, Vol. 52. p. 50-61 12 p. (JMLR: Workshop and Conference Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Learning Deterministic Finite Automata from Innite Alphabets

    Pellegrino, N., Hammerschmidt, C., Verwer, S. & Lin, Q., 2016, Proceedings of The 13th International Conference on Grammatical Inference: The JMLR Workshop and Conference, The Sequence PredictIction ChallengE (SPiCe). Verwer, S., van Zaanen, M. & Smetsers, R. (eds.). JMLR, Vol. 57. p. 69-72 5 p. (JMLR: Workshop and Conference Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • On the Energy Benefit of Compute-and-forward for Multiple Unicasts

    Ren, Z., Goseling, J., Weber, J. & Gastpar, M., 2016, Proceedings ISIT 2016: 2016 IEEE International Symposium on Information Theory. Piscataway, NJ: IEEE, p. 2334-2338 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    42 Downloads (Pure)
  • Privacy-Preserving Alpha Algorithm for Software Analysis

    Tillem, G., Erkin, Z. & Lagendijk, I., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 136-143 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    262 Downloads (Pure)
  • Remote Identification of Port Scan Toolchains

    Ghiëtte, V., Blenn, N. & Doerr, C., 2016, IFIP International Conference on New Technologies, Mobility and Security. Badra, M., Pau, G. & Vassiliou, V. (eds.). Piscataway, NJ: IEEE, p. 1-5 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    332 Downloads (Pure)
  • Scan Prediction and Reconnaissance Mitigation through Commodity Graphics Cards

    Doerr, C., El Maouchi, M., Kamoen, S. & Moree, J., 2016, IEEE Conference on Communications and Network Security. IEEE, p. 1-9 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Secure Key-Exchange Protocol for Implants Using Heartbeats

    Seepers, R., Weber, J., Erkin, Z., Sourdis, Y. & Strydis, C., 2016, Proceedings of the ACM International Conference on Computing Frontiers, CF '16. New York: Association for Computing Machinery (ACM), p. 119-126 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    21 Citations (Scopus)
  • Secure Matching of Dutch Car License Plates

    Bindu Sunil, A., Erkin, Z. & Veugen, T., 2016, 24th European Signal Processing Conference, EUSIPCO 2016. Piscataway: IEEE, p. 2116-2120 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Secure public-auditing cloud storage enabling data dynamics in the standard model

    Ma, M., Weber, J. & Van Den Berg, J., 2016, Proceedings - 3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications, DIPDMWC 2016. Piscataway, NJ: IEEE, p. 170-175 6 p. 7529384

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Simple Systematic Pearson Coding

    Weber, J., Swart, T. & Schouhamer Immink, KA., 2016, Proceedings ISIT 2016: 2016 IEEE International Symposium on Information Theory. IEEE, p. 385-389 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    38 Downloads (Pure)
  • TaleBox: A mobile game for mixed-initiative story creation

    Castaño Pérez, O., Kybartas, B. & Bidarra, R., 2016, Proceedings of DiGRA-FDG 2016: First Joint International Conference of DiGRA and FDG. p. 1-2 2 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

    File
    40 Downloads (Pure)
  • Understanding bifurcation of slow versus fast cyber-attackers

    van Wieren, M., Doerr, C., Jacobs, V. & Pieters, W., 2016, Data Privacy Management and Security Assurance: 11th International Workshop DPM 2016 and 5th International Workshop QASA 2016. Livraga, G., Torra, V., Aldini, A., Martinelli, F. & Suri, N. (eds.). Cham: Springer, p. 19-33 15 p. (Lecture notes in computer science; vol. 9963).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • 2013

    Privacy-preserving distributed speech enhancement forwireless sensor networks by processing in the encrypted domain

    Hendriks, R. C., Erkin, Z. & Gerkmann, T., 2013, 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings. p. 7005-7009 5 p. 6639020. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    14 Citations (Scopus)
  • Towards an Error Control Scheme for a Publish/Subscribe Network

    Stais, C., Voulimeneas, A. & Xylomenos, G., 2013, 2013 National Conference on Communications, NCC 2013.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • 2010

    Cryptographically secure pseudo-random bit generator for RFID tags

    Peris-Lopez, P., San Millan, E., Van Der Lubbe, J. C. A. & Entrena, L. A., 2010, 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010. 5678035

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    24 Citations (Scopus)
  • Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security

    Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. M. E., Palomar, E. & Van Der Lubbe, J. C. A., 2010, RFID 2010: International IEEE Conference on RFID. Piscataway, NJ: IEEE, p. 45-52 8 p. 5467258

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    20 Citations (Scopus)
  • Digital analysis of papers for the authentication and dating of art

    Pourebrahimi, B., Van Der Lubbe, J. C. A. & Dietz, G., 2010, Proceedings of the 12th IASTED International Conference on Signal and Image Processing, SIP 2010. p. 93-100 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)