Researcher
Vincent Naessens
- Disciplines:Distributed computing
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Numerical Analysis and Applied Mathematics (NUMA) (Division)
Member
From1 Aug 2020 → 31 Jul 2020 - Computer Science Technology, Ghent and Aalst Technology Campuses (Technology cluster)
Member
From1 Oct 2013 → 31 Jul 2020 - Informatics Section (Division)
Member
From1 Jan 2008 → 30 Sep 2013 - Faculty of Science, Kulak Kortrijk Campus (Faculty)
Member
From1 Oct 1999 → 30 Sep 2006
Projects
1 - 10 of 21
- AI-enhanced Software EngineeringFrom15 Sep 2023 → TodayFunding: BOF - doctoral mandates
- A Unifying, Distributed Data Processing Middleware for Heterogeneous Privacy-Enhancing Techniques.From27 Feb 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- TRUSTI - Secure remote software updates in IoTFrom1 Mar 2022 → TodayFunding: VLAIO ICON cybersecurity (CS-ICON)
- SolidLab FlandersFrom1 Feb 2022 → 31 Jan 2024Funding: Department of Economy, Science and Innovation
- CoCoNut: Unlocking the full potential of sensitive data by secure software technologiesFrom1 Jan 2022 → TodayFunding: VLAIO ICON cybersecurity (CS-ICON)
- Privacy Preserving Data Sharing(DASH)From1 Dec 2021 → 30 Nov 2023Funding: IWT / VLAIO - TETRA fund
- Security Hardening Support during the Development and Maintenance of Embedded DevicesFrom24 Nov 2021 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Automated Security Analysis of Embedded DevicesFrom25 Oct 2021 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Integration of cyber security and safety standards in the development of digital systemsFrom1 Oct 2021 → 30 Nov 2023Funding: IWT / VLAIO - TETRA fund
- Bringing dataset anonymization to practiceFrom16 Dec 2020 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
71 - 80 of 85
- Using a smartphone to access personalized Web services on a workstation
Authors: Faysal Boukayoua, Jan Vossaert, Bart De Decker, Vincent Naessens, Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello
Pages: 144 - 156 - Dataset anonymization with purpose: a resource allocation use case
Authors: Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens
Pages: 202 - 210 - Building advanced applications with the Belgian eID
Authors: Jorn Lapon, Vincent Naessens, Pieter Verhaeghe, Bart De Decker
Pages: 439 - 451 - CPS Security Assessment using Automatically Generated Attack Trees
Authors: Jan Vossaert, Vincent Naessens
Pages: 1 - 10Number of pages: 10 - Extending the scope of eID technology: Threats and opportunities in a commercial setting
Authors: Vincent Naessens, Bart De Decker
Pages: 1246 - 1261 - Untangling the Physical-Digital Knot When Designing Advanced IoT Ecosystems
Authors: Ilse Bohé, Michiel Willocx, Vincent Naessens
Pages: 1 - 6Number of pages: 6 - Privacy preserving mechanisms for a pervasive eHealth system
Authors: Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker, Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello
Pages: 221 - 231 - Supporting Contact Tracing by Privacy-Friendly Registration at Catering Facilities
Authors: Dave Singelée, Michiel Willocx, Jorn Lapon, Vincent Naessens
Pages: 162 - 167 - Claim-based versus network-based identity management: a hybrid approach
Authors: Faysal Boukayoua, Jan Vossaert, Bart De Decker, Vincent Naessens, Andreas U Schmidt, Giovanni Russello, Ioannis Krontiris, Shiguo Lian
Pages: 38 - 50 - Structure preserving CCA secure encryption and applications
Authors: Jorn Lapon, Vincent Naessens
Pages: 89 - 106