Marijke De Soete

According to our database1, Marijke De Soete authored at least 30 papers between 1988 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2015
A pan-European Framework on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market.
Proceedings of the ISSE 2015, 2015

2011
User Verification Method.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Two-Factor Authentication.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Token.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

SSH.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Smart Card.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

SIM/UICC.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

SEPA.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security Architecture.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

PKI.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Payment Card.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Mobile Wallet.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Mobile Payments.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Issuer.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Electronic Cheque.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Derived Key.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Control Vector.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Attribute Certificate.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Acquirer.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
A Secure Low-Delay Protocol for Wireless Body Area Networks.
Ad Hoc & Sensor Wireless Networks, 2010

2008
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

2005
EMV.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

1991
New Bounds and Constructions for Authentication/Secrecy Codes with Splitting.
J. Cryptology, 1991

Public Key Cryptography.
Proceedings of the Computer Security and Industrial Cryptography, 1991

1989
Cartesian Authentication Schemes.
Proceedings of the Advances in Cryptology, 1989

A Signature with Shared Verification Scheme.
Proceedings of the Advances in Cryptology, 1989

1988
A coordinatization of generalized quadrangles of order (s, s + 2).
J. Comb. Theory, Ser. A, 1988

Some New Classes of Geometric Threshold Schemes.
Proceedings of the Advances in Cryptology, 1988

Some Constructions for Authentication-Secrecy Codes.
Proceedings of the Advances in Cryptology, 1988

Bounds and Constructions for Authentication-Secrecy Codes with Splitting.
Proceedings of the Advances in Cryptology, 1988


  Loading...