default search action
An Braeken
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j90]Thibaut Vandervelden, Diana Deac, Roald Van Glabbeek, Ruben de Smet, An Braeken, Kris Steenhaut:
Evaluation of 6LoWPAN Generic Header Compression in the Context of a RPL Network. Sensors 24(1): 73 (2024) - [j89]Ruben de Smet, Robrecht Blancquaert, Tom Godden, Kris Steenhaut, An Braeken:
Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors. Sensors 24(3): 1030 (2024) - [j88]Laurent Segers, Borna Talebi, Bruno da Silva, Abdellah Touhafi, An Braeken:
Trustworthy Environmental Monitoring Using Hardware-Assisted Security Mechanisms. Sensors 24(14): 4720 (2024) - [j87]Thibaut Vandervelden, Ruben de Smet, Diana Deac, Kris Steenhaut, An Braeken:
Overview of Embedded Rust Operating Systems and Frameworks. Sensors 24(17): 5818 (2024) - [j86]Ruben de Smet, Kris Steenhaut, An Braeken:
Private Electronic Road Pricing Using Bulletproofs With Vector Commitments. IEEE Trans. Dependable Secur. Comput. 21(4): 2659-2671 (2024) - [j85]Julio César Pérez García, An Braeken, Abderrahim Benslimane:
Blockchain-Based Group Key Management Scheme for IoT With Anonymity of Group Members. IEEE Trans. Inf. Forensics Secur. 19: 6709-6721 (2024) - [j84]Shalitha Wijethilaka, Awaneesh Kumar Yadav, An Braeken, Madhusanka Liyanage:
Blockchain-Based Secure Authentication and Authorization Framework for Robust 5G Network Slicing. IEEE Trans. Netw. Serv. Manag. 21(4): 3988-4005 (2024) - [j83]Awaneesh Kumar Yadav, Mohammad Shojafar, An Braeken:
iVFAS: An Improved Vehicle-to-Fog Authentication System for Secure and Efficient Fog-Based Road Condition Monitoring. IEEE Trans. Veh. Technol. 73(9): 12570-12584 (2024) - [c85]An Braeken, Bruno da Silva, Laurent Segers, Johannes Knödtel, Marc Reichenbach, Cornelia Wulf, Sergio A. Pertuz, Diana Göhringer, Jo Vliegen, Md Masoom Rabbani, Nele Mentens:
Trusted Computing Architectures for IoT Devices. ARC 2024: 241-254 - [c84]Takahito Yoshizawa, An Braeken, Bart Preneel:
Toward Viable Security Solution for VRUs in V2X Communication. VNC 2024: 33-40 - 2023
- [j82]Raaj Anand Mishra, Anshuman Kalla, An Braeken, Madhusanka Liyanage:
Blockchain Regulated Verifiable and Automatic Key Refreshment Mechanism for IoT. IEEE Access 11: 21758-21770 (2023) - [j81]Suleman Khan, Gurjot Singh Gaba, An Braeken, Pardeep Kumar, Andrei V. Gurtov:
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications. Int. J. Crit. Infrastructure Prot. 42: 100619 (2023) - [j80]Julio César Pérez García, Abderrahim Benslimane, An Braeken, Zhou Su:
μTesla-Based Authentication for Reliable and Secure Broadcast Communications in IoD Using Blockchain. IEEE Internet Things J. 10(20): 18400-18413 (2023) - [j79]An Braeken:
Highly Efficient Bidirectional Multifactor Authentication and Key Agreement for Real-Time Access to Sensor Data. IEEE Internet Things J. 10(23): 21089-21099 (2023) - [j78]Edlira Dushku, Md Masoom Rabbani, Jo Vliegen, An Braeken, Nele Mentens:
PROVE: Provable remote attestation for public verifiability. J. Inf. Secur. Appl. 75: 103448 (2023) - [j77]Madhusanka Liyanage, An Braeken, Shahriar Shahabuddin, Pasika Ranaweera:
Open RAN security: Challenges and opportunities. J. Netw. Comput. Appl. 214: 103621 (2023) - [j76]Pramitha Fernando, Keshawa Dadallage, Tharindu D. Gamage, Chathura Seneviratne, An Braeken, Arjuna Madanayake, Madhusanka Liyanage:
Distributed-Proof-of-Sense: Blockchain Consensus Mechanisms for Detecting Spectrum Access Violations of the Radio Spectrum. IEEE Trans. Cogn. Commun. Netw. 9(5): 1110-1125 (2023) - [j75]Awaneesh Kumar Yadav, An Braeken, Manoj Misra:
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing. J. Supercomput. 79(10): 11261-11299 (2023) - [j74]Awaneesh Kumar Yadav, Shalitha Wijethilaka, An Braeken, Manoj Misra, Madhusanka Liyanage:
An Enhanced Cross-Network-Slice Authentication Protocol for 5G. IEEE Trans. Sustain. Comput. 8(4): 555-573 (2023) - [j73]Simone Patonico, An Braeken, Kris Steenhaut:
Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model. Wirel. Networks 29(3): 1017-1029 (2023) - [c83]Awaneesh Kumar Yadav, An Braeken, Manoj Misra, Madhusanka Liyanage:
A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain. CCNC 2023: 1110-1115 - [c82]Hasnae Lamrani Alaoui, Mostapha Zbakh, An Braeken, Abdellah Touhafi, Abdellatif El Ghazi:
