Follow
Roel Peeters
Roel Peeters
nextAuth
Verified email at nextauth.com
Title
Cited by
Cited by
Year
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs
R Maes, R Peeters, A Van Herrewege, C Wachsmann, S Katzenbeisser, ...
Financial Cryptography and Data Security, 374-389, 2012
228*2012
A Survey on Lightweight Entity Authentication with Strong PUFs
J Delvaux, D Gu, R Peeters, I Verbauwhede
ACM Computing Surveys, 42, 2015
2152015
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-) Membership Proofs
R Dahlberg, T Pulls, R Peeters
NordSec, 199-215, 2016
1142016
When a Bloom Filter is a Doom Filter: Security Assessment of a Novel Iris Biometric Template Protection System
J Hermans, B Mennink, R Peeters
BioSig 2014, 75-86, 2014
842014
Proper RFID Privacy: Model and Protocols
J Hermans, R Peeters, B Preneel
IEEE Transactions on Mobile Computing, 2888-2902, 2014
652014
Distributed privacy-preserving transparency logging
T Pulls, R Peeters, K Wouters
12th ACM Workshop on Privacy in the Electronic Society (WPES 2013), 83-94, 2013
602013
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
R Peeters, T Pulls
ESORICS 2015, 622-641, 2015
49*2015
Efficient, Secure, Private Distance Bounding without Key Updates
J Hermans, R Peeters, C Onete
6th ACM conference on Wireless network security (WiSec 2013), 207-218, 2013
472013
Attack on Liao and Hsiao’s Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol
R Peeters, J Hermans
IACR Cryptology ePrint Archive, 4, 2013
382013
Private yoking proofs: attacks, models and new provable constructions
J Hermans, R Peeters
RFIDSec 2012, 96-108, 2012
252012
Wide Strong Private RFID Identification based on Zero-Knowledge
R Peeters, J Hermans
IACR Cryptology ePrint Archive, 22, 2012
212012
Insynd: Improved Privacy-Preserving Transparency Logging
R Peeters, T Pulls
ESORICS, 121-139, 2016
172016
IBIHOP: Proper privacy preserving mutual RFID authentication
R Peeters, J Hermans, J Fan
Radio Frequency Identification System Security, 45-56, 2013
162013
Towards More Secure and Reliable Access Control
R Peeters, D Singelee, B Preneel
IEEE Pervasive Computing 11 (3), 76-83, 2012
152012
Collaborative Joint Content Sharing for Online Social Networks
F Beato, R Peeters
6th IEEE Workshop on SECurity and SOCial Networking (SESOC 2014), 616-621, 2014
142014
Security considerations on extending PACE to a biometric-based connection establishment
N Buchmann, R Peeters, H Baier, A Pashalidis
BioSig 2013, 15-26, 2013
142013
Increased resilience in threshold cryptography: sharing a secret with devices that cannot store shares
K Simoens, R Peeters, B Preneel
Pairing-Based Cryptography-Pairing 2010, 116-135, 2010
142010
n-Auth: Mobile Authentication Done Right
J Hermans, R Peeters, P Maene, K Grenman, K Halunen, J Häikiö
Annual Computer Security Applications Conference (ACSAC), 1-15, 2017
11*2017
Security Architecture for Things That Think (Beveiligingsarchitectuur voor Intelligente Objecten)
R Peeters
KU Leuven, 2012
10*2012
Cross-Context Delegation through Identity Federation
R Peeters, K Simoens, D De Cock, B Preneel
BioSig 2008, 79-92, 2008
102008
The system can't perform the operation now. Try again later.
Articles 1–20