Vincent Naessens

Orcid: 0000-0002-9255-4902

According to our database1, Vincent Naessens authored at least 71 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Masking Location Streams in the Presence of Colluding Service Providers.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

A hybrid anonymization pipeline to improve the privacy-utility balance in sensitive datasets for ML purposes.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Linux-based IoT Benchmark Generator For Firmware Security Analysis Tools.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

IoT Security Seminar: Raising Awareness and Sharing Critical Knowledge.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Reviewing review platforms: a privacy perspective.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Towards low-effort development of advanced IoT applications.
Proceedings of the M4IoT@Middleware 2021: Proceedings of the 8th International Workshop on Middleware and Applications for the Internet of Things, Virtual Event, Canada, December 6, 2021

Dataset Anonymization with Purpose: A Resource Allocation Use Case.
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021

A clustering approach to anonymize locations during dataset de-identification.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
SMIoT: a software architecture for maintainable internet-of-things applications.
Int. J. Cloud Comput., 2020

A Crowdsensing Solution for Tracking Bicycle Path Conditions.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Supporting Contact Tracing by Privacy-Friendly Registration at Catering Facilities.
Proceedings of the ESSE 2020: 2020 European Symposium on Software Engineering, 2020

2019
QoS-by-Design in reconfigurable IoT ecosystems.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

Untangling the Physical-Digital Knot When Designing Advanced IoT Ecosystems.
Proceedings of the 6th International Workshop on Middleware and Applications for the Internet of Things, 2019

Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

An Extensible Approach for Integrating Health and Activity Wearables in Mobile IoT Apps.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

2018
Using Android Devices as Mobile Extensible HMIs.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

Developing Maintainable Application-Centric IoT Ecosystems.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

2017
A logic-based framework for the security analysis of Industrial Control Systems.
Autom. Control. Comput. Sci., 2017

Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems.
Proceedings of the Computer Network Security, 2017

Development of an Embedded Platform for Secure CPS Services.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Security Evaluation of Cyber-Physical Systems Using Automatically Generated Attack Trees.
Proceedings of the Critical Information Infrastructures Security, 2017

Security Analysis of Cordova Applications in Google Play.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices.
Secur. Commun. Networks, 2016

An Assessment of Security Analysis Tools for Cyber-Physical Systems.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Comparing performance parameters of mobile app development strategies.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

2015
Secure remote access to an industrial generator with mobile devices.
Proceedings of the 2015 World Congress on Industrial Control Systems Security, 2015

A Quantitative Assessment of Performance in Mobile App Development Tools.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based System.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Privacy-Preserving Public Transport Ticketing System.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Formal Reasoning About Privacy and Trust in Loyalty Systems.
Proceedings of the Business Information Systems Workshops, 2015

2014
inShopnito: An Advanced yet Privacy-Friendly Mobile Shopping Application.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Trusted Computing to Increase Security and Privacy in eID Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

A keyboard that manages your passwords in Android.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

A SysML Extension for Security Analysis of Industrial Control Systems.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

Inferring Accountability from Trust Perceptions.
Proceedings of the Information Systems Security - 10th International Conference, 2014

An Architecture for the Analysis and Management of Security in Industrial Control Systems.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Secure Storage on Android with Context-Aware Access Control.
Proceedings of the Communications and Multimedia Security, 2014

2013
User-centric identity management using trusted modules.
Math. Comput. Model., 2013

A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services.
Proceedings of the Information Systems Security - 9th International Conference, 2013

A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

Client-Side Biometric Verification Based on Trusted Computing.
Proceedings of the Communications and Multimedia Security, 2013

Dedicated Hardware for Attribute-Based Credential Verification.
Proceedings of the Communications and Multimedia Security, 2013

2012
Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System.
Proceedings of the Information Security and Privacy Research, 2012

Claim-Based versus Network-Based Identity Management: A Hybrid Approach.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012

Privacy-Preserving Scheduling Mechanism for eHealth Systems.
Proceedings of the Communications and Multimedia Security, 2012

Data-Minimizing Authentication Goes Mobile.
Proceedings of the Communications and Multimedia Security, 2012

2011
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties.
IACR Cryptol. ePrint Arch., 2011

Privacy Preserving Mechanisms for a Pervasive eHealth System.
Proceedings of the Privacy and Identity Management for Life, 2011

Designing Privacy-Enhancing Mobile Applications.
Proceedings of the Privacy and Identity Management for Life, 2011

Using a Smartphone to Access Personalized Web Services on a Workstation.
Proceedings of the Privacy and Identity Management for Life, 2011

Commercial Home Assistance (eHealth) Services.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Analysis of Revocation Strategies for Anonymous Idemix Credentials.
Proceedings of the Communications and Multimedia Security, 2011

A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning.
Proceedings of the Communications and Multimedia Security, 2011

Structure Preserving CCA Secure Encryption and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Building advanced applications with the Belgian eID.
Secur. Commun. Networks, 2010

Performance Analysis of Accumulator-Based Revocation Mechanisms.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

A Smart Card Based Solution for User-Centric Identity Management.
Proceedings of the Privacy and Identity Management for Life, 2010

Personalized Mobile Services with Lightweight Security in a Sports Association.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

A Mobile and Reliable Anonymous ePoll Infrastructure.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

Privacy in Commercial Medical Storage Systems.
Proceedings of the Electronic Healthcare - Third International Conference, 2010

<i>PriMan</i> : A Privacy-Preserving Identity Framework.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Security and Privacy Improvements for the Belgian eID Technology.
Proceedings of the Emerging Challenges for Security, 2009

Extending the Belgian eID Technology with Mobile Security Functionality.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Privacy Policies, Tools and Mechanisms of the Future.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Anonymous, Yet Trustworthy Auctions.
Proceedings of the Software Services for e-Business and e-Society, 2009

Specification of Fair Data Practice Principles Using Privacy Policy Languages.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A Privacy-Preserving Ticketing System.
Proceedings of the Data and Applications Security XXII, 2008

2006
A Methodology for Designing Controlled Anonymous Applications.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

A Fair Anonymous Submission and Review System.
Proceedings of the Communications and Multimedia Security, 2006

2005
Accountable Anonymous E-Mail.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

2001
Securing RMI Communication.
Proceedings of the Advances in Network and Distributed Systems Security, 2001


  Loading...