Maarten H. Everts

Orcid: 0000-0002-5302-8985

According to our database1, Maarten H. Everts authored at least 26 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC.
IACR Cryptol. ePrint Arch., 2022

Balancing privacy and accountability in digital payment methods using zk-SNARKs.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

2020
HeadPrint: detecting anomalous communications through header-based application fingerprinting.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Victim-Aware Adaptive Covert Channels.
Proceedings of the Security and Privacy in Communication Networks, 2019

Practical Mutation Testing for Smart Contracts.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

2018
Multi-client Predicate-only Encryption for Conjunctive Equality Tests.
IACR Cryptol. ePrint Arch., 2018

2017
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Vote to Link: Recovering from Misbehaving Anonymous Users.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Private Sharing of IOCs and Sightings.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

Reliably determining data leakage in the presence of strong attackers.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Exploration of the Brain's White Matter Structure through Visual Abstraction and Multi-Scale Local Fiber Tract Contraction.
IEEE Trans. Vis. Comput. Graph., 2015

Interactive Illustrative Line Styles and Line Style Transfer Functions for Flow Visualization.
CoRR, 2015

Indicators of Malicious SSL Connections.
Proceedings of the Network and System Security - 9th International Conference, 2015

Revocable Privacy: Principles, Use Cases, and Technologies.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

Publicly Verifiable Private Aggregation of Time-Series Data.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2013
Privacy-Preserving Verification of Clinical Research.
Proceedings of the Sicherheit 2014: Sicherheit, 2013

Mobile Devices to the Identity Rescue.
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013

UbiKiMa: ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography.
Proceedings of the DIM'13, 2013

2012
Designing Privacy-by-Design.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2011
Illustrative Line Styles for Flow Visualization.
Proceedings of the 19th Pacific Conference on Computer Graphics and Applications, 2011

2010
FI3D: Direct-Touch Interaction for the Exploration of 3D Scientific Visualization Spaces.
IEEE Trans. Vis. Comput. Graph., 2010

DTI in Context: Illustrating Brain Fiber Tracts In Situ.
Comput. Graph. Forum, 2010

2009
Depth-Dependent Halos: Illustrative Rendering of Dense Line Data.
IEEE Trans. Vis. Comput. Graph., 2009

2008
Interactive Exploratory Visualization of 2D Vector Fields.
Comput. Graph. Forum, 2008


  Loading...