Research Output 2007 2019

Filter
Article
2019
1 Citation (Scopus)

Access control in Internet-of-Things: a survey

Ravidas, S., Lekidis, A., Paci, F. & Zannone, N., 15 Oct 2019, In : Journal of Network and Computer Applications. 144, p. 79-101 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Internet of things
Ecosystems
Industry
2 Downloads (Pure)

Discovering reliable evidence of data misuse by exploiting rule redundancy

Genga, L., Zannone, N. & Squicciarini, A., 1 Nov 2019, In : Computers and Security. 87, 17 p., 101577.

Research output: Contribution to journalArticleAcademicpeer-review

Association rules
redundancy
Transparency
Redundancy
Decision making

Security proof for quantum key recycling with noise

Leermakers, D. & Škorić, B., 1 Sep 2019, In : Quantum Information and Computation. 19, 11-12, p. 913-934 22 p.

Research output: Contribution to journalArticleAcademicpeer-review

Quantum cryptography
Security Proof
Recycling
recycling
Quantum Key Distribution
12 Downloads (Pure)

Security proof for quantum key recycling with noise

Leermakers, D. & Skoric, B., 2019, In : Quantum Information & Computation. 19, 11+12, p. 0913-0934

Research output: Contribution to journalArticleAcademic

File
Quantum cryptography
Security Proof
Recycling
recycling
Quantum Key Distribution
1 Citation (Scopus)

White-box cryptography: don’t forget about grey-box attacks

Alpirez Bock, E., Bos, J. W., Brzuska, C., Hubain, C., Michiels, W., Mune, C., Sanfelix Gonzalez, E., Teuwen, P. & Treff, A., 1 Oct 2019, In : Journal of Cryptology. 32, 4, p. 1095-1143 49 p.

Research output: Contribution to journalArticleAcademicpeer-review

Cryptography
Attack
Fault Analysis
Reverse engineering
Fault Injection
2018
1 Citation (Scopus)
64 Downloads (Pure)

Optimal attacks on qubit-based Quantum Key Recycling

Leermakers, D. & Škorić, B., 1 Mar 2018, In : Quantum Information Processing. 17, 3, 57.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Recycling
Qubit
recycling
attack
coding
4 Downloads (Pure)

Security proof for quantum key recycling with noise

Leermakers, D. & Skoric, B., 2018, In : IACR Cryptology ePrint Archive. 2018, 15 p., 264.

Research output: Contribution to journalArticleAcademic

Open Access
privacy
recycling
reuse
bit error rate
entropy
1 Citation (Scopus)
17 Downloads (Pure)

Security proof for round-robin differential phase shift QKD

Leermakers, D. & Škorić, B., 1 Oct 2018, In : Quantum Information Processing. 17, 10, 36 p., 250.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Security Proof
Phase Shift
Phase shift
privacy
phase shift
1 Downloads (Pure)

Underground economics for vulnerability risk

Allodi, L., Apr 2018, In : ;login:. 43, 1

Research output: Contribution to journalArticleAcademicpeer-review

Risk vulnerability
Attack
Economics
Risk assessment
Economic risk
2017
25 Downloads (Pure)

Optimal attacks on qubit-based Quantum Key Recycling

Leermakers, D. & Skoric, B., 2017, In : IACR Cryptology ePrint Archive. 2017, 331, p. 1-19

Research output: Contribution to journalArticleAcademic

Open Access
File
Recycling
Entropy
Quantum cryptography
Quantum computers
Cryptography
7 Citations (Scopus)
48 Downloads (Pure)

Security proof for round robin differential phase shift QKD

Leermakers, D. & Skoric, B., 2 Sep 2017, In : arXiv. 1709.00552v1, p. 1-17

Research output: Contribution to journalArticleAcademic

Open Access
File
phase shift
bit error rate
2016
2 Citations (Scopus)

A severity-based quantification of data leakages in database systems

Vavilis, S., Petkovic, M. & Zannone, N., 1 Jun 2016, In : Journal of Computer Security. 24, 3, p. 321-345 25 p.

