Repository hosted by TU Delft Library

Home · Contact · About · Disclaimer ·
 

Search results also available in MS Excel format.

Showing 1 to 20 of 45 found. Next | Sort by date

1 Linear round bit-decomposition of secret-shared values
article 2015    
Author: Veugen, P.J.M.
Keywords: Safety · bit-decomposition · linear secret sharing · secure multi-party computations · Bitwise operations · Communication complexity · Communication rounds · Least significant bits · Linear operations · Secret sharing · Signal processing in the encrypted domains · Secure communication · Cyber Security & Resilience · Defence, Safety and Security · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[Abstract]

2 Client-server framework for securely outsourcing computations
article 2016    
Author: Veugen, P.J.M.
Keywords: Informatics · 2016 ICT · CSR - Cyber Security & Robustness · TS - Technical Sciences
[PDF] [Abstract]

3 Quantum Computer nu al reden voor zorgen huidige cryptografie : Post-Quantum Cryptografie
report 2018    
Author: Veugen, P.J.M.
Keywords: 2016 ICT · CSR - Cyber Security & Robustness · TS - Technical Sciences

4 Choosing the parameters of multiple-repetition strategies
article 2007    
Author: Veugen, P.J.M.
Keywords: Informatics · Carrier communication · Channel capacity · Codes (symbols) · Constraint theory · Data storage equipment · Memorylesschannels · Multiple repetition strategies · Noiseless channels · Repetition parameters · Communication channels (information theory)
[Abstract]

5 Secure comparison through simple bit operations
article 2018    
Author: Veugen, P.J.M.
[Abstract]

6 Improving the DGK comparison protocol
article 2012    
Author: Veugen, P.J.M.
Keywords: Computational complexity · Computational modeling · Encryption · Optimization · Protocols · DGK comparison protocol · Encrypted data · Encrypted domain · Homomorphic encryption · inear operations · Perfect security · Statistical security · Safety and Security · Defence, Safety and Security · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[PDF] [Abstract]

7 Recurrent multiple-repetition coding for channels with feedback
article 2011    
Author: Veugen, P.J.M.
Keywords: Informatics ; Safety · Error exponent · feedback · multiple repetition · recurrent coding · Discrete memoryless channels · Error exponent · Fixed-delay · multiple repetition · Noiseless feedback · recurrent coding · Transmission rates · Channel capacity · Error correction · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[Abstract]

8 Rekenen met vercijferde data
article 2011    
Author: Veugen, P.J.M.
Keywords: Informatics · Cryptography · Information security · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[PDF] [Abstract]

9 Method and device for establishing a communication session
other 2010    
Author: Veugen, P.J.M.
Keywords: Informatics
[PDF] [Abstract]

10 Encrypted integer division
article 2010    
Author: Veugen, P.J.M.
Keywords: Informatics
[Abstract]

11 Encrypted integer division and secure comparison
article 2014    
Author: Veugen, P.J.M.
Keywords: Safety · Homomorphic encryption · Integer division · Comparison · Minimum · Maximum · Approximation · Client-server model · Secure multi-party computations · Infostructures · Information Society · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[Abstract]

12 Novomodo, een nieuwe manier om certificaten te valideren
article 2003    
Author: Veugen, P.J.M. · Geers, M.
Keywords: Physics
[PDF] [Abstract]

13 Privacy enhanced personal services for smart grids
article 2014    
Author: Erkin, Z. · Veugen, P.J.M.
Keywords: Informatics · Cryptography · Performance · Privacy · Secret sharing · Smart energy grid · Automation · Cryptography · Data privacy · Electric power transmission networks · Intelligent buildings · Smart meters · Business partners · Electrical devices · Performance · Personal services · Personalized service · Research communities · Secret sharing · Smart energies · Smart power grids · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[Abstract]

14 Secure Processing Offload in Recombining Media Segments for Mobile Access
article 2013    
Author: Veugen, P.J.M. · Stokking, H.M.
Keywords: Defence · Home gateways · Networks · Secure storage · Homomorphic encryption · Vandermonde-Reed-Solomon codes · Safety and Security · Defence, Safety and Security · Communication & Information · ISEC - Information Security ; MNS - Media & Network Services · TS - Technical Sciences
[PDF] [Abstract]

15 Anonymity for key-trees with adaptive adversaries
article 2012    
Author: Beye, M. · Veugen, P.J.M.
Keywords: adaptive adversaries · anonymity · Hash-lock protocol · Authentication protocols · Key compromise · key-tree · Side-channel information · Tree construction · Forestry · Radio frequency identification (RFID) · Identification · Performance · Simulation · Safety and Security · Defence, Safety and Security · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[Abstract]

16 Privacy for Key-Trees with Adaptive Adversaries
article 2011    
Author: Beye, M. · Veugen, P.J.M.
Keywords: Informatics · RFID · Hash-lock protocol · Kkey-tree · Anonymity · Anonymity set · Adaptive adversaries · Safety and Security · Defence, Safety and Security · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[Abstract]

17 Improved Anonymity for Key-trees
bookPart 2013    
Author: Veugen, P.J.M. · Beye, M.
Keywords: Informatics · RFID · Hash-lock protocol · Key-tree · Anonymity · Anonymity set · Authentication delay · Safety and Security · Defence, Safety and Security · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[PDF] [Abstract]

18 Threats and Vulnerabilities of RFID and Beyond
bookPart 2009    
Author: Hoepman, J.H. · Veugen, P.J.M.
Keywords: Physics · Sensor Networks · Security · Radio Frequency Identification Systems
[Abstract]

19 Security visie op Ambient Networks
report 2006    
Author: Veugen, P.J.M. · Welfing, D.J.
Keywords: Informatics · Ambient networks · Security
[PDF] [Abstract]

20 PKI als veilig communicatiemiddel
article 2002    
Author: Spek, J. van der · Veugen, P.J.M.
Keywords: Physics
[Abstract]

Search results also available in MS Excel format.

Showing 1 to 20 of 45 found. Next | Sort by date