Research Output 2007 2019

Filter
Conference contribution
2019

CARONTE: crawling adversarial resources over non-trusted, high-profile environments

Campobasso, M., Burda, P. & Allodi, L., 1 Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 433-442 10 p. 8802484

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Scalability
Servers
Resources
Data collection
Monitoring

Characterizing the redundancy of DarkWeb .onion services

Burda, P., Boot, C. & Allodi, L., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. New York: Association for Computing Machinery, Inc, 10 p. 19. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Redundancy
Law enforcement
Mirrors
9 Downloads (Pure)

Cognitive triaging of phishing attacks

van der Heijden, A. & Allodi, L., 6 May 2019, Usenix Security 2019. Usenix Association, 19 p. ARXIV 190502162v1

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
Electronic mail
Remediation
Learning systems
2 Citations (Scopus)

Doubly half-injective PRGs for incompressible white-box cryptography

Alpirez Bock, E., Amadori, A., Bos, J. W., Brzuska, C. & Michiels, W., 3 Feb 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 189-209 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
Injective
Attack
Digital Rights Management
Incompressibility
2 Citations (Scopus)
2 Downloads (Pure)

Leveraging semantics for actionable intrusion detection in building automation systems

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 1 Jan 2019, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer, p. 113-125 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Intelligent buildings
Intrusion detection
Intrusion Detection
Automation
Semantics

Privacy-conscious threat intelligence using DNSBLoom

van Rijswijk-Deij, R., Rijnders, G., Bomhoff, M. & Allodi, L., 16 May 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 98-106 9 p. 8717908

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Internet
Monitoring
Privacy
Threat
Malware
2 Downloads (Pure)

Productivity and patterns of activity in bug bounty programs: analysis of hackerone and Google vulnerability research

Luna, D., Allodi, L. & Cremonini, M., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. New York: Association for Computing Machinery, Inc, 10 p. 67

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Productivity
Fruits
Personnel
1 Citation (Scopus)

Unveiling systematic biases in decisional processes: an application to discrimination discovery

Genga, L., Allodi, L. & Zannone, N., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery, Inc, p. 67-72 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Association rules
Regression analysis
Data mining
2018
4 Citations (Scopus)

Economic incentives on DNSSEC deployment: time to move from quantity to quality

Le, T., Van Rijswijk-Deij, R., Allodi, L. & Zannone, N., 6 Jul 2018, IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018. Brussels: Institute of Electrical and Electronics Engineers, p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Incentives
Economics
Operator
Recommendations
Discount
2 Citations (Scopus)

On the ineffectiveness of internal encodings - Revisiting the DCA attack on white-box cryptography

Alpirez Bock, E., Brzuska, C., Michiels, W. & Treff, A., 1 Jan 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer, p. 103-120 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Computational Analysis
Cryptography
Encoding
Attack
Internal
2017

Attack potential in impact and complexity

Allodi, L. & Massacci, F., 2017, International Conference on Availability, Reliability and Security, ARES 2017, 29 August - 1 September 2017, Reggio Calabria, Italy. New York: Association for Computing Machinery, Inc

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Computer systems
1 Citation (Scopus)

Diversity: A poor man's solution to drone takeover

Davanian, A., Massacci, F. & Allodi, L., 1 Jan 2017, PECCS 2017 - Proceedings of the 7th International Joint Conference on Pervasive and Embedded Computing and Communication Systems. s.l.: SCITEPRESS-Science and Technology Publications, Lda., p. 25-34 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Energy utilization
Drones
13 Citations (Scopus)

Economic factors of vulnerability trade and exploitation

Allodi, L., 2017, CCS'17 : Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security ; Oktober 30 - November 3, 2017, Dallas, TX, USA. Newc York: Association for Computing Machinery, Inc, p. 1483-1499 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Vulnerability
Economic factors
Exploitation
Attack
Economics
3 Downloads (Pure)

Encryption in ICS networks : a blessing or a curse?

