Search concepts
|
Selected filters
|
- 35,800 - 35,850 out of 154,438 results
Search results
-
Secure storage system and method for secure storing
Jonker, W., Brinkman, R. & Maubach, S., 8 Nov 2007, (Submitted) Patent No. WO2007125454, Priority date 27 Apr 2006Research output: Patent
File23 Downloads (Pure) -
Secure Storage of Cryptographic Keys within Random Volumetric Materials
Horstmeyer, R., Judkewitz, B., Vellekoop, I. M. & Yang, C., 9 Jun 2013, Lasers for Imaging & Data Transmission (AF1H). San Jose, California USA: Optical Society of America, p. AF1H6-Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
3 Citations (Scopus) -
Secure Sessions for Web Services
Bhargavan, K., Corin, R., Fournet, C. & Gordon, A. D., Oct 2004, ACM Workshop on Secure Web Services (SWS). New York: ACM Press, p. 56-66 11 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile15 Citations (Scopus)210 Downloads (Pure) -
Secure Sessions for Web Services
Bhargavan, K., Corin, R., Fournet, C. & Gordon, A. D., 2007, In: ACM transactions on information and system security (TISSEC). 10, 2, 42 p., 8.Research output: Contribution to journal › Article › Academic › peer-review
23 Citations (Scopus) -
Secure Service Discovery in Home Networks
Scholten, J., van Dijk, H. W., De Cock, D., Preneel, B., Kung, A. & d'Hooge, M., 9 Jan 2006, 2006 IEEE Int. Conf. on Consumer Electronics. Piscataway, NJ, USA: IEEE Computer Society, p. 115-116 2 p. 10.1109/ICCE.2006.1598337Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File5 Citations (Scopus)129 Downloads (Pure) -
Secure Selfstabilizing Systems
Hoepman, J. H., 2001, WSS 2001. p. -Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
-
Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks
Law, Y. W., Zhang, Y., Jin, J., Palaniswami, M. & Havinga, P., Sep 2010, In: EURASIP journal on wireless communications and networking. 2011, 22 p., 685219.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile28 Citations (Scopus)3 Downloads (Pure) -
Secure PUF: Physically unclonable function based on arbiter with enhanced resistance against machine learning (ML) attacks
Elhajj, M., Fadlallah, A., Chamoun, M. & Serhrouchni, A., 25 Sep 2019, Sensors and electronic Instrumentation Advances. 19 ed. Canada: International Frequency Sensor Association, p. 216-220 4 p. 82Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile21 Downloads (Pure) -
Secure peer sampling
Jesi, G. P., Montresor, A. & van Steen, M., 26 Aug 2010, In: Computer networks. 54, 12, p. 2086-2098 13 p.Research output: Contribution to journal › Article › Academic › peer-review
25 Citations (Scopus) -
Secure pairing with biometrics
Buhan, I. R., Boom, B. J., Doumen, J. M., Hartel, P. H. & Veldhuis, R. N. J., Feb 2009, In: International journal of security and networks. 4, 1/2, p. 27-42 16 p., 10.1504/IJSN.2009.023424.Research output: Contribution to journal › Article › Academic › peer-review
17 Citations (Scopus) -
Secure Multiparty PageRank Algorithm for Collaborative Fraud Detection
Sangers, A., van Heesch, M., Attema, T., Veugen, T., Wiggerman, M., Veldsink, J., Bloemen, O. & Worm, D., 2019, Financial Cryptography and Data Security: 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Cham: Springer Vieweg, p. 605-623 19 p. (Lecture Notes in Computer Science; vol. 11598).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
7 Citations (Scopus) -
Secure Multi-party Computation and Its Applications
Veugen, T., 2022, Innovations for Community Services: 22nd International Conference, I4CS 2022, Delft, The Netherlands, June 13–15, 2022, Proceedings. Phillipson, F., Eichler, G., Erfurth, C. & Fahrnberger, G. (eds.). Springer, p. 3-5 3 p. (Communications in Computer and Information Science; vol. 1585).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
