Latest news

Trust in digital life - Strategic Partner logo

Papers & Articles


Titles journal papers Authors Released
An efficient Wi-Fi fingerprinting using Channel State Information with MIMO Yogita Chapre, Aleksandar Ignjatovic, Aruna Seneviratne, Sanjay Jha Pervasive and Mobile Computing, Volume 23, October 2015, Pages 89–103, Available online 9 July 2015, ISSN 1574-1192
Understanding perceived trust to reduce regret E. Costante, J.I. den Hartog, M. Petkovic Computational Intelligence, Volume 31 Issue 2, Pages 327-347. Published May 2015


Titles conference/workshop papers
Authors Released
Constant-Time Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption Gajek, S.  Topics in Cryptology - CT-RSA 2016, Lecture Notes in Computer Science, Series: Security and Cryptology, Vol. 9610 2016, 1st ed. Springer USA 2016; pp. 75-89; ISBN: 978-3-319-29484-1 (Print) 978-3-319-29485-8 (Online)]
Secure Distributed Key Generation in Attribute Based Encryption Systems Daniel Pletea, Saeed Sedghi, Meilof Veeningen, Milan Petkovic


14-16 December 2015

Secure Collaboration Platform: a Case Study in the Biosecurity Domain Jane Li, John Zic, Nerolie Oakes, Dongxi Liu, Chen Wang

SecTech 2015

25-28 November 2015

Why we need privacy-preserving authentication in the Facebook age Mike Johnstone


15-20 November 2015

A Two-Tiered User Feedback-based Approach for Spam Detection Feroze, M., Baig, Z. and Johnstone, M.

ICSNC 2015

15-20 November 2015

Method for Providing Secure and Private Fine-grained Access to Outsourced Data Mosarrat Jahan, Mohsen Rezvani, Aruna Seneviratne, and Sanjay Jha


26-29 October 2015

Controlled Android Application Execution for the IoT Infrastructure Johnstone, M., Baig, Z., Hannay, P., Carpene,C. and Feroze, M.


26-27 October 2015

European Health Data Privacy and eID Rules in Aged Care Coordination Koel Ghorai, Jan.M. Smits, Pradeep Ray, Maarten Kluitman

APC 2015

23-25 October, Amsterdam The Netherlands

Stronger Security Definition for Sanitizable Signatures

Stephan Krenn, Kai Samelin, and Dieter Sommer

DPM 2015, 10th International Workshop on Data Privacy Management, - Vienna, Austria, September 21–22, 2015

Anonymous Authentication in a Cloud Context Jan Camenisch

ARES 2015

24-28 August 2015

A secure integrated platform for rapidly formed multi organisation collaboration John Zic; Nerolie Oakes; Dongxi Liu; Jane Li; Chen Wang and Shiping Chen

ARES 2015

24-28 August 2015

Attribute Based Authentication and Authorization for Collaborative Services Stefan Thaler, Jerry den Hartog, Dhouha Ayed, Dieter Sommer, Michael Hitchens

ARES 2015

24-28 August 2015

Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators

Dongxi Liu and John Zic 

RATSP 2015, The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications

20-25 Augustus, Finland

DNA sequence modeling based on context trees

L. Kusters and T. Ignatenko

SITB 2015, 5th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 2015, pp. 96–103. Brussel, 6-7 May 2015


Privacy-preserving genome analysis

C. J. Kusters and T. Ignatenko  

ESIT 2015, European School of Information Theory

April 2015, Zandvoort, The Netherlands

Poster and Abstract:

Privacy - Preserving modeling of DNA sequences

L. Kusters and T. Ignatenko  

IEEE West European Student and Young Professional Congress

May 2015, Eindhoven, The Netherlands

Poster and Abstract:

Privacy-preserving modeling of DNA sequences

 C. J. Kusters and T. Ignatenko BioSB 2015,Bioinformatics & Systems Biology conference, May 2015, Lunteren, The Netherlands

Attribute-based Encryption with Encryption and Decryption outsourcing

This paper won the best paper award!

M. Asim, M. Petković, T. Ignatenko  

2014 SRI

1-3 December 2014

Authentication and Authorisation in Entrusted Unions A. F. Dhouha, J. Camenisch, T. Ignatenko,  M. Johnstone,  P. Koster, B. Lange, M. Petković, D. Sommer  

2014 SRI

1-3 December 2014

Protecting and Analysing Health Care Data on Cloud D. Thilakanathan, Y. Zhao, S. Chen, S. Nepal, l. Calvo, A. Pardo

CBD 2014

20-22 November 2014

Analysis of XACML Policies with SMT F. Turkmen, J. den Hartog, S. Ranise, N. Zannone, B. Kessler


3-7 November 2014

Integrating Data-minimising Authentication into Authorisation Systems D. Ayed, P. Bichsel, J. Camenisch, J. Den Hartog

Trust 2014

30 June - 2 July 2014 
Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents J. Zic  

Trust 2014

30 June - 2 July 2014
Privacy Preserving Matching of DNA Sequence
T.Ignatenko, M. Petkovic


30 June - 2 July 2014

Title submitted papers for publication

Authors Submitted to
Timing attack detection on Bacnet via a machine learning approach Michael N. Johnstone, Matthew Peacock, Jerry I. den Hartog To appear in: Proceedings of 13th Australian Information Security Management Conference (2015)
Selection of Penetration Testing Methodologies: A Comparison and Evaluation Aleatha Shanley and Michael N. Johnstone To appear in Proc. 13th Australian Information Security Management Conference (2015)
Secure distributed key generation in attribute-based encryption systems Daniel Pletea, Saeed Sedghi, Meilof Veeningen and Milan Petkovic To appear in the 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), December 14-16, 2015, London, UK
Context trees for privacy-preserving modeling of genetic data L. Kusters and T. Ignatenko To appear in IZS 2016, International Zurich Seminar on Communications, March 2-4 2016, Zurich
Constant-Time Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption Sebastian Gajek CTA-RSA 2016: RSA Conference Cryptographers’ Track; February 29- March 4, 2016, San Francisco
Privacy-utility trade off for (MAP) tree models in genetic sequence comparison L. Kusters and T. Ignatenko 37th IEEE Symposium on Security and Privacy, May 23-25, 2016, San Jose, CA, USA
Title technical paper Authors Published

Unified Representation and Analysis of Security Concerns in Collaboration Spaces

Mortada Al-Banna, Moshe Barukh, Boualem Benatallah, John Sun Technical Report, CSE, UNSW Australia

seventh framework programme logo