User Tools

Site Tools


researchareas

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
researchareas [2022/01/05 09:21] ggankhuyagresearchareas [2022/02/01 09:15] – [Research output] zannonen
Line 9: Line 9:
  
 ^ Research Area ^ Staff member(s) ^ Sample of output ^ ^ Research Area ^ Staff member(s) ^ Sample of output ^
-| Network monitoring | [[http://www.win.tue.nl/~setalle/|S. Etalle]] [[http://www.win.tue.nl/~jhartog/| J. Hartog]] | <WRAP>+| Network monitoring | [[http://www.win.tue.nl/~setalle/|S. Etalle]] [[http://www.win.tue.nl/~jhartog/| J. Hartog]] [[https://research.tue.nl/en/persons/emmanuele-zambon-mazzocato| Emmanuele Zambon-Mazzocato]]| <WRAP>
   * [[ http://www.win.tue.nl/~setalle/2017_etalle_esorics_supervisable.pdf | From Intrusion Detection to Software Design. ]] Sandro Etalle. ESORICS - European Symposium on Research in Computer Security 2017 (keynote talk). [[ http://www.win.tue.nl/~setalle/201709_etalle_esorics_slides.pdf | (slides) ]]   * [[ http://www.win.tue.nl/~setalle/2017_etalle_esorics_supervisable.pdf | From Intrusion Detection to Software Design. ]] Sandro Etalle. ESORICS - European Symposium on Research in Computer Security 2017 (keynote talk). [[ http://www.win.tue.nl/~setalle/201709_etalle_esorics_slides.pdf | (slides) ]]
   * [[http://www.sciencedirect.com/science/article/pii/S2214212616302629 | A white-box anomaly-based framework for database leakage detection.]] Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiya. Journal of Information Security and Applications 32: 27-46 (2017)   * [[http://www.sciencedirect.com/science/article/pii/S2214212616302629 | A white-box anomaly-based framework for database leakage detection.]] Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiya. Journal of Information Security and Applications 32: 27-46 (2017)
Line 47: Line 47:
 | Identification and Authentication | Boris Skoric | <WRAP> | Identification and Authentication | Boris Skoric | <WRAP>
   * [[ https://ieeexplore.ieee.org/document/8332526 | Decay-Based DRAM PUFs in Commodity Devices. ]] André Schaller; Wenjie Xiong; Nikolaos Athanasios Anagnostopoulos; Muhammad Umair Saleem; Sebastian Gabmeyer; Boris Škorić; Stefan Katzenbeisser; Jakub Szefer. IEEE Transactions on Dependable and Secure Computing Volume: 16, Issue: 3, May-June 1 2019.   * [[ https://ieeexplore.ieee.org/document/8332526 | Decay-Based DRAM PUFs in Commodity Devices. ]] André Schaller; Wenjie Xiong; Nikolaos Athanasios Anagnostopoulos; Muhammad Umair Saleem; Sebastian Gabmeyer; Boris Škorić; Stefan Katzenbeisser; Jakub Szefer. IEEE Transactions on Dependable and Secure Computing Volume: 16, Issue: 3, May-June 1 2019.
-  * [[ https://ieeexplore.ieee.org/document/8332526 | Asymmetric cryptography with physical unclonable keys. ]] Ravitej Uppu, Tom A W Wolterink, Sebastianus A Goorden, Bin Chen, Boris Škorić, Allard P Mosk,and Pepijn W H Pinkse. IEEE Transactions on Dependable and Secure Computing Volume: 16, Issue: 3May-June 1 2019. </WRAP>+  * [[ https://iopscience.iop.org/article/10.1088/2058-9565/ab479f/pdf | Asymmetric cryptography with physical unclonable keys. ]] Ravitej Uppu, Tom A W Wolterink, Sebastianus A Goorden, Bin Chen, Boris Škorić, Allard P Mosk,and Pepijn W H Pinkse. Quantum Science and Technology, Volume 4, Number 4, 2019.  
 +  * [[ https://www.osapublishing.org/optica/fulltext.cfm?uri=optica-1-6-421&id=306292 | Quantum-secure authentication of a physical unclonable key. ]] Sebastianus A. Goorden, Marcel Horstmann, Allard P. Mosk, Boris Škorić, and Pepijn W. H. Pinkse. Optica Vol. 1, Issue 6, 2014 
 +  * [[ https://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-019-0096-0 | Fingerprint template protection using minutia-pair spectral representations. ]] Taras Stanko, Bin Chen & Boris Škorić. EURASIP Journal on Information Security volume 2019 
 +  * [[ https://ieeexplore.ieee.org/document/7041187 | Tally-Based Simple Decoders for Traitor Tracing and Group Testing. ]] Boris Škorić. IEEE Transactions on Information Forensics and Security, Volume: 10, Issue: 6, June 2015 
 +</WRAP>
 | Information-theoretic security | Boris Skoric | <WRAP> | Information-theoretic security | Boris Skoric | <WRAP>
-  *  +  * [[ https://arxiv.org/abs/2012.15493 | Quantum digital signatures with smaller public keys. ]] Boris Škorić. 2021 
-  * </WRAP> |+  * [[ https://arxiv.org/abs/2006.02476 | Can't Touch This: unconditional tamper evidence from short keys. ]] Bart van der Vecht, Xavier Coiteux-Roy, Boris Skoric. 2020 
 +  * [[ https://arxiv.org/abs/2010.10827 | Two-way Unclonable Encryption with a vulnerable sender. ]] Daan Leermakers, Boris Skoric. 2020 
 +  * [[https://www.rintonpress.com/journals/doi/QIC21.11-12-1.html | Qubit-based Unclonable Encryption with Key Recycling.]] Daan Leermakers and Boris Skoric. Quantum Information and Computation, Vol.21 No.11&12 September 2021 
 +  * [[https://arxiv.org/abs/2008.13151 | Data Sanitisation Protocols for the Privacy Funnel with Differential Privacy Guarantees.]] Milan Lopuhaä-Zwakenberg, Haochen Tong, Boris Škorić. Fourteenth International Conference on the Digital Society, 2020   
 +</WRAP>
 +| IoT Security and Privacy | [[https://ssciancalepore.win.tue.nl/|Savio Sciancalepore]]| <WRAP> 
 +  * [[https://cri-lab.net/wp-content/uploads/2021/08/Mitigating-Energy-Depletion-Attacks-in-IoT.pdf | Mitigating Energy Depletion Attacks in IoT Networks via Random Time-Slotted Channel Access.]] Savio Sciancalepore, Pietro Tedeschi, Usman Riasat, and Roberto Di Pietro. 2021 IEEE Conference on Communications and Network Security (CNS), October 4-6, 2021. 
 +  * [[https://cri-lab.net/wp-content/uploads/2021/11/Tedeschi2021_ACSAC21.pdf | ARID - Anonymous Remote Identification of Unmanned Aerial Vehicles.]] Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro. 2021 ACM Annual Computer Security Applications Conference (ACSAC) (ACSAC), December 6-10, 2021. 
 +  * [[https://cri-lab.net/wp-content/uploads/2020/11/pprq_scianca2020.pdf | PPRQ: Privacy-Preserving MAX/MIN Range 
 +Queries in IoT Networks.]] Savio Sciancalepore, Roberto Di Pietro. IEEE Internet of Things Journal (IOT-J), November 2020. doi: 10.1109/JIOT.2020.3037115. 
 +  * [[https://intersct.nl/wp-content/uploads/2022/01/iot_ac_uncertainty-1.pdf | PICO: Privacy-Preserving Access Control in IoT Scenarios through Incomplete Information.]] Savio Sciancalepore, Nicola Zannone. SAC ’22, April 25–29, 2022, Virtual Event. 
 +</WRAP> |  
 +| Social engineering | [[https://lallodi.github.io|Luca Allodi]], [[http://zannone.win.tue.nl/|Nicola Zannone]] | <WRAP> 
 +  * [[https://dl.acm.org/doi/10.1145/3407023.3409178 | Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment.]] Pavlo Burda, Tzouliano Chotza, Luca Allodi, Nicola Zannone. ARES 2020: 3:1-3:10 
 +  * [[https://doi.org/10.1109/EuroSPW54576.2021.00024 | Dissecting Social Engineering Attacks Through the Lenses of Cognition.]] Pavlo Burda, Luca Allodi, Nicola Zannone. EuroS&P Workshops 2021: 149-160 
 +</WRAP> |
researchareas.txt · Last modified: 2022/02/01 09:20 by zannonen