Welcome...

dr. M.H. Everts (Maarten)

Assistant Professor

Expertise

Engineering & Materials Science
Communication
Computer Hardware
Cryptography
Http
Moderators
Monitoring
Testing
Mathematics
Encryption

Publications

Recent
Attema, T., Dunning, V. , Everts, M., & Langenkamp, P. (2022). Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC. In G. Ateniese, & D. Venturi (Eds.), Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings (pp. 663-683). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 13269 LNCS). Springer. https://doi.org/10.1007/978-3-031-09234-3_33
Bontekoe, T. , Everts, M. , & Peter, A. (2022). Balancing privacy and accountability in digital payment methods using zk-SNARKs. In 2022 19th Annual International Conference on Privacy, Security and Trust, PST 2022 IEEE. https://doi.org/10.1109/PST55820.2022.9851987
Mazzone, F., van den Heuvel, L., Huber, M., Verdecchia, C. , Everts, M. H. , Hahn, F. , & Peter, A. (2022). Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks. In AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022 (pp. 13-24). Association for Computing Machinery. https://doi.org/10.1145/3560830.3563721
Lathouwers, S. , Everts, M. , & Huisman, M. (2020). Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach. In S. Furnell, P. Mori, E. Weippl, & O. Camp (Eds.), Proceedings of the 6th International Conference on Information Systems Security and Privacy: Volume 1: ForSE (pp. 784-795). SCITEPRESS. https://doi.org/10.5220/0009371207840795
Bortolameotti, R. , van Ede, T. S. , Continella, A., Hupperich, T. M. , Everts, M. H., Rafati, R. , Jonker, W. , Hartel, P. , & Peter, A. (2020). HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting. In 35th Annual ACM Symposium on Applied Computing, SAC 2020 (pp. 1696-1705). Association for Computing Machinery. https://doi.org/10.1145/3341105.3373862
Bortolameotti, R. , van Ede, T. S. , Everts, M. H. , Jonker, W. , Hartel, P. H. , Peter, A. , & Continella, A. (2019). Victim-Aware Adaptive Covert Channels. In S. Chen, K.-K. R. Choo, X. Fu, W. Lou, & A. Mohaisen (Eds.), Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I (pp. 450-471). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 304 LNICST). https://doi.org/10.1007/978-3-030-37228-6_22

UT Research Information System

Contact Details

Visiting Address

University of Twente
Drienerlolaan 5
7522 NB Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
P.O. Box 217
7500 AE Enschede
The Netherlands

Social Media