Sentinels projects


Secure Metering

Secure metering is about measuring and charging for the consumption of products. This could be electricity or gas but equally road pricing. The aim...


Mobile IDM

The main question within the MobileIDM project is: How can you use your mobile phone as a reliable personal assistant in the monitoring of your mob...


Recovable Privacy

The project Revocable privacy tries to strike a balance between security and privacy. The starting point is that a system is set up in such a way t...


CREST

Piracy – the unauthorised spread of copyrighted work – is a growing problem. Two options are available to counteract such spread: (i) c...


Kindred Spirits

Kindred Spirits focuses on improving privacy in online social networks of kindred spirits. Online social networks exist in a wide range of areas: f...


VISPER

In days gone by you could place a fence around your company’s site to protect your company information. Nowadays data are stored in the cloud...


SEDAN

Data on the Internet can be made secure by means of encryption. If you want to search in the data then you do not want to have to decode everything...


VRIEND

Companies often collaborate in networks in which information is stored locally as opposed to centrally. The various companies in the network often ...


S-Mobile

The project S-Mobile focuses on the security of mobile communication equipment. Examples are smartphones, PDAs, RFIDs et cetera. Such mobile commun...


PEARL

The PEARL project focused on developing practically usable services for the security of RFID systems and on designing a suitable validation method ...

 

JASON

The Jason project is aimed at developing a secure system architecture and the associated programming paradigm that can be used for ambient applicat...


PASC

With the Practical Approaches to Secure Computation (PASC) project researchers want to ensure that fundamental security tools from the researc...


PINPAS-JC

PINPAS-JC focuses on the security of JavaCard chip cards. A chip card is a physically protected mini-computer, usually embedded in a plastic card, ...


ProBite

Within ProBiTe researchers are working on the integration of biometric identification, such as fingerprint recognition and iris scans, in security ...


DeWorm

The Project DeWorm aims to develop an automatic response system that can detect zero-day worms on the Internet. The system must also be able to gen...


IPID

Integrated Policy-based Intrusion Detection (IPID) focus is to develop tools to detect invaders in computer networks based on the security policy o...