Greg Alpár
Greg Alpár
Assistant Professor (Open Universiteit Nederland), Researcher (Radboud University)
Verified email at - Homepage
Cited by
Cited by
The Identity Crisis-Security, Privacy and Usability Issues in Identity Management
G Alpár, JH Hoepman, J Siljee
Journal of Information System Security 9 (1), 23-53, 2013
Efficient selective disclosure on smart cards using idemix
P Vullers, G Alpár
IFIP Working Conference on Policies and Research in Identity Management, 53-67, 2013
Fast revocation of attribute-based credentials for both users and verifiers
W Lueks, G Alpár, JH Hoepman, P Vullers
Computers & Security 67, 308-323, 2017
Using NFC Phones for Proving Credentials
G Alpár, L Batina, R Verdult
Credential Design in Attribute-Based Identity Management
G Alpár, B Jacobs
Bridging distances in technology and regulation, 3rd TILTing Perspectives …, 2013
New directions in IoT privacy using attribute-based authentication
G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, ...
Proceedings of the ACM International Conference on Computing Frontiers, 461-466, 2016
A secure channel for attribute-based credentials:[short paper]
G Alpár, JH Hoepman
Proceedings of the 2013 ACM workshop on Digital identity management, 13-18, 2013
IRMA: practical, decentralized and privacy-friendly identity management using smartphones
G Alpár, F van den Broek, B Hampiholi, B Jacobs, W Lueks, S Ringers
HotPETs 2017, 2017
The ABC of ABC: An analysis of attribute-based credentials in the light of data protection, privacy and identity.
PEI Korenhof, M Koning, G Alpár, JH Hoepman
Internet, Law and Politics: A decade of transformations, 357-374, 2014
Designated attribute-based proofs for RFID applications
G Alpár, L Batina, W Lueks
International Workshop on Radio Frequency Identification: Security and …, 2012
Towards Practical Attribute-Based Signatures
B Hampiholi, G Alpár, F van den Broek, B Jacobs
Security, Privacy, and Applied Cryptography Engineering, 310-328, 2015
Attribute-based identity management:[bridging the cryptographic design of ABCs with the real world]
G Alpar
[Sl: sn], 2015
Privacy-preserving webshopping with attributes
B Hampiholi, G Alpár
2017 IEEE Symposium on Privacy-Aware Computing (PAC), 25-36, 2017
State machine inference of QUIC
A Rasool, G Alpár, J de Ruiter
arXiv preprint arXiv:1903.04384, 2019
An Attack Against Fixed Value Discrete Logarithm Representations.
G Alpár, JH Hoepman, W Lueks
IACR Cryptology ePrint Archive 2013, 120, 2013
Mobile devices to the identity rescue
G Alpár, MH Everts
Privacy and Identity Management for Emerging Services and Technologies, 237-247, 2013
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals
G Alpár, JH Hoepman
IFIP Summer School 2011 -- Privacy and Identity Management for Life, 261--273, 2012
Security analysis of DTLS 1.2 implementations
N van Drueten, J de Ruiter, G Alpár
Bachelor thesis, Radboud University, Nijmegen, The Netherlands, 2019
A bunch of broken schemes: A simple yet powerful linear approach to analyzing security of attribute-based encryption
M Venema, G Alpár
Cryptographers’ Track at the RSA Conference, 100-125, 2021
Tandem: Securing Keys by Using a Central Server While Preserving Privacy
W Lueks, B Hampiholi, G Alpár, C Troncoso
Proceedings on Privacy Enhancing Technologies 2020 (3), 327-355, 2020
The system can't perform the operation now. Try again later.
Articles 1–20