Author Publications

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Number of items: 297.

Article

Alberda, Marjan I. and Hartel, Pieter H. and Jong, Eduard K. de (1997) Using formal methods to cultivate trust in smart card operating systems. Future Generation Computer Systems, 13 (1). pp. 39-54. ISSN 0167-739X

Barendregt, H.P. and Eekelen, M.C.J.D. and Hartel, P.H. and Hertzberger, L.O. and Plasmeijer, M.J. and Vree, W.G. (1987) The Dutch parallel reduction machine project. Future Generation Computer Systems, 3 (4). pp. 261-270. ISSN 0167-739X

Beemster, M. and Hartel, P.H. and Hertzberger, L.O. and Hofman, R.F.H. and Langendoen, K.G. and Li, L.L. and Milikowski, R. and Vree, W.G. and Barendregt, H.P. and Mulder, J.C. (1993) Experience with a clustered parallel reduction machine. Future Generation Computer Systems, 9 (3). pp. 175-200. ISSN 0167-739X

Bos, Jan van den and Plasmeijer, Marinus J. and Hartel, Pieter H. (1983) Input-output tools: a language facility for interactive and real-time systems. IEEE Transactions on Software Engineering, 9 (3). pp. 247-259. ISSN 0098-5589

Brinkman, R. and Feng, L. and Doumen, J. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Information systems security, 13 (3). pp. 14-21. ISSN 1065-898X

Buhan, I.R. and Boom, B.J. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2009) Secure pairing with biometrics. International Journal of Security and Networks, 4 (1/2). pp. 27-42. ISSN 1747-8405

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2010) Embedding renewable cryptographic keys into noisy data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262

Butler, M.J. and Hartel, P.H. (1999) Reasoning about Grover's quantum search algorithm using probabilistic wp. ACM Transactions on Programming Languages and Systems (TOPLAS), 21 (3). pp. 417-429. ISSN 0164-0925

Bösch, Christoph and Hartel, Pieter and Jonker, Willem and Peter, Andreas (2014) A survey of provably secure searchable encryption. ACM Computing Surveys, 47 (2). p. 18. ISSN 0360-0300

Chong, C.N. and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Y.W. and Tokmakoff, A. (2006) LicenseScript: A Logical Language for Digital Rights Management. Annals of telecommunications special issue on Network and Information systems security, 61 (3-4). pp. 284-331. ISSN 0003-4347

Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2007) Timed Analysis of Security Protocols. Journal of Computer Security, 15 (6). pp. 619-645. ISSN 0926-227X

Czenko, Marcin and Tran, Ha and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Hartog, Jerry den (2006) Nonmonotonic Trust Management for P2P Applications. Electronic Notes in Theoretical Computer Science (ENTCS), 157 (3). pp. 113-130. ISSN 1571-0661

Diehl, Stephan and Hartel, Pieter and Sestoft, Peter (2000) Abstract machines for programming language implementation. Future Generation Computer Systems, 16 (7). pp. 739-751. ISSN 0167-739X

Diehl, Stephan and Hartel, Pieter and Sestoft, Peter (2000) Principles of abstract machines : guest editorial. Future generation computer systems, 16 (7). V-VI. ISSN 0167-739X

Domingo-Ferrer, Josep and Hartel, Pieter (2001) Current directions in smart cards. Computer Networks, 36 (4). pp. 377-379. ISSN 1389-1286

Etalle, Sandro and Hartel, Pieter H. and Vree, Willem G. (1999) Declarative solutions to partitioned-grid problems. Software: Practice and Experience, 29 (13). pp. 1173-1200. ISSN 0038-0644

Glaser, Hugh and Hartel, Pieter H. (2000) Programming by numbers - a programming method for complete novices. The Computer Journal, 2000 (43). pp. 252-265. ISSN 0010-4620

Gong, Zheng and Hartel, Pieter and Nikova, Svetla and Tang, Shao-Hua and Zhu, Bo (2014) TuLP:A family of lightweight message authentication codes for body sensor networks. Journal of computer science and technology, 29 (1). pp. 53-68. ISSN 1000-9000

Hadžiosmanović, Dina and Bolzoni, Damiano and Hartel, Pieter (2012) A Log Mining Approach for Process Monitoring in SCADA. International Journal of Information Security, 11 . ISSN 1615-5262

Hartel, P.H. and Feeley, M. and Alt, M. and Augustsson, L. (1996) Benchmarking Implementations of Functional Languages with ``Pseudoknot'', a Float-Intensive Benchmark. Journal of functional programming, 6 (4). pp. 621-655. ISSN 0956-7968

Hartel, P.H. and Hertzberger, L.O. (1995) Paradigms and laboratories in the core computer science curriculum: An overview. ACM SIGCSE bulletin, 27 (4). pp. 13-20. ISSN 0097-8418

Hartel, P.H. and Vree, W.G. (1994) Experiments with destructive updates in a lazy functional language. Computer languages, 20 (3). pp. 177-192. ISSN 0096-0551

Hartel, P.H. and Berg, J. van den and Junger, M. (2013) Wat gaan we doen tegen de cyberaanvallen? Informatiebeveiliging, 4 (4). pp. 10-11. ISSN 1569-1063

Hartel, Pieter (1999) Review of Cousineau G. and Mauny, M. The Functional Approach to Programming. Journal of Functional Programming, 9 (4). pp. 479-481. ISSN 0956-7968

Hartel, Pieter (2012) Book review: The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / by P. Engebretson. - Waltham, MA : Syngress Publishing, 2011. - ISBN 978-1-597496-55-1. Computing Reviews (CR140206). ISSN 1530-6585

Hartel, Pieter and Jacobs, Bart (2001) De Smartcard van 2010. (Smart)Cards in Business, 6 (7). pp. 14-16. ISSN 1569-1179

Hartel, Pieter and Muller, Henk and Glaser, Hugh (2004) The Functional "C" experience. Journal of Functional Programming, 14 (2). pp. 129-135. ISSN 0956-7968

Hartel, Pieter H. (1999) LETOS - a lightweight execution tool for operational semantics. Software: Practice and Experience, 29 (15). pp. 1379-1416. ISSN 0038-0644

Hartel, Pieter H. and Glaser, Hugh (1993) The Resource constrained shortest path problem implemented in a lazy functional language. Journal of Functional Programming, 1 (1). pp. 1-17. ISSN 0956-7968

Hartel, Pieter H. and Glaser, Hugh and Wild, John M. (1994) Compilation of functional languages using flow graph analysis. Software: Practice and Experience, 24 (2). pp. 127-173. ISSN 0038-0644

Hartel, Pieter H. and Harmelen, Frank A. van (1984) The analysis of modular structures with respect to their interconnect topology. Interfaces in Computing, 2 (1). pp. 81-91. ISSN 0252-7308

