Expertises
Engineering & Materials Science
# Access Control
# Communication
# Cryptography
# Information Analysis
# Information Management
# Monitoring
Mathematics
# Encryption
# Predicate
Verbonden aan
Publicaties
Recent
Bortolameotti, R.
, van Ede, T. S.
, Continella, A.
, Hupperich, T. M.
, Everts, M. H., Rafati, R.
, Jonker, W.
, Hartel, P.
, & Peter, A. (2020).
HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting. In
35th Annual ACM Symposium on Applied Computing, SAC 2020 (pp. 1696-1705). Association for Computing Machinery (ACM).
https://doi.org/10.1145/3341105.3373862
van de Kamp, T. R. (2020).
Multi-client functional encryption for controlled data sharing. University of Twente.
https://doi.org/10.3990/1.9789036549585
van de Kamp, T.
, Peter, A.
, & Jonker, W. (2020).
A multi-authority approach to various predicate encryption types.
Designs, codes and cryptography,
88(2), 363–390.
https://doi.org/10.1007/s10623-019-00686-x
Bortolameotti, R.
, van Ede, T. S.
, Everts, M. H.
, Jonker, W.
, Hartel, P. H.
, Peter, A.
, & Continella, A. (2019).
Victim-Aware Adaptive Covert Channels. In S. Chen, K-K. R. Choo, X. Fu, W. Lou, & A. Mohaisen (Eds.),
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I (pp. 450-471). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 304 LNICST).
https://doi.org/10.1007/978-3-030-37228-6_22
Bortolameotti, R. (2019).
Detection and evaluation of data exfiltration. University of Twente.
https://doi.org/10.3990/1.9789036548243
van de Kamp, T. R., Stritzl, D.
, Jonker, W.
, & Peter, A. (2019).
Two-Client and Multi-client Functional Encryption for Set Intersection. In J. Jang-Jaccard, & F. Guo (Eds.),
Information security and privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings (pp. 97-115). (Lecture Notes in Computer Science; Vol. 11547). Springer.
https://doi.org/10.1007/978-3-030-21548-4_6
van de Kamp, T.
, Peter, A.
, Everts, M. H.
, & Jonker, W. (2018).
Multi-client predicate-only encryption for conjunctive equality tests. In S. Capkun, & S. S. M. Chow (Eds.),
Cryptology and Network Security - 16th International Conference, CANS 2017, Revised Selected Papers (pp. 135-157). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11261 LNCS). Springer.
https://doi.org/10.1007/978-3-030-02641-7_7
Bortolameotti, R.
, van Ede, T. S., Caselli, M.
, Everts, M. H.
, Hartel, P. H., Hofstede, R.
, Jonker, W.
, & Peter, A. (2017).
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. In
ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 373-386)
https://doi.org/10.1145/3134600.3134605
van de Kamp, T. R.
, Peter, A.
, Everts, M. H.
, & Jonker, W. (2017).
Multi-client Predicate-only Encryption for Conjunctive Equality Tests. Paper presented at 16th International Conference on Cryptology And Network Security 2017, Hong Kong, China.
Pure Link
Vakken Collegejaar 2021/2022
Vakken in het huidig collegejaar worden toegevoegd op het moment dat zij definitief zijn in het Osiris systeem. Daarom kan het zijn dat de lijst nog niet compleet is voor het gehele collegejaar.
Vakken Collegejaar 2020/2021
Contactgegevens
Bezoekadres
Universiteit Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling
(gebouwnr. 11), kamer 2007
Hallenweg 19
7522NH Enschede
Postadres
Universiteit Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling
2007
Postbus 217
7500 AE Enschede