Wouter Lueks
Wouter Lueks
EPFL, Switzerland
Verified email at epfl.ch - Homepage
Cited by
Cited by
Visualizing the quality of dimensionality reduction
B Mokbel, W Lueks, A Gisbrecht, B Hammer
Neurocomputing 112, 109-123, 2013
Illustrative molecular visualization with continuous abstraction
M Van Der Zwan, W Lueks, H Bekker, T Isenberg
Computer Graphics Forum 30 (3), 683-690, 2011
Sublinear scaling for multi-client private information retrieval
W Lueks, I Goldberg
International Conference on Financial Cryptography and Data Security, 168-186, 2015
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
Fast revocation of attribute-based credentials for both users and verifiers
W Lueks, G Alpár, JH Hoepman, P Vullers
Computers & Security 67, 308-323, 2017
Out-of-sample kernel extensions for nonparametric dimensionality reduction.
A Gisbrecht, W Lueks, B Mokbel, B Hammer
ESANN 2012, 531-536, 2012
Percy++ project on SourceForge
I Goldberg, C Devet, W Lueks, A Yang, P Hendry, R Henry
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging
B Kulynych, W Lueks, M Isaakidis, G Danezis, C Troncoso
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 86-103, 2018
Designated attribute-based proofs for RFID applications
G Alpár, L Batina, W Lueks
International Workshop on Radio Frequency Identification: Security and …, 2012
Spatially Continuous Change of Abstraction in Molecular Visualization
W Lueks, I Viola, M Van Der Zwan, H Bekker, T Isenberg
Abstracts of 1st IEEE Symposium on Biological Data Visualization (BioVis …, 2011
IRMA: practical, decentralized and privacy-friendly identity management using smartphones
G Alpár, F van den Broek, B Hampiholi, B Jacobs, W Lueks, S Ringers
HotPETs, 2017
Forward-secure distributed encryption
W Lueks, JH Hoepman, K Kursawe
International Symposium on Privacy Enhancing Technologies Symposium, 123-142, 2014
An Attack Against Fixed Value Discrete Logarithm Representations.
G Alpár, JH Hoepman, W Lueks
IACR Cryptology ePrint Archive 2013, 120, 2013
Revocable Privacy 2011–use cases
W Lueks, MH Everts, JH Hoepman
TNO, 2012
Security and Privacy via Cryptography -- Having your cake and eating it too
W Lueks
Radboud University, 2017
Vote to Link: Recovering from Misbehaving Anonymous Users
W Lueks, MH Everts, JH Hoepman
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
Reducing metadata leakage from encrypted files and communication with purbs
K Nikitin, L Barman, W Lueks, M Underwood, JP Hubaux, B Ford
Proceedings on Privacy Enhancing Technologies 2019 (4), 6-33, 2019
Revocable privacy: Principles, use cases, and technologies
W Lueks, MH Everts, JH Hoepman
Annual Privacy Forum, 124-143, 2015
On linkability and malleability in self-blindable credentials
JH Hoepman, W Lueks, S Ringers
IFIP International Conference on Information Security Theory and Practice …, 2015
Tandem: Securing Keys by Using a Central Server While Preserving Privacy
W Lueks, B Hampiholi, G Alpár, C Troncoso
arXiv preprint arXiv:1809.03390, 2018
The system can't perform the operation now. Try again later.
Articles 1–20