Hartel, Pieter H. and Hofman, Rutger F.H. and Langendoen, Koen G. and Muller, Henk L. and Vree, Willem G. and Hertzberger, L.O. (1995) A toolkit for parallel functional programming. Concurrency: Practice and experience, 7 (8). pp. 765-793. ISSN 1040-3108

Hartel, Pieter H. and Moreau, Luc (2001) Formalizing the Safety of Java, the Java Virtual Machine and Java Card. ACM computing surveys, 33 (4). pp. 517-558. ISSN 03600300

Hartel, Pieter H. and Muller, Henk L. (2011) Simple algebraic data types for C. Software: Practice and Experience . ISSN 0038-0644

Hartel, Pieter H. and Veen, Arthur H. (1988) Statistics on graph reduction of SASL programs. Software: Practice and Experience, 18 (3). pp. 239-253. ISSN 0038-0644

Hartel, Pieter H. (1990) A comparison of three garbage collection algorithms. Structured programming, 11 (117). ISSN 09351183

Hartel, Pieter H. and Starreveld, Dolf (1985) Modula-2 implementation overview. Journal of Pascal, Ada & Modula-2, 4 . pp. 9-23. ISSN 07471351

Haverkort, Boudewijn and Remke, Anne and Hartel, Pieter (2009) Betere beveiliging Scada-systemen vitaal voor Nederlandse infrastructuren. Bits & chips : tweewekelijks nieuwsmagazine voor de hightechindustrie, 11 (16). p. 23. ISSN 1879-6443

Haydarlou, A.R. and Hartel, P.H. (1995) Thunk-lifting: Reducing heap usage in an implementation of a lazy functional language. Journal of functional programming, 1 (1). ISSN 0956-7968

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2010) Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. International Journal of Computational Models and Algorithms in Medicine, 1 (2). pp. 1-21. ISSN 1947-3133

Kalker, T. and Epema, D.H.J. and Hartel, P.H. and Lagendijk, R.L. and Steen, M. van (2004) Music2Share - Copyright-Compliant Music Sharing in P2P Systems (Invited paper). Proceedings of the IEEE Special Issue on Digital Rights Management, 92 (6). pp. 961-970. ISSN 0018-9219

Kalker, Ton and Epema, Dick H.J. and Hartel, Pieter H. and Lagendijk, R. (Inald) L. and Steen, Maarten van (2004) Music2Share-Copyright-Compliant Music Sharing in P2P Systems. Proceedings of the IEEE, 92 (6). pp. 961-970. ISSN 0018-9219

Khatib, Mohammed G. and Hartel, Pieter H. (2010) Optimizing MEMS-Based Storage Devices for Mobile Battery-Powered Systems. ACM Transactions on Storage, 6 (1). pp. 1-37. ISSN 1553-3077

Khatib, Mohammed G. and Hartel, Pieter H. and Dijk, Hylke W. van (2008) Energy-Efficient Streaming Using Non-volatile Memory. Journal of Signal Processing Systems . ISSN 1939-8018

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2006) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks, 2 (1). pp. 65-93. ISSN 1550-4859

Law, Y.W. and Palaniswami, M. and Hoesel, L.F.W. van and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2009) Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks, 5 (1). p. 6. ISSN 1550-4859

Law, Yee Wei and Moniava, Giorgi and Gong, Zheng and Hartel, Pieter and Palaniswami, Marimuthu (2010) KALwEN: a new practical and interoperable key management scheme for body sensor networks. Security and communication networks, 4 (11). pp. 1309-1329. ISSN 1939-0122

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2008) Cluster-based service discovery for heterogeneous wireless sensor networks. International Journal of Parallel, Emergent and Distributed Systems, 23 (4). pp. 325-346. ISSN 1744-5760

Vree, W.G. and Hartel, P.H. (1995) Communication lifting: fixed point computation for parallelism. Journal of functional programming, 5 (4). pp. 549-581. ISSN 0956-7968

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. and Hartel, Pieter (2010) Model-based Qualitative Risk Assessment for Availability of IT Infrastructures. Software and systems modeling, 10 (4). pp. 553-580. ISSN 1619-1366

Article News

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2005) Timed Analysis of Security Protocols (version 2, oct. 2005).

Book

Glaser, H. and Hartel, P.H. and Kuchen, H. , eds. (1997) 9th Programming Languages: Implementations, Logics and Programs (PLILP). Springer-Verlag, Berlin. ISBN 9783540633983

Hartel, P.H. and Paradinas, P. and Quisquater, J.-J. , eds. (1996) 2nd Smart Card Research and Advanced Application (CARDIS). CWI, Amsterdam. ISBN 9789061964650

Hartel, P.H. and Plasmeijer, M.J. , eds. (1995) 1st Functional Programming languages in Education (FPLE). Springer-Verlag, Berlin. ISBN 9783540606758

Hartel, Pieter and Muller, Henk (1997) Functional C. Addison Wesley Longman, Harlow, UK. ISBN 9780201419504

Book Review

Hartel, P.H. (1999) Review of Okasaki, C. Purely Functional Data Structures. [Review of the book ] , pp. 75-77. ISSN 0167-6423

Hartel, Pieter (2012) Review of: Smartening the crowds: computational techniques for improving human verification to fight phishing scams / by G. Liu, G. Xiang, B. Pendleton, J. Hong, W. Liu. [Review of the book ] Computing reviews , ACM, New York, NY, USA, CR139837. ISSN 0010-4884

Book Section

Beye, Michael and Jeckmans, Arjan J.P. and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2012) Privacy in Online Social Networks. In: Computational Social Networks: Security and Privacy. Springer Verlag, London, pp. 87-113. ISBN 9781447140504

Corin, Ricardo and Durante, Antonio and Etalle, Sandro and Hartel, Pieter (2005) A Trace Logic for Local Security Properties. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003). Electronic Notes in Theoretical Computer Science, 118 (1). Elsevier, pp. 129-143.

Glaser, Hugh and Hartel, Pieter and Wild, John (1991) A pragmatic approach to the analysis and compilation of lazy functional languages. In: Second Workshop on Parallel and Distributed Processing, WP&DP, Sofia, Bulgaria, 1990. North-Holland, Amsterdam, pp. 169-184. ISBN 9780444888686

Hartel, P.H. and Butler, M.J. and Levy, M. (1999) The Operational Semantics of a Java Secure Processor. In: Formal Syntax and Semantics of Java. Springer-Verlag, pp. 313-352. ISBN 9783540661580

Hartel, P.H. and Hertzberger, L.O. and Mooij, W.G.P. and Tuynman, F. (1985) Een multiprocessor testbed systeem. In: Uitnodiging aan de informatica. Nederlands Genootschap voor Informatica, Amsterdam, pp. 222-230. ISBN 9789070621179

Hartel, P.H. and Vree, W.G. (2007) Lambda Calculus for Engineers. In: Reflections on Type Theory, Lambda Calculus, and the Mind: Essays Dedicated to Henk Barendregt on the Occasion of his 60th Birthday. Radboud University, Nijmegen, pp. 125-138. ISBN 9789090224466

