| Defeating IMSI catchers F Van Den Broek, R Verdult, J De Ruiter Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 127 | 2015 |
| IRMA: practical, decentralized and privacy-friendly identity management using smartphones G Alpár, F Van Den Broek, B Hampiholi, B Jacobs, W Lueks, S Ringers 10th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2017 …, 2017 | 39 | 2017 |
| Security testing of GSM implementations F Van Den Broek, B Hond, A Cedillo Torres International Symposium on Engineering Secure Software and Systems, 179-195, 2014 | 39 | 2014 |
| A comparison of time-memory trade-off attacks on stream ciphers F van den Broek, E Poll International Conference on Cryptology in Africa, 406-423, 2013 | 26 | 2013 |
| Securing the information infrastructure for EV charging F van den Broek, E Poll, B Vieira International Conference on Wireless and Satellite Systems, 61-74, 2015 | 24 | 2015 |
| Eavesdropping on GSM: state-of-affairs F Broek arXiv preprint arXiv:1101.0552, 2011 | 21 | 2011 |
| Towards practical attribute-based signatures B Hampiholi, G Alpár, F van den Broek, B Jacobs International Conference on Security, Privacy, and Applied Cryptography …, 2015 | 19 | 2015 |
| Catching and understanding gsm-signals F van den Broek, B Jacobs, E Poll Master's thesis, Radboud University Nijmegen, 2010 | 19 | 2010 |
| Securely derived identity credentials on smart phones via self-enrolment F van den Broek, B Hampiholi, B Jacobs International Workshop on Security and Trust Management, 106-121, 2016 | 11 | 2016 |
| An end-to-end security design for smart EV-charging for Enexis and ElaadNL M van Eekelen, E Poll, E Hubbers, B Vieira, F van den Broek ElaadNL: Arnhem, The Netherlands, 2014 | 10 | 2014 |
| Femtocell security in theory and practice F van den Broek, R Wichers Schreur Nordic Conference on Secure IT Systems, 183-198, 2013 | 9 | 2013 |
| SIM toolkit in practice S Gielen, E Poll Norwegian University of science and technology p, 15-16, 2012 | 7 | 2012 |
| HTML5 Tracking Techniques in Practice I Derksen, IE Poll, F van den Broek Radboud University, 2016 | 4 | 2016 |
| Cryptographic (in) security in android apps M Masoodi, V Moonsamy, F van den Broek | 2 | 2020 |
| Fair Privacy: Improving Usability of the Android Permission System M Derks, JH Hoepman, F van den Broek, V Moonsamy, K Jongenburger, ... Master thesis, 2015 | 2 | 2015 |
| Comparison of chain merge behaviour of TMTO methods K Stoffelen, E Poll, F van den Broek, P Schwabe BSc Ihesis, Radboud Univ., http://www. cs. ru. nl, 2013 | 2 | 2013 |
| Protecting app secrets in Android M Sonneveld, F van den Broek, S Ringers | 1 | 2016 |
| Security Requirements for Proctoring in Higher Education R Luijben, F van den Broek, G Alpár 2024 IEEE Global Engineering Education Conference (EDUCON), 1-5, 2024 | | 2024 |
| Nothing to see here! J Pinoy, F van den Broek, H Jonker | | 2021 |
| C-DAX Deliverable D2. 2 H Bontius, W Smith, M Hoefling, F Heimgaertner, M Menth, M Strobbe, ... | | 2015 |