Standout Papers

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requir... 2010 2026 2015 2020 224
  1. A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements (2010)
    Mina Deng, Kim Wuyts et al. Requirements Engineering

Citation Impact

Citing Papers

A minimalist approach to remote attestation
2014
A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks
2007
Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless Entry Systems
2016
Lightweight Security Solutions for the Internet of Things
2013
A local electricity trading market: Security analysis
2016
Secure, privacy-preserving and federated machine learning in medical imaging
2020 Standout
Scalable Access Control For Privacy-Aware Media Sharing
2018
Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System
2017
Future Intelligent and Secure Vehicular Network Toward 6G: Machine-Learning Approaches
2019 Standout
Mobile banking services
2004
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
2018 Standout
Survey on VANET security challenges and possible cryptographic solutions
2014
Refinements of Miller's algorithm for computing the Weil/Tate pairing
2005
A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks
2006
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
2016
Wi-Fi Fingerprint-Based Indoor Positioning: Recent Advances and Comparisons
2015 Standout
Industrial IoT for Intelligent Steelmaking With Converter Mouth Flame Spectrum Information Processed by Deep Learning
2019 Standout
Utilizing Transfer Learning and Homomorphic Encryption in a Privacy Preserving and Secure Biometric Recognition System
2018
A survey on FinTech
2017 Standout
A lightweight attribute-based encryption scheme for the Internet of Things
2014
GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network
2023 Standout
Blockchain technology in the energy sector: A systematic review of challenges and opportunities
2018 Standout
A survey on internet of things security from data perspectives
2018
Cyber–Physical System Security for the Electric Power Grid
2011 Standout
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
2017 Standout
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
2008 Standout
Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions
2017
Security and privacy in the internet of things
2017
Perception layer security in Internet of Things
2019
The rise of “big data” on cloud computing: Review and open research issues
2014 Standout
VANet security challenges and solutions: A survey
2017
Physical Unclonable Functions and Applications: A Tutorial
2014 Standout
Security and Privacy Approaches in Mixed Reality
2019
M2M Security: Challenges and Solutions
2016
Logistic map as a block encryption algorithm
2001
A Survey on Security and Privacy Issues in Internet-of-Things
2017 Standout
Two robust remote user authentication protocols using smart cards
2010
Cyber–Physical Security of a Smart Grid Infrastructure
2011 Standout
The Internet of Things: A survey
2010 Standout
Joint physical-application layer security for wireless multimedia delivery
2014
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
2011
The Elliptic Curve Digital Signature Algorithm (ECDSA)
2001 Standout
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle
2015 Standout
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center
2018
Industrial Internet-of-Things Security Enhanced With Deep Learning Approaches for Smart Cities
2020 Standout
Information hiding-a survey
1999 Standout
3GPP LTE Versus IEEE 802.11p/WAVE: Which Technology is Able to Support Cooperative Vehicular Safety Applications?
2012 Standout
Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review
2016
Lightweight Mutual Authentication for IoT and Its Applications
2017
A Novel Approach to Mapped Correlation of ID for RFID Anti-Collision
2014 Standout
Developing Trust in M-commerce: A Vendor and Certificate Authority Model
2006
Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain
2022 Standout
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
2016 Standout
Cooperative Adaptive Cruise Control in Real Traffic Situations
2013 Standout
Data Protection Compliance Regulations and Implications for Smart Factories of the Future
2016
Cybersecurity Myths on Power Control Systems: 21 Misconceptions and False Beliefs
2010
A Review on the Use of Blockchain for the Internet of Things
2018 Standout
A Survey on Metaverse: Fundamentals, Security, and Privacy
2022 Standout
Privacy in the Digital Age: a Review of Information Privacy Research in Information Systems1
2011 Standout
An overview on smart contracts: Challenges, advances and platforms
2019 Standout
Federated Identity Management Systems: A Privacy-Based Characterization
2013
Examining the Impact of E-privacy Risk Concerns on Citizens’ Intentions to Use E-government Services: An Oman Perspective
2009
Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey
2017
Chaos-based cryptography: a brief overview
2001
A Proxy for Privacy: the Discreet Box
2007
On the features and challenges of security and privacy in distributed internet of things
2013 Standout
The Internet of Things: Review and theoretical framework
2019 Standout
Battery Lifetime Prognostics
2020 Standout
Parallel Collision Search with Cryptanalytic Applications
1999
The Future of Personal Area Networks in a Ubiquitous Computing World
2010
AEGIS: A single-chip secure processor
2005
Understanding digital transformation: A review and a research agenda
2019 Standout
Industrial Internet of Things: Challenges, Opportunities, and Directions
2018 Standout
Factors influencing adoption of mobile banking by Jordanian bank customers: Extending UTAUT2 with trust
2017 Standout
Connected Vehicles: Solutions and Challenges
2014 Standout
Provision of mobile banking services from an actor–network perspective: Implications for convergence and standardization
2014
Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions
2011 Standout
Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges
2019 Standout
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019 Standout
Protecting location privacy
2012
The Challenges and Opportunities in the Digitalization of Companies in a Post-COVID-19 World
2020 Standout
An Overview of Internet of Things (IoT) and Data Analytics in Agriculture: Benefits and Challenges
2018 Standout
Digital currency forecasting with chaotic meta-heuristic bio-inspired signal processing techniques
2019 Standout
Internet of Things security: A survey
2017 Standout
Evaluation of mobile services and substantial adoption factors with Analytic Hierarchy Process (AHP)
2012 Standout
Secure and dependable software defined networks
2015
A symmetric image encryption scheme based on 3D chaotic cat maps
2004 Standout
Classifying RFID attacks and defenses
2009
Computer Security — ESORICS 98
1998
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments
2014
The Impact of Artificial Intelligence and Blockchain on the Accounting Profession
2020 Standout
Fog and IoT: An Overview of Research Opportunities
2016 Standout
Cyber-Physical Systems Security—A Survey
2017 Standout
Cumulative Attestation Kernels for Embedded Systems
2012
SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
2006 Standout
A novel keyed parallel hashing scheme based on a new chaotic system
2016
ECC-based untraceable authentication for large-scale active-tag RFID systems
2014
A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy
2018 Standout

Works of Bart Preneel being referenced

PrETP: privacy-preserving electronic toll pricing
2010
Sancus: low-cost trustworthy extensible networked devices with a zero-software trusted computing base
2013
Recent developments in the design of conventional cryptographic algorithms
1998
Integrity primitives for secure information systems : final report of RACE Integrity Primitives Evaluation RIPE-RACE 1040
1995
A Practical Attack on KeeLoq
2008
Software-Based Protection is Moving to the Mainstream
2011
FPGA Vendor Agnostic True Random Number Generator
2006
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them
2016
On the Feasibility of Cryptography for a Wireless Insulin Pump System
2016
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
2010 Standout
End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation
2013
PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
2010
Location verification using secure distance bounding protocols
2005
On the Security of Today’s Online Electronic Banking Systems
2002
Revocable anonymous access to the Internet?
2003
Proper RFID Privacy: Model and Protocols
2014
Cryptography on smart cards
2001
Authentication and payment in future mobile systems
2000
(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions
2003
Privacy-preserving Biometric Authentication Model for e-FinanceApplications
2018
Location privacy in wireless personal area networks
2006
Toward More Secure and Reliable Access Control
2011
Identification via location-profiling in GSM networks
2008
High Assurance Smart Metering
2016
ARM: anonymous routing protocol for mobile ad hoc networks
2009
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
2008
Sancus 2.0
2017
Progress in Cryptology – AFRICACRYPT 2009
2009
Topics in Cryptology — CT-RSA 2002
2002
A Provably Secure Anonymous Buyer–Seller Watermarking Protocol
2010
Cryptographic hash functions
1994
Rankless by CCL
2026