-
Secure Method Invocation in JASON
Hoepman, J. H. & Brinkman, R., Nov 2002, 5th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS). Welch, J. L. (ed.). Berkeley, California: Springer, p. 29-40 12 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File6 Citations (Scopus)42 Downloads (Pure) -
Secure matching of dutch car license plates
Sunil, A. B., Erkin, Z. & Veugen, T., 2 Sep 2016, 2016 24th European Signal Processing Conference (EUSIPCO). Piscataway, NJ: IEEE, p. 2116-2120 5 p. 7760622Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
3 Citations (Scopus) -
Secure Management of Personal Health Records by Applying Attribute-Based Encryption
Ibraimi, L., Asim, M. & Petkovic, M., 20 Jul 2009, Enschede: Centre for Telematics and Information Technology (CTIT). 6 p. (CTIT Technical Report Series; no. TR-CTIT-09-41)Research output: Book/Report › Report › Professional
File77 Citations (Scopus)307 Downloads (Pure) -
Securely replicated web documents
Popescu, B. C., van Steen, M., Crispo, B., Tanenbaum, A. S., Sacha, J. & Kuz, I., 1 Dec 2005, 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005. IEEE, 1419930. (IEEE International Parallel and Distributed Processing Symposium; vol. 2005).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
8 Citations (Scopus) -
Secure Implementations for Typed Session Abstractions
Corin, R. J., Deniélou, P-M., Fournet, C., Bhargavan, K. & Leifer, J., Jul 2007, 20th IEEE Computer Security Foundations Symposium (CSF). Focardi, R. (ed.). Los Alamitos, CA, USA: IEEE Computer Society, p. 170-186 17 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
24 Citations (Scopus)77 Downloads (Pure) -
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches
Paar, C. (ed.), Nikova, S. I., Rijmen, V., Quisquater, J. J. (ed.), Sunar, B. (ed.) & Schläffer, M., 2011, In: Journal of cryptology. 24, 2, p. 292-321 27 p.Research output: Contribution to journal › Article › Academic › peer-review
222 Citations (Scopus) -
SECURE EVALUATION OF A PROGRAM
Veugen, P., 20 May 2015, IPC No. H04L 9/ 00 A I, Patent No. EP2874341, Priority date 24 Sep 2014, Priority No. EP20140186076Research output: Patent
Open AccessFile6 Downloads (Pure) -
Secure Evaluation of a Program
Veugen, P. J. M., 26 Mar 2015, IPC No. G06F 21/ 72 A I, Patent No. US2015089243, Priority date 26 Sep 2013, Priority No. EP20130186211Research output: Patent
Open AccessFile2 Downloads (Pure) -
Secure equality testing protocols in the two-party setting
Nateghizad, M., Veugen, T., Erkin, Z. & Lagendijk, R. L., 27 Aug 2018, ARES 2018 - 13th International Conference on Availability, Reliability and Security. New York, NY: Association for Computing Machinery, 3230866Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
2 Citations (Scopus) -
Secure Ecommerce; Voorwaarden voor veilig zakendoen over het Internet
Helme, A. & Hoepman, J. H., 1999, In: Mnet Magazine. 1999, p. 16-18Research output: Contribution to journal › Article › Academic
-
Secure Distribution of Watermarked Content
van Deventer, M. O. & Veugen, P. J. M., 15 Dec 2016, IPC No. H04L 29/ 06 A I, Patent No. US2016365973, Priority date 30 Oct 2012, Priority No. EP20120190643Research output: Patent
Open AccessFile -
Secure Distribution of Content
Veugen, P. J. M. & van Deventer, M. O., 16 Oct 2014, IPC No. H04L 9/ 08 A I, Patent No. US2014310527, Priority date 24 Oct 2012, Priority No. WO2012EP70995Research output: Patent
Open AccessFile4 Downloads (Pure) -
Secure Distribution of Content
Veugen, P. & van Deventer, M. O., 4 Sep 2015, IPC No. H04L C I, Patent No. HK1201658, Priority date 24 Oct 2012, Priority No. WO2012EP70995Research output: Patent
