Fabian van den Broek
Fabian van den Broek
Post Doc Computer Science, Radboud University Nijmegen
Verified email at cs.ru.nl
TitleCited byYear
Defeating IMSI catchers
F Van Den Broek, R Verdult, J de Ruiter
Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications …, 2015
552015
Eavesdropping on GSM: state-of-affairs
F Broek
arXiv preprint arXiv:1101.0552, 2011
192011
A comparison of time-memory trade-off attacks on stream ciphers
F Van Den Broek, E Poll
International Conference on Cryptology in Africa, 406-423, 2013
162013
Security testing of GSM implementations
F Van Den Broek, B Hond, AC Torres
International Symposium on Engineering Secure Software and Systems, 179-195, 2014
132014
Catching and understanding gsm-signals
F Van Den Broek, B Jacobs, E Poll
Master's thesis, Radboud University Nijmegen, 2010
132010
Femtocell security in theory and practice
F Van Den Broek, RW Schreur
Nordic Conference on Secure IT Systems, 183-198, 2013
112013
Securely derived identity credentials on smart phones via self-enrolment
F van den Broek, B Hampiholi, B Jacobs
International Workshop on Security and Trust Management, 106-121, 2016
62016
Securing the information infrastructure for EV charging
F Van den Broek, E Poll, B Vieira
International Conference on Wireless and Satellite Systems, 61-74, 2015
62015
SIM toolkit in practice
S Gielen, F van den Broek
Bachelor Thesis, Radboud University in Nijmegen, The Netherlands, 2012
62012
Towards practical attribute-based signatures
B Hampiholi, G Alpár, F van den Broek, B Jacobs
International Conference on Security, Privacy, and Applied Cryptography …, 2015
42015
HTML5 Tracking Techniques in Practice
I Derksen, IE Poll, F van den Broek
32016
IRMA: practical, decentralized and privacy-friendly identity management using smartphones
G Alpár, F van den Broek, B Hampiholi, B Jacobs, W Lueks, S Ringers
HotPETs, 2017
22017
Fair Privacy: Improving Usability of the Android Permission System
M Derks, JH Hoepman, F van den Broek, V Moonsamy, K Jongenburger, ...
22015
Comparison of chain merge behaviour of TMTO methods
K Stoffelen, E Poll, F van den Broek, P Schwabe
BSc Ihesis, Radboud Univ., http://www. cs. ru. nl, 2013
22013
Protecting app secrets in Android
M Sonneveld, F van den Broek, S Ringers
2016
C-DAX Deliverable D2. 2
H Bontius, W Smith, M Hoefling, F Heimgaertner, M Menth, M Strobbe, ...
2015
An end-to-end security design for smart EV-charging for Enexis and ElaadNL
M van Eekelen, E Poll, E Hubbers, B Vieira, F van den Broek
2014
Digitale handtekeningen: nieuwe technologie & nieuwe wet-en regelgeving
F Broek, E Poll
2014
Smartphone-privacy
B Siebert, M van Eekelen, F van den Broek
2013
GSM SECURITY: FACT AND FICTION BruCON 2010
F van den Broek
Institute for Computing and Information Sciences (iCIS), 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–20