default search action
Dave Singelée
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Kevin Bogner, Dave Singelée, Aysajan Abidin:
Entangled States and Bell's Inequality: A New Approach to Quantum Distance Bounding. ISCC 2024: 1-6 - [c35]Takahito Yoshizawa, Alireza Aghabagherloo, Árpád Huszák, Csongor Ujvárosi, Dave Singelée, Bart Preneel:
Security-Focused Training Model of Reinforcement Learning in Autonomous Vehicles. VNC 2024: 215-218 - [i9]Ilja Siros, Dave Singelée, Bart Preneel:
GitHub Copilot: the perfect Code compLeeter? CoRR abs/2406.11326 (2024) - [i8]Sayon Duttagupta, Dave Singelée:
PISA: Privacy-Preserving Smart Parking. IACR Cryptol. ePrint Arch. 2024: 1725 (2024) - 2023
- [j13]Takahito Yoshizawa, Dave Singelée, Jan Tobias Mühlberg, Stéphane Delbruel, Amir Taherkordi, Danny Hughes, Bart Preneel:
A Survey of Security and Privacy Issues in V2X Communication Systems. ACM Comput. Surv. 55(9): 185:1-185:36 (2023) - [j12]Roozbeh Sarenche, Seyed Farhad Aghili, Takahito Yoshizawa, Dave Singelée:
DASLog: Decentralized Auditable Secure Logging for UAV Ecosystems. IEEE Internet Things J. 10(23): 20264-20284 (2023) - [c34]Sayon Duttagupta, Eduard Marin, Dave Singelée, Bart Preneel:
HAT: Secure and Practical Key Establishment for Implantable Medical Devices. CODASPY 2023: 213-224 - [c33]Tohid Behdadnia, Geert Deconinck, Can Ozkan, Dave Singelée:
Encrypted Traffic Classification for Early-Stage Anomaly Detection in Power Grid Communication Network. ISGT EUROPE 2023: 1-6 - [c32]Omid Mirzamohammadi, Kristof Jannes, Laurens Sion, Dimitri Van Landuyt, Aysajan Abidin, Dave Singelée:
Security and Privacy Threat Analysis for Solid. SecDev 2023: 196-206 - [i7]Aysajan Abidin, Karim Eldefrawy, Dave Singelée:
Entanglement-based Mutual Quantum Distance Bounding. CoRR abs/2305.09905 (2023) - 2022
- [j11]Seyed Farhad Aghili, Mahdi Sedaghat, Dave Singelée, Maanak Gupta:
MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme. Future Gener. Comput. Syst. 131: 75-90 (2022) - [j10]Jori Winderickx, An Braeken, Dave Singelée, Nele Mentens:
In-depth energy analysis of security algorithms and protocols for the Internet of Things. J. Cryptogr. Eng. 12(2): 137-149 (2022) - [c31]Sayon Duttagupta, Dave Singelée, Bart Preneel:
T-HIBE: A Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT Systems. CCNC 2022: 766-774 - [i6]Takahito Yoshizawa, Dave Singelée, Jan Tobias Mühlberg, Stéphane Delbruel, Amir Taherkordi, Danny Hughes, Bart Preneel:
A Survey of Security and Privacy Issues in V2X Communication Systems. CoRR abs/2208.14674 (2022) - 2021
- [j9]Amirhossein Adavoudi Jolfaei, Seyed Farhad Aghili, Dave Singelée:
A Survey on Blockchain-Based IoMT Systems: Towards Scalability. IEEE Access 9: 148948-148975 (2021) - [j8]Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann:
Secure, Accurate, and Practical Narrow-Band Ranging System. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2): 106-135 (2021) - [c30]Mo Zhang, Eduard Marin, David F. Oswald, Dave Singelée:
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices. CARDIS 2021: 289-309 - [c29]Takahito Yoshizawa, Dave Singelée, Bart Preneel:
A New Privacy Enhancing Beacon Scheme in V2X Communication. DPM/CBT@ESORICS 2021: 139-151 - [i5]André Noll Barreto, Stefan Köpsell, Arsenia Chorti, Bertram Poettering, Jens Jelitto, Julia Hesse, Jonathan Boole, Konrad Rieck, Marios Kountouris, Dave Singelée, Kumar Ashwinee:
