Towards low-effort development of advanced IoT applications | 0 | 0.34 | 2021 |
SMIoT: a software architecture for maintainable internet-of-things applications. | 0 | 0.34 | 2020 |
Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices | 0 | 0.34 | 2019 |
Untangling the Physical-Digital Knot When Designing Advanced IoT Ecosystems | 0 | 0.34 | 2019 |
An Extensible Approach for Integrating Health and Activity Wearables in Mobile IoT Apps | 0 | 0.34 | 2019 |
Using Android Devices as Mobile Extensible HMIs | 0 | 0.34 | 2018 |
Developing Maintainable Application-Centric IoT Ecosystems | 1 | 0.36 | 2018 |
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems. | 0 | 0.34 | 2017 |
A logic-based framework for the security analysis of Industrial Control Systems. | 1 | 0.63 | 2017 |
Security Analysis of Cordova Applications in Google Play | 0 | 0.34 | 2017 |
Comparing performance parameters of mobile app development strategies. | 2 | 0.36 | 2016 |
An Assessment Of Security Analysis Tools For Cyber-Physical Systems | 0 | 0.34 | 2016 |
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices | 1 | 0.36 | 2016 |
A Quantitative Assessment of Performance in Mobile App Development Tools | 3 | 0.38 | 2015 |
Secure remote access to an industrial generator with mobile devices | 0 | 0.34 | 2015 |
Privacy-Preserving Public Transport Ticketing System | 1 | 0.35 | 2015 |
Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based System. | 3 | 0.53 | 2015 |
Formal Reasoning About Privacy and Trust in Loyalty Systems. | 0 | 0.34 | 2015 |
A SysML Extension for Security Analysis of Industrial Control Systems | 5 | 0.78 | 2014 |
Secure Storage On Android With Context-Aware Access Control | 0 | 0.34 | 2014 |
An Architecture for the Analysis and Management of Security in Industrial Control Systems. | 0 | 0.34 | 2014 |
A formal approach for inspecting privacy and trust in advanced electronic services | 2 | 0.43 | 2013 |
User-centric identity management using trusted modules | 2 | 0.36 | 2013 |
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services. | 0 | 0.34 | 2013 |
Privacy-preserving scheduling mechanism for ehealth systems | 1 | 0.63 | 2012 |
Privacy-Preserving Mechanisms For Organizing Tasks In A Pervasive Ehealth System | 0 | 0.34 | 2012 |
Data-minimizing authentication goes mobile | 1 | 0.37 | 2012 |
Claim-Based versus Network-Based Identity Management: A Hybrid Approach. | 0 | 0.34 | 2012 |
Using a Smartphone to Access Personalized Web Services on a Workstation. | 0 | 0.34 | 2011 |
Commercial home assistance (ehealth) services | 1 | 0.39 | 2011 |
Analysis of revocation strategies for anonymous Idemix credentials | 10 | 0.58 | 2011 |
Designing Privacy-Enhancing Mobile Applications. | 0 | 0.34 | 2011 |
Structure preserving CCA secure encryption and applications | 19 | 0.62 | 2011 |
Privacy Preserving Mechanisms for a Pervasive eHealth System. | 0 | 0.34 | 2011 |
A generic architecture for integrating health monitoring and advanced care provisioning | 0 | 0.34 | 2011 |
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties. | 1 | 0.36 | 2011 |
A Mobile and Reliable Anonymous ePoll Infrastructure | 2 | 0.38 | 2010 |
Personalized Mobile Services with Lightweight Security in a Sports Association | 1 | 0.36 | 2010 |
PriMan: a privacy-preserving identity framework | 1 | 0.36 | 2010 |
Performance Analysis of Accumulator-Based Revocation Mechanisms. | 14 | 0.69 | 2010 |
Building advanced applications with the Belgian eID | 0 | 0.34 | 2010 |
Privacy in Commercial Medical Storage Systems. | 2 | 0.44 | 2010 |
A Smart Card Based Solution For User-Centric Identity Management | 4 | 0.52 | 2010 |
Anonymous, Yet Trustworthy Auctions | 0 | 0.34 | 2009 |
Security and Privacy Improvements for the Belgian eID Technology | 3 | 0.51 | 2009 |
Extending the Belgian eID Technology with Mobile Security Functionality | 0 | 0.34 | 2009 |
A fair anonymous submission and review system | 5 | 0.52 | 2006 |
Accountable Anonymous E-Mail | 0 | 0.34 | 2005 |
Securing RMI Communication | 0 | 0.34 | 2001 |