Hartel, Pieter and Suryana Herman, Nanna (2012) Information Security. In: Cyber Safety: An Introduction. Eleven International Publishers, The Hague, the Netherlands, pp. 281-291. ISBN 9789490947750

Hartel, Pieter H. (1983) Comparing Pascal and Modula-2 as systems programming languages. In: Programming languages and system design: proceedings of the IFIP TC 2 Working conference on programming languages and system design, Dresden, GDR, 7-10 March, 1983. North-Holland, Amsterdam, pp. 187-198. ISBN 9780444867940

Hartel, Pieter H. and Glaser, Hugh and Leuschel, Michael and Martin, Andrew (2001) Declarative Languages in Education. In: Encyclopaedia of Microcomputers. Marcel Dekker Inc., New York, pp. 97-102. ISBN 9780824727260

Hartel, Pieter H. and Jong, Eduard de (2000) A programming and a modelling perspective on the evaluation of Java card implementations. In: Java on Smart Cards:Programming and Security. Springer-Verlag, Berlin, Germany, pp. 52-72. ISBN 9783540421672

Jansen, Jurjen and Junger, Marianne and Montoya, Lorena and Hartel, Peter (2013) Offenders in a digitized society. In: Cybercrime and the police. Safety & security studies . Eleven International Publishing, The Hague, The Netherlands, pp. 45-59. ISBN 9789462360693

Jeckmans, Arjan and Beye, Michael and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2013) Privacy in recommender systems. In: Social media retrieval. Computer Communications and Networks . Springer Verlag, London, pp. 263-281. ISBN 9781447145547

Junger, M. and Ottenhof, R.H.J. and Hartel, P.H. (2012) New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students. In: KLM Van Dijk : Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Wolf Legal Publishers, Nijmegen, pp. 191-206. ISBN 9789058509321

Muller, H.L. and Hartel, P.H. and Hertzberger, L.O. (1995) Using a functional notation to specify abstract simulation models. In: Abstract machine models for highly parallel computers. Oxford University Press, Oxford, pp. 243-258. ISBN 9780198537960

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2009) A Taxonomy of Service Discovery Systems. In: Context-Aware Computing and Self-Managing Systems. CRC Studies in Informatics . Chapman and Hall, Boca Raton, pp. 43-77. ISBN 9781420077711

Conference or Workshop Item

Bolks, Mathieu and Hanssen, Ferdy and Abelmann, Leon and Havinga, Paul and Hartel, Pieter and Jansen, Pierre and Lodder, Cock and Smit, Gerard (2001) Micro Scanning Probe Array memory (µSPAM). In: PROGRESS 2001 2nd Workshop on Embedded Systems, October 18, 2001, Veldhoven, the Netherlands (pp. pp. 17-26).

Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. In: Recent Advances in Intrusion Detection (pp. pp. 1-20).

Bolzoni, Damiano and Zambon, Emmanuele and Etalle, Sandro and Hartel, Pieter (2006) Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System. In: Fourth IEEE International Workshop on Information Assurance, IWIA 2006, 13-14 Apr 2006, London, UK (pp. pp. 144-156).

Brinkman, R. and Feng, L. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. In: Proceedings of the 2nd International Workshop on Security In Information Systems (WOSIS), 13-14 Apr 2004, Porto, Portugal (pp. pp. 126-135).

Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. In: First International Workshop on Security for Spontaneous Interaction, 16. September 2007, Innsbruck, Austria (pp. pp. 450-456).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, ICICS, October 20-22, 2008, Birmingham, UK (pp. pp. 294-310).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Feeling Is Believing: A Secure Template Exchange Protocol. In: International Conference on Biometrics, ICB 2007, August 27-29, 2007, Seoul, Korea (pp. pp. 897-906).

Buhan, Ileana and Bazen, Asker and Hartel, Pieter and Veldhuis, Raymond (2005) A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems. In: International Conference on Biometrics, ICB, January 5 - 7, 2006, Hong Kong, China (pp. pp. 728-736).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter (2008) Controlling Leakage Of Biometric Information Using Dithering. In: 16th European Signal Processing Conference, EUSIPCO, 25-29 August 2008, Lausanne, Switzerland.

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Fuzzy extractors for continuous distributions. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS, 20-22 March 2007, Singapore (pp. pp. 353-355).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) A unifying view on template protection schemes. In: 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands (pp. pp. 353-42).

Bösch, Christoph and Brinkman, Richard and Hartel, Pieter and Jonker, Willem (2011) Conjunctive Wildcard Search over Encrypted Data. In: 8th VLDB Workshop on Secure Data Management, SDM 2011, 2 September 2011, Seattle, WA, USA (pp. pp. 114-127).

Bösch, Christoph and Peter, Andreas and Hartel, Pieter and Jonker, Willem (2014) SOFIR: Securely Outsourced Forensic Image Recognition. In: 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, May 4-9, 2014, Florence, Italy.

Bösch, Christoph and Peter, Andreas and Leenders, Bram and Lim, Hoon Wei and Tang, Qiang and Wang, Huaxiong and Hartel, Pieter and Jonker, Willem (2014) Distributed Searchable Symmetric Encryption. In: Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014, 23-24 July 2014, Toronto, Canada.

Bösch, Christoph and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2012) Selective Document Retrieval from Encrypted Database. In: 15th International Conference on Information Security, ISC 2012, 19-21 September 2012, Passau, Germany.

Cheng, Jieyin and Chong, Cheun Ngen and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Nikolaus, Stefan (2005) STREAMTO: Streaming Content using a Tamper-Resistant Token (Workshop paper). In: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (pp. pp. 601-612).

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Joosten, Rieks and Kleinhuis, Geert (2005) Service brokerage with Prolog (Poster paper). In: 7th International Conference on Enterprise Information Systems, ICEIS 2005, May 24-28, 2005, Miami, FL, USA (pp. pp. 409-412).

Chong, C.N. and Peng, Z. and Hartel, P.H. (2003) Secure Audit Logging with Tamper-Resistant Hardware. In: 18th IFIP TC11 Int. Conf. on Information Security, Security and Privacy in the Age of Uncertainty (pp. pp. 73-84).

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Jonker, Willem and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. In: Third International Conference on Web Delivering of Music, WEDELMUSIC 2003, 15-17 September 2003, Leeds, UK (pp. pp. 122-129).

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language. In: IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, May 22-24, 2003, Ilmenau, Germany (pp. pp. 104-115).

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter H. (2003) Comparing Logic-based and XML-based Rights Expression Languages. In: OTM Confederated International Workshops: On The Move to Meaningful Internet Systems, November 3-7, 2003, Catania, Sicily, Italy (pp. pp. 779-792).

Chong, Cheun Ngen and Law, Yee Wei and Etalle, Sandro and Hartel, Pieter (2002) LicenseScript- A Language and Framework for Calculating Licenses on Information over Constrained Domains. In: 7th Cabernet Radicals Workshop, 13-16 October 2002, Bertinoro (Forlì), Italy.

