Computer security, Encryption, Computer network, Wireless sensor network and Programming language are his primary areas of study. His Computer security research is multidisciplinary, relying on both Industrial control system and Protocol. His work on Link layer, Block cipher and Advanced Encryption Standard as part of general Computer network study is frequently linked to Radio jamming and Jamming, therefore connecting diverse disciplines of science.
His Wireless sensor network study incorporates themes from Efficient energy use and Cryptography. His research combines Benchmark and Programming language. The concepts of his Probabilistic encryption study are interwoven with issues in Theoretical computer science and Client-side encryption.
His scientific interests lie mostly in Computer security, Programming language, Computer network, Encryption and Theoretical computer science. As part of his studies on Computer security, Pieter H. Hartel often connects relevant areas like Internet privacy. The various areas that Pieter H. Hartel examines in his Computer network study include Key and Distributed computing.
His research is interdisciplinary, bridging the disciplines of Scheme and Encryption. His On-the-fly encryption course of study focuses on Probabilistic encryption and Filesystem-level encryption. His Wireless sensor network study integrates concerns from other disciplines, such as Efficient energy use, Block cipher and Cluster analysis.
His primary scientific interests are in Computer security, Smart contract, Internet privacy, Risk analysis and Social engineering. His Industrial control system research extends to Computer security, which is thematically connected. Pieter H. Hartel has researched Internet privacy in several fields, including Mobile phone, Finance, Personally identifiable information and Upload.
His Risk analysis research includes elements of Risk management, Order, Is security, Audit and Software engineering. His Social engineering study combines topics in areas such as Persuasion and Applied psychology. His research in Cryptography intersects with topics in SCADA and Data mining.
The scientist’s investigation covers issues in Computer security, Homomorphic encryption, Industrial control system, Recommender system and Scheme. His work deals with themes such as SCADA and Phishing, which intersect with Computer security. His Recommender system research focuses on subjects like Social network, which are linked to Information retrieval, Similarity and Differential privacy.
His work carried out in the field of Scheme brings together such families of science as Database, Computer network, Encryption, Computer security model and Search algorithm. His research in Computer network tackles topics such as Private information retrieval which are related to areas like Symmetric-key algorithm. His Encryption research is multidisciplinary, incorporating elements of Document retrieval and Keyword search.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Survey and benchmark of block ciphers for wireless sensor networks
Yee Wei Law;Jeroen Doumen;Pieter Hartel.
ACM Transactions on Sensor Networks (2006)
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Yee Wei Law;Marimuthu Palaniswami;Lodewijk Van Hoesel;Jeroen Doumen.
ACM Transactions on Sensor Networks (2009)
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
Luan Ibraimi;Milan Petkovic;Svetla Nikova;Pieter Hartel.
workshop on information security applications (2009)
A Survey of Provably Secure Searchable Encryption
Christoph Bösch;Pieter Hartel;Willem Jonker;Andreas Peter.
ACM Computing Surveys (2014)
Computationally efficient searchable symmetric encryption
Peter Van Liesdonk;Saeed Sedghi;Jeroen Doumen;Pieter Hartel.
very large data bases (2010)
Programming Languages: Implementations, Logics, and Programs
Hugh Glaser;Pieter Hartel;Herbert Kuchen.
(1995)
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Yee Wei Law;Lodewijk van Hoesel;Jeroen Doumen;Pieter Hartel.
security of ad hoc and sensor networks (2005)
Through the eye of the PLC: semantic security monitoring for industrial processes
Dina Hadžiosmanović;Robin Sommer;Emmanuele Zambon;Pieter H. Hartel.
annual computer security applications conference (2014)
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
Luan Ibraimi;Qiang Tang;Pieter Hartel;Willem Jonker.
information security practice and experience (2009)
POSEIDON: a 2-tier anomaly-based network intrusion detection system
D. Bolzoni;S. Etalle;P. Hartel.
Fourth IEEE International Workshop on Information Assurance (IWIA'06) (2006)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
University of Twente
University of Twente
University of Southampton
Delft University of Technology
University of Southampton
University of Twente
Delft University of Technology
Heinrich Heine University Düsseldorf
University of Twente
Université Catholique de Louvain
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: