Greg Alpár
Greg Alpár
Assistant Professor (Open Universiteit Nederland), Researcher (Radboud University)
Verified email at - Homepage
Cited by
Cited by
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management
G Alpár, JH Hoepman, J Siljee
Arxiv preprint arXiv:1101.0427, 2011
Efficient selective disclosure on smart cards using idemix
P Vullers, G Alpár
IFIP Working Conference on Policies and Research in Identity Management, 53-67, 2013
Using NFC Phones for Proving Credentials
G Alpár, L Batina, R Verdult
Fast revocation of attribute-based credentials for both users and verifiers
W Lueks, G Alpár, JH Hoepman, P Vullers
Computers & Security 67, 308-323, 2017
Credential Design in Attribute-Based Identity Management
G Alpár, B Jacobs
Bridging distances in technology and regulation, 3rd TILTing Perspectives …, 2013
A secure channel for attribute-based credentials:[short paper]
G Alpár, JH Hoepman
Proceedings of the 2013 ACM workshop on Digital identity management, 13-18, 2013
New directions in IoT privacy using attribute-based authentication
G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, ...
Proceedings of the ACM International Conference on Computing Frontiers, 461-466, 2016
Designated attribute-based proofs for RFID applications
G Alpár, L Batina, W Lueks
International Workshop on Radio Frequency Identification: Security and …, 2012
The ABC of ABC-An Analysis of Attribute-Based Credentials in the Light of Data Protection, Privacy and Identity-∗
M Koning, P Korenhof, G Alpár
IRMA: practical, decentralized and privacy-friendly identity management using smartphones
G Alpár, F van den Broek, B Hampiholi, B Jacobs, W Lueks, S Ringers
10th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2017), 2017
Towards Practical Attribute-Based Signatures
B Hampiholi, G Alpár, F van den Broek, B Jacobs
Security, Privacy, and Applied Cryptography Engineering, 310-328, 2015
Attribute-based identity management:[bridging the cryptographic design of ABCs with the real world]
G Alpar
[Sl: sn], 2015
An Attack Against Fixed Value Discrete Logarithm Representations.
G Alpár, JH Hoepman, W Lueks
IACR Cryptology ePrint Archive 2013, 120, 2013
Mobile devices to the identity rescue
G Alpár, MH Everts
Privacy and Identity Management for Emerging Services and Technologies, 237-247, 2013
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals
G Alpár, JH Hoepman
IFIP Summer School 2011 -- Privacy and Identity Management for Life, 261--273, 2012
State machine inference of QUIC
A Rasool, G Alpár, J de Ruiter
arXiv preprint arXiv:1903.04384, 2019
Privacy-preserving webshopping with attributes
B Hampiholi, G Alpár
2017 IEEE Symposium on Privacy-Aware Computing (PAC), 25-36, 2017
Security analysis of DTLS 1.2 implementations
N van Drueten, J de Ruiter, G Alpár
Bachelor thesis, Radboud University, Nijmegen, The Netherlands, 2019
Tandem: Securing Keys by Using a Central Server While Preserving Privacy
W Lueks, B Hampiholi, G Alpár, C Troncoso
arXiv preprint arXiv:1809.03390, 2018
Designated Attribute Proofs with the Camenish-Lysyanskaya Signature
K Papagiannopoulos, G Alpár, W Lueks
WIC - Information and Communication Theory, 2013
The system can't perform the operation now. Try again later.
Articles 1–20