Research output: Contribution to journalArticleAcademicpeer-review

Data structures
Leakage (fluid)
Specifications
2015
6 Citations (Scopus)

A capacity-achieving simple decoder for bias-based traitor tracing schemes

Oosterwijk, J., Skoric, B. & Doumen, J. M., 2015, In : IEEE Transactions on Information Theory. 61, 7, p. 3882-3900

Research output: Contribution to journalArticleAcademicpeer-review

trend
coalition
scaling
symbol
7 Citations (Scopus)
5 Downloads (Pure)

An anomaly analysis framework for database systems

Vavilis, S., Egner, A. I., Petkovic, M. & Zannone, N., 2015, In : Computers and Security. 53, p. 156-173 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

incident
ranking
Risk assessment
Visualization
Monitoring
7 Citations (Scopus)
34 Downloads (Pure)

Binary and q-ary Tardos codes, revisited

Skoric, B. & Oosterwijk, J., 2015, In : Designs, Codes and Cryptography. 74, 1, p. 75-111 37 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Binary
Collusion
Fingerprinting
Coalitions
Traitor Tracing
45 Downloads (Pure)

False negative probabilities in Tardos codes

Simone, A. & Skoric, B., 2015, In : Designs, Codes and Cryptography. 74, 1, p. 159-182

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Watermarking
Convolution
Collusion
Series Expansion
Attack
66 Downloads (Pure)

False positive probabilities in q-ary Tardos codes : comparison of attacks

Simone, A. & Skoric, B., 1 Jun 2015, In : Designs, Codes and Cryptography. 75, 3, p. 519-542 24 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
False Positive
Attack
Convolution
Voting
Series Expansion

Quantum physics can fight fraud by making card verification unspoofable

Skoric, B., 5 Feb 2015, In : The Conversation. 2015, February 5, 35632.

Research output: Contribution to journalArticleAcademic

Security of data
Physics
Electronic document identification systems
Cryptography
Cracks
2 Citations (Scopus)
1 Downloads (Pure)

Tally-based simple decoders for traitor tracing and group testing

Skoric, B., 2015, In : IEEE Transactions on Information Forensics and Security. 10, 6, p. 1221-1233 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

Watermarking
Testing
Probability distributions
4 Citations (Scopus)
4 Downloads (Pure)

Understanding perceived trust to reduce regret

Costante, E., Hartog, den, J. I. & Petkovic, M., 2015, In : Computational Intelligence. 31, 2, p. 327-347 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

Regret
Privacy
Health
Impact Factor
Security Model
2014
37 Citations (Scopus)
3 Downloads (Pure)

A reference model for reputation systems

Vavilis, S., Petkovic, M. & Zannone, N., 2014, In : Decision Support Systems. 61, 1, p. 147-154 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

Systems Analysis
Technology
Reference model
Reputation system
Surveys and Questionnaires
3 Citations (Scopus)
2 Downloads (Pure)

Data minimisation in communication protocols : a formal analysis framework and application to identity management

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2014, In : International Journal of Information Security. 13, 6, p. 529-569 41 p.

Research output: Contribution to journalArticleAcademicpeer-review

Network protocols
Data privacy
Reusability
Authentication
Internet
11 Citations (Scopus)
2 Downloads (Pure)

GEM : a distributed goal evaluation algorithm for trust management

Trivellato, D., Zannone, N. & Etalle, S., 2014, In : Theory and Practice of Logic Programming. 14, 3, p. 293-337 45 p.

Research output: Contribution to journalArticleAcademicpeer-review

Air cushion vehicles
Trust Management
Evaluation
Confidentiality
Termination
67 Citations (Scopus)
96 Downloads (Pure)

Quantum-secure authentication of a physical unclonable key

Goorden, S. A., Horstmann, M., Mosk, A. P., Skoric, B. & Pinkse, P. W. H., 2014, In : Optica. 1, 6, p. 421-424

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Authentication
pulses
illuminating
Multiple scattering
degrees of freedom
9 Citations (Scopus)

The spammed code offset method

Skoric, B. & Vreede, de, N., 2014, In : IEEE Transactions on Information Forensics and Security. 9, 5, p. 875-884

Research output: Contribution to journalArticleAcademicpeer-review

Entropy
Biometrics
Data storage equipment
2013
17 Citations (Scopus)
2 Downloads (Pure)

A semantic security framework for systems of systems

Trivellato, D., Zannone, N., Glaundrup, M., Skowronek, J. & Etalle, S., 2013, In : International Journal of Cooperative Information Systems. 22, 1, p. 1350004/1-35

Research output: Contribution to journalArticleAcademicpeer-review

Semantics
Interoperability
Ontology
Access control
Scalability
101 Downloads (Pure)

