Koen Simoens
Koen Simoens
Unknown affiliation
Verified email at
Cited by
Cited by
Privacy weaknesses in biometric sketches
K Simoens, P Tuyls, B Preneel
2009 30th IEEE Symposium on Security and Privacy, 188-203, 2009
A framework for analyzing template security and privacy in biometric authentication systems
K Simoens, J Bringer, H Chabanne, S Seys
IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012
Dynamic random projection for biometric template protection
B Yang, D Hartung, K Simoens, C Busch
2010 Fourth IEEE international conference on biometrics: theory …, 2010
Criteria towards metrics for benchmarking template protection algorithms
K Simoens, B Yang, X Zhou, F Beato, C Busch, EM Newton, B Preneel
2012 5th IAPR International Conference on Biometrics (ICB), 498-505, 2012
A survey of authentication and communications security in online banking
S Kiljan, K Simoens, DD Cock, MV Eekelen, H Vranken
ACM Computing Surveys (CSUR) 49 (4), 1-35, 2016
Pseudo identities based on fingerprint characteristics
N Delvaux, H Chabanne, J Bringer, B Kindarji, P Lindeberg, J Midgren, ...
2008 International Conference on Intelligent Information Hiding and …, 2008
Secure and privacy-friendly logging for egovernment services
K Wouters, K Simoens, D Lathouwers, B Preneel
2008 Third International Conference on Availability, Reliability and …, 2008
A survey of the security and privacy measures for anonymous biometric authentication systems
I Buhan, E Kelkboom, K Simoens
2010 Sixth International Conference on Intelligent Information Hiding and …, 2010
Reversing protected minutiae vicinities
K Simoens, CM Chang, B Preneel
2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010
Memoryless near-collisions via coding theory
M Lamberger, F Mendel, V Rijmen, K Simoens
Designs, Codes and Cryptography 62, 1-18, 2012
Increased resilience in threshold cryptography: Sharing a secret with devices that cannot store shares
K Simoens, R Peeters, B Preneel
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
Cross-Context Delegation through Identity Federation
R Peeters, K Simoens, D Cock, B Preneel
Gesellschaft für Informatik e. V., 2008
Blackbox security of biometrics
J Bringer, H Chabanne, K Simoens
2010 Sixth International Conference on Intelligent Information Hiding and …, 2010
Insights on identity documents based on the Belgian case study
D De Cock, K Simoens, B Preneel
Information Security Technical Report 13 (2), 54-60, 2008
Security of Online Banking Systems.
SZ Kiljan, K Simoens, D De Cock, M van Eekelen, HPE Vranken
Open Universiteit Nederland, 2014
Technical report: security of online banking systems
S Kiljan, K Simoens, DD Cock, M van Eekelen, HPE Vranken
Sl: Open Universiteit, 2014
Analysis of biometric authentication protocols in the blackbox model
K Simoens, J Bringer, H Chabanne, S Seys
arXiv preprint arXiv:1101.2569, 2011
Security and privacy challenges with biometric solutions
K Simoens
LSEC Biometrics, 2011
Delegation and digital mandates: legal requirements and security objectives
B Van Alsenoy, D De Cock, K Simoens, J Dumortier, B Preneel
Computer Law & Security Review 25 (5), 415-431, 2009
TURBINE Security Assessment: How to Build Trust
K Simoens
The system can't perform the operation now. Try again later.
Articles 1–20