Open Access -
Secure Data Management: 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings
Jonker, W. (ed.) & Petković, M. (ed.), Aug 2012, Berlin: Springer. 177 p. (Lecture Notes in Computer Science; vol. 7482)Research output: Book/Report › Book editing › Academic
Open AccessFile443 Downloads (Pure) -
Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings
Jonker, W. (ed.) & Petković, M. (ed.), Sep 2005, Berlin, Heidelberg: Springer. 241 p. (Lecture Notes in Computer Science; vol. 3674)Research output: Book/Report › Book editing › Academic
Open AccessFile60 Downloads (Pure) -
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004. Proceedings
Jonker, W. (ed.) & Petkovic, M. (ed.), Aug 2004, Berlin: Springer. 219 p. (Lecture Notes in Computer Science; vol. 3178)Research output: Book/Report › Book editing › Academic
Open AccessFile24 Downloads (Pure) -
Secure Data Management: Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedings
Jonker, W. (ed.) & Petković, M. (ed.), Sep 2006, Berlin: Springer. 185 p. (Lecture Notes in Computer Science; vol. 4165)Research output: Book/Report › Book › Academic
Open AccessFile9 Downloads (Pure) -
Secure Data Flow in a Calculus for Context Awareness
Bucur, D. & Nielsen, M., 2008, Concurrency, Graphs and Models: Essays Dedicated to Ugo Montanari on the Occasion of His 65th Birthday. Degano, P., De Nicola, R. & Meseguer, J. (eds.). Berlin, Heidelberg: Springer, p. 439-456 18 p. (Lecture Notes in Computer Science; vol. 5065).Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
7 Citations (Scopus) -
Secure content management in authorised domains
van den Heuvel, S. A. F. A., Jonker, W., Jonker, W., Kamperman, F. L. A. J. & Lenoir, P. J., Sep 2002, p. 467-474. 8 p.Research output: Contribution to conference › Paper › peer-review
File93 Downloads (Pure) -
Secure comparison protocols in the semi-honest model
Veugen, T., Blom, F., de Hoogh, S. J. A. & Erkin, Z., 1 Oct 2015, In: IEEE journal of selected topics in signal processing. 9, 7, p. 1217-1228 12 p., 7101213.Research output: Contribution to journal › Article › Academic › peer-review
38 Citations (Scopus) -
Secure communication with coded wavefronts
Uppu, R., Wolterink, T. A. W., Goorden, S. A., Skoric, B., Mosk, A. P. & Pinkse, P. W. H., 2017, 2017 Conference on Lasers and Electro-Optics Europe & European Quantum Electronics Conference (CLEO/Europe-EQEC). Optical Society of America, Vol. Part F81-EQEC 2017.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
-
Secure communication with coded wavefronts
Uppu, R., Wolterink, T., Goorden, S. A., Skoric, B., Mosk, A. & Pinkse, P. W. H., 2017.Research output: Contribution to conference › Poster › Other research output
-
Secure Communication using Identity Based Encryption
Roschke, S., Ibraimi, L., Cheng, F. & Meinel, C., 31 May 2010, Proceedings of the 11th Joint IFIP TC6 and TC 11 Conference on Communications and Multimedia Security (CMS). Berlin: Springer, p. 256-267 12 p. (Lecture Notes in Computer Science; vol. 6109).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File5 Citations (Scopus)255 Downloads (Pure) -
Secure Communication in Vehicular Networks - PRESERVE Demo
Lagana, M., Feiri, M., Sall, M., Lange, M., Tomatis, A. & Papadimitratos, P., Nov 2012, 2012 IEEE Vehicular Networking Conference (VNC): Demo Summaries. Seoul: IEEE Communications Society, p. 11-12 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File272 Downloads (Pure) -
Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks
Dietzel, S., Peter, A. & Kargl, F., May 2015, IEEE 81st Vehicular Technology Conference, VTC Spring 2015. Piscataway, NJ, USA: IEEE, p. 1-5 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