Chong, Cheun Ngen and Law, Yee Wei and Etalle, Sandro and Hartel, Pieter H. (2003) Approximating Fair Use in LicenseScript. In: 6th International Conference on Asian Digital Libraries, ICADL 2003, December 8-12, 2003, Kuala Lumpur, Malaysia (pp. pp. 432-443).

Chong, Cheun Ngen and Ren, Bin and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Corin, Ricardo (2004) License protection with a tamper-resistant token. In: 5th International Workshop Information Security Applications, WISA 2004, August 23-25, 2004, Jeju Island, Korea (pp. pp. 223-238).

Chong, Jordan C.N. and Buuren, René van and Hartel, Pieter H. and Kleinhuis, Geert (2002) Security Attributes Based Digital Rights Management. In: Joint International Workshops on Interactive Distributed Multimedia Systems and Protocols for Multimedia Systems, IDMS/PROMS 2002, November 26-29, 2002, Coimbra, Portugal (pp. pp. 339-352).

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2004) Timed Model Checking of Security Protocols. In: 2nd ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, October 25-29, 2004, Washington, DC, USA (pp. pp. 23-32).

Corin, Ricardo and Durante, Antonio and Etalle, Sandro and Hartel, Pieter (2002) Using Trace Formulae for Security Protocol Design. In: 7th Cabernet Radicals Workshop, 13-16 October 2002, Bertinoro (Forlì), Italy.

Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Mader, Angelika (2003) On Modelling Real-time and Security properties of Distributed Systems. In: 5th Plenary Cabernet Workshop, 5-7 November 2003, Porto Santo, Portugal.

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Training Students to Steal: A Practical Assignment in Computer Security Education. In: 42nd ACM Technical Symposium on Computer Science Education, SIGCSE’11, March 9-12, 2011, Dallas, Texas, USA.

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Portunes: representing attack scenarios spanning through the physical, digital and social domain. In: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS '10, 27-28 March 2010, Paphos, Cyprus. (In Press)

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. In: 17th ACM Conference on Computer and Communications Security, CCS 2010, 4-8 Oct 2010, Chicago, Illinois, US (pp. pp. 666-668).

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations. In: 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010, 18-20 Dec 2010, Hangzhou, China.

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Two methodologies for physical penetration testing using social engineering. In: Annual Computer Security Applications Conference, ACSAC '10, 6-10 Dec 2010, Austin, Texas, USA.

Dimkov, Trajce and Tang, Qiang and Hartel, Pieter (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. In: Workshop on Modeling Security, MODSEC 2008, 28 Sep 2008, Toulouse, France (pp. pp. 1-13).

Field, A.N. and Hartel, P.H. and Mooij, W. (2001) Personal DJ, an Architecture for personalised content delivery. In: 10th Int. World Wide Web conference , Hong Kong may 2001 (pp. pp. 1-8).

Glaser, Hugh and Hartel, Pieter H. and Jong, Eduard K. de (1996) Structuring and Visualising an IC-card Security Standard. In: Second International Conference on Smart Card Research and Advanced Applications, CARDIS, September 16-18, 1996, Amsterdam, The Netherlands (pp. pp. 89-110).

Glaser, Hugh and Hartel, Pieter H. and Jong Frz, Eduard K.J. de (1996) Visualising the Structure of an IC-card Security Architecture. In: Smart Card Convention 1996 - Technology and markets, February 1996, Peterborough, UK (pp. pp. 22-34).

Gong, Zheng and Hartel, Pieter and Nikova, Svetla and Zhu, Bo (2009) Towards Secure and Practical MACs for Body Sensor Networks. In: 10th International Conference on Cryptology - INDOCRYPT 2009, December 13-16, 2009, New Delhi, India (pp. pp. 182-198).

Hadziosmanovic, Dina and Bolzoni, Damiano and Etalle, Sandro and Hartel, Pieter (2012) Challenges and opportunities in securing industrial control systems. In: IEEE Workshop on Complexity in Engineering, COMPENG 2012, 11-13 June 2012, Aachen, Germany (pp. pp. 1-6).

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter (2010) MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. In: 13th International Symposium on Recent Advances in Intrusion Detection, RAID 2010, 15-17 Sep 2010, Ottawa, Canada (pp. pp. 500-501).

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter (2011) Smart Device Profiling for Smart SCADA. In: 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, 20-21 Sept 2011, Menlo Park, California, USA.

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter and Etalle, Sandro (2011) MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. In: European Conference on Computer Network Defense, EC2ND 2011, 6-8 Sept 2011, Gothenburg, Sweden (pp. pp. 41-48).

Hanssen, F. and Hartel, P. and Hattink, T. and Jansen, P. and Wijnberg, J. and Scholten, J. (2002) A Real-Time Ethernet Network at Home. In: Euromicro International Conference on Real-Time Systems, June 19 - 21, 2002, Vienna, Austria (pp. pp. 5-8).

Hanssen, Ferdy and Hartel, Pieter and Jansen, Pierre and Scholten, Hans and Vervoort, Wiek (2001) A Real time network at home. In: PROGRESS 2001 Workshop on Embedded Systems, October 18, 2001, Veldhoven, the Netherlands (pp. pp. 67-72).

Hartel, P.H. (1995) Benchmarking implementations of lazy functional languages II -- Two years later. In: 7th Implementation of Functional Languages, Marstrand, Sweden (pp. pp. 63-68).

Hartel, P.H. (2013) Situative Prävention von Cybercrime: ein chancenreicher Bekämpfungsansatz. In: BKA-Herbsttagung 2013: Cybercrime - Bedrohung, Intervention, Abwehr, 12-13 November 2013, Wiesbaden, Germany (pp. pp. 96-108).

Hartel, P.H. and Abelmann, L. and Khatib, M.G. (2008) Towards Tamper-Evident Storage on Patterned Media. In: 6th USENIX Conference on File and Storage Technologies, FAST 2008, February 26-29, 2008, San Jose, CA, USA (pp. pp. 283-296).

Hartel, P.H. and Butler, M.J. and Currie, A. and Henderson, P. and Leuschel, M. and Martin, A. and Smith, A. and Ultes-Nitsche, U. and Walters, B. (1999) Questions and Answers About Ten Formal Methods. In: 4th Int. Workshop on Formal Methods for Industrial Critical Systems, Trento, Italy, ERCIM/CNR II (pp. pp. 179-203).

Hartel, P.H. and Es, B. van and Tromp, Th.J.M. (1995) Basic proof skills of computer science students. In: 1st Functional Programming languages in Education, FPLE 1995, Nijmegen, The Netherlands. pp. 269-287. Springer-Verlag LNCS 1022 (pp. pp. 269-287).

Hartel, P.H. and Hill, J. and Sims, M. (1998) An Operational Model of QuickPay. In: 3rd Smart card research and advanced application, CARDIS 1998, Louvain la Neuve, Belgium (pp. pp. 19-28).

