• Publications
  • Influence
Towards Measuring Anonymity
TLDR
This paper introduces an information theoretic model that allows to quantify the degree of anonymity provided by schemes for anonymous connections. Expand
  • 779
  • 50
  • PDF
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
  • S. Seys, B. Preneel
  • Computer Science
  • 20th International Conference on Advanced…
  • 18 April 2006
TLDR
We present a novel anonymous on demand routing scheme for MANETs that is secure against both nodes that actively participate in the network and a passive global adversary that monitors all network traffic. Expand
  • 254
  • 36
  • PDF
Privacy-Preserving ECC-Based Grouping Proofs for RFID
TLDR
We propose a privacy-preserving RFID grouping proof and demonstrate that it can easily be extended to use cases with more than two tags. Expand
  • 25
  • 5
  • PDF
A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems
TLDR
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with respect to user and data privacy. Expand
  • 78
  • 4
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
TLDR
We extend the notion of public-key RFID authentication protocols and propose a privacy-preserving multi-party grouping-proof protocol which relies exclusively on the use of elliptic curve cryptography (ECC). Expand
  • 42
  • 3
  • PDF
Secure JTAG Implementation Using Schnorr Protocol
TLDR
In this paper we propose a novel architecture that implements a secure JTAG interface. Expand
  • 30
  • 3
  • PDF
Information Theory and Anonymity
TLDR
This paper introduces a model, based on Shannon's deflnition of entropy, with which the degree of anonymity of a set of users grouped in several subsets can be quantifled in an objective way. Expand
  • 35
  • 2
  • PDF
Authenticated and efficient key management for wireless ad hoc networks
TLDR
In this paper we present a key management protocol for wireless ad hoc multi-hop networks. Expand
  • 11
  • 1
  • PDF
Challenge-response based secure test wrapper for testing cryptographic circuits
TLDR
We propose a secure challenge-response based Secure Test Wrapper structure, suitable for testing IP cores in a SoC environment, which provides full testability, very high security and scalability of the proposed design. Expand
  • 9
  • 1
  • PDF
Analysis of Biometric Authentication Protocols in the Blackbox Model
TLDR
In this paper we analyze different biometric authentication protocols considering an internal adversary. Expand
  • 3
  • 1
  • PDF