Authentication Protocol for RFID Systems: A Survey. CloudTech 2023: 1-11 - [c81]Pramitha Fernando, An Braeken, Madhusanka Liyanage:
Breaking Chains, Empowering IoT: A Comparative Study of Holochain and Blockchain. LATINCOM 2023: 1-6 - [c80]Awaneesh Kumar Yadav, An Braeken, Mika Ylianttila, Madhusanka Liyanage:
A Blockchain-based Authentication Protocol for Metaverse Environments using a Zero Knowledge Proof. MetaCom 2023: 242-249 - [c79]Awaneesh Kumar Yadav, Manoj Misra, An Braeken, Madhusanka Liyanage:
A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming. TrustCom 2023: 1324-1331 - [c78]Shalitha Wijethilaka, Awaneesh Kumar Yadav, An Braeken, Madhusanka Liyanage:
A Novel Blockchain-based Decentralized Multi-party Certificate Management Framework. TrustCom 2023: 1361-1368 - 2022
- [j72]Tom Godden, Ruben de Smet, Christophe Debruyne, Thibaut Vandervelden, Kris Steenhaut, An Braeken:
Circuitree: A Datalog Reasoner in Zero-Knowledge. IEEE Access 10: 21384-21396 (2022) - [j71]Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, An Braeken, Madhusanka Liyanage:
An improved and provably secure symmetric-key based 5G-AKA Protocol. Comput. Networks 218: 109400 (2022) - [j70]An Braeken:
Pairing free asymmetric group key agreement protocol. Comput. Commun. 181: 267-273 (2022) - [j69]Thibaut Vandervelden, Ruben de Smet, Kris Steenhaut, An Braeken:
SHA 3 and Keccak variants computation speeds on constrained devices. Future Gener. Comput. Syst. 128: 28-35 (2022) - [j68]An Braeken:
Public key versus symmetric key cryptography in client-server authentication protocols. Int. J. Inf. Sec. 21(1): 103-114 (2022) - [j67]Jori Winderickx, An Braeken, Dave Singelée, Nele Mentens:
In-depth energy analysis of security algorithms and protocols for the Internet of Things. J. Cryptogr. Eng. 12(2): 137-149 (2022) - [j66]Thibaut Vandervelden, Ruben de Smet, Kris Steenhaut, An Braeken:
Symmetric-Key-Based Authentication among the Nodes in a Wireless Sensor and Actuator Network. Sensors 22(4): 1403 (2022) - [j65]Alejandro Iglesias-Rivera, Roald Van Glabbeek, Erik Ortiz Guerra, An Braeken, Kris Steenhaut, Hector Cruz-Enriquez:
Time-Slotted Spreading Factor Hopping for Mitigating Blind Spots in LoRa-Based Networks. Sensors 22(6): 2253 (2022) - [j64]Diana Deac, Eden Teshome, Roald Van Glabbeek, Virgil Dobrota, An Braeken, Kris Steenhaut:
Traffic Aware Scheduler for Time-Slotted Channel-Hopping-Based IPv6 Wireless Sensor Networks. Sensors 22(17): 6397 (2022) - [j63]Roald Van Glabbeek, Diana Deac, Thomas Perale, Kris Steenhaut, An Braeken:
Flexible and Efficient Security Framework for Many-to-Many Communication in a Publish/Subscribe Architecture. Sensors 22(19): 7391 (2022) - [j62]Tharaka Hewa, An Braeken, Madhusanka Liyanage, Mika Ylianttila:
Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing. IEEE Trans. Ind. Informatics 18(10): 7174-7185 (2022) - [j61]An Braeken:
Authenticated key agreement protocols for dew-assisted IoT systems. J. Supercomput. 78(10): 12093-12113 (2022) - [c77]Luca Gattobigio, Steffen Thielemans, Priscilla Benedetti, Gianluca Reali, An Braeken, Kris Steenhaut:
A multi-cloud service mesh approach applied to Internet of Things. IECON 2022: 1-6 - [c76]Steffen Thielemans, Ruben de Smet, Priscilla Benedetti, Gianluca Reali, An Braeken, Kris Steenhaut:
Experiences with on-premise open source cloud infrastructure with network performance validation. IECON 2022: 1-6 - [i14]Madhusanka Liyanage, An Braeken, Shahriar Shahabuddin, Pasika Ranaweera:
Open RAN Security: Challenges and Opportunities. CoRR abs/2212.01510 (2022) - 2021
- [j60]Kieu-Ha Phung, Hieu Tran, Thang V. Nguyen, Hung V. Dao, Vinh Tran-Quang, Thu-Huong Truong, An Braeken, Kris Steenhaut:
oneVFC - A Vehicular Fog Computation Platform for Artificial Intelligence in Internet of Vehicles. IEEE Access 9: 117456-117470 (2021) - [j59]An Braeken:
Device-to-device group authentication compatible with 5G AKA protocol. Comput. Networks 201: 108575 (2021) - [j58]Raaj Anand Mishra, Anshuman Kalla, An Braeken, Madhusanka Liyanage:
Privacy Protected Blockchain Based Architecture and Implementation for Sharing of Students' Credentials. Inf. Process. Manag. 58(3): 102512 (2021) - [j57]An Braeken, Ji-Jian Chin, Syh-Yuan Tan:
