Maarten Hinderik Everts

dr.

20082022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2022

    Balancing privacy and accountability in digital payment methods using zk-SNARKs

    Bontekoe, T., Everts, M. & Peter, A., 18 Aug 2022, 2022 19th Annual International Conference on Privacy, Security and Trust, PST 2022. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    27 Downloads (Pure)
  • Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC

    Attema, T., Dunning, V., Everts, M. & Langenkamp, P., 18 Jun 2022, Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings. Ateniese, G. & Venturi, D. (eds.). Springer, p. 663-683 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13269 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    24 Downloads (Pure)
  • Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks

    Mazzone, F., van den Heuvel, L., Huber, M., Verdecchia, C., Everts, M. H., Hahn, F. & Peter, A., 11 Nov 2022, AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022. Association for Computing Machinery, p. 13-24 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    3 Citations (Scopus)
    27 Downloads (Pure)
  • 2020

    HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting

    Bortolameotti, R., van Ede, T. S., Continella, A., Hupperich, T. M., Everts, M. H., Rafati, R., Jonker, W., Hartel, P. & Peter, A., 30 Mar 2020, 35th Annual ACM Symposium on Applied Computing, SAC 2020. Association for Computing Machinery, p. 1696-1705 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    7 Citations (Scopus)
    325 Downloads (Pure)
  • Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach

    Lathouwers, S., Everts, M. & Huisman, M., 2020, Proceedings of the 6th International Conference on Information Systems Security and Privacy: Volume 1: ForSE. Furnell, S., Mori, P., Weippl, E. & Camp, O. (eds.). SCITEPRESS, p. 784-795 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    159 Downloads (Pure)
  • 2019

    Practical Mutation Testing for Smart Contracts

    Honig, J. J., Everts, M. H. & Huisman, M., 2019, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings. Pérez-Solà, C., Navarro-Arribas, G., Biryukov, A. & García-Alfaro, J. (eds.). Cham: Springer, p. 289-303 15 p. (Lecture Notes in Computer Science; vol. 11737).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    18 Citations (Scopus)
    23 Downloads (Pure)
  • Victim-Aware Adaptive Covert Channels

    Bortolameotti, R., van Ede, T. S., Everts, M. H., Jonker, W., Hartel, P. H., Peter, A. & Continella, A., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). p. 450-471 22 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
    12 Downloads (Pure)
  • 2018

    Multi-client predicate-only encryption for conjunctive equality tests

    van de Kamp, T., Peter, A., Everts, M. H. & Jonker, W., 10 Nov 2018, Cryptology and Network Security - 16th International Conference, CANS 2017, Revised Selected Papers. Capkun, S. & Chow, S. S. M. (eds.). Springer, p. 135-157 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11261 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    3 Citations (Scopus)
    8 Downloads (Pure)
  • 2017

    DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting

    Bortolameotti, R., van Ede, T. S., Caselli, M., Everts, M. H., Hartel, P. H., Hofstede, R., Jonker, W. & Peter, A., 2017, ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference. p. 373-386

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    27 Citations (Scopus)
    6 Downloads (Pure)
  • 2016

    Private Sharing of IOCs and Sightings

    van de Kamp, T. R., Peter, A., Everts, M. H. & Jonker, W., 2016, 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016. New York: Association for Computing Machinery, p. 35-38 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    11 Citations (Scopus)
    4 Downloads (Pure)
  • Reliably determining data leakage in the presence of strong attackers

    Bortolameotti, R., Peter, A., Everts, M. H., Jonker, W. & Hartel, P. H., Dec 2016, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016. New York: Association for Computing Machinery, p. 484-495 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Revocable privacy: Principles, use cases, and technologies

    Lueks, W., Everts, M. H. & Hoepman, J. H., 2016, Privacy Technologies and Policy: Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers. Le Metayer, D., Berendt, B., Engel, T., Ikonomou, D. & Schiffner, S. (eds.). Cham: Springer, p. 124-143 20 p. (Lecture Notes in Computer Science; vol. 9484).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Vote to link: Recovering from misbehaving anonymous users

    Lueks, W., Everts, M. H. & Hoepman, J. H., 24 Oct 2016, WPES 2016 - Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society, co-located with CCS 2016. Association for Computing Machinery, p. 111-122 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • 2015

    Indicators of Malicious SSL Connections

    Bortolameotti, R., Peter, A., Everts, M. H. & Bolzoni, D., Nov 2015, 9th International Conference on Network and System Security, NSS 2015. New York: Springer, p. 162-175 14 p. (Lecture Notes in Computer Science; vol. 9408).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    3 Citations (Scopus)
  • Publicly Verifiable Private Aggregation of Time-Series Data

    Bakondi, B. G., Peter, A., Everts, M. H., Hartel, P. H. & Jonker, W., 1 Aug 2015, 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway, NJ, USA: IEEE, p. 50-59 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    3 Citations (Scopus)
    4 Downloads (Pure)
  • 2014

    Designing privacy-by-design

    van Rest, J., Boonstra, D., Everts, M., van Rijn, M. & van Paassen, R., 2014, Privacy Technologies and Policy: First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers. Preneel, B. & Ikonomou, D. (eds.). Berlin, Heidelberg: Springer, p. 55-72 18 p. (Lecture Notes in Computer Science; vol. 8319).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    30 Citations (Scopus)
  • Mobile devices to the identity Rescue

    Alpár, G. & Everts, M. H., 2014, ICT and Society - 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Proceedings. Hansen, M., Hoepman, J-H., Leenes, R. & Whitehouse, D. (eds.). Springer, p. 237-247 11 p. (IFIP Advances in Information and Communication Technology; vol. 421).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Privacy-Preserving Verification of Clinical Research

    Makri, E., Everts, M. H., de Hoogh, S., Peter, A., op den Akker, H., Hartel, P. H. & Jonker, W., 2014, Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Bonn: Gesellschaft für Informatik, p. 481-500 20 p. (Lecture Notes in Informatics (LNI)).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    File
    1 Citation (Scopus)
    37 Downloads (Pure)
  • 2013

    UbiKiMa: Ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography

    Everts, M., Hoepman, J-H. & Siljee, J., 2013, DIM 2013 - Proceedings of the 2013 ACM Workshop on Digital Identity Management, Co-located with CCS 2013. Association for Computing Machinery, p. 19-24 6 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    5 Citations (Scopus)
  • 2011

    Illustrative line styles for flow visualization

    Everts, M. H., Bekker, H., Roerdink, J. B. T. M. & Isenberg, T., 2011, 19th Pacific Conference on Computer Graphics and Applications, PG 2011 - Short Papers. Chen, B-Y., Kautz, J., Lee, T-Y. & Lin, M. C. (eds.). Graz University of Technology, p. 105-110 6 p. (Proceedings - Pacific Conference on Computer Graphics and Applications; vol. 2011-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    5 Citations (Scopus)
    7 Downloads (Pure)
  • 2009

    Visualizing white matter structure of the brain using Dijkstra's algorithm

    Everts, M. H., Bekker, H. & Roerdink, J. B. T. M., 2009, ISPA 2009 - Proceedings of the 6th International Symposium on Image and Signal Processing and Analysis. Piscataway, NJ: IEEE, p. 569-574 6 p. 5297652. (Proceedings of the International Symposium on Image and Signal Processing and Analysis (ISPA); vol. 2009, no. 6).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    4 Citations (Scopus)