Dave Singelée

Orcid: 0000-0001-9084-698X

According to our database1, Dave Singelée authored at least 52 papers between 2004 and 2023.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


DASLog: Decentralized Auditable Secure Logging for UAV Ecosystems.
IEEE Internet Things J., 2023

A Survey of Security and Privacy Issues in V2X Communication Systems.
ACM Comput. Surv., 2023

Entanglement-based Mutual Quantum Distance Bounding.
CoRR, 2023

Security and Privacy Threat Analysis for Solid.
Proceedings of the IEEE Secure Development Conference, 2023

Encrypted Traffic Classification for Early-Stage Anomaly Detection in Power Grid Communication Network.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2023

HAT: Secure and Practical Key Establishment for Implantable Medical Devices.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

In-depth energy analysis of security algorithms and protocols for the Internet of Things.
J. Cryptogr. Eng., 2022

MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme.
Future Gener. Comput. Syst., 2022

T-HIBE: A Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT Systems.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Secure, Accurate, and Practical Narrow-Band Ranging System.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2021

Towards Intelligent Context-Aware 6G Security.
CoRR, 2021

A Survey on Blockchain-Based IoMT Systems: Towards Scalability.
IEEE Access, 2021

A New Privacy Enhancing Beacon Scheme in V2X Communication.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Poster: Securing IoT Through Coverage-Bounding Wireless Communication With Visible Light.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020

Supporting Contact Tracing by Privacy-Friendly Registration at Catering Facilities.
Proceedings of the ESSE 2020: 2020 European Symposium on Software Engineering, 2020

Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019

On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

The Impact of Pulsed Electromagnetic Fault Injection on True Random Number Generators.
Proceedings of the 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018

Securing Wireless Neurostimulators.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Digital signatures and signcryption schemes on embedded devices: a trade-off between computation and storage.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

HeComm: End-to-end secured communication in a heterogeneous IoT environment via fog computing.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

A survey on physiological-signal-based security for medical devices.
IACR Cryptol. ePrint Arch., 2016

Towards Quantum Distance Bounding Protocols.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

On the Feasibility of Cryptography for a Wireless Insulin Pump System.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

A Privacy-Preserving Remote Healthcare System Offering End-to-End Security.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, 2016

On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

The Energy Budget for Wireless Security: Extended Version.
IACR Cryptol. ePrint Arch., 2015

Efficient and Location-Private Communication Protocols for WBSNs.
Ad Hoc Sens. Wirel. Networks, 2013

Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs.
Pers. Ubiquitous Comput., 2012

Toward More Secure and Reliable Access Control.
IEEE Pervasive Comput., 2012

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
Proceedings of the Computer Security - ESORICS 2012, 2012

Threshold-Based Location-Aware Access Control.
Int. J. Handheld Comput. Res., 2011

The communication and computation cost of wireless security: extended abstract.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Hierarchical ECC-Based RFID Authentication Protocol.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

A Secure Low-Delay Protocol for Wireless Body Area Networks.
Ad Hoc Sens. Wirel. Networks, 2010

Low-cost untraceable authentication protocols for RFID.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Wide-Weak Privacy-Preserving RFID Authentication Protocols.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

Privacy-Preserving ECC-Based Grouping Proofs for RFID.
Proceedings of the Information Security - 13th International Conference, 2010

User Privacy in RFID Networks.
Proceedings of the ISSE 2009, 2009

A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

Key Establishment Using Secure Distance Bounding Protocols.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Distance Bounding in Noisy Environments.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

Location privacy in wireless personal area networks.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

Improved Pairing Protocol for Bluetooth.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

The Wireless Application Protocol.
Int. J. Netw. Secur., 2005

Location verification using secure distance bounding protocols.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Threat Modelling for Security Tokens in Web Applications.
Proceedings of the Communications and Multimedia Security, 2004