ECQV-IBI: Identity-based identification with implicit certification. J. Inf. Secur. Appl. 63: 103027 (2021) - [j56]Ahsan Manzoor, An Braeken, Salil S. Kanhere, Mika Ylianttila, Madhusanka Liyanage:
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain. J. Netw. Comput. Appl. 176: 102917 (2021) - [j55]Hasnae Lamrani Alaoui, Abdellatif El Ghazi, Mustapha Zbakh, Abdellah Touhafi, An Braeken:
A Highly Efficient ECC-Based Authentication Protocol for RFID. J. Sensors 2021: 8876766:1-8876766:16 (2021) - [j54]Placide Shabisha, Chamara Sandeepa, Charuka Moremada, Nadeeka Dissanayaka, Tharindu D. Gamage, An Braeken, Kris Steenhaut, Madhusanka Liyanage:
Security Enhanced Emergency Situation Detection System for Ambient Assisted Living. IEEE Open J. Comput. Soc. 2: 241-259 (2021) - [j53]Zakariae El Ouazzani, An Braeken, Hanan El Bakkali:
Proximity Measurement for Hierarchical Categorical Attributes in Big Data. Secur. Commun. Networks 2021: 6612923:1-6612923:17 (2021) - [j52]Eden Teshome, Diana Deac, Steffen Thielemans, Matthias Carlier, Kris Steenhaut, An Braeken, Virgil Dobrota:
Time Slotted Channel Hopping and ContikiMAC for IPv6 Multicast-Enabled Wireless Sensor Networks. Sensors 21(5): 1771 (2021) - [j51]Feras Almasri, Jurgen Vandendriessche, Laurent Segers, Bruno da Silva, An Braeken, Kris Steenhaut, Abdellah Touhafi, Olivier Debeir:
XCycles Backprojection Acoustic Super-Resolution. Sensors 21(10): 3453 (2021) - [j50]Simone Patonico, Thanh-Long Nguyen, Placide Shabisha, An Braeken, Kris Steenhaut:
Toward the inclusion of end-to-end security in the OM2M platform. J. Supercomput. 77(4): 4056-4080 (2021) - [j49]An Braeken, Madhusanka Liyanage:
Highly efficient key agreement for remote patient monitoring in MEC-enabled 5G networks. J. Supercomput. 77(6): 5562-5585 (2021) - [j48]Ruben de Smet, Thibaut Vandervelden, Kris Steenhaut, An Braeken:
Lightweight PUF based authentication scheme for fog architecture. Wirel. Networks 27(2): 947-959 (2021) - [j47]An Braeken:
Pairing Free Certified Common Asymmetric Group Key Agreement Protocol for Data Sharing Among Users with Different Access Rights. Wirel. Pers. Commun. 121(1): 307-318 (2021) - [c75]Suleman Khan, Pardeep Kumar, An Braeken, Andrei V. Gurtov:
Detection of evil flies: securing air-ground aviation communication. MobiCom 2021: 852-854 - [c74]Md Masoom Rabbani, Edlira Dushku, Jo Vliegen, An Braeken, Nicola Dragoni, Nele Mentens:
RESERVE: Remote Attestation of Intermittent IoT devices. SenSys 2021: 578-580 - [i13]Feras Almasri, Jurgen Vandendriessche, Laurent Segers, Bruno da Silva, An Braeken, Kris Steenhaut, Abdellah Touhafi, Olivier Debeir:
XCycles Backprojection Acoustic Super-Resolution. CoRR abs/2105.09128 (2021) - 2020
- [j46]Tanesh Kumar, Erkki Harjula, Muneeb Ejaz, Ahsan Manzoor, Pawani Porambage, Ijaz Ahmad, Madhusanka Liyanage, An Braeken, Mika Ylianttila:
BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks. IEEE Access 8: 154166-154185 (2020) - [j45]An Braeken:
Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability. Comput. Networks 181: 107424 (2020) - [j44]An Braeken, Madhusanka Liyanage, Salil S. Kanhere, Sudhir Dixit:
Blockchain and Cyberphysical Systems. Computer 53(9): 31-35 (2020) - [j43]Simone Patonico, Placide Shabisha, An Braeken, Abdellah Touhafi, Kris Steenhaut:
Elliptic curve-based proxy re-signcryption scheme for secure data storage on the cloud. Concurr. Comput. Pract. Exp. 32(17) (2020) - [j42]Tanesh Kumar, An Braeken, Anca Delia Jurcut, Madhusanka Liyanage, Mika Ylianttila:
AGE: authentication in gadget-free healthcare environments. Inf. Technol. Manag. 21(2): 95-114 (2020) - [j41]Yasser Mesmoudi, Mohammed Lamnaour, Yasser El Khamlichi, Abderrahim Tahiri, Abdellah Touhafi, An Braeken:
A Middleware based on Service Oriented Architecture for Heterogeneity Issues within the Internet of Things (MSOAH-IoT). J. King Saud Univ. Comput. Inf. Sci. 32(10): 1108-1116 (2020) - [j40]Laurent Segers, An Braeken, Abdellah Touhafi:
Optimizations for FPGA-Based Ultrasound Multiple-Access Spread Spectrum Ranging. J. Sensors 2020: 4697345:1-4697345:26 (2020) - [j39]An Braeken:
Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak. Sensors 20(8): 2160 (2020) - [j38]Placide Shabisha, An Braeken, Kris Steenhaut:
