Welkom...

dr. A. Peter (Andreas)

Universitair docent in Security & Privacy Engineering

Publicaties

Recente Artikelen
Bortolameotti, R., Peter, A., Everts, M. H., Jonker, W., & Hartel, P. H. (2016). Reliably determining data leakage in the presence of strong attackers. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016 (pp. 484-495). New York: ACM. DOI: 10.1145/2991079.2991095
van de Kamp, T. R., Peter, A., Everts, M. H., & Jonker, W. (2016). Private Sharing of IOCs and Sightings. In 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016 (pp. 35-38). New York: ACM. DOI: 10.1145/2994539.2994544
Bortolameotti, R., Peter, A., Everts, M. H., & Bolzoni, D. (2015). Indicators of Malicious SSL Connections. In 9th International Conference on Network and System Security, NSS 2015 (pp. 162-175). (Lecture Notes in Computer Science; Vol. 9408). New York: Springer. DOI: 10.1007/978-3-319-25645-0_11
Dietzel, S., Peter, A., & Kargl, F. (2015). Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks. In IEEE 81st Vehicular Technology Conference, VTC Spring 2015 (pp. 1-5). Piscataway, NJ, USA: IEEE. DOI: 10.1109/VTCSpring.2015.7146074
Bakondi, B. G., Peter, A., Everts, M. H., Hartel, P. H., & Jonker, W. (2015). Publicly Verifiable Private Aggregation of Time-Series Data. In 10th International Conference on Availability, Reliability and Security, ARES 2015 (pp. 50-59). Piscataway, NJ, USA: IEEE. DOI: 10.1109/ARES.2015.82
Bösch, C. T., Peter, A., Leenders, B., Lim, H. W., Tang, Q., Wang, H., ... Jonker, W. (2014). Distributed Searchable Symmetric Encryption. In Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014 (pp. 330-337). USA: IEEE. DOI: 10.1109/PST.2014.6890956
Karvelas, N. P., Peter, A., Katzenbeisser, S., Tews, E., Tews, E., & Hamacher, K. (2014). Privacy preserving whole genome sequence processing through proxy-aided ORAM. In 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014) (pp. 1-10). New York: ACM. DOI: 10.1145/2665943.2665962
Bösch, C. T., Peter, A., Hartel, P. H., & Jonker, W. (2014). SOFIR: Securely Outsourced Forensic Image Recognition. In 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014 (pp. 2694-2698). USA: IEEE. DOI: 10.1109/ICASSP.2014.6854089
Makri, E., Everts, M. H., de Hoogh, S., Peter, A., op den Akker, H., Hartel, P. H., & Jonker, W. (2014). Privacy-Preserving Verification of Clinical Research. In Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) (pp. 481-500). (Lecture Notes in Informatics (LNI)). Bonn: Gesellschaft für Informatik.

Pure Link

Google Scholar Link

Contactgegevens

Bezoekadres

Universiteit Twente
Faculteit Elektrotechniek, Wiskunde en Informatica
Zilverling (gebouwnr. 11), kamer 4051
Hallenweg 19
7522NH  Enschede

Navigeer naar locatie

Postadres

Universiteit Twente
Faculteit Elektrotechniek, Wiskunde en Informatica
Zilverling  4051
Postbus 217
7500 AE Enschede