Koen Simoens

According to our database1, Koen Simoens authored at least 17 papers between 2008 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
A Survey of Authentication and Communications Security in Online Banking.
ACM Comput. Surv., 2017

2012
Analysis of Fuzzy Encryption Schemes for the Protection of Biometric Data (Analyse van fuzzy encryptieschema's voor het afschermen van biometrische gegevens).
PhD thesis, 2012

A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems.
IEEE Trans. Inf. Forensics Secur., 2012

Memoryless near-collisions via coding theory.
Des. Codes Cryptogr., 2012

Criteria towards metrics for benchmarking template protection algorithms.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

2011
Analysis of Biometric Authentication Protocols in the Blackbox Model
CoRR, 2011

2010
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares.
IACR Cryptol. ePrint Arch., 2010

A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Blackbox Security of Biometrics (Invited Paper).
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Dynamic random projection for biometric template protection.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

Reversing protected minutiae vicinities.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

2009
Delegation and digital mandates: Legal requirements and security objectives.
Comput. Law Secur. Rev., 2009

Privacy Weaknesses in Biometric Sketches.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
Insights on identity documents based on the Belgian case study.
Inf. Secur. Tech. Rep., 2008

Pseudo Identities Based on Fingerprint Characteristics.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Cross-Context Delegation through Identity Federation.
Proceedings of the BIOSIG 2008, 2008

Secure and Privacy-Friendly Logging for eGovernment Services.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...