Symmetric Key-Based Secure Storage and Retrieval of IoT Data on a Semi-trusted Cloud Server. Wirel. Pers. Commun. 113(1): 537-553 (2020) - [c73]Tharaka Mawanane Hewa, Gürkan Gür, Anshuman Kalla, Mika Ylianttila, An Braeken, Madhusanka Liyanage:
The Role of Blockchain in 6G: Challenges, Opportunities and Research Directions. 6G SUMMIT 2020: 1-5 - [c72]An Braeken, Pawani Porambage, Amirthan Puvaneswaran, Madhusanka Liyanage:
ESSMAR: Edge Supportive Secure Mobile Augmented Reality Architecture for Healthcare. Cloudtech 2020: 1-7 - [c71]An Braeken, Abdellah Touhafi:
Efficient Mobile User Authentication Service with Privacy Preservation and User Untraceability. Cloudtech 2020: 1-8 - [c70]Tharaka Mawanane Hewa, An Braeken, Mika Ylianttila, Madhusanka Liyanage:
Multi-Access Edge Computing and Blockchain-based Secure Telehealth System Connected with 5G and IoT. GLOBECOM 2020: 1-6 - [c69]Tharaka Mawanane Hewa, An Braeken, Mika Ylianttila, Madhusanka Liyanage:
Blockchain-based Automated Certificate Revocation for 5G IoT. ICC 2020: 1-7 - [p1]Carmen Mas Machuca, Francesco Musumeci, Petra Vizarreta, Dimitrios Pezaros, Simon Jouët, Massimo Tornatore, Ali Hmaity, Madhusanka Liyanage, Andrei V. Gurtov, An Braeken:
Reliable Control and Data Planes for Softwarized Networks. Guide to Disaster-Resilient Communication Networks 2020: 243-270
2010 – 2019
- 2019
- [j37]An Braeken, Madhusanka Liyanage, Pardeep Kumar, John Murphy:
Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks. IEEE Access 7: 64040-64052 (2019) - [j36]An Braeken:
Holistic Air Protection Scheme of ADS-B Communication. IEEE Access 7: 65251-65262 (2019) - [j35]Placide Shabisha, An Braeken, Pardeep Kumar, Kris Steenhaut:
Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement. IEEE Access 7: 150247-150261 (2019) - [j34]Matthias Carlier, Kris Steenhaut, An Braeken:
Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks. Comput. 8(1): 27 (2019) - [j33]An Braeken:
Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates. KSII Trans. Internet Inf. Syst. 13(3): 1546-1565 (2019) - [j32]Bruno da Silva, Laurent Segers, An Braeken, Kris Steenhaut, Abdellah Touhafi:
Design Exploration and Performance Strategies towards Power-Efficient FPGA-Based Architectures for Sound Source Localization. J. Sensors 2019: 5761235:1-5761235:27 (2019) - [j31]Laurent Segers, Jurgen Vandendriessche, Thibaut Vandervelden, Benjamin Johan Lapauw, Bruno da Silva, An Braeken, Abdellah Touhafi:
CABE: A Cloud-Based Acoustic Beamforming Emulator for FPGA-Based Sound Source Localization. Sensors 19(18): 3906 (2019) - [j30]An Braeken, Madhusanka Liyanage, Anca Delia Jurcut:
Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA). Wirel. Pers. Commun. 106(2): 345-364 (2019) - [c68]Bruno da Silva, An Braeken, Abdellah Touhafi:
Probabilistic Performance Modelling when Using Partial Reconfiguration to Accelerate Streaming Applications with Non-deterministic Task Scheduling. ARC 2019: 81-95 - [c67]Bruno da Silva, Laurent Segers, An Braeken, Abdellah Touhafi:
Demonstration of a Multimode SoC FPGA-Based Acoustic Camera. FPL 2019: 419-420 - [c66]Ahsan Manzoor, Madhusanka Liyanage, An Braeken, Salil S. Kanhere, Mika Ylianttila:
Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing. IEEE ICBC 2019: 99-103 - [c65]Maite Bezunartea, Roald Van Glabbeek, An Braeken, Jacques Tiberghien, Kris Steenhaut:
Towards Energy Efficient LoRa Multihop Networks. LANMAN 2019: 1-3 - [c64]Steffen Thielemans, Benjamin Sartori, An Braeken, Kris Steenhaut:
Integration of oneM2M in Inter-IoT's platform of platforms. LANMAN 2019: 1-2 - [c63]Tanesh Kumar, An Braeken, Vidhya Ramani, Ijaz Ahmad, Erkki Harjula, Mika Ylianttila:
SEC-BlockEdge: Security Threats in Blockchain-Edge based Industrial IoT Networks. RNDM 2019: 1-7 - 2018
- [j29]Bruno da Silva, An Braeken, Abdellah Touhafi:
FPGA-Based Architectures for Acoustic Beamforming with Microphone Arrays: Trends, Challenges and Research Opportunities. Comput. 7(3): 41 (2018) - [j28]An Braeken, Abdellah Touhafi:
AAA - autonomous anonymous user authentication and its application in V2G. Concurr. Comput. Pract. Exp. 30(12) (2018) - [j27]Abdellah Touhafi, An Braeken, Abderrahim Tahiri, Mostapha Zbakh:
CoderLabs: A cloud-based platform for real-time online labs with user collaboration. Concurr. Comput. Pract. Exp. 30(12) (2018) - [j26]Bruno da Silva, An Braeken, Federico Domínguez, Abdellah Touhafi:
