Expertise
Engineering & Materials Science
# Access Control
# Communication
# Cryptography
# Information Analysis
# Information Management
# Monitoring
Mathematics
# Encryption
# Predicate
Organisations
Publications
Recent
Bortolameotti, R.
, van Ede, T. S.
, Continella, A., Hupperich, T. M.
, Everts, M. H., Rafati, R.
, Jonker, W.
, Hartel, P.
, & Peter, A. (2020).
HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting. In
35th Annual ACM Symposium on Applied Computing, SAC 2020 (pp. 1696-1705). Association for Computing Machinery.
https://doi.org/10.1145/3341105.3373862
van de Kamp, T. R. (2020).
Multi-client functional encryption for controlled data sharing. [PhD Thesis - Research UT, graduation UT, University of Twente]. University of Twente.
https://doi.org/10.3990/1.9789036549585
van de Kamp, T.
, Peter, A.
, & Jonker, W. (2020).
A multi-authority approach to various predicate encryption types.
Designs, codes and cryptography,
88(2), 363–390.
https://doi.org/10.1007/s10623-019-00686-x
Bortolameotti, R.
, van Ede, T. S.
, Everts, M. H.
, Jonker, W.
, Hartel, P. H.
, Peter, A.
, & Continella, A. (2019).
Victim-Aware Adaptive Covert Channels. In S. Chen, K-K. R. Choo, X. Fu, W. Lou, & A. Mohaisen (Eds.),
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I (pp. 450-471). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 304 LNICST).
https://doi.org/10.1007/978-3-030-37228-6_22
Bortolameotti, R. (2019).
Detection and evaluation of data exfiltration. [PhD Thesis - Research UT, graduation UT, University of Twente]. University of Twente.
https://doi.org/10.3990/1.9789036548243
van de Kamp, T. R., Stritzl, D.
, Jonker, W.
, & Peter, A. (2019).
Two-Client and Multi-client Functional Encryption for Set Intersection. In J. Jang-Jaccard, & F. Guo (Eds.),
Information security and privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings (pp. 97-115). (Lecture Notes in Computer Science; Vol. 11547). Springer.
https://doi.org/10.1007/978-3-030-21548-4_6
van de Kamp, T.
, Peter, A.
, Everts, M. H.
, & Jonker, W. (2018).
Multi-client predicate-only encryption for conjunctive equality tests. In S. Capkun, & S. S. M. Chow (Eds.),
Cryptology and Network Security - 16th International Conference, CANS 2017, Revised Selected Papers (pp. 135-157). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11261 LNCS). Springer.
https://doi.org/10.1007/978-3-030-02641-7_7
UT Research Information System
Courses Academic Year 2023/2024
Courses in the current academic year are added at the moment they are finalised in the Osiris system. Therefore it is possible that the list is not yet complete for the whole academic year.
Courses Academic Year 2022/2023
Contact Details
Visiting Address
University of Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling
(building no. 11), room 2007
Hallenweg 19
7522NH Enschede
The Netherlands
Mailing Address
University of Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling
2007
P.O. Box 217
7500 AE Enschede
The Netherlands