- document
-
Rooij S.B. van, (author), Bouma, H. (author), van Mil, J.D. (author), ten Hove, R.J.M. (author)The increasing complexity of security challenges requires Law Enforcement Agencies (LEAs) to have improved analysis capabilities, e.g., with the use of Artificial Intelligence (AI). However, it is challenging to make large enough high-quality training and testing datasets available to the community that is developing AI tools to support LEAs in...conference paper 2022
- document
-
Bontekoe, T.H. (author), Everts, M. (author), Peter, A. (author)In this paper we propose and implement a digital permissioned decentralized anonymous payment scheme that finds a balance between anonymity and auditability. This approach allows banks to ensure that their clients are not participating in illegal financial transactions, whilst clients stay in control over their sensitive, personal information....conference paper 2022
- document
-
van Rooijen, A.L. (author), Bouma, H. (author), Pruim, R.H.R. (author), Baan, J. (author), Uijens, W.R. (author), van Mil, J.D. (author)Person re-identification (Re-ID) is a valuable technique because it can assist in finding suspects after a terrorist attack. However, the machine learning algorithms for person Re-ID are usually trained on large datasets with images of many different people in a public space. This could pose privacy concerns for the people involved. One way to...conference paper 2020
- document
-
Bouma, H. (author), Pruim, R.H.R. (author), van Rooijen, A.L. (author), ten Hove, R.J.M. (author), van Mil, J.D. (author), Kromhout, B. (author)The current capabilities and capacities of border guards and immigration services can be enhanced using technologies that automate the analysis of travel, identity and breeder documents in order to detect fraud. These technologies can be relevant for countering emerging threats in document and identity verification (e.g., forged documents,...conference paper 2020
- document
-
Veugen, P.J.M. (author), Beye, M. (author)Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an et al. have defined measures for the...bookPart 2013
- document
-
Alpár, G. (author), Batina, L. (author), Verdult, R. (author)In this paper we propose a new solution for mobile payments called Tap2 technology. To use it, users need only their NFC-enabled mobile phones and credentials implemented on their smart cards. An NFC device acts like a bridge between service providers and secure elements and the secure credentials (on the card) are never revealed. In this way,...conference paper 2012
- document
-
Beye, M. (author), Veugen, P.J.M. (author)Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen [3] devised trees to withstand such attacks, but...conference paper 2012
- document
-
Beye, M. (author), Veugen, P.J.M. (author)Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen [2] devised trees to withstand such attacks, but...conference paper 2011
- document
-
Batina, L. (author), Hoepman, J.H. (author), Jacobs, B. (author), Mostowski, W. (author), Vullers, P. (author), TNO Informatie- en Communicatietechnologie (author)This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are verified on the reader-side via a bilinear pairing....bookPart 2010