What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Pieter H. Hartel
Google Scholar
ORCID:
0000-0002-0411-0421
18
publications in security and cryptology related venues
Year
Venue
Title
2017
conf/soups
How Effective is Anti-Phishing Training for Children?
Elmer Lastdrager
Inés Carvajal Gallardo
Pieter H. Hartel
Marianne Junger
2017
conf/acsac
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.
Riccardo Bortolameotti
Thijs van Ede
Marco Caselli
Maarten H. Everts
Pieter H. Hartel
Rick Hofstede
Willem Jonker
Andreas Peter
2016
conf/acsac
Reliably determining data leakage in the presence of strong attackers.
Riccardo Bortolameotti
Andreas Peter
Maarten H. Everts
Willem Jonker
Pieter H. Hartel
2014
conf/acsac
Through the eye of the PLC: semantic security monitoring for industrial processes.
Dina Hadziosmanovic
Robin Sommer
Emmanuele Zambon
Pieter H. Hartel
2013
conf/esorics
Efficient Privacy-Enhanced Familiarity-Based Recommender System.
Arjan Jeckmans
Andreas Peter
Pieter H. Hartel
2011
conf/ccs
Poster: privacy-preserving profile similarity computation in online social networks.
Arjan Jeckmans
Qiang Tang
Pieter H. Hartel
2011
conf/acns
Public-Key Encryption with Delegated Search.
Luan Ibraimi
Svetla Nikova
Pieter H. Hartel
Willem Jonker
2010
conf/ccs
Laptop theft: a case study on the effectiveness of security mechanisms in open organizations.
Trajce Dimkov
Wolter Pieters
Pieter H. Hartel
2010
conf/acsac
Two methodologies for physical penetration testing using social engineering.
Trajce Dimkov
Wolter Pieters
Pieter H. Hartel
2009
conf/wisa
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application.
Luan Ibraimi
Milan Petkovic
Svetla Nikova
Pieter H. Hartel
Willem Jonker
2008
conf/icics
Towards an Information Theoretic Analysis of Searchable Encryption.
Saeed Sedghi
Jeroen Doumen
Pieter H. Hartel
Willem Jonker
2008
conf/icics
Embedding Renewable Cryptographic Keys into Continuous Noisy Data.
Ileana Buhan
Jeroen Doumen
Pieter H. Hartel
Qiang Tang
Raymond N. J. Veldhuis
2007
conf/ccs
Fuzzy extractors for continuous distributions.
Ileana Buhan
Jeroen Doumen
Pieter H. Hartel
Raymond N. J. Veldhuis
2005
conf/sec
StreamTo: Streaming Content using a Tamper-Resistant Token.
Jieyin Cheng
Cheun Ngen Chong
Jeroen Doumen
Sandro Etalle
Pieter H. Hartel
Stefan Nikolaus
2004
conf/ccs
Timed model checking of security protocols.
Ricardo Corin
Sandro Etalle
Pieter H. Hartel
Angelika Mader
2004
conf/wisa
License Protection with a Tamper-Resistant Token.
Cheun Ngen Chong
Bin Ren
Jeroen Doumen
Sandro Etalle
Pieter H. Hartel
Ricardo Corin
2003
conf/sec
Assessing Security in Energy-Efficient Sensor Networks.
Yee Wei Law
Sandro Etalle
Pieter H. Hartel
2003
conf/sec
Secure Audit Logging with Tamper-Resistant Hardware.
Cheun Ngen Chong
Zhonghong Peng
Pieter H. Hartel
Coauthors
Andreas Peter
(3)
Angelika Mader
(1)
Arjan Jeckmans
(2)
Bin Ren
(1)
Cheun Ngen Chong
(3)
Dina Hadziosmanovic
(1)
Elmer Lastdrager
(1)
Emmanuele Zambon
(1)
Ileana Buhan
(2)
Inés Carvajal Gallardo
(1)
Jeroen Doumen
(5)
Jieyin Cheng
(1)
Luan Ibraimi
(2)
Maarten H. Everts
(2)
Marco Caselli
(1)
Marianne Junger
(1)
Milan Petkovic
(1)
Pieter H. Hartel
(18)
Qiang Tang
(2)
Raymond N. J. Veldhuis
(2)
Ricardo Corin
(2)
Riccardo Bortolameotti
(2)
Rick Hofstede
(1)
Robin Sommer
(1)
Saeed Sedghi
(1)
Sandro Etalle
(4)
Stefan Nikolaus
(1)
Svetla Nikova
(2)
Thijs van Ede
(1)
Trajce Dimkov
(2)
Willem Jonker
(5)
Wolter Pieters
(2)
Yee Wei Law
(1)
Zhonghong Peng
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to