Controlling break-the-glass through alignment

Adriansyah, A., Dongen, van, B. F. & Zannone, N., 2013, In : Advanced Science Express. 2, 4, p. 198-212 15 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Glass
Specifications
21 Citations (Scopus)
1 Downloads (Pure)

Hybrid static-runtime information flow and declassification enforcement

Pontes Soares Rocha, B., Conti, M., Etalle, S. & Crispo, B., 2013, In : IEEE Transactions on Information Forensics and Security. 8, 8, p. 1294-1305

Research output: Contribution to journalArticleAcademicpeer-review

Security of data
Static analysis
Flow control
Access control
Mobile devices
66 Downloads (Pure)

Privacy analysis of user behavior using alignments

Adriansyah, A., Dongen, van, B. F. & Zannone, N., 2013, In : IT - Information Technology. 55, 6, p. 255-260 6 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Industry
Data privacy
Access control
Information systems
5 Citations (Scopus)
85 Downloads (Pure)

Requirements engineering within a large-scale security-oriented research project : lessons learned

Gürses, S., Seguran, M. & Zannone, N., 2013, In : Requirements Engineering. 18, 1, p. 43-66

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Requirements engineering
Software engineering
12 Citations (Scopus)

Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks

Skoric, B., Mosk, A. P. & Pinkse, P. W. H., 2013, In : International Journal of Quantum Information. 11, 4, p. 1350041-1/15 1350041.

Research output: Contribution to journalArticleAcademicpeer-review

quadratures
attack
readout
photons
quantum cryptography
2012
3 Citations (Scopus)

A2THOS : availability analysis and optimisation in SLAs

Zambon, E., Etalle, S. & Wieringa, R. J., 2012, In : International Journal of Network Management. 22, 2, p. 104-130

Research output: Contribution to journalArticleAcademicpeer-review

Information technology
Availability
Customer satisfaction
Managers
Costs
13 Citations (Scopus)
58 Downloads (Pure)

Accusation probabilities in Tardos codes : beyond the Gaussian approximation

Simone, A. & Skoric, B., 2012, In : Designs, Codes and Cryptography. 63, 3, p. 379-412 34 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Gaussian Approximation
Fingerprinting
Collusion
Attack
Traitor Tracing
2 Citations (Scopus)

Computer-assisted proof of performance ratios for the Differencing Method

Michiels, W. P. A. J., Aarts, E. H. L., Korst, J. H. M., Leeuwen, van, J. & Spieksma, F. C. R., 2012, In : Discrete Optimization. 9, 1, p. 1-16

Research output: Contribution to journalArticleAcademicpeer-review

Computer-assisted Proof
Mixed Integer Linear Programming
Linear programming
Programming Model
Linear Model
5 Citations (Scopus)
3 Downloads (Pure)

Flow-based reputation : more than just ranking

Simone, A., Skoric, B. & Zannone, N., 2012, In : International Journal of Information Technology and Decision Making. 11, 3, p. 551-578

Research output: Contribution to journalArticleAcademicpeer-review

10 Citations (Scopus)
2 Downloads (Pure)

Quantum readout of physical unclonable functions

Skoric, B., 2012, In : International Journal of Quantum Information. 10, 1, p. 1250001-1/31 1250001.

Research output: Contribution to journalArticleAcademicpeer-review

readout
quantum computers
attack
hardware
disturbances
2011
8 Citations (Scopus)
3 Downloads (Pure)

Engineering and verifying agent-oriented requirements augmented by business constraints with B-Tropos

Montali, M., Torroni, P., Zannone, N., Mello, P. & Bryl, V., 2011, In : Autonomous Agents and Multi-Agent Systems. 23, 2, p. 193-223 31 p.

Research output: Contribution to journalArticleAcademicpeer-review

Formal logic
Systems engineering
Industry
21 Citations (Scopus)

Model-based qualitative risk assessment for availability of IT infrastructures

Zambon, E., Etalle, S., Wieringa, R. J. & Hartel, P. H., 2011, In : Software and Systems Modeling. 10, 4, p. 553-580 28 p.

