Research output per year

If you made any changes in Pure these will be visible here soon.

Personal profile

Research interests

Security & Privacy Engineering

Motivation: The digitalization of society and industry is largely software-defined, which shows the pivotal role of algorithms in order to guarantee security & privacy.

Research focus (technical): The design and analysis of

  1. Secure & Private Algorithms: Algorithms that, next to their functional requirements, additionally fulfill specific security and/or privacy requirements. This involves security & privacy attacker modelling and proving that algorithms satisfy these models.
  2. Algorithms for Security & Privacy: Algorithms that are used to increase the security and/or privacy levels in application-specific contexts. This involves research on scalability and efficiency of algorithms as well as experimentation-based evaluation.

Approach: Scientific Engineering (from real-world problem -> fundamental research challence -> scientific solution -> real-world deployment)

Application domain: Current and Future Critical Infrastructures; mostly: financial, health, cyber/internet, smart cities, and Blockchain


Projects regarding my research focus "Secure & Private Algorithms":

  • OBRE: Optimal Biometric Recognition under Encryption; joint project with Raymond Veldhuis (UT)
  • PensionChain: Blockchain Applications for Pensions; joint project with Marc Francke (UvA)
  • SPA: Seamless Personal Authentication; joint project with Jaco van de Pol (UT)
  • PriFi: Privacy-Preserving WiFi Tracking for Crowd Management; joint project with Maarten van Steen (UT)
  • CRIPTIM: CRitical Infrastructure Protection Through cryptographic Incident Management
  • (finished) THeCS: Trusted Healthcare Services


Projects regarding my research focus "Algorithms for Security & Privacy":

  • BASS: Building Automation Systems Security and Privacy
  • EVIDENCE: EVolutionary Intrusion DEtectioN for dynamiC Environments; joint project with Maarten van Steen (UT)
  • (finished) #BREACHED: Determining and Reducing the Impact of Data Breaches

Education/Academic qualification

PhD, Technische Universitat Darmstadt

Master, University of Oldenburg

Master, University of Cambridge

Fingerprint Dive into the research topics where Andreas Peter is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 10 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic

van Ede, T. S., Bortolameotti, R., Continella, A., Ren, J., Dubois, D. J., Lindorfer, M., Choffnes, D., van Steen, M. & Peter, A., 24 Feb 2020, Network and Distributed System Security Symposium (NDSS). 27 ed. San Diego: Internet Society

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
  • 6 Downloads (Pure)

    HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting

    Bortolameotti, R., van Ede, T. S., Continella, A., Hupperich, T. M., Everts, M. H., Rafati, R., Jonker, W., Hartel, P. H. & Peter, A., 30 Mar 2020, SAC'20. p. 1696-1705 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
  • 7 Downloads (Pure)

    A multi-authority approach to various predicate encryption types

    van de Kamp, T. R., Peter, A. & Jonker, W., 25 Oct 2019, In : Designs, codes and cryptography.

    Research output: Contribution to journalArticleAcademicpeer-review

    Open Access
  • 14 Downloads (Pure)

    BACRank: Ranking building automation and control system components by business continuity impact

    Esquivel-Vargas, H., Caselli, M., Tews, E., Bucur, D. & Peter, A., 8 Aug 2019, Computer Safety, Reliability, and Security: 38th International Conference, SAFECOMP 2019, Proceedings. Romanovsky, A., Troubitsyna, E. & Bitsch, F. (eds.). Springer Verlag, p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11698 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities

    Jakubeit, P., Dercksen, A. & Peter, A., Dec 2019.

    Research output: Contribution to conferencePaper