Towards Intelligent Context-Aware 6G Security. CoRR abs/2112.09411 (2021) - [i4]Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann:
Secure, Accurate, and Practical Narrow-Band Ranging System. IACR Cryptol. ePrint Arch. 2021: 70 (2021) - [i3]Mo Zhang, Eduard Marin, David F. Oswald, Dave Singelée:
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices. IACR Cryptol. ePrint Arch. 2021: 1326 (2021) - 2020
- [c28]Michiel Willocx, Dave Singelée, Jorn Lapon, Vincent Naessens:
Supporting Contact Tracing by Privacy-Friendly Registration at Catering Facilities. ESSE 2020: 162-167 - [c27]Qing Wang, Jona Beysens, Dave Singelée, Sofie Pollin:
Poster: Securing IoT Through Coverage-Bounding Wireless Communication With Visible Light. ICNP 2020: 1-2
2010 – 2019
- 2019
- [j7]Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - [c26]Eduard Marin, Enrique Argones-Rúa, Dave Singelée, Bart Preneel:
On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols. SACMAT 2019: 113-122 - 2018
- [c25]Jori Winderickx, Dave Singelée, Nele Mentens:
HeComm: End-to-end secured communication in a heterogeneous IoT environment via fog computing. CCNC 2018: 1-6 - [c24]Jori Winderickx, An Braeken, Dave Singelée, Roel Peeters, Thijs Vandenryt, Ronald Thoelen, Nele Mentens:
Digital signatures and signcryption schemes on embedded devices: a trade-off between computation and storage. CF 2018: 342-347 - [c23]Eduard Marin, Dave Singelée, Bohan Yang, Vladimir Volskiy, Guy A. E. Vandenbosch, Bart Nuttin, Bart Preneel:
Securing Wireless Neurostimulators. CODASPY 2018: 287-298 - [c22]Maxime Madau, Michel Agoyan, Josep Balasch, Milos Grujic, Patrick Haddad, Philippe Maurine, Vladimir Rozic, Dave Singelée, Bohan Yang, Ingrid Verbauwhede:
The Impact of Pulsed Electromagnetic Fault Injection on True Random Number Generators. FDTC 2018: 43-48 - 2017
- [c21]Tomer Ashur, Jeroen Delvaux, Sanghan Lee, Pieter Maene, Eduard Marin, Svetla Nikova, Oscar Reparaz, Vladimir Rozic, Dave Singelée, Bohan Yang, Bart Preneel:
A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network. CANS 2017: 347-369 - [c20]Pieter Robyns, Eduard Marin, Wim Lamotte, Peter Quax, Dave Singelée, Bart Preneel:
Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning. WISEC 2017: 58-63 - 2016
- [c19]Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel:
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them. ACSAC 2016: 226-236 - [c18]Eduard Marin, Mustafa A. Mustafa, Dave Singelée, Bart Preneel:
A Privacy-Preserving Remote Healthcare System Offering End-to-End Security. ADHOC-NOW 2016: 237-250 - [c17]Eduard Marin, Dave Singelée, Bohan Yang, Ingrid Verbauwhede, Bart Preneel:
On the Feasibility of Cryptography for a Wireless Insulin Pump System. CODASPY 2016: 113-120 - [c16]Erik Jan Marinissen, Yervant Zorian, Mario Konijnenburg, Chih-Tsun Huang, Ping-Hsuan Hsieh, Peter Cockburn, Jeroen Delvaux, Vladimir Rozic, Bohan Yang, Dave Singelée, Ingrid Verbauwhede, Cedric Mayor, Robert Van Rijsinge, Cocoy Reyes:
IoT: Source of test challenges. ETS 2016: 1-10 - [c15]Aysajan Abidin, Eduard Marin, Dave Singelée, Bart Preneel:
Towards Quantum Distance Bounding Protocols. RFIDSec 2016: 151-162 - [i2]Eduard Marin, Enrique Argones-Rúa, Dave Singelée, Bart Preneel:
A survey on physiological-signal-based security for medical devices. IACR Cryptol. ePrint Arch. 2016: 867 (2016) - 2015
