2008 |
9 | EE | Dave Singelée,
Benoît Latré,
Bart Braem,
Michael Peeters,
Marijke De Soete,
Peter De Cleyn,
Bart Preneel,
Ingrid Moerman,
Chris Blondia:
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks.
ADHOC-NOW 2008: 94-107 |
2005 |
8 | EE | Marijke De Soete,
Michael Ward:
EMV.
Encyclopedia of Cryptography and Security 2005 |
1991 |
7 | | Marijke De Soete:
Public Key Cryptography.
Computer Security and Industrial Cryptography 1991: 33-49 |
6 | | Marijke De Soete:
New Bounds and Constructions for Authentication/Secrecy Codes with Splitting.
J. Cryptology 3(3): 173-186 (1991) |
1989 |
5 | EE | Marijke De Soete,
Jean-Jacques Quisquater,
Klaus Vedder:
A Signature with Shared Verification Scheme.
CRYPTO 1989: 253-262 |
4 | EE | Marijke De Soete,
Klaus Vedder,
Michael Walker:
Cartesian Authentication Schemes.
EUROCRYPT 1989: 476-490 |
1988 |
3 | EE | Marijke De Soete:
Bounds and Constructions for Authentication-Secrecy Codes with Splitting.
CRYPTO 1988: 311-317 |
2 | EE | Marijke De Soete,
Klaus Vedder:
Some New Classes of Geometric Threshold Schemes.
EUROCRYPT 1988: 389-401 |
1 | EE | Marijke De Soete:
Some Constructions for Authentication-Secrecy Codes.
EUROCRYPT 1988: 57-75 |