Publications

Export 287 results:
Sort by: Author Title Type [ Year  (Desc)]
2009
Beye M. RFID - Threat Taxonomies & Improved Anonymity for Hash-Trees. Department of Information and Computing Sciences. 2009;Master of Science:120. Download: Thesis Michael Beye.pdf (2.17 MB)
Verwer SE, de Weerdt M, Witteveen C. One-clock deterministic timed automata are efficiently identifiable in the limit. In: Language and Automata Theory and Applications (LATA). Language and Automata Theory and Applications (LATA).; 2009:740–751.
Hoepman J-H, Veugen T. Threats and vulnerabilities of RFID and beyond. In: Zhang Y, Kitsos P Security in RFID and Sensor Networks. Security in RFID and Sensor Networks. Boca Raton; 2009:469-488. Available at: http://www.amazon.co.uk/Security-Sensor-Networks-Wireless-Communications/dp/1420068393. Download: Book chapter RFID security - januari 2008.pdf (364.14 KB)
Heule MJH, Verwer SE. Using a satisfiability solver to identify deterministic finite state automata. In: Proceedings of the Belgium-Dutch Conference on Artificial Intelligence (BNAIC). Proceedings of the Belgium-Dutch Conference on Artificial Intelligence (BNAIC).; 2009:91–98.
Erkin Z, Veugen T, Toft T, Lagendijk RL. Privacy-Preserving User Clustering in a Social Network. In: IEEE International Workshop on Information Forensics and Security. IEEE International Workshop on Information Forensics and Security.; 2009. Download: WI090052.pdf (146.42 KB)
Bianchi T, Veugen T, Piva A, Barni M. Processing in the encrypted domain using a composite signal representation: pros and cons. In: IEEE International Workshop on Information Forensics and Security. IEEE International Workshop on Information Forensics and Security.; 2009. Download: WI090091.pdf (148.59 KB)
2008
Mitrokotsa A, Karygiannis A. Intrusion Detection Techniques in Sensor Networks Lopez L, Zhou J. Wireless Sensor Network Security. 2008;1:251-272. Abstract  Download: idswsn.pdf (172.05 KB)
Koz A, Triantafyllidis G, Alatan AA. 3D Watermarking: Techniques and Directions. In: Ozaktas HM, Onural L Three-Dimensional Television: Capture, Transmission, and Display. Three-Dimensional Television: Capture, Transmission, and Display. Heidelberg; 2008.
Verwer SE, de Weerdt M, Witteveen C. Efficiently learning simple timed automata. In: Induction of Process Models workshop at ECML/PKDD. Induction of Process Models workshop at ECML/PKDD.; 2008:61–68.
Verwer SE, de Weerdt M, Witteveen C. Efficiently learning timed system models from observations. In: Proceedings of the Annual Machine Learning Conference of Belgium and the Netherlands (Benelearn). Proceedings of the Annual Machine Learning Conference of Belgium and the Netherlands (Benelearn).; 2008:75–76.
Verwer SE, de Weerdt M, Witteveen C. Polynomial distinguishability of timed automata. In: Grammatical Inference: Algorithms and Applications (ICGI). Grammatical Inference: Algorithms and Applications (ICGI).; 2008:238–251.
Verwer SE, de Weerdt M, Witteveen C. Polynomial distinguishability of timed automata (extended abstract). In: Proceedings of the Belgium-Dutch Conference on Artificial Intelligence (BNAIC). Proceedings of the Belgium-Dutch Conference on Artificial Intelligence (BNAIC).; 2008:373-374.
2007
Koz A, Cigla C, Alatan AA. Watermarking for Light Field Rendering. European Signal Processing Conference (EUSIPCO). 2007:2296-2300.
Smolic A, Mueller K, Stefanoski N, et al. 3D TV: Coding Algorithms for 3D TV-A Survey. IEEE Transactions on Circuits, Systems and Video Technology. 2007;17:1606-1621.
van Hensbergen M, Gedrojc B, van der Lubbe JCA. A Beehive Approach to e-Commerce Mobile Agents. In: 28th Sympotisum on Information Theory in the Benelux. 28th Sympotisum on Information Theory in the Benelux.; 2007. Abstract  Download: wic2007_paper.pdf (147.07 KB)
Prins JP, Erkin Z, Lagendijk RL. Robust Anonymous Fingerprinting. In: Twenty-eight Symposium on Information Theory in the Benelux. Twenty-eight Symposium on Information Theory in the Benelux.; 2007:59-66.