If you made any changes in Pure these will be visible here soon.

Personal profile

Research interests

Security & Privacy Engineering

Motivation: The digitalization of society and industry is largely software-defined, which shows the pivotal role of algorithms in order to guarantee security & privacy.

Research focus (technical): The design and analysis of

  1. Secure & Private Algorithms: Algorithms that, next to their functional requirements, additionally fulfill specific security and/or privacy requirements. This involves security & privacy attacker modelling and proving that algorithms satisfy these models.
  2. Algorithms for Security & Privacy: Algorithms that are used to increase the security and/or privacy levels in application-specific contexts. This involves research on scalability and efficiency of algorithms as well as experimentation-based evaluation.

Approach: Scientific Engineering (from real-world problem -> fundamental research challence -> scientific solution -> real-world deployment)

Application domain: Current and Future Critical Infrastructures; mostly: financial, health, cyber/internet, smart cities, and Blockchain


Projects regarding my research focus "Secure & Private Algorithms":

  • OBRE: Optimal Biometric Recognition under Encryption; joint project with Raymond Veldhuis (UT)
  • PensionChain: Blockchain Applications for Pensions; joint project with Marc Francke (UvA)
  • SPA: Seamless Personal Authentication; joint project with Jaco van de Pol (UT)
  • PriFi: Privacy-Preserving WiFi Tracking for Crowd Management; joint project with Maarten van Steen (UT)
  • CRIPTIM: CRitical Infrastructure Protection Through cryptographic Incident Management
  • (finished) THeCS: Trusted Healthcare Services


Projects regarding my research focus "Algorithms for Security & Privacy":

  • BASS: Building Automation Systems Security and Privacy
  • EVIDENCE: EVolutionary Intrusion DEtectioN for dynamiC Environments; joint project with Maarten van Steen (UT)
  • (finished) #BREACHED: Determining and Reducing the Impact of Data Breaches

Education/Academic qualification

PhD, Technische Universitat Darmstadt

Master, University of Oldenburg

Master, University of Cambridge

Fingerprint Dive into the research topics where Andreas Peter is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 7 Similar Profiles
Cryptography Engineering & Materials Science
HTTP Engineering & Materials Science
Automation Engineering & Materials Science
Random access storage Engineering & Materials Science
Intrusion detection Engineering & Materials Science
Predicate Mathematics
Encryption Mathematics
Ranking Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2010 2019

2 Downloads (Pure)

A multi-authority approach to various predicate encryption types

van de Kamp, T. R., Peter, A. & Jonker, W., 25 Oct 2019, In : Designs, codes and cryptography.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access

BACRank: Ranking building automation and control system components by business continuity impact

Esquivel-Vargas, H., Caselli, M., Tews, E., Bucur, D. & Peter, A., 8 Aug 2019, Computer Safety, Reliability, and Security: 38th International Conference, SAFECOMP 2019, Proceedings. Romanovsky, A., Troubitsyna, E. & Bitsch, F. (eds.). Springer Verlag, p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11698 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Control System
Control systems

SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities

Jakubeit, P., Dercksen, A. & Peter, A., Dec 2019.

Research output: Contribution to conferencePaper

1 Downloads (Pure)

Two-Client and Multi-client Functional Encryption for Set Intersection

van de Kamp, T. R., Stritzl, D., Jonker, W. & Peter, A., 30 May 2019, Information security and privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Charm: Springer International Publishing AG, p. 97-115 19 p. (Lecture Notes in Computer Science; vol. 11547).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data transfer

Victim-Aware Adaptive Covert Channels

Bortolameotti, R., van Ede, T. S., Continella, A., Everts, M. H., Jonker, W., Hartel, P. H. & Peter, A., 2019, Security and Privacy in Communication Networks: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohalsen, A. (eds.). p. 450-471 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 304).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review