Hartel, P.H. and Langendoen, K.G. (1993) Benchmarking implementations of lazy functional languages. In: 6th Functional programming languages and computer architecture (FPCA), Copenhagen, Denmark (pp. pp. 341-349).

Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow. In: 8th Int. Conf. on Formal Methods in Computer Aided Design (FMCAD), 17-20 Nov. 2008, Portland, Oregon (pp. pp. 161-170).

Hartel, P.H. and Vree, W.G. (1992) Arrays in a lazy functional language -- a case study: the fast Fourier transform. In: 2nd Arrays, functional languages and parallel systems (ATABLE), Montreal, Canada. pp. 52-66. Publication 841. (pp. pp. 52-66).

Hartel, P.H. (2000) Formalising Java safety - an overview. In: 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application. CARDIS 2000 - Kluwer Acad. Publ. (pp. pp. 115-134).

Hartel, P.H. (2005) A Trace Semantics for Positive Core XPath. In: 12th Int. Symp. on Temporal Representation and Reasoning (TIME), Burlington, Vermont (pp. pp. 103-112).

Hartel, P.H. and Henderson, N.J. (2000) Pressure sequence - a novel method of protecting smart cards. In: IFIP wg 8.8 Conf. Smart card research & advanced application, CARDIS 2000, ), Bristol, UK (pp. pp. 241-256).

Hartel, Pieter and Eck, Pascal van and Etalle, Sandro and Wieringa, Roel (2004) Modelling mobility aspects of security policies (Invited paper). In: Construction and Analysis of Safe, Secure and Interoperable Smart Cards, CASSIS, March 10-14, 2004, Marseille, France (pp. pp. 172-191).

Hartel, Pieter and Glaser, Hugh and Wild, John (1993) FAST compiler user's guide. In: FAST: Functional Programming for Arrays of Transputers (pp. pp. 247-264).

Hartel, Pieter and Glaser, Hugh and Wild, John (1991) On the benefits of different analyses in the compilation of functional languages. In: 3rd Workshop on Implementation of Functional Languages on Parallel Architectures, June 1991, Southampton, UK (pp. pp. 123-145).

Hartel, Pieter H. and Butler, Michael J. and Jong, Eduard de and Longley, Mark (2001) Transacted Memory for Smart Cards. In: International Symposium of Formal Methods Europe, FME 2001, March 12–16, 2001, Berlin, Germany (pp. pp. 478-499).

Hartel, Pieter H. and Jong, Eduard K. de (1994) Towards testability in smart card operating system design. In: First Smart Card Research and Advanced Application Conference, CARDIS 1994, Lille, France (pp. pp. 73-88).

Hartel, Pieter H. (1988) The average size of ordered binary subgraphs. In: International Workshop WG '88 , June 15–17, 1988, Amsterdam, The Netherlands (pp. pp. 327-351).

Hartel, Pieter H. and Smid, Michiel H.M. and Torenvliet, Leen and Vree, Wilem G. (1989) A parallel functional implementation of range queries. In: Computing science in The Netherlands, 1989, Utrecht, The Netherlands (pp. pp. 173-189).

Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2002) Low-Cost Planar PTF Sensors for the Identity Verification of Smartcard Holders. In: 1st IEEE Int. Conf. on Sensors, 12-14 June 2002, Orlando, Florida (pp. pp. 1614-1619).

Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2001) Polymer thick-film sensors: possibilities for smartcard biometrics. In: 11th Conference on Sensors and Their Applications, 3-6 September 2001, London, UK (pp. pp. 83-88).

Henderson, N.J. and White, N.M. and Hartel, P.H. (2001) iButton enrolment and verification times for the pressure sequence smartcard biometric. In: 2nd Conf. Smart card Programming and Security (E-smart), Cannes, France (pp. pp. 124-134).

Henderson, N.J. and White, N.M. and Veldhuis, R.N.J. and Hartel, P.H. and Slump, C.H. (2002) Sensing pressure for authentication. In: 3rd IEEE Benelux Signal Processing Symp. (pp. pp. 241-244).

Henderson, Neil J. and White, Neil M. and Hartel, Pieter H. (2001) iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric. In: International Conference on Research in Smart Cards, E-smart 2001 , September 19–21, 2001 , Cannes, France (pp. pp. 124-134).

Ibraimi, Luan and Petkovic, Milan and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In: 10th International Workshop on Information Security Applications, WISA, 25-27 August 2009, Busan, Korea (pp. pp. 309-323).

Ibraimi, Luan and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2011) Public-Key Encryption with Delegated Search. In: 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, June 7-10, 2011, Nerja, Malaga, Spain (pp. pp. 532-549).

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2009) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. In: 5th International Conference on Information Security Practice and Experience, ISPEC, 12-15 April 2009, Xi'an, China (pp. pp. 1-12).

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: 5th VLDB Workshop on Secure Data Management, SDM, August 24, 2008, Auckland, New Zealand (pp. pp. 185-198).

Jeckmans, Arjan and Peter, Andreas and Hartel, Pieter (2013) Efficient privacy-enhanced familiarity-based recommender system. In: 18th European Symposium on Research in Computer Security, ESORICS 2013, 9-13 September 2013, Egham, UK (pp. pp. 400-417).

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) Privacy-Preserving Profile Matching Using the Social Graph. In: International Conference on Computational Aspects of Social Networks, CASoN 2011, 19-21 October 2011 , Salamanca, Spain (pp. pp. 42-47).

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks. In: 18th ACM conference on Computer and Communications Security, CCS 2011, 17-21 October 2011 , Chicago, IL, USA (pp. pp. 793-795).

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2012) Privacy-Preserving Collaborative Filtering based on Horizontally Partitioned Dataset. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 May 2012, Denver, CO, USA (pp. pp. 439-446).

Khatib, M.G. and Hartel, P.H. (2008) Power Management of MEMS-Based Storage Devices for Mobile Systems. In: Proceedings of the 8th ACM & IEEE International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES '08), 19-24 Oct 2008, Atlanta, USA (pp. pp. 245-254).

Khatib, M.G. and Hartel, P.H. (2009) Policies for Probe-Wear Leveling in MEMS-Based Storage Devices. In: Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 21-23 Sep 2009, London, UK (pp. pp. 152-161).

Khatib, M.G. and Miller, E.L. and Hartel, P.H. (2008) Workload-Based Configuration of MEMS-Based Storage Devices for Mobile Systems. In: Proceedings of the 8th ACM & IEEE International Conference on Embedded Software (EMSOFT '08), 19-24 Oct 2008, Atlanta, USA (pp. pp. 41-50).

Khatib, M.G. and Zwaag, B.J. van der and Hartel, P.H. and Smit, G.J.M. (2007) Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. In: IEE/ACM/IFIP Workshop on Embedded Systems for Real-Time Multimedia, ESTImedia 2207, 4-5 Oct 2007, Salzburg, Austria (pp. pp. 7-12).

Langendoen, K.G. and Hartel, P.H. (1992) FCG: a code generator for lazy functional languages. In: Compiler construction (CC), Paderborn, Germany. pp. 278-296. Springer-Verlag LNCS 641 (pp. pp. 278-296).

Lastdrager, E.E.H. and Montoya, Lorena and Hartel, Pieter and Junger, Marianne (2013) Applying the Lost-Letter Technique to Assess IT Risk Behaviour. In: 3rd Workshop on Socio-Technical Aspects in Security and Trust, 29 June 2013, New Orleans, LA, USA (pp. pp. 24-9).

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2003) EnergY-Efficient Sensor CRYptographic Module. In: Proceedings of the 14th ProRISC workshop on Circuits, Systems and Signal Processing.

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2004) Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract). In: IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2004, 25-27 October 2004, Fort Lauderdale, FL, USA (pp. pp. 447-456).

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2004) Benchmarking Block Ciphers for Wireless Sensor Networks. In: IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004 (pp. pp. 447-456).

Law, Yee Wei and Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Corin, Ricardo (2004) Licensing Structured Data with Ease. In: IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, May 22-24, 2003, Ilmenau, Germany.

Law, Yee Wei and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter H. (2003) A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. In: IFIP-TC6 8th International Conference on Personal Wireless Communications, PWC 2003, September 23-25, 2003, Venice, Italy (pp. pp. 27-39).

Law, Yee Wei and Hartel, Pieter and Hartog, Jerry den and Havinga, Paul (2005) Link-layer jamming attacks on S-MAC. In: Second European Workshop on Wireless Sensor Networks, EWSN, 31 Jan. - 2 Feb. 2005, Istanbul, Turkey (pp. pp. 217-225).

Law, Yee Wei and Hoesel, Lodewijk van and Doumen, Jeroen and Hartel, Pieter and Havinga, Paul (2005) Energy-Efficient Link-Layer Jamming Attacks against Three Wireless Sensor Network MAC Protocols. In: 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN, November 07, 2005, Alexandria, VA, USA (pp. pp. 76-88).

Liesdonk, Peter van and Sedghi, Saeed and Doumen, Jeroen and Hartel, Pieter and Jonker, Willem (2010) Computationally Efficient Searchable Symmetric Encryption. In: 7th VLDB Workshop on Secure Data Management, SDM 2010, 17 Sep 2010, Singapore (pp. pp. 87-100).

Luiijf, Eric and Hartel, Pieter (2013) Critical information infrastructures security - Preface. In: 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, 16-18 September 2013, Amsterdam, the Netherlands (pp. v-vi).

Makri, Eleftheria and Everts, Maarten H. and Hoogh, Sebastiaan de and Peter, Andreas and Akker, Harm op den and Hartel, Pieter and Jonker, Willem (2014) Privacy-Preserving Verification of Clinical Research. In: Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19-21 März 2014, Wien, Österreich (pp. pp. 481-500).

Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks. In: Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA-08), 10-12 Dec 2008, Sydney, Australia (pp. pp. 863-870).

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. In: Sixth International Workshop on Wireless Local Networks, 14-16 Nov 2006, Tampa, Florida (pp. pp. 931-938).

McEvoy, H. and Hartel, P.H. (1995) Local Linear Logic for Locality Consciousness in Multiset Transformation. In: 7th Programming Languages: Implementations, Logics and Programs, PLILP 1995, Utrecht, The Netherlands (pp. pp. 357-379).

Montoya, Lorena and Junger, Marianne and Hartel, Pieter (2013) How 'digital' is traditional crime? In: European Intelligence and Security Informatics Conference, EISIC 2013, 12-14 August 2013, Uppsala, Sweden.

Montoya, Lorena and Junger, Marianne and Hartel, Pieter (2013) Modus operandi study of information and communication technology (ICT) facilitated crime. In: NVC Congres, 13-14 June 2013, Leiden, The Netherlands (pp. pp. 93-94).

Mountjoy, J. and Hartel, P.H. and Corporaal, H. (1997) Modular Operational Semantic Specification of Transport Triggered Architectures. In: 13th IFIP WG 10.5 Conf. on Computer Hardware Description Languages and Their Applications, Toledo, Spain (pp. pp. 260-279).

Nasution, S. and Suryana, N. and Shahib, S. and Abu, N.A. and Hartel, P.H. (2009) The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home. In: International Technology, Education and Development Conference (INTED), 9-11 March 2009, Valencia, Spain (pp. p. 702).

Nasution, Sandy and Hartel, Pieter and Suryana, Nanna and Azman, Nur and Shahib, Shahrin (2010) Trust Level and Routing Selection for Mobile Agents in a Smart Home. In: Second International Conference on Computer Modeling and Simulation, ICCMS, 22-24 Jan. 2010, Sanya, China (pp. pp. 445-450).

Poll, Erik and Hartel, Pieter and Jong, Eduard de (2002) A Java Reference Model of Transacted Memory for Smart Cards. In: Fifth Smart Card Research and Advanced Application Conference, CARDIS 2002, November 21-22, 2002, San Jose, CA (pp. pp. 75-86).

Revill, J.D. and Hartel, P.H. (1999) Modelling a Java Ring based implementation of an N-Count payment system. In: 2nd Workshop on Security in Communication Networks, University of Salerno, Amalfi, Italy (pp. pp. 139-150).

Saake, Gunter and Hartel, Peter and Jungclaus, Ralf and Wieringa, Roel and Feenstra, Remco (1994) Inheritance conditions for object life cycle diagrams. In: EMISA-Workshop Formale Grundlagen fur den Entwurf von Informationsystemen, 24-26 May 1994, Tutzing, Germany (pp. pp. 79-88).

Scholten, H. and Jansen, P. and Hanssen, F. and Hartel, P. and Hattink, T. and Sundramoorthy, V. (2002) Multimedia QoS in low-cost home networks. In: 27th Annual IEEE Conference on Local Computer Networks, LCN, 6-8 Nov. 2002 , Tampa, Florida (pp. pp. 327-328).

Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption. In: 10th international conference on information and communication security, 20-22 Oct 2008, Birmingham, UK (pp. pp. 345-360).

Sedghi, Saeed and Hartel, Pieter and Jonker, Willem and Nikova, Svetla (2011) Privacy Enhanced Access Control by Means of Policy Blinding. In: 7th International Conference on Information Security Practice and Experience, ISPEC 2011, May 30 - June 1, 2011, Guangzhou, China (pp. pp. 108-122).

Sedghi, Saeed and Liesdonk, Peter van and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2010) Searching Keywords with Wildcards on Encrypted Data. In: Seventh international Conference on Security and Cryptography for Networks, SCN 2010, September 13-15, 2010, Amalfy, Italy (pp. pp. 138-153).

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2006) On consistency maintenance in service discovery. In: 20th International Parallel and Distributed Processing Symposium, IPDPS, 25-29 April, Rhodes Island, Greece.

Sundramoorthy, V. and Glind, G.J. van de and Hartel, P.H. and Scholten, J. (2006) The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss. In: 1st Int. Conf. on Communication System Software and Middleware (COMSWARE), 08-12 Jan. 2006, New Delhi, India (pp. CDROM).

Sundramoorthy, V. and Tan, C. and Hartel, P.H. and Hartog, J.I. den and Scholten, J. (2005) Functional Principles of Registry-based Service Discovery. In: 30th Annual IEEE Conf. on Local Computer Networks, LCN, 15-17 Nov. 2005, Sydney, Australia (pp. pp. 209-217).

Sundramoorthy, Vasughi and Scholten, Hans and Jansen, Pierre and Hartel, Pieter (2003) Service discovery at home. In: Joint Conference of the Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia, 2003, 15-18 Dec. 2003 , Singapore (pp. pp. 1929-1933).

Tang, Q. and Hartel, P.H. and Jonker, W. (2009) Inter-domain Identity-Based Proxy Re-encryption. In: Information Security and Cryptology, 4th International Conference (Inscrypt), December 14-17, 2008, Beijing China (pp. pp. 332-347).

Veldhuis, Raymond and Bazen, Asker and Kauffman, Joost and Hartel, Pieter (2004) Biometric Verification Based on Grip-pattern Recognition. In: Security, Steganography, and Watermarking of Multimedia Contents VI, 19 January 2004, San Jose, California, USA (pp. pp. 634-641).

Wild, John and Glaser, Hugh and Hartel, Pieter (1991) Statistics on storage management in a lazy functional language implementation. In: 3rd Workshop on Parallel and Distributed Processing (WP&DP'91), 16-19 April, 1991, Sofia, Bulgaria (pp. pp. 73-87).

Lecture

Hartel, Pieter (2001) Veiligheid in Gedistribueerde Systemen. [Lecture]

Patent

Jong, Eduard de and Hartel, Pieter H. (2007) Method and apparatus for deployment of high integrity software using static procedure return addresses. Patent.

Zych, Anna K. and Doumen, Jeroen M. and Jonker, Willem and Hartel, Pieter and Petkovic, Milan (2006) Method of Key Management. Patent.

Zych, Anna K. and Doumen, Jeroen M. and Jonker, Willem and Hartel, Pieter H. and Petkovic, Milan (2008) Method of Key Management. Patent.

Report

Abelmann, Leon and Chong, Jordan and Hartel, Pieter and Lodder, Cock (2002) Design rationale for secure probe storage based on patterned magnetic media. [Report]

Beye, Michael and Jeckmans, Arjan and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2010) Literature Overview - Privacy in Online Social Networks. [Report]

Bolks, Mathieu and Hanssen, Ferdy and Abelmann, Leon and Havinga, Paul and Hartel, Pieter and Jansen, Pierre and Lodder, Cock and Smit, Gerard (2001) Micro Scanning Probe Array Memory. [Report]

Bolzoni, Damiano and Etalle, Sandro and Hartel, Pieter (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. [Report]

Bolzoni, Damiano and Zambon, Emmanuele and Etalle, Sandro and Hartel, Pieter (2005) Poseidon: a 2-tier anomaly-based intrusion detection system. [Report]

Brinkman, Richard and Feng, Ling and Etalle, Sandro and Hartel, Pieter and Jonker, Willem (2003) Experimenting with linear search in encrypted data. [Report]

Brinkman, R. and Feng, L. and Doumen, J. and Hartel, P.H. and Jonker, W. (2004) Efficient tree search in encrypted data. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. [Report]

Buhan, Ileana and Bazen, Asker and Hartel, Pieter and Veldhuis, Raymond (2005) A false rejection oriented threat model for the design of biometric authentication systems. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Fuzzy extractors for continuous distributions. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) From Watermarks to Fuzzy Extractors: a Practical Construction. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Constructing practical Fuzzy Extractors using QIM. [Report]

Buhan, Ileana and Hartel, Pieter (2005) The state of the art in abuse of biometrics. [Report]

Butler, Michael and Hartel, Pieter and Longley, Mark and Jong, Eduard de (1997) Applying Formal Methods to the Design of Smart Card Software. [Report]

Cheng, Jieyin and Chong, Cheun Ngen and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Nikolaus, Stefan (2004) STREAMTO: streaming content using a tamper-resistant token. [Report]

Chong, C.N. and Law, Y.W. and Etalle, S. and Hartel, P.H. (2002) LicenseScript : a language and framework for calculating licenses on information over constrained domains. [Report]

Chong, C.N. and Peng, Z. and Hartel, P.H. (2002) Secure Audit Logging with Tamper-Resistant Hardware. [Report]

Chong, Cheun Ngen and Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei and Tokmakoff, Andrew (2005) LicenseScript : a logical language for digital rights management. [Report]

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Jonker, Willem and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. [Report]

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei (2003) LicenseScript: a novel digital rights language. [Report]

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Joosten, Rieks and Kleinhuis, Geert (2005) Service brokerage with Prolog. [Report]

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Joosten, Rieks and Kleinhuis, Geert (2004) Inter-library service brokerage in LicenseScript. [Report]

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter H. (2003) Comparing logic-based and XML-based rights expression languages. [Report]

Chong, Cheun Ngen and Law, Yee Wei and Etalle, Sandro and Hartel, Pieter H. (2003) Approximating fair use in LicenseScript. [Report]

Chong, Cheun Ngen and Ren, Bin and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Corin, Ricardo (2004) License protection with a tamper-resistant token. [Report]

Chong, Jordan C.N. and Buuren, René van and Hartel, Pieter H. and Kleinhuis, Geert (2002) Security Attributes Based Digital Rights Management. [Report]

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2004) Timed model checking of security protocols. [Report]

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2005) Timed analysis of security protocols. [Report]

Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2002) Using Trace Formulae for Security Protocol Design. [Report]

Corin, Ricardo and Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter (2003) How to pay in LicenseScript. [Report]

Corin, Ricardo and Durante, Antonio and Etalle, Sandro and Hartel, Pieter (2003) trace logic for local security properties. [Report]

Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Mader, Angelika (2003) On modelling real-time and security properties of distributed systems. [Report]

Czenko, Marcin and Tran, Ha and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Hartog, Jerry den (2005) Nonmonotonic trust management for P2P applications. [Report]

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. [Report]

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2009) Two methodologies for physical penetration testing using social engineering. [Report]

Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain. [Report]

Dimkov, T. and Tang, Q. and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. [Report]

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Portunes: analyzing multi-domain insider threats. [Report]

Dulman, Stefan and Nieberg, Tim and Havinga, Paul and Hartel, Pieter (2002) Multipath Routing for Data Dissemination in Energy Efficient Sensor Networks. [Report]

