Turning advanced cryptographic techniques into practical security applications. KU Leuven
ICT systems and services are becoming ever more pervasive, with a development towards both large scale centralized services (e.g., cloud computing) and tiny pervasive devices (e.g., the Internet of things). The more important ICT becomes in our professional and private lives, the more important it is that the ICT infrastructure is trustworthy. However, most elements of our current infrastructure are vulnerable to a broad range of security ...