Exploiting Partial Reconfiguration through PCIe for a Microphone Array Network Emulator. Int. J. Reconfigurable Comput. 2018 (2018) - [j25]Jan Lemeire, Bruno da Silva, An Braeken, Jan G. Cornelis, Abdellah Touhafi:
Efficiency analysis methodology of FPGAs based on lost frequencies, area and cycles. J. Parallel Distributed Comput. 113: 204-217 (2018) - [j24]An Braeken:
PUF Based Authentication Protocol for IoT. Symmetry 10(8): 352 (2018) - [j23]An Braeken, Pardeep Kumar, Madhusanka Liyanage, Ta Thi Kim Hue:
An efficient anonymous authentication protocol in multiple server communication networks (EAAM). J. Supercomput. 74(4): 1695-1714 (2018) - [c62]Madhusanka Liyanage, Jukka Salo, An Braeken, Tanesh Kumar, Suranga Seneviratne, Mika Ylianttila:
5G Privacy: Scenarios and Solutions. 5G World Forum 2018: 197-203 - [c61]Bruno da Silva, Laurent Segers, An Braeken, Kris Steenhaut, Abdellah Touhafi:
A Low-Power FPGA-Based Architecture for Microphone Arrays in Wireless Sensor Networks. ARC 2018: 281-293 - [c60]Jori Winderickx, An Braeken, Dave Singelée, Roel Peeters, Thijs Vandenryt, Ronald Thoelen, Nele Mentens:
Digital signatures and signcryption schemes on embedded devices: a trade-off between computation and storage. CF 2018: 342-347 - [c59]Matthias Carlier, Kris Steenhaut, An Braeken:
Symmetric-key Based Security for Multicast Communication in Wireless Sensor Networks. Cloudtech 2018: 1-6 - [c58]Yasser Mesmoudi, Mohammed Lamnaour, Yasser El Khamlichi, Abderrahim Tahiri, Abdellah Touhafi, An Braeken:
Design and implementation of a smart gateway for IoT applications using heterogeneous smart objects. Cloudtech 2018: 1-7 - [c57]Simone Patonico, Thanh Long Nguyen, Placide Shabisha, An Braeken, Kris Steenhaut:
DTLS Integration in oneM2M based on Zolertia RE-motes. Cloudtech 2018: 1-8 - [c56]Laurent Segers, Bruno da Silva, An Braeken, Abdellah Touhafi:
Cloud-Based Acoustic Beamforming Emulator for FPGA-Based Sound Source Localization. Cloudtech 2018: 1-6 - [c55]Bruno da Silva, Jan G. Cornelis, An Braeken, Erik H. D'Hollander, Jan Lemeire, Abdellah Touhafi:
Heterogeneous Cloud Computing: Design Methodology to Combine Hardware Accelerators. Cloudtech 2018: 1-8 - [c54]Jori Winderickx, An Braeken, Nele Mentens:
Storage and computation optimization of public-key schemes on embedded devices. Cloudtech 2018: 1-8 - [c53]Vidhya Ramani, Tanesh Kumar, An Braeken, Madhusanka Liyanage, Mika Ylianttila:
Secure and Efficient Data Accessibility in Blockchain Based Healthcare Systems. GLOBECOM 2018: 206-212 - [c52]Tanesh Kumar, Vidhya Ramani, Ijaz Ahmad, An Braeken, Erkki Harjula, Mika Ylianttila:
Blockchain Utilization in Healthcare: Key Requirements and Challenges. HealthCom 2018: 1-7 - [c51]Thanh Long Nguyen, Simone Patonico, Maite Bezunartea, Steffen Thielemans, An Braeken, Kris Steenhaut:
Horizontal Integration of CoAP and MQTT on Internet Protocol - based LoRaMotes. PIMRC 2018: 1-7 - [c50]Maite Bezunartea, Chenlu Wang, An Braeken, Kris Steenhaut:
Multi-radio Solution for Improving Reliability in RPL. PIMRC 2018: 129-134 - [c49]Ruben de Smet, Ann Dooms, An Braeken, Jo Pierson:
Glycos: The Basis for a Peer-to-Peer, Private Online Social Network. Privacy and Identity Management 2018: 123-136 - [c48]Bruno da Silva, Laurent Segers, Yannick Rasschaert, Quentin Quevy, An Braeken, Abdellah Touhafi:
A Multimode SoC FPGA-Based Acoustic Camera for Wireless Sensor Networks. ReCoSoC 2018: 1-8 - [i12]Ahsan Manzoor, Madhusanka Liyanage, An Braeken, Salil S. Kanhere, Mika Ylianttila:
Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing. CoRR abs/1811.02276 (2018) - 2017
- [j22]Guillermo Gastón Lorente, Bart Lemmens, Matthias Carlier, An Braeken, Kris Steenhaut:
BMRF: Bidirectional Multicast RPL Forwarding. Ad Hoc Networks 54: 69-84 (2017) - [j21]Madhusanka Liyanage, An Braeken, Anca Delia Jurcut, Mika Ylianttila, Andrei V. Gurtov:
Secure communication channel architecture for Software Defined Mobile Networks. Comput. Networks 114: 32-50 (2017) - [j20]Bruno da Silva, An Braeken, Kris Steenhaut, Abdellah Touhafi:
Design Considerations When Accelerating an FPGA-Based Digital Microphone Array for Sound-Source Localization. J. Sensors 2017: 6782176:1-6782176:20 (2017) - [j19]Pardeep Kumar, An Braeken, Andrei V. Gurtov, Jari H. Iinatti, Phuong Hoai Ha:
Anonymous Secure Framework in Connected Smart Home Environments. IEEE Trans. Inf. Forensics Secur. 12(4): 968-979 (2017) - [j18]Pawani Porambage, An Braeken, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things. Wirel. Pers. Commun. 96(1): 421-440 (2017) - [j17]An Braeken:
An Improved E-Payment System and Its Extension to a Payment System for Visually Impaired and Blind People with User Anonymity. Wirel. Pers. Commun. 96(1): 563-581 (2017) - [c47]Tanesh Kumar, Madhusanka Liyanage, An Braeken, Ijaz Ahmad, Mika Ylianttila:
From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges. EuCNC 2017: 1-6 - [c46]Bruno da Silva, Federico Domínguez, An Braeken, Abdellah Touhafi:
A partial reconfiguration based microphone array network emulator. FPL 2017: 1-4 - [c45]Bruno da Silva, Federico Domínguez, An Braeken, Abdellah Touhafi:
Demonstration of a partial reconfiguration based microphone array network emulator. FPL 2017: 1 - [c44]Tanesh Kumar, An Braeken, Madhusanka Liyanage, Mika Ylianttila:
Identity privacy preserving biometric based authentication scheme for Naked healthcare environment. ICC 2017: 1-7 - [c43]Ta Thi Kim Hue, Thang Manh Hoang, An Braeken:
Lightweight signcryption scheme based on discrete Chebyshev maps. ICITST 2017: 43-47 - [c42]Thomas Zinner, Stefan Geissler, Fabian Helmschrott, Susanna Spinsante, An Braeken:
An AAL-oriented measurement-based evaluation of different HTTP-based data transport protocols. IM 2017: 1162-1167 - [c41]An Braeken, Sergey Bezzateev, Abdellah Touhafi, Natalia Voloshina:
HEPPA: Highly Efficient Privacy Preserving Authentication for ITS. MMM-ACNS 2017: 260-271 - [c40]Maite Bezunartea, Benjamin Sartori, Iñigo Francés, Jacques Tiberghien, An Braeken, Kris Steenhaut:
Enabling dual-band operation with the RPL routing protocol. SenSys 2017: 63:1-63:2 - [c39]Rachid Cherkaoui, Mostapha Zbakh, An Braeken, Abdellah Touhafi:
Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems. UNet 2017: 206-213 - [c38]Benjamin Sartori, Steffen Thielemans, Maite Bezunartea, An Braeken, Kris Steenhaut:
Enabling RPL multihop communications based on LoRa. WiMob 2017: 1-8 - 2016
- [j16]An Braeken, Pawani Porambage, Milos Stojmenovic, Lambros Lambrinos:
eDAAAS: Efficient distributed anonymous authentication and access in smart homes. Int. J. Distributed Sens. Networks 12(12) (2016) - [j15]An Braeken, Pawani Porambage, Andrei V. Gurtov, Mika Ylianttila:
Secure and Efficient Reactive Video Surveillance for Patient Monitoring. Sensors 16(1): 32 (2016) - [c37]Bruno da Silva, Jan Lemeire, An Braeken, Abdellah Touhafi:
A Lost Cycles Analysis for Performance Prediction using High-Level Synthesis. ARC 2016: 334-342 - [c36]Bruno da Silva, Laurent Segers, An Braeken, Abdellah Touhafi:
Runtime reconfigurable beamforming architecture for real-time sound-source localization. FPL 2016: 1-4 - [c35]Bruno da Silva, Laurent Segers, An Braeken, Abdellah Touhafi:
A runtime reconfigurable FPGA-based microphone array for sound source localization. FPL 2016: 1 - 2015
- [j14]Pawani Porambage, An Braeken, Corinna Schmitt, Andrei V. Gurtov, Mika Ylianttila, Burkhard Stiller:
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications. IEEE Access 3: 1503-1511 (2015) - [j13]Laurent Segers, David Van Bavegem, Sam De Winne, An Braeken, Abdellah Touhafi, Kris Steenhaut:
An Ultrasonic Multiple-Access Ranging Core Based on Frequency Shift Keying Towards Indoor Localization. Sensors 15(8): 18641-18665 (2015) - [c34]Nele Mentens, Jochen Vandorpe, Jo Vliegen, An Braeken, Bruno da Silva, Abdellah Touhafi, Alois Kern, Stephan Knappmann, Jens Rettkowski, Muhammed Al Kadi, Diana Göhringer, Michael Hübner:
DynamIA: Dynamic Hardware Reconfiguration in Industrial Applications. ARC 2015: 513-518 - [c33]Matthias Carlier, Kris Steenhaut, An Braeken, Ruben Smeets, Nele Mentens, Kris Aerts:
Study on impact of adding security in a 6LoWPAN based network. CNS 2015: 577-584 - [c32]Pawani Porambage, An Braeken, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach. GLOBECOM 2015: 1-6 - [c31]Pawani Porambage, An Braeken, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
Proxy-based end-to-end key establishment protocol for the Internet of Things. ICC Workshops 2015: 2677-2682 - [c30]Pawani Porambage, An Braeken, Matthias Carlier, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
Secure and Efficient Automatic Ruling in Three-Level Network Architecture. ICT Innovations 2015: 185-194 - [c29]Pawani Porambage, An Braeken, Corinna Schmitt, Andrei V. Gurtov, Mika Ylianttila, Burkhard Stiller:
Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks. LCN 2015: 482-485 - [c28]Pawani Porambage, An Braeken, Andrei V. Gurtov, Mika Ylianttila, Susanna Spinsante:
Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems. WF-IoT 2015: 711-714 - 2014
- [j12]Matthias Carlier, An Braeken, Clémence Flémal, Francis Gueuning, Abdellah Touhafi:
Creation and Evaluation of Educational Tools for E-Learning Based on Videomodels. Int. J. Eng. Pedagog. 4(4): 8-11 (2014) - [j11]Laurent Segers, Jelmer Tiete, An Braeken, Abdellah Touhafi:
Ultrasonic Multiple-Access Ranging System Using Spread Spectrum and MEMS Technology for Indoor Localization. Sensors 14(2): 3172-3187 (2014) - 2013
- [j10]An Braeken, Dave Singelée:
Efficient and Location-Private Communication Protocols for WBSNs. Ad Hoc Sens. Wirel. Networks 19(3-4): 305-326 (2013) - [j9]Antonio de la Piedra, An Braeken, Abdellah Touhafi, Karel Wouters:
Secure event logging in sensor networks. Comput. Math. Appl. 65(5): 762-773 (2013) - [j8]Yannick Verbelen, Pieter Taelman, An Braeken, Abdellah Touhafi:
Reconfigurable and Modular Mobile Robotics Platform for Remote Experiments. Int. J. Online Eng. 9(3): 19-26 (2013) - [j7]Bruno da Silva, An Braeken, Erik H. D'Hollander, Abdellah Touhafi:
Performance Modeling for FPGAs: Extending the Roofline Model with High-Level Synthesis Tools. Int. J. Reconfigurable Comput. 2013: 428078:1-428078:10 (2013) - [j6]Antonio de la Piedra, An Braeken, Abdellah Touhafi:
Extending the IEEE 802.15.4 Security Suite with a Compact Implementation of the NIST P-192/B-163 Elliptic Curves. Sensors 13(8): 9704-9728 (2013) - [c27]Antonio de la Piedra, An Braeken, Abdellah Touhafi:
A performance comparison study of ECC and AES in commercial and research sensor nodes. EUROCON 2013: 347-354 - [c26]Bruno da Silva, An Braeken, Erik H. D'Hollander, Abdellah Touhafi, Jan G. Cornelis, Jan Lemeire:
Performance and toolchain of a combined GPU/FPGA desktop (abstract only). FPGA 2013: 274 - [c25]Antonio de la Piedra, Abdellah Touhafi, An Braeken:
Compact implementation of CCM and GCM modes of AES using DSP blocks. FPL 2013: 1-4 - [c24]Bruno da Silva, An Braeken, Erik H. D'Hollander, Abdellah Touhafi, Jan G. Cornelis, Jan Lemeire:
Comparing and combining GPU and FPGA accelerators in an image processing context. FPL 2013: 1-4 - [c23]Antonio de la Piedra, An Braeken, Abdellah Touhafi:
Leveraging the DSP48E1 block in lightweight cryptographic implementations. Healthcom 2013: 238-242 - [c22]Bruno da Silva, An Braeken, Erik H. D'Hollander, Abdellah Touhafi:
Performance and Resource Modeling for FPGAs using High-Level Synthesis tools. PARCO 2013: 523-531 - 2012
- [j5]Abdellah Touhafi, An Braeken, Yannick Verbelen, Francis Gueuning:
Comparative Study of Electronics Visualisation Techniques for E-Learning. Int. J. Eng. Pedagog. 2(2): 30-36 (2012) - [j4]Antonio de la Piedra, An Braeken, Abdellah Touhafi:
Sensor Systems Based on FPGAs and Their Applications: A Survey. Sensors 12(9): 12235-12264 (2012) - [c21]An Braeken, Lucas Sterckx, Abdellah Touhafi, Yannick Verbelen, Francis Gueuning:
Comparative study of electronic visualisation techniques for e-learning. EDUCON 2012: 1-8 - [c20]Bruno da Silva, An Braeken, Erik H. D'Hollander, Abdellah Touhafi, Jan G. Cornelis, Jan Lemeire:
Performance and Programming Environment of a Combined GPU/FPGA Desktop. High Performance Computing Workshop (2) 2012: 177-193 - 2011
- [c19]An Braeken, Antonio de la Piedra, Karel Wouters:
Secure Event Logging in Sensor Networks. EuroPKI 2011: 194-208 - [c18]Mathias Claes, Vincent van der Leest, An Braeken:
Comparison of SRAM and FF PUF in 65nm Technology. NordSec 2011: 47-64 - [c17]An Braeken, Jan Genoe, Serge Kubera, Nele Mentens, Abdellah Touhafi, Ingrid Verbauwhede, Yannick Verbelen, Jo Vliegen, Karel Wouters:
Secure remote reconfiguration of an FPGA-based embedded system. ReCoSoC 2011: 1-6 - 2010
- [c16]Jo Vliegen, Nele Mentens, Jan Genoe, An Braeken, Serge Kubera, Abdellah Touhafi, Ingrid Verbauwhede:
