Skip to main content
Go to the home page of the European Commission (opens in new window)
English en
CORDIS - EU research results
CORDIS

reLIable and sCalable tOols foR self-sovereIgn identity and data proteCtion framEwork

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

IEEE Access (opens in new window)

Author(s): Roberto Román; Rosario Arjona; Iluminada Baturone
Published in: Mathematics, 2025, ISSN 2169-3536
Publisher: MDPI
DOI: 10.3390/MATH13182914

Towards the integration of Privacy-Preserving technologies in future mobile networking (opens in new window)

Author(s): Vittorio Prodomo, Roberto González, Giancarlo Sperlì, Simon Pietro Romano
Published in: Computer Communications, Issue 250, 2026, ISSN 0140-3664
Publisher: Elsevier
DOI: 10.1016/J.COMCOM.2026.108445

Subliminal Channels in CRYSTALS-Kyber Key-Encapsulation Mechanism and Their Use in Quantum-Resistant TLS Protocols (opens in new window)

Author(s): Roberto Román, Rosario Arjona, Iluminada Baturone
Published in: IEEE Access, Issue 13, 2025, ISSN 2169-3536
Publisher: IEEE
DOI: 10.1109/ACCESS.2025.3590863

SCIPER: Secure Collaborative Inference via Privacy-Enhancing Regularization (opens in new window)

Author(s): Vittorio Prodomo; Roberto Gonzalez; Marco Gramaglia
Published in: IEEE Transactions on Privacy, 2024, ISSN 2836-208X
Publisher: IEEE
DOI: 10.1109/TP.2024.3513254

A quantum-safe authentication scheme for IoT devices using homomorphic encryption and weak physical unclonable functions with no helper data (opens in new window)

Author(s): Román, Roberto; ARJONA, ROSARIO; Baturone, Iluminada
Published in: Internet of Things, 2024, ISSN 2542-6605
Publisher: Elsevier
DOI: 10.1016/J.IOT.2024.101389

BISON: Blind Identification with Stateless scOped pseudoNyms (opens in new window)

Author(s): Jakob Heher; Stefan More; Lena Heimberger
Published in: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025
Publisher: ACM
DOI: 10.48550/ARXIV.2406.01518

Guardians of the Registry: Certificate Transparency for Relying Party Authorization in eIDAS 2 (opens in new window)

Author(s): Edona Fasllija, Stefan More
Published in: Lecture Notes in Computer Science, Availability, Reliability and Security, 2025
Publisher: Springer
DOI: 10.1007/978-3-032-00639-4_9

QoeSiGN: Towards Qualified Collaborative eSignatures (opens in new window)

Author(s): Karl W. Koch, Stephan Krenn, Alexandra Hofer
Published in: IFIP Advances in Information and Communication Technology
Publisher: arxiv
DOI: 10.48550/ARXIV.2512.13613

Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats (opens in new window)

Author(s): Dmytro Shvets, Edona Fasllija, Jakob Heher, Stefan More
Published in: IFIP Advances in Information and Communication Technology, ICT Systems Security and Privacy Protection, 2025
Publisher: Springer
DOI: 10.1007/978-3-031-92886-4_3

b4M: Holistic Benchmarking for MPC (opens in new window)

Author(s): Karl W. Koch, Christian Rechberger, Dragos Rotaru
Published in: Lecture Notes in Computer Science, Availability, Reliability and Security, 2025
Publisher: Springer
DOI: 10.1007/978-3-032-00642-4_12

SecFePAS: Secure Facial-Expression-Based Pain Assessment with Deep Learning at the Edge (opens in new window)

Author(s): Kanwal Batool, Saleem Anwar, Zoltán Ádám Mann
Published in: 2024 IEEE/ACM Symposium on Edge Computing (SEC), 2024
Publisher: IEEE
DOI: 10.1109/SEC62691.2024.00046

A Cloud-Based Multifactor Authentication Scheme Using Post-Quantum Cryptography and Trusted Execution Environments (opens in new window)

Author(s): Claudia Franco, Rosario Arjona, Iluminada Baturone
Published in: Lecture Notes in Computer Science, Availability, Reliability and Security, 2025
Publisher: Springer
DOI: 10.1007/978-3-032-00642-4_13

Lecture Notes in Computer Science (opens in new window)

Author(s): Claudia Franco, Carlos Lancha, Daniel Flores, Rosario Arjona, Iluminada Baturone
Published in: Lecture Notes in Computer Science, Availability, Reliability and Security, 2025, ISSN 0302-9743
Publisher: Springer
DOI: 10.1007/978-3-032-00639-4_6

Scalable, Standards-Driven Tools for Self-Sovereign Identity and Data Protection in Healthcare Clinical Decision Systems* (opens in new window)

Author(s): Emmanouil G. Spanakis, Antonio Kung, Amélie Gyrard, Diana Jimenez, Cécile Rabrait, Vangelis Sakkalis
Published in: 2025 IEEE International Conference on Imaging Systems and Techniques (IST), 2025
Publisher: IEEE
DOI: 10.1109/IST66504.2025.11268362

SwiftSNNI: Optimized Scheduling for Secure Neural Network Inference (SNNI) on Multi-Core Systems (opens in new window)

Author(s): Kanwal Batool, Saleem Anwar, Francesco Regazzoni, Andy Pimentel, Zoltán Ádám Mann
Published in: Proceedings of the 17th ACM/SPEC International Conference on Performance Engineering, 2026
Publisher: ACM
DOI: 10.1145/3777884.3797005

Multimodal IoT Device Authentication using Behavioral and Physical Unclonable Functions and Kyber Public Key Encryption (opens in new window)

Author(s): Roberto Román, Rosario Arjona, Iluminada Baturone
Published in: 2025 21st International Conference on Synthesis, Modeling, Analysis and Simulation Methods, and Applications to Circuits Design (SMACD), 2025
Publisher: IEEE
DOI: 10.1109/SMACD65553.2025.11092202

Don’t Stop Receiving: Ensuring Availability of Critical Services on Compromised Mobile Devices (opens in new window)

Author(s): Tom Van Eyck, Stefan More, Florian Draschbacher, Sam Michiels, Danny Hughes
Published in: 2025 23rd International Symposium on Network Computing and Applications (NCA), 2025
Publisher: IEEE
DOI: 10.1109/NCA67271.2025.00032

webSPDZ: Versatile MPC on the Web (opens in new window)

Author(s): Thomas Buchsteiner, Karl W. Koch, Dragos Rotaru, Christian Rechberger
Published in: Lecture Notes in Computer Science, Cryptology and Network Security, 2025
Publisher: Springer
DOI: 10.1007/978-981-95-4434-9_11

Genuine PDF Forgeries

Author(s): Jakob Heher, Emanuel Pichler, Stefan More
Published in: IFIP Advances in Information and Communication Technology, 2025
Publisher: Springer

Electromagnetic Side-Channel Attack on a SoC-FPGA Fingerprint Recognition System (opens in new window)

Author(s): Sergio Tejeda, Roberto Román, Rosario Arjona, Iluminada Baturone
Published in: 2025 40th Conference on Design of Circuits and Integrated Systems (DCIS), 2025
Publisher: IEEE
DOI: 10.1109/DCIS67520.2025.11281924

Foundations of Dynamic Group Signatures: The Case of Malicious Openers and Issuers

Author(s): Stephan Krenn, Kai Samelin, Daniel Slamanig
Published in: Cryptology ePrint, Issue 1752
Publisher: Cryptology ePrint

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0