| 2008 |
| 9 | EE | Dave Singelée,
Benoît Latré,
Bart Braem,
Michael Peeters,
Marijke De Soete,
Peter De Cleyn,
Bart Preneel,
Ingrid Moerman,
Chris Blondia:
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks.
ADHOC-NOW 2008: 94-107 |
| 2005 |
| 8 | EE | Marijke De Soete,
Michael Ward:
EMV.
Encyclopedia of Cryptography and Security 2005 |
| 1991 |
| 7 | | Marijke De Soete:
Public Key Cryptography.
Computer Security and Industrial Cryptography 1991: 33-49 |
| 6 | | Marijke De Soete:
New Bounds and Constructions for Authentication/Secrecy Codes with Splitting.
J. Cryptology 3(3): 173-186 (1991) |
| 1989 |
| 5 | EE | Marijke De Soete,
Jean-Jacques Quisquater,
Klaus Vedder:
A Signature with Shared Verification Scheme.
CRYPTO 1989: 253-262 |
| 4 | EE | Marijke De Soete,
Klaus Vedder,
Michael Walker:
Cartesian Authentication Schemes.
EUROCRYPT 1989: 476-490 |
| 1988 |
| 3 | EE | Marijke De Soete:
Bounds and Constructions for Authentication-Secrecy Codes with Splitting.
CRYPTO 1988: 311-317 |
| 2 | EE | Marijke De Soete,
Klaus Vedder:
Some New Classes of Geometric Threshold Schemes.
EUROCRYPT 1988: 389-401 |
| 1 | EE | Marijke De Soete:
Some Constructions for Authentication-Secrecy Codes.
EUROCRYPT 1988: 57-75 |