A compact FPGA-based architecture for elliptic curve cryptography over prime fields. ASAP 2010: 313-316 - [i11]Nele Mentens, Jo Vliegen, An Braeken, Abdellah Touhafi, Karel Wouters, Ingrid Verbauwhede:
Secure remote reconfiguration of FPGAs. Dynamically Reconfigurable Architectures 2010
2000 – 2009
- 2009
- [c15]An Braeken, Serge Kubera, Frederik Trouillez, Abdellah Touhafi, Nele Mentens, Jo Vliegen:
Secure FPGA technologies and techniques. FPL 2009: 560-563 - 2006
- [j3]Christopher Wolf, An Braeken, Bart Preneel:
On the security of stepwise triangular systems. Des. Codes Cryptogr. 40(3): 285-302 (2006) - [j2]An Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel:
Classification of cubic (n-4)-resilient Boolean functions. IEEE Trans. Inf. Theory 52(4): 1670-1676 (2006) - [c14]An Braeken, Joseph Lano, Bart Preneel:
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks. ACISP 2006: 40-51 - [i10]An Braeken, Ventzislav Nikov, Svetla Nikova:
On Zigzag Functions and Related Objects in New Metric. IACR Cryptol. ePrint Arch. 2006: 437 (2006) - 2005
- [j1]Yuri L. Borissov, An Braeken, Svetla Nikova, Bart Preneel:
On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions. IEEE Trans. Inf. Theory 51(3): 1182-1189 (2005) - [c13]An Braeken, Ventzislav Nikov, Svetla Nikova:
Error-Set Codes and Related Objects. COCOON 2005: 577-585 - [c12]An Braeken, Christopher Wolf, Bart Preneel:
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. CT-RSA 2005: 29-43 - [c11]An Braeken, Igor A. Semaev:
The ANF of the Composition of Addition and Multiplication mod 2n with a Boolean Function. FSE 2005: 112-125 - [c10]An Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel:
Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties. ICALP 2005: 324-334 - [c9]An Braeken, Christopher Wolf, Bart Preneel:
Normality of Vectorial Functions. IMACC 2005: 186-200 - [c8]An Braeken, Bart Preneel:
Probabilistic Algebraic Attacks. IMACC 2005: 290-303 - [c7]An Braeken, Bart Preneel:
On the Algebraic Immunity of Symmetric Boolean Functions. INDOCRYPT 2005: 35-48 - [c6]An Braeken, Joseph Lano:
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners. Selected Areas in Cryptography 2005: 159-174 - [i9]An Braeken, Bart Preneel:
On the Algebraic Immunity of Symmetric Boolean Functions. IACR Cryptol. ePrint Arch. 2005: 245 (2005) - [i8]An Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel:
Classification of Cubic (n-4)-resilient Boolean Functions. IACR Cryptol. ePrint Arch. 2005: 332 (2005) - 2004
- [c5]An Braeken, Christopher Wolf, Bart Preneel:
A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions. IFIP TCS 2004: 51-66 - [c4]An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel:
On Boolean Functions with Generalized Cryptographic Properties. INDOCRYPT 2004: 120-135 - [c3]Christopher Wolf, An Braeken, Bart Preneel:
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. SCN 2004: 294-309 - [i7]An Braeken, Svetla Nikova, Ventzislav Nikov:
On Cheating Immune Secret Sharing. IACR Cryptol. ePrint Arch. 2004: 200 (2004) - [i6]Yuri L. Borissov, An Braeken, Svetla Nikova:
Covering Radius of the (n-3)-rd Order Reed-Muller Code in the Set of Resilient Functions. IACR Cryptol. ePrint Arch. 2004: 202 (2004) - [i5]An Braeken, Christopher Wolf, Bart Preneel:
Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality. IACR Cryptol. ePrint Arch. 2004: 214 (2004) - [i4]An Braeken, Christopher Wolf, Bart Preneel:
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. IACR Cryptol. ePrint Arch. 2004: 222 (2004) - [i3]Christopher Wolf, An Braeken, Bart Preneel:
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. IACR Cryptol. ePrint Arch. 2004: 237 (2004) - [i2]An Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel:
Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties. IACR Cryptol. ePrint Arch. 2004: 248 (2004) - [i1]An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel:
On Boolean Functions with Generalized Cryptographic Properties. IACR Cryptol. ePrint Arch. 2004: 259 (2004) - 2003
- [c2]Alex Biryukov, Christophe De Cannière, An Braeken, Bart Preneel:
A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms. EUROCRYPT 2003: 33-50 - [c1]Yuri L. Borissov, An Braeken, Svetla Nikova, Bart Preneel:
On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions. IMACC 2003: 82-92
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint