Follow
vincent naessens
vincent naessens
DistriNet, department of Computer Science, KULeuven
Verified email at cs.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Comparing performance parameters of mobile app development strategies
M Willocx, J Vossaert, V Naessens
Proceedings of the International Conference on Mobile Software Engineering …, 2016
812016
A quantitative assessment of performance in mobile app development tools
M Willocx, J Vossaert, V Naessens
2015 IEEE International conference on mobile services, 454-461, 2015
632015
Analysis of revocation strategies for anonymous idemix credentials
J Lapon, M Kohlweiss, B De Decker, V Naessens
Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International …, 2011
502011
Structure preserving CCA secure encryption and applications
J Camenisch, K Haralambiev, M Kohlweiss, J Lapon, V Naessens
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
442011
A SysML extension for security analysis of industrial control systems
L Lemaire, J Lapon, BD Decker, V Naessens
2nd International Symposium for ICS & SCADA Cyber Security Research 2014 …, 2014
432014
Performance analysis of accumulator-based revocation mechanisms
J Lapon, M Kohlweiss, B De Decker, V Naessens
Security and Privacy–Silver Linings in the Cloud: 25th IFIP TC-11 …, 2010
352010
User-centric identity management using trusted modules
J Vossaert, J Lapon, B De Decker, V Naessens
Mathematical and Computer Modelling 57 (7-8), 1592-1605, 2013
342013
Extracting vulnerabilities in industrial control systems using a knowledge-based system
L Lemaire, J Vossaert, J Jansen, V Naessens
3rd International Symposium for ICS & SCADA Cyber Security Research 2015 …, 2015
202015
Privacy-preserving public transport ticketing system
M Milutinovic, K Decroix, V Naessens, B De Decker
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015
202015
CPS security assessment using automatically generated attack trees
W Depamelaere, L Lemaire, J Vossaert, V Naessens
5th International Symposium for ICS & SCADA Cyber Security Research 2018, 2018
192018
A fair anonymous submission and review system
V Naessens, L Demuynck, B De Decker
IFIP International Conference on Communications and Multimedia Security, 43-53, 2006
182006
A privacy-preserving ticketing system
K Verslype, B De Decker, V Naessens, G Nigusse, J Lapon, P Verhaeghe
Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working …, 2008
142008
A logic-based framework for the security analysis of industrial control systems
L Lemaire, J Vossaert, J Jansen, V Naessens
Automatic Control and Computer Sciences 51, 114-123, 2017
132017
A smart card based solution for user-centric identity management
J Vossaert, P Verhaeghe, B De Decker, V Naessens
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4 …, 2011
122011
Petanon: A privacy-preserving e-petition system based on idemix
K Verslype, J Lapon, P Verhaeghe, V Naessens, B De Decker
Report CW522 (October 2008), 2008
122008
Security and privacy improvements for the belgian eid technology
P Verhaeghe, J Lapon, B De Decker, V Naessens, K Verslype
Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 …, 2009
112009
Developing maintainable application-centric iot ecosystems
M Willocx, I Bohé, J Vossaert, V Naessens
2018 IEEE International Congress on Internet of Things (ICIOT), 25-32, 2018
102018
A formal approach for inspecting privacy and trust in advanced electronic services
K Decroix, J Lapon, B De Decker, V Naessens
Engineering Secure Software and Systems: 5th International Symposium, ESSoS …, 2013
102013
Security and privacy threats of the Belgian electronic identity card and middleware
P Verhaeghe, J Lapon, V Naessens, B De Decker, K Verslype, ...
EEMA European e-Identity conference, Date: 2008/06/10-2008/06/11, Location …, 2008
102008
A methodology for designing controlled anonymous applications
V Naessens, B De Decker
Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 …, 2006
102006
The system can't perform the operation now. Try again later.
Articles 1–20