Research output: Contribution to journalArticleAcademicpeer-review

Risk Assessment
Risk assessment
Availability
Infrastructure
Model-based
2 Downloads (Pure)

Organizational patterns for security and dependability : from design to application

Asnar, Y., Massacci, F., Saidane, A., Riccucci, C., Felici, M., Tedeschi, A., El Khoury, P., Li, K., Seguran, M. & Zannone, N., 2011, In : International Journal of Secure Software Engineering. 2, 3, p. 1-22

Research output: Contribution to journalArticleAcademicpeer-review

Social aspects
Industry
6 Citations (Scopus)
1 Downloads (Pure)

Sharp lower bounds on the extractable randomness from non-uniform sources

Skoric, B., Obi, C., Verbitskiy, E. A. & Schoenmakers, B., 2011, In : Information and Computation. 209, 8, p. 1184-1196

Research output: Contribution to journalArticleAcademicpeer-review

Hash functions
Universal Function
Randomness
Hash Function
Lower bound
18 Citations (Scopus)

Tardos fingerprinting codes in the combined digit model

Skoric, B., Katzenbeisser, S., Schaathun, H. G. & Celik, M. U., 2011, In : IEEE Transactions on Information Forensics and Security. 6, 3, p. 906-919

Research output: Contribution to journalArticleAcademicpeer-review

Watermarking
Signal processing
26 Citations (Scopus)
1 Downloads (Pure)

The impact of mobility on Mobile Ad Hoc Networks through the perspective of complex networks

Rezende, C. G., Boukerche, A., Pazzi, R. W., Pontes Soares Rocha, B. & Loureiro, A. A. F., 2011, In : Journal of Parallel and Distributed Computing. 71, 9, p. 1189-1200 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

Complex networks
Mobile ad hoc networks
Mobile Ad Hoc Networks
Complex Networks
Topology
2010
13 Citations (Scopus)

Adaptive security protocol selection for mobile computing

Pontes Soares Rocha, B., Costa, D. N. O., Moreira, R. A., Rezende, C. G., Loureiro, A. A. F. & Boukerche, A., 2010, In : Journal of Network and Computer Applications. 33, 5, p. 569-587

Research output: Contribution to journalArticleAcademicpeer-review

Mobile computing
Network protocols
Middleware
Quality of service
Semantics
17 Citations (Scopus)
177 Downloads (Pure)

A flexible architecture for privacy-aware trust management

Böhm, K., Etalle, S., Hartog, den, J. I., Hütter, C., Trabelsi, S., Trivellato, D. & Zannone, N., 2010, In : Journal of Theoretical and Applied Electronic Commerce Research. 5, 2, p. 77-96

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Privacy
Trust management
Management system
Factors
Authorization
62 Citations (Scopus)
2 Downloads (Pure)

A vulnerability-centric requirements engineering framework : Analyzing security attacks, countermeasures, and requirements based on vulnerabilities

Elahi, G., Yu, E. & Zannone, N., 2010, In : Requirements Engineering. 15, 1, p. 41-62

Research output: Contribution to journalArticleAcademicpeer-review

Requirements engineering
1 Citation (Scopus)

Flowchart description of security primitives for Controlled Physical Unclonable Functions

Skoric, B. & Makkes, M. X., 2010, In : International Journal of Information Security. 9, 5, p. 327-335

Research output: Contribution to journalArticleAcademicpeer-review

Authentication
Cryptography
Hardware security
Denial-of-service attack
20 Citations (Scopus)
1 Downloads (Pure)

Key extraction from general non-discrete signals

Verbitskiy, E. A., Tuyls, P. T., Obi, C., Schoenmakers, B. & Skoric, B., 2010, In : IEEE Transactions on Information Forensics and Security. 5, 2, p. 269-279

Research output: Contribution to journalArticleAcademicpeer-review

Probability distributions
Entropy
Error probability
11 Citations (Scopus)

Making random choices invisible to the scheduler

Chatzikokolakis, K. & Palamidessi, C., 2010, In : Information and Computation. 208, 6, p. 694-715

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
Scheduler
Network protocols
Syntactics
Process Calculi
Preorder
8 Citations (Scopus)

Opportunities in white-box cryptography

Michiels, W., Jan 2010, In : IEEE Security and Privacy. 8, 1, p. 64-67 4 p., 5403155.

Research output: Contribution to journalArticleAcademicpeer-review

Cryptography
software
2009
37 Citations (Scopus)

Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions

Guajardo, J., Skoric, B., Tuyls, P. T., Kumar, S. S., Bel, T., Blom, A. H. M. & Schrijen, G. J., 2009, In : Information Systems Frontiers. 11, 1, p. 19-41

Research output: Contribution to journalArticleAcademicpeer-review

Key Distribution
Costs
Radio frequency identification (RFID)
Extractor
Sensor networks