Roel Peeters
Roel Peeters
KU LEUVEN, COSIC
Geverifieerd e-mailadres voor esat.kuleuven.be
TitelGeciteerd doorJaar
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs
R Maes, R Peeters, A Van Herrewege, C Wachsmann, S Katzenbeisser, ...
Financial Cryptography and Data Security, 374-389, 2012
99*2012
A Survey on Lightweight Entity Authentication with Strong PUFs
J Delvaux, D Gu, R Peeters, I Verbauwhede
ACM Computing Surveys, 42, 2015
632015
Distributed privacy-preserving transparency logging
T Pulls, R Peeters, K Wouters
12th ACM Workshop on Privacy in the Electronic Society (WPES 2013), 83-94, 2013
372013
Proper RFID Privacy: Model and Protocols
J Hermans, R Peeters, B Preneel
IEEE Transactions on Mobile Computing, 2888-2902, 2014
352014
Efficient, Secure, Private Distance Bounding without Key Updates
J Hermans, R Peeters, C Onete
6th ACM conference on Wireless network security (WiSec 2013), 207-218, 2013
312013
When a Bloom Filter is a Doom Filter: Security Assessment of a Novel Iris Biometric Template Protection System
J Hermans, B Mennink, R Peeters
BioSig 2014, 75-86, 2014
282014
Private yoking proofs: attacks, models and new provable constructions
J Hermans, R Peeters
RFIDSec 2012, 96-108, 2012
222012
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
R Peeters, T Pulls
ESORICS 2015, 622-641, 2015
21*2015
Attack on Liao and Hsiao’s Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol
R Peeters, J Hermans
IACR Cryptology ePrint Archive, 4, 2013
172013
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-) Membership Proofs
R Dahlberg, T Pulls, R Peeters
NordSec, 199-215, 2016
16*2016
Wide Strong Private RFID Identification based on Zero-Knowledge
R Peeters, J Hermans
IACR Cryptology ePrint Archive, 22, 2012
132012
Increased resilience in threshold cryptography: sharing a secret with devices that cannot store shares
K Simoens, R Peeters, B Preneel
Pairing-Based Cryptography-Pairing 2010, 116-135, 2010
122010
Towards More Secure and Reliable Access Control
R Peeters, D Singelee, B Preneel
IEEE Pervasive Computing 11 (3), 76-83, 2012
112012
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication.
R Peeters, J Hermans, J Fan
RFIDSec Asia 11, 45-56, 2013
92013
Security Architecture for Things That Think (Beveiligingsarchitectuur voor Intelligente Objecten)
R Peeters
KU Leuven, 2012
9*2012
Cross-Context Delegation through Identity Federation
R Peeters, K Simoens, D De Cock, B Preneel
BioSig 2008, 79-92, 2008
92008
Speedup for European ePassport Authentication
R Peeters, J Hermans, B Mennink
BioSig 2014, 51-62, 2014
72014
Security considerations on extending PACE to a biometric-based connection establishment
N Buchmann, R Peeters, H Baier, A Pashalidis
BioSig 2013, 15-26, 2013
72013
Insynd: Improved Privacy-Preserving Transparency Logging
R Peeters, T Pulls
ESORICS, 121-139, 2016
6*2016
Threshold Things That Think: Usable Authorisation for Resharing
R Peeters, M Kohlweiss, B Preneel, N Sulmon
5th Symposium on Usable Privacy and Security (SOUPS 2009), 2, 2009
6*2009
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20