Fauri, D., de Wijs, B., den Hartog, J. I., Costante, E., Zambon, E. & Etalle, S., 2017, IEEE SmartGridCom : Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 23-26 October 2017, Dresden, Germany. Brussels: IEEE Computer Society, p. 289-294 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
Cryptography
Control systems
Telecommunication networks
2 Citations (Scopus)

Estimating the assessment difficulty of CVSS environmental metrics : an experiment

Allodi, L., Biagioni, S., Crispo, B., Labunets, K., Massacci, F. & Santos, W., 2017, Future Data and Security Engineering: 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings. Dang, T. K., Wagner, R., Küng, J., Thoai, N., Takizawa, M. & Neuhold, E. J. (eds.). Berlin: Springer, p. 23-39

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Large scale systems
Students
Experiments
Compliance
5 Citations (Scopus)
3 Downloads (Pure)

From system specification to anomaly detection (and back)

Fauri, D., Dos Santos, D. R., Costante, E., den Hartog, J. J., Etalle, S. & Tonetta, S., 2017, CPS'17 : Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, p. 13-24 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Specifications
Monitoring
Intrusion detection
Control systems
Formal specification
8 Citations (Scopus)

Incorporating trust in NFV : addressing the challenges

Ravidas, S., Lal, S., Oliver, I. & Hippelainen, L., 7 Mar 2017, 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), 7-9 March 2017, . Piscataway: Institute of Electrical and Electronics Engineers, p. 87-91

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Terminology
Network function virtualization
Telecommunication networks
Hardware
1 Citation (Scopus)

Towards realistic threat modeling : attack commodification, irrelevant vulnerabilities, and unrealistic assumptions

Allodi, L. & Etalle, S., 2017, SafeConfig '17 Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, p. 23-26

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Game theory
2016
10 Citations (Scopus)

A hybrid framework for data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., Den Hartog, J. & Zannone, N., 1 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 23-25 May 2016, San Jose, California. Piscataway: Institute of Electrical and Electronics Engineers, p. 324-333 10 p. 7527785

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Loss prevention
Engines
Feedback
25 Citations (Scopus)

Differential computation analysis: hiding your white-box designs is not enough

Bos, J. W., Hubain, C., Michiels, W. & Teuwen, P., 2016, Cryptographic Hardware and Embedded Systems – CHES 2016: 18th International Conference, Santa Barbara, California, August 17-19, 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Dordrecht: Springer, p. 215-236 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Reverse engineering
Box Product
Trace
Attack
Differential Power Analysis
2 Citations (Scopus)

Role mining with missing values

Vavilis, S., Egner, A. I., Petkovic, M. & Zannone, N., 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES), 31 August - 2 September 2016, Salzburg, Austria. Piscataway: Institute of Electrical and Electronics Engineers, p. 167-176

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2015
1 Citation (Scopus)
70 Downloads (Pure)

Access control with non-deterministic and probabilistic attribute retrieval

Crampton, J., Morisset, C. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-19

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Access control
Specifications
25 Citations (Scopus)
3 Downloads (Pure)

Analysis of XACML policies with SMT

Turkmen, F., den Hartog, J. I., Ranise, S. & Zannone, N., 2015, Principles of Security and Trust (4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, 11-18 April, 2015. Proceedings). Focardi, R. & Myters, A. (eds.). Dordrecht: Springer, p. 115-134 (Lecture Notes in Computer Science; vol. 9036).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Surface mount technology
Access control
XML
Markup languages
Specifications
48 Downloads (Pure)

Auditing with incomplete logs

Mian, U. S., Hartog, den, J. I., Etalle, S. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-23

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Compliance
Industry
35 Downloads (Pure)

Evidence-based discounting rule in subjective logic

Skoric, B., Hoogh, de, S. J. A. & Zannone, N., 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (Brussels, Belgium, May 6-7, 2015). Roland, J. & Horlin, F. (eds.). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), p. 1-3

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File

Introducing probabilities in controller strategies

Hartog, den, J. I. & Matteucci, J., 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers): 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Garcia-Alfaro, J., Herrera-Joancomarti, J., Lupu, E., Posegga, J., Aldini, A., Martonelli, F. & Suri, N. (eds.). Berlin: Springer, p. 233-249 (Lecture Notes in Computer Science; vol. 8872).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Controllers
Specifications
12 Citations (Scopus)
3 Downloads (Pure)

On missing attributes in access control: non-deterministic and probabilistic attribute retrieval

Crampton, J., Morisset, C. & Zannone, N., 2015, 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015, Vienna, Austria, June 1-3, 2015). New York: Association for Computing Machinery, Inc, p. 99-109

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Specifications
10 Citations (Scopus)
3 Downloads (Pure)

