default search action
Koen Simoens
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j5]Sven Kiljan, Koen Simoens, Danny De Cock, Marko C. J. D. van Eekelen, Harald P. E. Vranken:
A Survey of Authentication and Communications Security in Online Banking. ACM Comput. Surv. 49(4): 61:1-61:35 (2017) - 2012
- [b1]Koen Simoens:
Analysis of Fuzzy Encryption Schemes for the Protection of Biometric Data (Analyse van fuzzy encryptieschema's voor het afschermen van biometrische gegevens). Katholieke Universiteit Leuven, Belgium, 2012 - [j4]Mario Lamberger, Florian Mendel, Vincent Rijmen, Koen Simoens:
Memoryless near-collisions via coding theory. Des. Codes Cryptogr. 62(1): 1-18 (2012) - [j3]Koen Simoens, Julien Bringer, Hervé Chabanne, Stefaan Seys:
A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems. IEEE Trans. Inf. Forensics Secur. 7(2): 833-841 (2012) - [c10]Koen Simoens, Bian Yang, Xuebing Zhou, Filipe Beato, Christoph Busch, Elaine M. Newton, Bart Preneel:
Criteria towards metrics for benchmarking template protection algorithms. ICB 2012: 498-505 - 2011
- [i2]Koen Simoens, Julien Bringer, Hervé Chabanne, Stefaan Seys:
Analysis of Biometric Authentication Protocols in the Blackbox Model. CoRR abs/1101.2569 (2011) - 2010
- [c9]Koen Simoens, Chi-Ming Chang, Bart Preneel:
Reversing protected minutiae vicinities. BTAS 2010: 1-8 - [c8]Bian Yang, Daniel Hartung, Koen Simoens, Christoph Busch:
Dynamic random projection for biometric template protection. BTAS 2010: 1-7 - [c7]Julien Bringer, Hervé Chabanne, Koen Simoens:
Blackbox Security of Biometrics (Invited Paper). IIH-MSP 2010: 337-340 - [c6]Ileana Buhan, Emile Kelkboom, Koen Simoens:
A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems. IIH-MSP 2010: 346-351 - [c5]Koen Simoens, Roel Peeters, Bart Preneel:
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares. Pairing 2010: 116-135 - [i1]Koen Simoens, Roel Peeters, Bart Preneel:
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares. IACR Cryptol. ePrint Arch. 2010: 207 (2010)
2000 – 2009
- 2009
- [j2]Brendan Van Alsenoy, Danny De Cock, Koen Simoens, Jos Dumortier, Bart Preneel:
Delegation and digital mandates: Legal requirements and security objectives. Comput. Law Secur. Rev. 25(5): 415-431 (2009) - [c4]Koen Simoens, Pim Tuyls, Bart Preneel:
Privacy Weaknesses in Biometric Sketches. SP 2009: 188-203 - 2008
- [j1]Danny De Cock, Koen Simoens, Bart Preneel:
Insights on identity documents based on the Belgian case study. Inf. Secur. Tech. Rep. 13(2): 54-60 (2008) - [c3]Karel Wouters, Koen Simoens, Danny Lathouwers, Bart Preneel:
Secure and Privacy-Friendly Logging for eGovernment Services. ARES 2008: 1091-1096 - [c2]Roel Peeters, Koen Simoens, Danny De Cock, Bart Preneel:
Cross-Context Delegation through Identity Federation. BIOSIG 2008: 79-92 - [c1]Nicolas Delvaux, Hervé Chabanne, Julien Bringer, Bruno Kindarji, Patrik Lindeberg, Johannes Midgren, Jeroen Breebaart, Ton H. Akkermans, Michiel van der Veen, Raymond N. J. Veldhuis, Els Kindt, Koen Simoens, Christoph Busch, Patrick Bours, Davrondzhon Gafurov, Bian Yang, Julien Stern, Carsten Rust, Bruno Cucinelli, Dimitrios Skepastianos:
Pseudo Identities Based on Fingerprint Characteristics. IIH-MSP 2008: 1063-1068
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint