Privacy weaknesses in biometric sketches K Simoens, P Tuyls, B Preneel 2009 30th IEEE Symposium on Security and Privacy, 188-203, 2009 | 249 | 2009 |
A framework for analyzing template security and privacy in biometric authentication systems K Simoens, J Bringer, H Chabanne, S Seys IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012 | 150 | 2012 |
Dynamic random projection for biometric template protection B Yang, D Hartung, K Simoens, C Busch 2010 Fourth IEEE international conference on biometrics: theory …, 2010 | 133 | 2010 |
Criteria towards metrics for benchmarking template protection algorithms K Simoens, B Yang, X Zhou, F Beato, C Busch, EM Newton, B Preneel 2012 5th IAPR International Conference on Biometrics (ICB), 498-505, 2012 | 87 | 2012 |
A survey of authentication and communications security in online banking S Kiljan, K Simoens, DD Cock, MV Eekelen, H Vranken ACM Computing Surveys (CSUR) 49 (4), 1-35, 2016 | 64 | 2016 |
Pseudo identities based on fingerprint characteristics N Delvaux, H Chabanne, J Bringer, B Kindarji, P Lindeberg, J Midgren, ... 2008 International Conference on Intelligent Information Hiding and …, 2008 | 38 | 2008 |
Secure and privacy-friendly logging for egovernment services K Wouters, K Simoens, D Lathouwers, B Preneel 2008 Third International Conference on Availability, Reliability and …, 2008 | 31 | 2008 |
A survey of the security and privacy measures for anonymous biometric authentication systems I Buhan, E Kelkboom, K Simoens 2010 Sixth International Conference on Intelligent Information Hiding and …, 2010 | 20 | 2010 |
Reversing protected minutiae vicinities K Simoens, CM Chang, B Preneel 2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010 | 17 | 2010 |
Memoryless near-collisions via coding theory M Lamberger, F Mendel, V Rijmen, K Simoens Designs, Codes and Cryptography 62, 1-18, 2012 | 15 | 2012 |
Increased resilience in threshold cryptography: Sharing a secret with devices that cannot store shares K Simoens, R Peeters, B Preneel Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010 | 14 | 2010 |
Cross-Context Delegation through Identity Federation R Peeters, K Simoens, D Cock, B Preneel Gesellschaft für Informatik e. V., 2008 | 10 | 2008 |
Blackbox security of biometrics J Bringer, H Chabanne, K Simoens 2010 Sixth International Conference on Intelligent Information Hiding and …, 2010 | 8 | 2010 |
Insights on identity documents based on the Belgian case study D De Cock, K Simoens, B Preneel Information Security Technical Report 13 (2), 54-60, 2008 | 8 | 2008 |
Security of Online Banking Systems. SZ Kiljan, K Simoens, D De Cock, M van Eekelen, HPE Vranken Open Universiteit Nederland, 2014 | 6 | 2014 |
Technical report: security of online banking systems S Kiljan, K Simoens, DD Cock, M van Eekelen, HPE Vranken Sl: Open Universiteit, 2014 | 5 | 2014 |
Analysis of biometric authentication protocols in the blackbox model K Simoens, J Bringer, H Chabanne, S Seys arXiv preprint arXiv:1101.2569, 2011 | 4 | 2011 |
Security and privacy challenges with biometric solutions K Simoens LSEC Biometrics, 2011 | 3 | 2011 |
Delegation and digital mandates: legal requirements and security objectives B Van Alsenoy, D De Cock, K Simoens, J Dumortier, B Preneel Computer Law & Security Review 25 (5), 415-431, 2009 | 3 | 2009 |
TURBINE Security Assessment: How to Build Trust K Simoens | 2 | |