- document
-
Veugen, P.J.M. (author)In the field of signal processing in the encrypted domain, linear operations are usually easy to perform, whereas multiplications, and bitwise operations like comparison, are more costly in terms of computation and communication. These bitwise operations frequently require a decomposition of the secret value into bits. To minimize the...article 2015
- document
-
Hoepman, J.J. (author)Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their customers. Users may benefit from identity...bookPart 2011
- document
-
Hoepman, J.H. (author)The Internet of Things is nothing new. First introduced as Ubiquitous Computing by Mark Weiser [49] around 1990, the basic concept of the “disappearing computer” has been studied as Ambient Intelligence or Pervasive Computing in the decades that followed. Today we witness the first large scale applications of these ideas. We see RFID technology...article 2011
- document
-
Koninklijke KPN ; Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek (author), Hoepman, J.H. (author), Joosten, H.J.M. (author), Knobbe, J.W. (author)A method and a system for securing communication between at least a first and a second hardware components of a mobile device is described. The method includes establishing a first shared secret between the first and the second hardware components during an initialization of the mobile device and, following the initialization of the mobile...patent 2011
- document
-
Koninklijke KPN ; Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek (author), Knobbe, J.W. (author), Hoepman, J.H. (author), Joosten, H.J.M. (author)A method and a system for securing communication between at least a first and a second hardware components of a mobile device is described. The method includes establishing a first shared secret between the first and the second hardware components during an initialization of the mobile device and, following the initialization of the mobile...patent 2011
- document
-
Cayirci, E. (author), Rong, C. (author), Huiskamp, W. (author), Verkoelen, C.A.A. (author), TNO Defensie en Veiligheid TNO Informatie- en Communicatietechnologie (author)Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an...conference paper 2009