Pre-distribution of certificates for pseudonymous broadcast authentication in VANET

Feiri, M., Pielage, R. H. M., Petit, J., Zannone, N. & Kargl, F., 2015, IEEE 81st Vehicular Technology Conference (VTC2015-Spring, Glasgow, UK, May 11-14, 2015). Institute of Electrical and Electronics Engineers, p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Network management
Packet loss
Authentication
Topology
Communication
9 Citations (Scopus)
3 Downloads (Pure)

Preventing information inference in access control

Paci, F. & Zannone, N., 2015, 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015, Vienna, Austria, June 1-3, 2015). New York: Association for Computing Machinery, Inc, p. 87-97

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Data privacy
Data structures
Cloud computing
Innovation
48 Downloads (Pure)

Spamming the code offset method

Vreede, de, N. & Skoric, B., 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (Brussels, Belgium, May 6-7, 2015). Roland, J. & Horlin, F. (eds.). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), p. 162-165

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Spamming
2014
2 Citations (Scopus)
1 Downloads (Pure)

A quantitative analysis of common criteria certification practice

Kaluvuri, S. P., Bezzi, M. & Roudier, Y., 2014, Trust, Privacy, and Security in Digital Business (11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings). Eckert, C., Katsikas, S. K. & Pernul, G. (eds.). Cham: Springer, p. 132-143 (Lecture Notes in Computer Science; vol. 8647).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Monitoring
Chemical analysis
6 Citations (Scopus)
2 Downloads (Pure)

Attribute-based encryption with encryption and decryption outsourcing

Asim, M., Petkovic, M. & Ignatenko, T., 2014, 12th Australian Information Security Management Conference (Perth, Australia, December 1-3, 2014). Perth: ECU Security Research Institute, p. -21-28

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Outsourcing
Cryptography
1 Citation (Scopus)
4 Downloads (Pure)

AU2EU : Privacy-preserving matching of DNA sequences

Ignatenko, T. & Petkovic, M., 2014, 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Securing the Internet of Things (WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014). Naccache, D. & Sauveron, D. (eds.). Berlin: Springer, p. 180-189 (Lecture Notes in Computer Science; vol. 8501).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Privacy
DNA
DNA Sequence Analysis
Automatic Data Processing
Life Style
2 Downloads (Pure)

Authentication and authorisation in entrusted unions

Ayed, D., Camenisch, J., Ignatenko, T., Johnstone, M. N., Koster, R. P., Lange, B., Petkovic, M., Sommer, D. & Zic, J., 2014, 12th Australian Information Security Management Conference ( Perth, Australia, December 1-3, 2014). p. -56-63

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Authentication
Cryptography
Information management
Health
Processing
10 Citations (Scopus)
92 Downloads (Pure)

CollAC: Collaborative access control

Damen, S., Hartog, den, J. I. & Zannone, N., 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS 2014, Minneapolis MN, USA, May 19-23, 2014). Institute of Electrical and Electronics Engineers, p. 142-149

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Access control
Decision making
6 Citations (Scopus)
2 Downloads (Pure)

Data leakage quantification

Vavilis, S., Petkovic, M. & Zannone, N., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (eds.). Springer, p. 98-113 (Lecture Notes in Computer Science; vol. 8566).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Leakage (fluid)
Data structures
5 Citations (Scopus)
40 Downloads (Pure)

History-based construction of log-process alignments for conformance checking : discovering what really went wrong

Alizadeh, M., Leoni, de, M. & Zannone, N., 2014, 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014, Milan, Italy, November 19-21, 2014). Accorsi, R., Ceravolo, P. & Russo, B. (eds.). CEUR-WS.org, p. 1-15 (CEUR Workshop Proceedings; vol. 1293).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Cost functions
10 Citations (Scopus)
5 Downloads (Pure)

Hunting the unknown: White-box database leakage detection

Costante, E., Hartog, den, J. I., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (eds.). Springer, p. 243-259 (Lecture Notes in Computer Science; vol. 8566).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Industry
3 Citations (Scopus)

Integration of data-minimising authentication into authorisation systems

Ayed, D., Bichsel, P., Camenisch, J. & Hartog, den, J. I., 2014, Trust and Trustworthy Computing (7th International Conference, TRUST 2014, Heraklion, Crete, June 30-July 2, 2014. Proceedings). Holz, T. & Ioannidis, S. (eds.). Berlin: Springer, p. 179-187 (Lecture Notes in Computer Science; vol. 8564).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Authentication
Information systems
11 Citations (Scopus)
6 Downloads (Pure)

