Please type your desired tags, e.g. geochronological methods, Painleve and Schlesinger equations, Continental Philosophy, Social Psychology, Psychometrics, Methods/Software Development, Critical Infrastructure, Digital Art, nonlinear analysis (equivariant degree), Short pulse fiber lasers, and etc.
Press the 'enter' key or type a comma (,) after each new tag.
M.S. - Electrical Engineering Kathlieke Universiteit Leuven - 1979
Research Areas
Current Research
Access Control
Anonymity and Internet Voting
Bridging theory and practice
Cryptanalysis, breaking and hacking of systems
Distributed and Network security (including:
Reliable and Perfectly Secure Message Transmission
Secret Sharing
Secure Multiparty Computation
Economic models for information security
Publications
S. Mahmood and Y. Desmedt. Usable Privacy by visual and interactive control of information flow. In Security Protocols (to appear in: Lecture Notes in Computer Science). Springer-Verlag, 2012. Cambridge, United Kingdom April 12-13, 2012. 2012 - Publication
S. Mahmood and Y. Desmedt. Your facebook deactivated friend or a cloaked spy. In 4th IEEE International Workshop on Security and Social Networking (SESOC) 2012. Accepted for publication. 2012 - Publication
Y. Lu and Y. Desmedt. Improved distinguishing attack on rabbit. In M. Burmester, G. Tsudik,
S. Magliveras, and I. Ilic, editors, Information Security Conference (ISC 2010), volume 6531 of Lecture
Notes in Computer Science, pp. 17{23. Springer, 2011. 2011 - Publication
Q. Yang and Y. Desmedt. Secure communication in multicast graphs. In S.H. Lee and X. Wang, editors, Asiacrypt 2011, volume 7073 of Lecture Notes in Computer Science, pp. 538-555. Springer, 2011. 2011 - Publication
Y. Wang and Y. Desmedt. Homogeneous faults, colored edge graphs, and cover free families. In S. Fehr,
editor, Information Theoretic Security, 5th International Conference, ICITS, volume 6673 of Lecture
Notes in Computer Science, pp. 58{72. Springer, May 2011. 2011 - Publication
Y. Desmedt. Secret sharing and reliable cloud computing. In Cryptography for Emerginng Technologies and Applications Workshop, National Institute of Standards and Technology (NIST), Gaitherburg, Maryland, Novemeber 708, 2011 2011 - Publication
Y. Desmedt and A. Miyaji. Redesigning group key exchange protocol based on bilinear pairing suitable
for various environments. In Inscrypt 2010, 2010. To appear in the proceedings, LNCS. 2010 - Publication
Y. Lu and Y. Desmedt. Bias analysis of a certain problem with applications to E0 and Shannon cipher.
In Information Security and Cryptology - ICISC 2010, December 2010. To appear in the proceedings,
LNCS. 2010 - Publication
Appointments
BT-Chair of Information Security University College London, U.K. [2004–2009]
Professor Florida State University [1999–2004]
Professor University of Wisconsin, Milwaukee [1995–1999]
Associate Professor University of Wisconsin [1991–1995]
Assistant Professor Universit de Montral, Canada [1987–2018]
Assistant Professor Universit de Montral, Canada [1987–1991]
Visiting Profesor Universit de Montral, Canada [1986–1987]
Visiting Assistant Professor University of New Mexico [1985–1985]