Home > Publications
Home University of Twente
Prospective Students
Intranet (internal)

EEMCS EPrints Service

Research Project: COMMIT/THeCS: Trusted Healthcare Systems
Home Policy Brochure Browse Search User Area Contact Help


Bortolameotti, R. and Peter, A. and Everts, M.H. and Jonker, W. and Hartel, P.H. (2016) Reliably determining data leakage in the presence of strong attackers. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016. pp. 484-495. ACM. ISBN 978-1-4503-4771-6
Esquivel Vargas, H.T. (2016) Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol. Master's thesis, Univ. of Twente.
van Velsen, L.S. and Wildevuur, S. and Flierman, I. and van Schooten, B.W. and Tabak, M. and Hermens, H.J. (2016) Trust in telemedicine portals for rehabilitation care: an exploratory focus group study with patients and healthcare professionals. BMC medical informatics and decision making, 16 (11). ISSN 1472-6947 *** ISI Impact 2,042 ***


Bakondi, B.G. and Peter, A. and Everts, M.H. and Hartel, P.H. and Jonker, W. (2015) Publicly Verifiable Private Aggregation of Time-Series Data. In: 10th International Conference on Availability, Reliability and Security, ARES 2015, 24-27 Aug 2015, Toulouse, France. pp. 50-59. IEEE. ISBN 978-1-4673-6590-1
Bortolameotti, R. and Peter, A. and Everts, M.H. and Bolzoni, D. (2015) Indicators of Malicious SSL Connections. In: 9th International Conference on Network and System Security, NSS 2015, 3-5 Nov 2015, New York, USA. pp. 162-175. Lecture Notes in Computer Science 9408. Springer Verlag. ISBN 978-3-319-25645-0


Armknecht, F. and Gagliardoni, T. and Katzenbeisser, S. and Peter, A. (2014) General Impossibility of Group Homomorphic Encryption in the Quantum World. In: 17th International Conference on Practice and Theory in Public-Key Cryptography. PKC 2014, 26-28 Mar 2014, Buenos Aires, Argentina. pp. 556-573. Lecture Notes in Computer Science 8383. Springer Verlag. ISBN 978-3-642-54630-3
Bösch, C.T. and Hartel, P.H. and Jonker, W. and Peter, A. (2014) A Survey of Provably Secure Searchable Encryption. ACM computing surveys, 47 (2). 18:1-18:51. ISSN 0360-0300 *** ISI Impact 5,243 ***
Biedermann, S. and Karvelas, N. and Katzenbeisser, S. and Strufe, T. and Peter, A. (2014) ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. In: Proceedings of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014), 26-29 Jan 2014, Nový Smokovec, Slovakia. pp. 114-125. Lecture Notes in Computer Science 8327. Springer Verlag. ISBN 978-3-319-04297-8
Günther, F. and Manulis, M. and Peter, A. (2014) Privacy-enhanced participatory sensing with collusion resistance and data aggregation. In: 13th International Conference on Cryptology and Network Security (CANS 2014), 22-24 Oct 2014, Heraklion, Crete, Greece. pp. 321-336. Lecture Notes in Computer Science 8813. Springer Verlag. ISBN 978-3-319-12279-3
de Hoogh, S. and Schoenmakers, B. and Chen, Ping and op den Akker, H. (2014) Practical secure decision tree learning in a teletreatment application. In: Proceedings of the 18th International Conference on Financial Cryptography, 3-7 Mar 2014, Christ Church, Barbados. pp. 179-194. Lecture Notes in Computer Science 8437. Springer Verlag. ISSN 0302-9743 ISBN 978-3-662-45471-8
Makri, E. and Everts, M.H. and de Hoogh, S. and Peter, A. and op den Akker, H. and Hartel, P.H. and Jonker, W. (2014) Privacy-Preserving Verification of Clinical Research. In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19-21 Mar 2014, Wien, Österreich. pp. 481-500. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V.. ISBN 978-3-88579-622-0


Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013) Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, Codes and Cryptography, 67 (2). pp. 209-232. ISSN 0925-1022 *** ISI Impact 0,781 ***
Jeckmans, A.J.P. and Peter, A. and Hartel, P.H. (2013) Efficient privacy-enhanced familiarity-based recommender system. In: Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013, 9-13 Sep 2013, Egham, UK. pp. 400-417. Lecture Notes in Computer Science 8134. Springer. ISBN 978-3-642-40203-6
Peter, A. and Tews, E. and Katzenbeisser, S. (2013) Efficiently outsourcing multiparty computation under multiple keys. IEEE transactions on information forensics and security, 8 (12). pp. 2046-2058. ISSN 1556-6013 *** ISI Impact 2,441 ***
Tabak, M. and Flierman, I. and van Schooten, B.W. and Hermens, H.J. (2013) Development of a trusted healthcare service to support self-management and a physically active lifestyle in COPD patients. In: International Conference on Telemedicine and eHealth 2013: Aging well - how can technology help?, 25-26 Nov 2013, London, United Kingdom. Royal Society of Medicine. ISBN not assigned


Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012) Shift-type homomorphic encryption and its application to fully homomorphic encryption. In: 5th International Conference on Cryptology in Africa, AFRICACRYPT 2012, 10-12 Jul 2012, Ifrane, Morocco. pp. 234-251. Lecture Notes in Computer Science 7374. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-31410-0
Beye, M.R.T. and Jeckmans, A.J.P. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2012) Privacy in Online Social Networks. In: Computational Social Networks: Security and Privacy. Springer Verlag, London, pp. 87-113. ISBN 978-1-4471-4050-4
Peter, A. and Kronberg, M. and Trei, W. and Katzenbeisser, S. (2012) Additively homomorphic encryption with a double decryption mechanism, revisited. In: 15th International Conference on Information Security, ISC 2012, 19-21 Sep 2012, Passau, Gemany. pp. 242-257. Lecture Notes in Computer Science 7483. Springer Verlag. ISSN 1611-3349 ISBN 978-3-642-33383-5
Tang, Qiang (2012) Cryptographic framework for analyzing the privacy of recommender algorithms. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 may. 2012, Denver, USA. pp. 455-462. IEEE Computer Society. ISBN 978-1-4673-1381-0


Makri, E. and Konstantinou, E. (2011) Constant round group key agreement protocols: A comparative study. Computers & Security, 30 (8). pp. 643-678. ISSN 0167-4048 *** ISI Impact 1,640 ***