Expertises
Engineering & Materials Science
# Access Control
# Communication
# Cryptography
# Information Analysis
# Information Management
# Monitoring
Mathematics
# Encryption
# Predicate
Verbonden aan
Nevenactiviteiten
-
AiNed
Chairman -
EIT Digital
Advisor
Publicaties
Recent
Bortolameotti, R.
, van Ede, T. S.
, Continella, A., Hupperich, T. M.
, Everts, M. H., Rafati, R.
, Jonker, W.
, Hartel, P.
, & Peter, A. (2020).
HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting. In
35th Annual ACM Symposium on Applied Computing, SAC 2020 (pp. 1696-1705). Association for Computing Machinery.
https://doi.org/10.1145/3341105.3373862
van de Kamp, T. R. (2020).
Multi-client functional encryption for controlled data sharing. [PhD Thesis - Research UT, graduation UT, University of Twente]. University of Twente.
https://doi.org/10.3990/1.9789036549585
van de Kamp, T.
, Peter, A.
, & Jonker, W. (2020).
A multi-authority approach to various predicate encryption types.
Designs, codes and cryptography,
88(2), 363–390.
https://doi.org/10.1007/s10623-019-00686-x
Bortolameotti, R.
, van Ede, T. S.
, Everts, M. H.
, Jonker, W.
, Hartel, P. H.
, Peter, A.
, & Continella, A. (2019).
Victim-Aware Adaptive Covert Channels. In S. Chen, K.-K. R. Choo, X. Fu, W. Lou, & A. Mohaisen (Eds.),
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I (pp. 450-471). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; Vol. 304).
https://doi.org/10.1007/978-3-030-37228-6_22
Bortolameotti, R. (2019).
Detection and evaluation of data exfiltration. [PhD Thesis - Research UT, graduation UT, University of Twente]. University of Twente.
https://doi.org/10.3990/1.9789036548243
van de Kamp, T. R., Stritzl, D.
, Jonker, W.
, & Peter, A. (2019).
Two-Client and Multi-client Functional Encryption for Set Intersection. In J. Jang-Jaccard, & F. Guo (Eds.),
Information security and privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings (pp. 97-115). (Lecture Notes in Computer Science; Vol. 11547). Springer.
https://doi.org/10.1007/978-3-030-21548-4_6
Pure Link
Vakken Collegejaar 2023/2024
Vakken in het huidig collegejaar worden toegevoegd op het moment dat zij definitief zijn in het Osiris systeem. Daarom kan het zijn dat de lijst nog niet compleet is voor het gehele collegejaar.
Vakken Collegejaar 2022/2023
Contactgegevens
Bezoekadres
Universiteit Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling
(gebouwnr. 11), kamer 2007
Hallenweg 19
7522NH Enschede
Postadres
Universiteit Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling
2007
Postbus 217
7500 AE Enschede