According to our database1, Dave Singelée authored at least 40 papers between 2004 and 2021.
Legend:Book In proceedings Article PhD thesis Other
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Poster: Securing IoT Through Coverage-Bounding Wireless Communication With Visible Light.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020
Proceedings of the ESSE 2020: 2020 European Symposium on Software Engineering, 2020
On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
The Impact of Pulsed Electromagnetic Fault Injection on True Random Number Generators.
Proceedings of the 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Digital signatures and signcryption schemes on embedded devices: a trade-off between computation and storage.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018
HeComm: End-to-end secured communication in a heterogeneous IoT environment via fog computing.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Proceedings of the 21th IEEE European Test Symposium, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, 2016
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
IACR Cryptol. ePrint Arch., 2015
Ad Hoc Sens. Wirel. Networks, 2013
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs.
Pers. Ubiquitous Comput., 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Ad Hoc Sens. Wirel. Networks, 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the Mobile Lightweight Wireless Systems, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005
Proceedings of the Communications and Multimedia Security, 2004