Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pieter Verhaeghe is active.

Publication


Featured researches published by Pieter Verhaeghe.


Lecture Notes in Computer Science | 2008

A privacy-preserving ticketing system

Kristof Verslype; Bart De Decker; Vincent Naessens; Girma Enideg Nigusse; Jorn Lapon; Pieter Verhaeghe

Electronic identity (eID) cards are deployed in an increasing number of countries. These cards often provide digital authentication and digital signature capabilities, but have at the same time serious privacy shortcomings. We can expect that ordering and issuing tickets for events (e.g. soccer matches) will be increasingly done using eID cards, hence, severely threatening the user’s privacy. This paper proposes two alternative ticketing systems that are using the eID card in a bootstrap procedure, but still are providing a high degree of privacy to the user.


information security conference | 2009

Security and Privacy Improvements for the Belgian eID Technology

Pieter Verhaeghe; Jorn Lapon; Bart De Decker; Vincent Naessens; Kristof Verslype

The Belgian Electronic Identity Card enables Belgian citizens to prove their identity digitally and to sign electronic documents. At the end of 2009, every Belgian citizen older than 12 years will have such an eID card. In the future, usage of the eID card may be mandatory. However, irresponsible use of the card may cause harm to individuals.


IFIP PrimeLife International Summer School on Privacy and Identity Management for Life | 2010

A smart card based solution for user-centric identity management

Jan Vossaert; Pieter Verhaeghe; Bart De Decker; Vincent Naessens

This paper presents a prototype of a previously proposed user-centric identity management system using trusted modules. The trusted module, implemented using a smart card, can retrieve user attributes from identity providers and offer them to service providers, after authentication. This paper allows an evaluation of the practical feasibility of the identity management architecture and provides insight in several design decisions made during the prototype implementation. Also, the cryptographic protocols implemented in the prototype are discussed.


security and privacy in mobile information and communication systems | 2010

A Mobile and Reliable Anonymous ePoll Infrastructure

Pieter Verhaeghe; Kristof Verslype; Jorn Lapon; Vincent Naessens; Bart De Decker

This paper illustrates and scans the limits of the use of anonymous credentials (e.g. Idemix) on smart phones to preserve the user’s privacy. A prototypical application with strong privacy requirements, ePoll, will be presented in detail. To ease the implementation of such applications, a specialized identity management framework has been developed. A first prototype of the ePoll application was built for workstations. Later it was ported to a smart phone to evaluate the performance of anonymous credential protocols in this setting.


DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy | 2010

PriMan: a privacy-preserving identity framework

Kristof Verslype; Pieter Verhaeghe; Jorn Lapon; Vincent Naessens; Bart De Decker

PriMan is presented; privacy-preserving user-centric identity management middleware which defines and groups the required functionality. It offers the application developer a uniform technology-agnostic interface to use and combine different types of privacy enhancing technologies. Moreover, the PriMan framework defines all the components and their functionality required to raise the development of privacy enhanced client-server applications to a higher level.


Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security | 2008

A Privacy-Preserving Ticketing System

Kristof Verslype; Bart De Decker; Vincent Naessens; Girma Enideg Nigusse; Jorn Lapon; Pieter Verhaeghe

Electronic identity (eID) cards are deployed in an increasing number of countries. These cards often provide digital authentication and digital signature capabilities, but have at the same time serious privacy shortcomings. We can expect that ordering and issuing tickets for events (e.g. soccer matches) will be increasingly done using eID cards, hence, severely threatening the users privacy. This paper proposes two alternative ticketing systems that are using the eID card in a bootstrap procedure, but still are providing a high degree of privacy to the user.


security and privacy in mobile information and communication systems | 2009

Extending the Belgian eID Technology with Mobile Security Functionality

Jorn Lapon; Bram Verdegem; Pieter Verhaeghe; Vincent Naessens; Bart De Decker

The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a limited number of citizens really use the card in electronic applications. A major reason is the lack of killer functionality and killer applications.


InetSec 2009 | 2009

Privacy Policies, Tools and Mechanisms of the Future

Vincent Naessens; Mehmet Tahir Sandikkaya; Jorn Lapon; Kristof Verslype; Pieter Verhaeghe; Girma Enideg Nigusse; Bart De Decker

Although many believe that we have lost the battle for privacy, protection of what’s left of the user’s privacy is all the more important. Not only should a user be able to minimize the disclosure of her personal data, she should also have rights to decide what happens with her data once they have been disclosed. In order to minimize user interaction when deciding whether or not to reveal personal data, privacy policy languages were developed. However, these languages are inadequate and cannot properly deal with the complex interactions between users, service providers, third parties, identity providers and others. Also, tool support for composing and verifying these policies and mechanisms for enforcing them are lagging behind. This paper argues the need for better privacy policies and proposes some solutions. Throughout the paper, our statements are applied to three sample applications in three different domains: e-health, banking and social networks.


Security and Communication Networks | 2010

Building advanced applications with the Belgian eID

Jorn Lapon; Vincent Naessens; Bram Verdegem; Pieter Verhaeghe; Bart De Decker

The Belgian Electronic Identity Card (eID) was introduced in 2002. The card enables Belgian citizens to digitally prove their identity and to sign electronic documents. Today, only a limited number of citizens really use the card in electronic applications. An important reason is the lack of killer functionality and killer applications. This paper presents two reusable extensions to the Belgian eID technology that opens up new opportunities for application developers. First, a secure and ubiquitously accessible remote storage service is presented. Second, it is shown how the eID card can be used to issue new certificates. The feasibility and reusability of both extensions are validated through the development of several applications in different domains. Copyright


Archive | 2008

Security and privacy threats of the Belgian electronic identity card and middleware

Pieter Verhaeghe; Jorn Lapon; Vincent Naessens; Bart De Decker; Kristof Verslype; Girma Enideg Nigusse

Collaboration


Dive into the Pieter Verhaeghe's collaboration.

Top Co-Authors

Avatar

Bart De Decker

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Jorn Lapon

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Kristof Verslype

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Girma Enideg Nigusse

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Jan Vossaert

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge