2004 |
12 | | Els Van Herreweghen:
A Risk Driven Approach to Designing Privacy Enhanced Secure.
International Information Security Workshops 2004: 261-276 |
2003 |
11 | EE | Günter Karjoth,
Matthias Schunter,
Els Van Herreweghen,
Michael Waidner:
Amending P3P for Clearer Privacy Promises.
DEXA Workshops 2003: 445-449 |
10 | EE | Günter Karjoth,
Matthias Schunter,
Els Van Herreweghen:
Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep.
POLICY 2003: 135-146 |
2002 |
9 | EE | Jan Camenisch,
Els Van Herreweghen:
Design and implementation of the idemix anonymous credential system.
ACM Conference on Computer and Communications Security 2002: 21-30 |
2001 |
8 | | Bart De Decker,
Frank Piessens,
Jan Smits,
Els Van Herreweghen:
Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium
Kluwer 2001 |
2000 |
7 | EE | Els Van Herreweghen:
Secure Anonymous Signature-Based Transactions.
ESORICS 2000: 55-71 |
6 | EE | Els Van Herreweghen:
Non-repudiation in SET: Open Issues.
Financial Cryptography 2000: 140-156 |
1996 |
5 | | Ralf C. Hauser,
Philippe A. Janson,
Refik Molva,
Gene Tsudik,
Els Van Herreweghen:
Robust and Secure Password and Key Change Method.
Journal of Computer Security 4(1): 97-112 (1996) |
1994 |
4 | EE | Ralf C. Hauser,
Philippe A. Janson,
Refik Molva,
Gene Tsudik,
Els Van Herreweghen:
Robust and Secure Password and Key Change Method.
ESORICS 1994: 107-122 |
1993 |
3 | EE | Gene Tsudik,
Els Van Herreweghen:
On Simple and Secure Key Distribution.
ACM Conference on Computer and Communications Security 1993: 49-57 |
2 | | Gene Tsudik,
Els Van Herreweghen:
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks.
SRDS 1993: 136-142 |
1992 |
1 | EE | Refik Molva,
Gene Tsudik,
Els Van Herreweghen,
Stefano Zatti:
KryptoKnight Authentication and Key Distribution System.
ESORICS 1992: 155-174 |