5 Citations (Scopus) -
Secure base stations
Bosch, P., Brusilovsky, A., McLellan, R., Mullender, S. J. & Polakos, P., 25 Feb 2009, In: Bell labs technical journal. 13, 4, p. 227-243 17 p.Research output: Contribution to journal › Article › Academic › peer-review
2 Citations (Scopus) -
Secure Audit Logging with Tamper-Resistant Hardware
Chong, C. N., Peng, Z. & Hartel, P. H., Aug 2002, Enschede: Centre for Telematics and Information Technology (CTIT).Research output: Book/Report › Report › Other research output
-
Secure Audit Logging with Tamper-Resistant Hardware
Chong, C. N., Peng, Z., Peng, Z. & Hartel, P. H., May 2003, 18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC). Gritzalis, D., De Capitani di Vimercati, S., Katsikas, S. K. & Samarati, P. (eds.). Boston, Massachusetts: Kluwer Academic Publishers, p. 73-84 12 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File345 Downloads (Pure) -
Secure Architectures in the Cloud
De Capitani di Vimercati, S., Pieters, W. & Probst, C. W., 1 Dec 2011, Germany: Dagstuhl. 16 p. (Dagstuhl Reports; vol. 1, issue 12, no. 11492)Research output: Book/Report › Report › Professional
File80 Downloads (Pure) -
Secure Ad-hoc Pairing with Biometrics: SAfE
Buhan, I. R., Doumen, J. M., Hartel, P. H. & Veldhuis, R. N. J., Jul 2007, Enschede: Centre for Telematics and Information Technology (CTIT). 10 p. (CTIT Technical Report Series; no. TR-CTIT-07-69)Research output: Book/Report › Report › Professional
File86 Downloads (Pure) -
Secure Ad-hoc Pairing with Biometrics: SAfE
Buhan, I. R., Doumen, J. M., Hartel, P. H. & Veldhuis, R. N. J., Sep 2007, UbiComp 2007: Workshop proceedings : Innsbruck, Austria, September 2007. Bajart, A. (ed.). p. 450-456 7 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File32 Downloads (Pure) -
Secundaire analyses TIMSS-2007 Natuuronderwijs in groep 6
Meelissen, M. R. M., 2010, Enschede: Universiteit Twente, Vakgroep Onderwijsorganisatie en -management.Research output: Book/Report › Report › Professional
-
Secundaire analyses op de data van TIMSS-2015: een nadere analyse van leerkrachtpercepties en de referentieniveaus voor rekenen en natuuronderwijs
Rebber, A. I., van den Berg, S. M. & Meelissen, M. R. M., May 2017, Enschede: Universiteit Twente. 28 p.Research output: Book/Report › Report › Academic
Open AccessFile92 Downloads (Pure) -
Secundair beroepsonderwijs in transitie: een introductie op het thema
Streumer, J. & Nijhof, W. J., 1998, In: Pedagogische studiën. 75, 5, p. 289-294 5 p.Research output: Contribution to journal › Article › Academic
File29 Downloads (Pure) -
Sector effects on the distribution of achievement
Apperloo, C. J. F., Bosker, R., Brandsma, H. P. & Dijkstra, A. B., 3 Jan 1995, Proceedings of the International Congress on School Effectiveness and School Improvement. Leeuwarden, p. 26-Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
-
Sector collapse forming at Casita volcano, Nicaragua
van Wyk de Vries, B., Kerle, N. & Peltey, D., 2000, In: Geology. 28, 2, p. 167-170Research output: Contribution to journal › Article › Academic › peer-review
131 Citations (Scopus) -
Sectoral demand articulation: The case of emerging sensor technologies in the drinking water sector
te Kulve, H. & Konrad, K. E., Jun 2017, In: Technological forecasting and social change. 119, p. 154-169Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile5 Citations (Scopus)3 Downloads (Pure) -
Section Introduction: requirements and principles for groupware design
van der Veer, G. C., 1996, The design of comp.supp.cooperative work and groupware systems. Eds. D.Shapiro, M.Tauber, R.Traunmuller. Amsterdam: Elsevier, p. 69-76Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic