Javascript must be enabled to use this form.

UTDallas Research Explorer
 View Profile
    Faculty Profile — Is this you? Login to edit.Last Modified Time: 04:00:18 PM Tue, 11 Mar 2014 

This site is going away soon - please visit the new URL for this page.

You will be automatically redirected in 10 seconds.

Image of  Yvo  Desmedt
 Contact InformationHelpHelp  
Yvo Desmedt
Professor-Computer Science
Office MailstopRoom No.: ECS4411 
Email Address    Primary Phone Number 972-883-4536    Media Contact
 Professional Preparation
 Ph.D.Applied ScienceKathlieke Universiteit Leuven1984
 M.S.Electrical EngineeringKathlieke Universiteit Leuven1979
Collapse Section Expand Section Research and Expertise
Current Research
  • Access Control
  • Anonymity and Internet Voting
  • Bridging theory and practice
  • Cryptanalysis, breaking and hacking of systems
  • Distributed and Network security (including:
    • Reliable and Perfectly Secure Message Transmission
    • Secret Sharing
    • Secure Multiparty Computation
  • Economic models for information security
Collapse Section Expand Section Publications
 2 3 4 Next>> 7>>  
  YearPublication  Type
S. Mahmood and Y. Desmedt. Usable Privacy by visual and interactive control of information flow. In Security Protocols (to appear in: Lecture Notes in Computer Science). Springer-Verlag, 2012. Cambridge, United Kingdom April 12-13, 2012.
S. Mahmood and Y. Desmedt. Your facebook deactivated friend or a cloaked spy. In 4th IEEE International Workshop on Security and Social Networking (SESOC) 2012. Accepted for publication.
Q. Yang and Y. Desmedt. Secure communication in multicast graphs. In S.H. Lee and X. Wang, editors, Asiacrypt 2011, volume 7073 of Lecture Notes in Computer Science, pp. 538-555. Springer, 2011.
Y. Desmedt. Secret sharing and reliable cloud computing. In Cryptography for Emerginng Technologies and Applications Workshop, National Institute of Standards and Technology (NIST), Gaitherburg, Maryland, Novemeber 708, 2011
Y. Wang and Y. Desmedt. Homogeneous faults, colored edge graphs, and cover free families. In S. Fehr, editor, Information Theoretic Security, 5th International Conference, ICITS, volume 6673 of Lecture Notes in Computer Science, pp. 58{72. Springer, May 2011.
Collapse Section Expand Section Appointments
DurationRankDepartment / SchoolCollege / OfficeUniversity / Company
2004-2009BT-Chair of Information Security  University College London, U.K.
1999-2004ProfessorComputer Science Florida State University
1995-1999ProfessorElectrical Engineering and Computer Science University of Wisconsin, Milwaukee
1991-1995Associate ProfessorElectrical Engineering and Computer Science University of Wisconsin
1987Assistant Professor  Université de Montréal, Canada
1987-1991Assistant Professor  Université de Montréal, Canada
1986-1987Visiting Profesor  Université de Montréal, Canada
1985-1985Visiting Assistant ProfessorComputer Science University of New Mexico
1985-1986Post-doctoral NFWO (National Science Foundation Belgium) researcher  Katholieke Universiteit Leuven
1983-1984Research AssistantElectrical Engineering Katholieke Universiteit Leuven
1979-1980Research AssistantElectrical Engineering Katholieke Universiteit Leuven
       Teaching HelpHelp  
 Additional Information
Prizes Awards, and other Honors
  • 1983 100 Year Bell Telephone Belgium Prize
  • 1985 IBM Belgium Prize for best PhD in Computer Science NFWO, Belgium
  • 1985 S.W.I.F.T. (Society for Worldwide Interbank Financial Telecommunication) Prize
  • 1992 Graduate School/University of Wisconsin | Milwaukee Foundation Research Award Graduate School
  • 2000 Center of Excellence in Information Security Education at Florida State University NSA
  • 2010 International Association of Cryptologic Research Fellow IACR Fellows
  • Committee

Current Professional Activities
  • editor in Chief IET Information Security Journal
  • editor of:
    • the Journal of Computer Security,
    • Information Processing Letters,
    • Advances in Mathematics of Communications
  • Chair of the Steering Committee of:
    • International Conference on Cryptology and Network Security
    • International Conference on Information Theoretic Security
  • Member of the Steering Committee of the International Workshop on Practice and Theory in Public Key Cryptography (PKC)

Please verify the information in this request and mention any changes or suggestions in the comments section. Email notifications and confirmations regarding this will be sent to you at fromEmail and the profile owner. If you would like to receive it at a different email address, please change the email address listed on your profile.
© 2018-2019 The University of Texas at Dallas About Explorer | Accessibility | Contact Explorer Team