- [i1]Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede:
The Energy Budget for Wireless Security: Extended Version. IACR Cryptol. ePrint Arch. 2015: 1029 (2015) - 2013
- [j6]An Braeken, Dave Singelée:
Efficient and Location-Private Communication Protocols for WBSNs. Ad Hoc Sens. Wirel. Networks 19(3-4): 305-326 (2013) - 2012
- [j5]Roel Peeters, Dave Singelée, Bart Preneel:
Toward More Secure and Reliable Access Control. IEEE Pervasive Comput. 11(3): 76-83 (2012) - [j4]Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede:
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Pers. Ubiquitous Comput. 16(3): 323-335 (2012) - [c14]Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun:
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. ESORICS 2012: 415-432 - 2011
- [j3]Roel Peeters, Dave Singelée, Bart Preneel:
Threshold-Based Location-Aware Access Control. Int. J. Handheld Comput. Res. 2(3): 22-37 (2011) - [c13]Lejla Batina, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede:
Hierarchical ECC-Based RFID Authentication Protocol. RFIDSec 2011: 183-201 - [c12]Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede:
The communication and computation cost of wireless security: extended abstract. WISEC 2011: 1-4 - 2010
- [j2]Dave Singelée, Benoît Latré, Bart Braem, Michaël Peeters, Marijke De Soete, Peter De Cleyn, Bart Preneel, Ingrid Moerman, Chris Blondia:
A Secure Low-Delay Protocol for Wireless Body Area Networks. Ad Hoc Sens. Wirel. Networks 9(1-2): 53-72 (2010) - [c11]Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede:
Privacy-Preserving ECC-Based Grouping Proofs for RFID. ISC 2010: 159-165 - [c10]Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede:
Wide-Weak Privacy-Preserving RFID Authentication Protocols. MOBILIGHT 2010: 254-267 - [c9]Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede:
Low-cost untraceable authentication protocols for RFID. WISEC 2010: 55-64 - [p1]Yong Ki Lee, Lejla Batina, Dave Singelée, Bart Preneel, Ingrid Verbauwhede:
Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware. Towards Hardware-Intrinsic Security 2010: 237-257
2000 – 2009
- 2009
- [c8]Dave Singelée, Stefaan Seys:
User Privacy in RFID Networks. ISSE 2009: 206-215 - 2008
- [c7]Dave Singelée, Benoît Latré, Bart Braem, Michaël Peeters, Marijke De Soete, Peter De Cleyn, Bart Preneel, Ingrid Moerman, Chris Blondia:
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks. ADHOC-NOW 2008: 94-107 - 2007
- [c6]Dave Singelée, Bart Preneel:
Distance Bounding in Noisy Environments. ESAS 2007: 101-115 - [c5]Dave Singelée, Bart Preneel:
Key Establishment Using Secure Distance Bounding Protocols. MobiQuitous 2007: 1-6 - 2006
- [c4]Dave Singelée, Bart Preneel:
Improved Pairing Protocol for Bluetooth. ADHOC-NOW 2006: 252-265 - [c3]Dave Singelée, Bart Preneel:
Location privacy in wireless personal area networks. Workshop on Wireless Security 2006: 11-18 - 2005
- [j1]Dave Singelée, Bart Preneel:
The Wireless Application Protocol. Int. J. Netw. Secur. 1(3): 161-165 (2005) - [c2]Dave Singelée, Bart Preneel:
Location verification using secure distance bounding protocols. MASS 2005 - 2004
- [c1]Danny De Cock, Karel Wouters, Dries Schellekens, Dave Singelée, Bart Preneel:
Threat Modelling for Security Tokens in Web Applications. Communications and Multimedia Security 2004: 183-193
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint