Jorn Lapon
Jorn Lapon
PostDoc, KU Leuven, TCG
Verified email at lapon.eu
Title
Cited by
Cited by
Year
Analysis of revocation strategies for anonymous Idemix credentials
J Lapon, M Kohlweiss, B De Decker, V Naessens
IFIP International Conference on Communications and Multimedia Security, 3-17, 2011
392011
Structure preserving CCA secure encryption and applications
J Camenisch, K Haralambiev, M Kohlweiss, J Lapon, V Naessens
International Conference on the Theory and Application of Cryptology and …, 2011
352011
User-centric identity management using trusted modules
J Vossaert, J Lapon, B De Decker, V Naessens
Mathematical and Computer Modelling 57 (7-8), 1592-1605, 2013
292013
A SysML extension for security analysis of industrial control systems
L Lemaire, J Lapon, BD Decker, V Naessens
2nd International Symposium for ICS & SCADA Cyber Security Research 2014 …, 2014
262014
Performance analysis of accumulator-based revocation mechanisms
J Lapon, M Kohlweiss, B De Decker, V Naessens
IFIP International Information Security Conference, 289-301, 2010
242010
A privacy-preserving ticketing system
K Verslype, B De Decker, V Naessens, G Nigusse, J Lapon, P Verhaeghe
IFIP Annual Conference on Data and Applications Security and Privacy, 97-112, 2008
122008
A formal approach for inspecting privacy and trust in advanced electronic services
K Decroix, J Lapon, B De Decker, V Naessens
International Symposium on Engineering Secure Software and Systems, 155-170, 2013
112013
PetAnon: A Privacy-Preserving e-Petition System Based on Idemix
K Verslype, J Lapon, P Verhaeghe, V Naessens, B De Decker
102008
Data-minimizing authentication goes mobile
P Bichsel, J Camenisch, B De Decker, J Lapon, V Naessens, D Sommer
IFIP International Conference on Communications and Multimedia Security, 55-71, 2012
82012
Security and privacy improvements for the belgian eid technology
P Verhaeghe, J Lapon, B De Decker, V Naessens, K Verslype
IFIP International Information Security Conference, 237-247, 2009
72009
Security and privacy threats of the Belgian electronic identity card and middleware
P Verhaeghe, J Lapon, V Naessens, B De Decker, K Verslype, ...
EEMA European e-Identity conference, Date: 2008/06/10-2008/06/11, Location …, 2008
72008
Improving secure storage of data in android
F Boukayoua, J Lapon, BD Decker, V Naessens
KU Leuven, https://lirias. kuleuven. be/handle/123456789/446974, Internal Report, 2014
62014
A framework for formal reasoning about privacy properties based on trust relationships in complex electronic services
K Decroix, J Lapon, B De Decker, V Naessens
International Conference on Information Systems Security, 106-120, 2013
62013
Anonymous credential systems: From theory towards practice
J Lapon
Katholieke Universiteit Leuven (Ph. D. thesis), 2012
62012
A mobile and reliable anonymous epoll infrastructure
P Verhaeghe, K Verslype, J Lapon, V Naessens, B De Decker
International Conference on Security and Privacy in Mobile Information and …, 2010
62010
Kritische beoordeling van het gebruik van de Belgische eID kaart
B De Decker, V Naessens, J Lapon, P Verhaeghe
CW Reports, 2008
62008
Communications and Multimedia Security
B De Decker, A Zuquete
Proc. 12th IFIP TC 6/TC 11 Int. Conf., CMS, 19-21, 2014
5*2014
PriMan : A Privacy-Preserving Identity Framework
K Verslype, P Verhaeghe, J Lapon, V Naessens, B De Decker
IFIP Annual Conference on Data and Applications Security and Privacy, 327-334, 2010
52010
Formal reasoning about privacy and trust in loyalty systems
K Decroix, J Lapon, L Lemaire, B De Decker, V Naessens
International Conference on Business Information Systems, 211-223, 2015
42015
Secure storage on Android with context-aware access control
F Boukayoua, J Lapon, B De Decker, V Naessens
IFIP International Conference on Communications and Multimedia Security, 46-59, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20