Name
Affiliation
Papers
VINCENT NAESSENS
Katholieke Univ Leuven, Campus Kortrijk KULAK, Louvain, Belgium
49
Collaborators
Citations 
PageRank 
38
86
19.70
Referers 
Referees 
References 
185
730
396
Search Limit
100730
Title
Citations
PageRank
Year
Towards low-effort development of advanced IoT applications00.342021
SMIoT: a software architecture for maintainable internet-of-things applications.00.342020
Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices00.342019
Untangling the Physical-Digital Knot When Designing Advanced IoT Ecosystems00.342019
An Extensible Approach for Integrating Health and Activity Wearables in Mobile IoT Apps00.342019
Using Android Devices as Mobile Extensible HMIs00.342018
Developing Maintainable Application-Centric IoT Ecosystems10.362018
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems.00.342017
A logic-based framework for the security analysis of Industrial Control Systems.10.632017
Security Analysis of Cordova Applications in Google Play00.342017
Comparing performance parameters of mobile app development strategies.20.362016
An Assessment Of Security Analysis Tools For Cyber-Physical Systems00.342016
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices10.362016
A Quantitative Assessment of Performance in Mobile App Development Tools30.382015
Secure remote access to an industrial generator with mobile devices00.342015
Privacy-Preserving Public Transport Ticketing System10.352015
Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based System.30.532015
Formal Reasoning About Privacy and Trust in Loyalty Systems.00.342015
A SysML Extension for Security Analysis of Industrial Control Systems50.782014
Secure Storage On Android With Context-Aware Access Control00.342014
An Architecture for the Analysis and Management of Security in Industrial Control Systems.00.342014
A formal approach for inspecting privacy and trust in advanced electronic services20.432013
User-centric identity management using trusted modules20.362013
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services.00.342013
Privacy-preserving scheduling mechanism for ehealth systems10.632012
Privacy-Preserving Mechanisms For Organizing Tasks In A Pervasive Ehealth System00.342012
Data-minimizing authentication goes mobile10.372012
Claim-Based versus Network-Based Identity Management: A Hybrid Approach.00.342012
Using a Smartphone to Access Personalized Web Services on a Workstation.00.342011
Commercial home assistance (ehealth) services10.392011
Analysis of revocation strategies for anonymous Idemix credentials100.582011
Designing Privacy-Enhancing Mobile Applications.00.342011
Structure preserving CCA secure encryption and applications190.622011
Privacy Preserving Mechanisms for a Pervasive eHealth System.00.342011
A generic architecture for integrating health monitoring and advanced care provisioning00.342011
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties.10.362011
A Mobile and Reliable Anonymous ePoll Infrastructure20.382010
Personalized Mobile Services with Lightweight Security in a Sports Association10.362010
PriMan: a privacy-preserving identity framework10.362010
Performance Analysis of Accumulator-Based Revocation Mechanisms.140.692010
Building advanced applications with the Belgian eID00.342010
Privacy in Commercial Medical Storage Systems.20.442010
A Smart Card Based Solution For User-Centric Identity Management40.522010
Anonymous, Yet Trustworthy Auctions00.342009
Security and Privacy Improvements for the Belgian eID Technology30.512009
Extending the Belgian eID Technology with Mobile Security Functionality00.342009
A fair anonymous submission and review system50.522006
Accountable Anonymous E-Mail00.342005
Securing RMI Communication00.342001