Publications

Export 287 results:
Sort by: Author Title Type [ Year  (Desc)]
2016
Seepers RM, Weber JH, Erkin Z, Sourdis I, Strydis C. Secure Key-Exchange Protocol for Implants Using Heartbeats. ACM International Conference on Computing Frontiers. 2016. Download: ACM-CF16.pdf (2.17 MB)
Tillem G, Candan OM, Savas E, Kaya K. Hiding Access Patterns in Range Queries Using Private Information Retrieval and ORAM. Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC16) in International Conference on Financial Cryptography and Data Security. 2016:253-270.
Weber JH, Immink KAS, Blackburn SR. Pearson Codes. IEEE Transactions on Information Theory. 2016;62(1):131-135. Download: 07297850.pdf (401.43 KB)
Hammerschmidt C, Verwer SE, Lin Q, State R. Interpreting Finite Automata for Sequential Data. In: Interpretable ML for Complex Systems NIPS 2016 Workshop. Interpretable ML for Complex Systems NIPS 2016 Workshop. Barcelona; 2016.
Pellegrino G, Hammerschmidt C, Lin Q, Verwer SE. Learning Behavioral Fingerprints From Netflows Using Timed Automata. In: 15th IFIP/IEEE International Symposium on Integrated Network Management (IM 2017). 15th IFIP/IEEE International Symposium on Integrated Network Management (IM 2017).; 2016.
Pellegrino G, Lin Q, Hammerschmidt C, Verwer SE. Learning Deterministic Finite Automata from Infinite Alphabets. In: International Conference on Grammatical Inference 2016. International Conference on Grammatical Inference 2016.; 2016.
Lin Q, Hammerschmidt C, Pellegrino G, Verwer SE. Short-term Time Series Forecasting with Regression Automata. In: ACM SIGKDD 2016 Workshop on Mining and Learning from Time Series (MiLeTS). ACM SIGKDD 2016 Workshop on Mining and Learning from Time Series (MiLeTS).; 2016. Download: short-term-time.pdf (345.51 KB)
2015
Erkin Z. Private Data Aggregation with Groups for Smart Grids in a Dynamic Setting using CRT. In: IEEE Workshop on Information Forensics and Security. IEEE Workshop on Information Forensics and Security. Rome, Italy; 2015.
Veugen T, Blom F, de Hoogh S, Erkin Z. Secure Comparison Protocols in the Semi-Honest Model. IEEE Journal of Selected Topics in Signal Processing. 2015;9(7 (Special issue on Signal and Information Processing for Privacy). Available at: http://dx.doi.org/10.1109/JSTSP.2015.2429117. Download: Implementation.zip (34.81 KB); JSTSP2429117.pdf (242.56 KB)
Immink KAS, Weber JH. Hybrid Minimum Pearson and Euclidean Distance Detection. IEEE Transactions on Communications. 2015;63(9):3290-3298. Download: 07163311 COM Immink.pdf (925.42 KB)
Goseling J, Gastpar M, Weber JH. Random Access With Physical-Layer Network Coding. IEEE Transactions on Information Theory. 2015;61(7):3670-3681. Download: 07093157 IT Goseling.pdf (1002.39 KB)
A. Sunil B. Secure License Plate Matching using Homomorphic Encryption. Parallel and Distributed Computer Systems. 2015;MSc:63. Download: A_BinduSunil_Masters_Thesis.pdf (585.97 KB)
Immink KAS, Weber JH. Detection in the Presence of Additive Noise and Unknown Offset. In: 2015 IEEE International Conference on Communications. 2015 IEEE International Conference on Communications. London, UK; 2015. Download: 07248359 ICC2015 Immink.pdf (169.18 KB)
van Elsas M, van der Lubbe JCA, Weber JH. A Dynamic Digital Signature Scheme Without Third Parties. In: 36th WIC Symposium on Information Theory in the Benelux, 5th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux (SITB/SPS 2015). 36th WIC Symposium on Information Theory in the Benelux, 5th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux (SITB/SPS 2015). Brussels, Belgium; 2015:89-95. Download: 15-vanElsas.pdf (195.91 KB)
Sips R-J, Erkin Z, Manta A, Havers B, Lagendijk RL. Towards Closing the Gap between Theory and Practice in Open Data Publishing. In: 36th WIC Symposium on Information Theory in the Benelux. 36th WIC Symposium on Information Theory in the Benelux. Université Libre de Bruxelles, Brussels, Belgium.; 2015:174-183.
van den Berg J. Wat maakt cyber security anders dan informatiebeveiliging?. Magazine Nationale Veiligheid en Crisisbeheersing. 2015;(2):4-5.
Ren Z, Goseling J, Gastpar M, Weber JH. Secure Transmission Using an Untrusted Relay with Scaled Compute-and-Forward. In: 2015 IEEE Information Theory Workshop. 2015 IEEE Information Theory Workshop. Jerusalem, Israel; 2015. Download: 07133135 IEEE ITW 2015 Zhijie.pdf (145.75 KB)
Veugen T. Linear Round Bit-Decomposition of Secret-Shared Values. IEEE Transactions on Information Forensics and Security. 2015;10(3). Download: Linear Round Bit-Decomposition of Secret-Shared Values.pdf (1.14 MB)