Jens Hermans

According to our database1, Jens Hermans authored at least 19 papers between 2009 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol.
IACR Cryptol. ePrint Arch., 2017

n-Auth: Mobile Authentication Done Right.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2014
Proper RFID Privacy: Model and Protocols.
IEEE Trans. Mob. Comput., 2014

Optimization of inland shipping - A polynomial time algorithm for the single-ship single-lock optimization problem.
J. Sched., 2014

Realizing Pico: Finally No More Passwords!
IACR Cryptol. ePrint Arch., 2014

High-Speed Dating Privacy-Preserving Attribute Matching for RFID.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

Speedup for European ePassport Authentication.
Proceedings of the BIOSIG 2014, 2014

Shattering the Glass Maze.
Proceedings of the BIOSIG 2014, 2014

When a Bloom Filter is a Doom Filter: Security Assessment of a Novel Iris Biometric Template Protection System.
Proceedings of the BIOSIG 2014, 2014

2013
Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol.
IACR Cryptol. ePrint Arch., 2013

Efficient, secure, private distance bounding without key updates.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

IBIHOP: Proper Privacy Preserving Mutual RFID Authentication.
Proceedings of the Radio Frequency Identification System Security, 2013

2012
Lightweight Public Key Cryptography (Lichtgewicht publieke-sleutel cryptografie).
PhD thesis, 2012

Wide Strong Private RFID Identification based on Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2012

Private Yoking Proofs: Attacks, Models and New Provable Constructions.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012

2011
A New RFID Privacy Model.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
On the claimed privacy of EC-RAC III.
IACR Cryptol. ePrint Arch., 2010

Speed Records for NTRU.
Proceedings of the Topics in Cryptology, 2010

2009
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
IACR Cryptol. ePrint Arch., 2009


  Loading...