Privacy implications of privacy settings and tagging in Facebook

Damen, S. & Zannone, N., 2014, Secure Data Management (10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings). Jonker, W. & Petkovic, M. (eds.). Berlin: Springer, p. 121-138 (Lecture Notes in Computer Science; vol. 8425).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Visibility
Communication
6 Citations (Scopus)
2 Downloads (Pure)

Reduction of access control decisions

Morisset, C. & Zannone, N., 2014, 19th ACM Symposium on Access Control Models and Technologies (SACMAT 2014, London ON, Canada, June 25-27, 2014). New York NY: Association for Computing Machinery, Inc, p. 53-62

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Decision making
Chemical analysis

Security, privacy and trust : from innovation blocker to innovation enabler

Jonker, W. & Petkovic, M., 2014, Secure Data Management (10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings). Jonker, W. & Petkovic, M. (eds.). Berlin: Springer, p. 54-58 (Lecture Notes in Computer Science; vol. 8425).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

privacy
innovation
social economics
new technology
communication technology
2013
6 Citations (Scopus)

Asymptotic fingerprinting capacity in the combined digit model

Boesten, D. & Skoric, B., 2013, Information Hiding (14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers). Berlin: Springer, p. 255-268 (Lecture Notes in Computer Science; vol. 7692).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Channel capacity
Signal processing
13 Citations (Scopus)

Bias-based modeling and entropy analysis of PUFs

van den Berg, R., Skoric, B. & Leest, van der, V., 2013, 3rd International Workshop on Trustworthy Embedded Devices (TrustED'13, Berlin, Germany, November 4, 2013). New York NY: Association for Computing Machinery, Inc, p. 13-20

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Entropy
Static random access storage
Hardware security
Data storage equipment
19 Citations (Scopus)
2 Downloads (Pure)

Controlling break-the-glass through alignment

Adriansyah, A., Dongen, van, B. F. & Zannone, N., 2013, Proceedings of the 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013, Washington DC, USA, September 8-14, 2013). Piscataway: Institute of Electrical and Electronics Engineers, p. 606-611

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Glass
Specifications
9 Citations (Scopus)
2 Downloads (Pure)

Database anomalous activities: Detection and quantification

Costante, E., Vavilis, S., Etalle, S., Petkovic, M. & Zannone, N., 2013, SECRYPT 2013 (Proceedings of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, July 29-31, 2013). SCITEPRESS-Science and Technology Publications, Lda., p. 603-608

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Monitoring
4 Citations (Scopus)
2 Downloads (Pure)

Data reliability in home healthcare services

Vavilis, S., Zannone, N. & Petkovic, M., 2013, Proceedings of the 26th International Symposium on Computer-Based Medical Systems (CBMS'13, Porto, Portugal, June 20-22, 2013). Piscataway: Institute of Electrical and Electronics Engineers, p. 377-380

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
1 Downloads (Pure)

Diagnostic category leakage in helper data schemes for biometric authentication

Groot, de, J. A., Skoric, B., Vreede, de, N. & Linnartz, J. P. M. G., 2013, SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, 29-31 July, 2013, Reykjavík, Iceland. Samarati, P. (ed.). SCITEPRESS-Science and Technology Publications, Lda., p. 506-511

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Leakage
Biometrics
Positivity
Authentication
Diagnostics
1 Citation (Scopus)

eConsent management and enforcement in personal telehealth

Asim, M., Koster, R. P., Petkovic, M. & Rosner, M., 2013, ISSE 2012 Securing Electronic Business Processes (Highlights of the Information Security Solutions Europe 2012 Conference, Brussels, Germany, October 23-24, 2012). Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Springer, p. 209-216

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Security of data
Health
Communication
Costs
3 Citations (Scopus)
2 Downloads (Pure)

Formal modelling of (de)pseudonymisation : a case study in health care privacy

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2013, Security and Trust Management (8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012. Revised selected papers). Jøsang, A., Samarati, P. & Petrocchi, M. (eds.). Berlin: Springer, p. 145-160 (Lecture Notes in Computer Science; vol. 7783).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Health care
Health