Towards measuring anonymity C Diaz, S Seys, J Claessens, B Preneel International Workshop on Privacy Enhancing Technologies, 54-68, 2002 | 1070 | 2002 |
ARM: Anonymous routing protocol for mobile ad hoc networks S Seys, B Preneel International Journal of Wireless and Mobile Computing 3 (3), 145-155, 2009 | 308 | 2009 |
A framework for analyzing template security and privacy in biometric authentication systems K Simoens, J Bringer, H Chabanne, S Seys IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012 | 150 | 2012 |
Power consumption evaluation of efficient digital signature schemes for low power devices S Seys, B Preneel WiMob'2005), IEEE International Conference on Wireless And Mobile Computing …, 2005 | 61 | 2005 |
Secure JTAG implementation using Schnorr protocol A Das, J Da Rolt, S Ghosh, S Seys, S Dupuis, G Di Natale, ML Flottes, ... Journal of Electronic Testing 29, 193-209, 2013 | 55 | 2013 |
Information theory and anonymity C Dıaz, J Claessens, S Seys, B Preneel Proceedings of the 23rd Symposium on Information Theory in the Benelux, 179-186, 2002 | 54 | 2002 |
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede Personal and Ubiquitous Computing 16, 323-335, 2012 | 49 | 2012 |
Hierarchical ECC-based RFID authentication protocol L Batina, S Seys, D Singelée, I Verbauwhede RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012 | 37 | 2012 |
Privacy-preserving ECC-based grouping proofs for RFID L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011 | 30 | 2011 |
The communication and computation cost of wireless security D Singelée, S Seys, L Batina, I Verbauwhede Proceedings of the fourth ACM conference on Wireless network security, 1-4, 2011 | 24 | 2011 |
Authenticated and efficient key management for wireless ad hoc networks S Seys, B Preneel Proceedings of the 24th Symposium on Information Theory in the Benelux, 195-202, 2003 | 22 | 2003 |
Efficient cooperative signatures: A novel authentication scheme for sensor networks S Seys, B Preneel International Conference on Security in Pervasive Computing, 86-100, 2005 | 21 | 2005 |
Key establishment and authentication suite to counter DoS attacks in distributed sensor networks S Seys, B Preneel Unpublished manuscript). COSIC, 2002 | 15 | 2002 |
The wandering nodes: Key management for low-power mobile ad hoc networks S Seys, B Preneel 25th IEEE International Conference on Distributed Computing Systems …, 2005 | 13 | 2005 |
Challenge-response based secure test wrapper for testing cryptographic circuits A Das, M Knezevic, S Seys, I Verbauwhede IEEE European Test Symposium (ETS), 672-677, 2011 | 11 | 2011 |
inshopnito: An advanced yet privacy-friendly mobile shopping application A Put, I Dacosta, M Milutinovic, B De Decker, S Seys, F Boukayoua, ... 2014 IEEE World Congress on Services, 129-136, 2014 | 8 | 2014 |
Cryptographic algorithms and protocols for security and privacy in wireless ad hoc networks S Seys Catholic University Leuven Secure Communications:‘End-to-end encryption’in …, 2006 | 6 | 2006 |
Applications requirements for controlled anonymity J Claessens, C Díaz, S Nikova, B De Win, C Goemans, M Loncke, ... APES Deliverable D 7, 129, 2003 | 6 | 2003 |
The energy budget for wireless security: Extended version D Singelée, S Seys, L Batina, I Verbauwhede Cryptology ePrint Archive, 2015 | 5 | 2015 |
Security issues for distributed sensor networks S Seys, B Preneel IWT, Mefisto-2000/06, 2003 | 5 | 2003 |