default search action
Maarten H. Everts
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i4]Federico Mazzone, Ahmad Al Badawi, Yuriy Polyakov, Maarten H. Everts, Florian Hahn, Andreas Peter:
Investigating Privacy Attacks in the Gray-Box Setting to Enhance Collaborative Learning Schemes. CoRR abs/2409.17283 (2024) - 2022
- [c20]Thomas Attema, Vincent Dunning, Maarten H. Everts, Peter Langenkamp:
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC. ACNS 2022: 663-683 - [c19]Federico Mazzone, Leander van den Heuvel, Maximilian Huber, Cristian Verdecchia, Maarten H. Everts, Florian Hahn, Andreas Peter:
Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks. AISec@CCS 2022: 13-24 - [c18]Tariq Bontekoe, Maarten H. Everts, Andreas Peter:
Balancing privacy and accountability in digital payment methods using zk-SNARKs. PST 2022: 1-10 - [i3]Thomas Attema, Vincent Dunning, Maarten H. Everts, Peter Langenkamp:
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC. IACR Cryptol. ePrint Arch. 2022: 454 (2022) - 2020
- [c17]Sophie Lathouwers, Maarten H. Everts, Marieke Huisman:
Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer Approach. ICISSP 2020: 784-795 - [c16]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Thomas Hupperich, Maarten H. Everts, Reza Rafati, Willem Jonker, Pieter H. Hartel, Andreas Peter:
HeadPrint: detecting anomalous communications through header-based application fingerprinting. SAC 2020: 1696-1705
2010 – 2019
- 2019
- [c15]Joran J. Honig, Maarten H. Everts, Marieke Huisman:
Practical Mutation Testing for Smart Contracts. DPM/CBT@ESORICS 2019: 289-303 - [c14]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Maarten H. Everts, Willem Jonker, Pieter H. Hartel, Andreas Peter:
Victim-Aware Adaptive Covert Channels. SecureComm (1) 2019: 450-471 - 2018
- [i2]Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker:
Multi-client Predicate-only Encryption for Conjunctive Equality Tests. IACR Cryptol. ePrint Arch. 2018: 563 (2018) - 2017
- [c13]Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter:
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. ACSAC 2017: 373-386 - [c12]Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker:
Multi-client Predicate-Only Encryption for Conjunctive Equality Tests. CANS 2017: 135-157 - 2016
- [c11]Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel:
Reliably determining data leakage in the presence of strong attackers. ACSAC 2016: 484-495 - [c10]Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker:
Private Sharing of IOCs and Sightings. WISCS@CCS 2016: 35-38 - [c9]Wouter Lueks, Maarten H. Everts, Jaap-Henk Hoepman:
Vote to Link: Recovering from Misbehaving Anonymous Users. WPES@CCS 2016: 111-122 - 2015
- [j5]Maarten H. Everts, Eric Begue, Henk Bekker, Jos B. T. M. Roerdink, Tobias Isenberg:
Exploration of the Brain's White Matter Structure through Visual Abstraction and Multi-Scale Local Fiber Tract Contraction. IEEE Trans. Vis. Comput. Graph. 21(7): 808-821 (2015) - [c8]Bence Gabor Bakondi, Andreas Peter, Maarten H. Everts, Pieter H. Hartel, Willem Jonker:
Publicly Verifiable Private Aggregation of Time-Series Data. ARES 2015: 50-59 - [c7]Wouter Lueks, Maarten H. Everts, Jaap-Henk Hoepman:
Revocable Privacy: Principles, Use Cases, and Technologies. APF 2015: 124-143 - [c6]Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Damiano Bolzoni:
Indicators of Malicious SSL Connections. NSS 2015: 162-175 - [i1]Maarten H. Everts, Henk Bekker, Jos B. T. M. Roerdink, Tobias Isenberg:
Interactive Illustrative Line Styles and Line Style Transfer Functions for Flow Visualization. CoRR abs/1503.05787 (2015) - 2013
- [c5]Maarten H. Everts, Jaap-Henk Hoepman, Johanneke Siljee:
UbiKiMa: ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography. Digital Identity Management 2013: 19-24 - [c4]Gergely Alpár, Maarten H. Everts:
Mobile Devices to the Identity Rescue. Privacy and Identity Management 2013: 237-247 - [c3]Eleftheria Makri, Maarten H. Everts, Sebastiaan de Hoogh, Andreas Peter, Harm op den Akker, Pieter H. Hartel, Willem Jonker:
Privacy-Preserving Verification of Clinical Research. Sicherheit 2013: 481-500 - 2012
- [c2]Jeroen van Rest, Daniel Boonstra, Maarten H. Everts, Martin van Rijn, Ron van Paassen:
Designing Privacy-by-Design. APF 2012: 55-72 - 2011
- [c1]Maarten H. Everts, Henk Bekker, Jos B. T. M. Roerdink, Tobias Isenberg:
Illustrative Line Styles for Flow Visualization. PG (Short Papers) 2011 - 2010
- [j4]Pjotr Svetachov, Maarten H. Everts, Tobias Isenberg:
DTI in Context: Illustrating Brain Fiber Tracts In Situ. Comput. Graph. Forum 29(3): 1023-1032 (2010) - [j3]Lingyun Yu, Pjotr Svetachov, Petra Isenberg, Maarten H. Everts, Tobias Isenberg:
FI3D: Direct-Touch Interaction for the Exploration of 3D Scientific Visualization Spaces. IEEE Trans. Vis. Comput. Graph. 16(6): 1613-1622 (2010)
2000 – 2009
- 2009
- [j2]Maarten H. Everts, Henk Bekker, Jos B. T. M. Roerdink, Tobias Isenberg:
Depth-Dependent Halos: Illustrative Rendering of Dense Line Data. IEEE Trans. Vis. Comput. Graph. 15(6): 1299-1306 (2009) - 2008
- [j1]Tobias Isenberg, Maarten H. Everts, Jens Grubert, Sheelagh Carpendale:
Interactive Exploratory Visualization of 2D Vector Fields. Comput. Graph. Forum 27(3): 983-990 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint