Suivre
Dave Singelee
Titre
Citée par
Citée par
Année
CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus
A Van Herrewege, D Singelee, I Verbauwhede
ECRYPT workshop on Lightweight Cryptography 2011, 20, 2011
3252011
Location verification using secure distance bounding protocols
D Singelee, B Preneel
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference …, 2005
2212005
Distance bounding in noisy environments
D Singelée, B Preneel
European workshop on security in ad-hoc and sensor networks, 101-115, 2007
1522007
Low-cost untraceable authentication protocols for RFID
YK Lee, L Batina, D Singelée, I Verbauwhede
Proceedings of the third ACM conference on Wireless network security, 55-64, 2010
1172010
On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them
E Marin, D Singelée, FD Garcia, T Chothia, R Willems, B Preneel
Proceedings of the 32nd annual conference on computer security applications …, 2016
932016
Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning
P Robyns, E Marin, W Lamotte, P Quax, D Singelée, B Preneel
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
842017
A secure cross-layer protocol for multi-hop wireless body area networks
D Singelée, B Latré, B Braem, M Peeters, MD Soete, PD Cleyn, B Preneel, ...
International Conference on Ad-Hoc Networks and Wireless, 94-107, 2008
712008
Design and implementation of a terrorist fraud resilient distance bounding system
A Ranganathan, NO Tippenhauer, B Škorić, D Singelée, S Čapkun
European Symposium on Research in Computer Security, 415-432, 2012
542012
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
522018
On the feasibility of cryptography for a wireless insulin pump system
E Marin, D Singelée, B Yang, I Verbauwhede, B Preneel
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
502016
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede
Personal and Ubiquitous Computing 16 (3), 323-335, 2012
472012
Threat modelling for security tokens in web applications
DD Cock, K Wouters, D Schellekens, D Singelee, B Preneel
Communications and multimedia security, 183-193, 2005
392005
Location privacy in wireless personal area networks
D Singelée, B Preneel
Proceedings of the 5th ACM Workshop on Wireless Security, 11-18, 2006
352006
IoT: Source of test challenges
EJ Marinissen, Y Zorian, M Konijnenburg, CT Huang, PH Hsieh, ...
2016 21th IEEE European test symposium (ETS), 1-10, 2016
342016
Hierarchical ECC-based RFID authentication protocol
L Batina, S Seys, D Singelée, I Verbauwhede
International workshop on radio frequency identification: Security and …, 2011
332011
The wireless application protocol (WAP)
D Singelée, B Preneel
Cosic Internet Report, 2003
312003
Securing wireless neurostimulators
E Marin, D Singelée, B Yang, V Volski, GAE Vandenbosch, B Nuttin, ...
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
282018
Privacy-preserving ECC-based grouping proofs for RFID
L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede
International conference on information security, 159-165, 2010
282010
Key establishment using secure distance bounding protocols
D Singelée, B Preneel
2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems …, 2007
242007
The communication and computation cost of wireless security
D Singelée, S Seys, L Batina, I Verbauwhede
Proceedings of the fourth ACM conference on Wireless network security, 1-4, 2011
232011
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20