Field, A.N. and Hartel, P.H. and Mooij, W.G.P. (2001) Personal DJ, an Architecture for Personalized Content Delivery. [Report]

Field, A.N. and Hartel, P.H. (2001) On the evaluation of Web Radio. [Report]

Gong, Z. and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) Towards Secure and Practical MACs for Body Sensor Networks. [Report]

Gras, F. and Le Dantec, B. and Trebucq, O. and Cucinelli, B and Leduc, M. and Simplot, D. and Bueker, U. and Barthe, G. and Michaud, B. and Hartel, P.H. and Thevenot, B. and Moedl, A. and Quisquater, J.J. and Thomasson, J.P. and Canto, E. (2003) RESET Roadmap for European research on Smartcard rElated Technologies. [Report]

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter (2010) Towards securing SCADA systems against process-related threats. [Report]

Hanssen, F. and Hartel, P. and Hattink, T. and Jansen, P. and Scholten, J. and Wijnberg, J. (2002) A Real-Time Ethernet Network at Home. [Report]

Hanssen, Ferdy and Hartel, Pieter and Jansen, Pierre and Scholten, Hans and Vervoort, Wiek (2001) A Real-time Network at Home. [Report]

Hartel, P.H. and Abelmann, L. (2007) Towards compliant data retention with probe storage on patterned media. [Report]

Hartel, P.H. and Muller, H.L. (2000) Simple algebraic data types for C. [Report]

Hartel, P. (2005) A trace semantics for positive core XPath. [Report]

Hartel, P. and Junger, M. (2012) Teaching Information Security Students to "Think thief". [Report]

Hartel, P.H. (2009) On the Cost and Benefits of Building a High-Quality Institutional Repository. [Report]

Hartel, P.H. and Moreau, L.A.V. (2001) Formalising the safety of Java, the Java Virtual Machine and Java Card. [Report]

Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow (with appendix). [Report]

Hartel, Pieter and Eck, Pascal van and Etalle, Sandro and Wieringa, Roel (2004) Modelling mobility aspects of security policies. [Report]

Hartel, Pieter and Junger, Marianne and Wieringa, Roel (2010) Cyber-crime Science = Crime Science + Information Security. [Report]

Hartel, Pieter and Muller, Henk (2010) Simple algebraic data types for C. [Report]

Hartel, Pieter and Muller, Henk and Glaser, Hugh (2002) The Functional "C" experience. [Report]

Hartel, Pieter H. and Jong, Eduard K. de (1996) Smart Cards and Card Operating Systems. [Report]

Hartel, Pieter H. and Vree, Willem G. (1988) Parallel graph reduction for divide-and-conquer applications - Part II: program performance. [Report]

Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2002) Polymer thick-film sensors: possibilities for smartcard biometrics. [Report]

Henderson, N.J. and White, N.M. and Veldhuis, R.N.J. and Hartel, P.H. and Slump, C.H. (2002) Sensing pressure for authentication. [Report]

Ibraimi, Luan and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2010) An Identity-Based Group Signature with Membership Revocation in the Standard Model. [Report]

Ibraimi, Luan and Petkovic, Milan and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2009) Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes (extended version). [Report]

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. [Report]

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. [Report]

Ionita, Dan and Hartel, Pieter and Pieters, Wolter and Wieringa, Roel (2013) Current established risk assessment methodologies and tools. [Report]

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) Privacy-Preserving Profile Matching Using the Social Graph. [Report]

Jong, Eduard de and Hartel, Pieter and Peyret, Patrice and Cattaneo, Peter (2005) Java Card: an analysis of the most successful smart card operating system to date. [Report]

Junger, M. and Montoya, L. and Hartel, P.H. and Karemaker, M. (2013) Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit. [Report]

Khatib, M.G. and Zwaag, B.J. van der and Hartel, P.H. and Smit, G.J.M. (2007) Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. [Report]

Law, Y.W. and Moniava, G. and Gong, Z. and Hartel, P.H. and Palaniswami, M. (2008) KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks. [Report]

Law, Yee Wei and Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Corin, Ricardo (2003) Licensing structured data with ease. [Report]

Law, Yee Wei and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter H. (2003) A formally verified decentralized key management architecture for wireless sensor networks. [Report]

Law, Yee Wei and Doumen, Jeroen and Hartel, Pieter (2005) Benchmarking block ciphers for wireless sensor networks. [Report]

Law, Yee Wei and Doumen, Jeroen and Hartel, Pieter (2004) Survey and benchmark of block ciphers for wireless sensor networks. [Report]

Law, Yee Wei and Etalle, Sandro and Hartel, Peter (2002) Key management with group-wise pre-deployed keying and secret sharing pre-deployed keying. [Report]

Law, Yee Wei and Hartel, Pieter and Etalle, Sandro and Havinga, Paul and Di Pietro, Roberto and Mancini, Luigi (2005) Overview of security research in EYES. [Report]

Law, Yee Wei and Hartel, Pieter and Hartog, Jerry den and Havinga, Paul (2004) Link-layer jamming attacks on S-MAC. [Report]

Law, Yee Wei and Hoesel, Lodewijk van and Doumen, Jeroen and Hartel, Pieter and Havinga, Paul (2005) Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. [Report]

Marin Perianu, Raluca and Hartel, Pieter and Scholten, Hans (2005) A classification of service discovery protocols. [Report]

Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A generalized clustering algorithm for dynamic wireless sensor networks. [Report]

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. [Report]

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks. [Report]

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2007) Cluster-based service discovery for heterogeneous wireless sensor networks. [Report]

Mouthaan, A.J. and Hartel, P.H. (2007) Interim research assessment 2003-2005 - Computer Science. [Report]

Nasution, S. and Hartel, P.H. and Suryana, N. and Azman, N. and Shahib, S. (2009) Trust Level and Routing Selection for Mobile Agents in a Smart Home. [Report]

Poll, Erik and Hartel, Pieter and Jong, Eduard de (2002) A Java Reference Model of Transacted Memory for Smart Cards. [Report]

Saffarian, M. and Tang, Q. and Jonker, W. and Hartel, P.H. (2009) Dynamic User Role Assignment in Remote Access Control. [Report]

Scholten, H. and Jansen, P. and Hanssen, F. and Hartel, P.H. and Hattink, T. and Sundramoorthy, V. (2002) Multimedia Qos in low-cost home networks. [Report]

Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version). [Report]

Sedghi, S. and Liesdonk, P. van and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2009) Adaptively Secure Computationally Efficient Searchable Symmetric Encryption. [Report]

Sedghi, S. and Liesdonk, Peter van and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2010) Searching Keywords with Wildcards on Encrypted Data. [Report]

Sinderen, M.J. van and Pras, A. and Haverkort, B.R.H.M. and Apers, P.M.G. and Hartel, P.H. and Pol, J.C. van de and Nijholt, A. and Wieringa, R.J. and Havinga, P.J.M. and Aksit, M. (2009) Research Self-Evaluation 2003-2008, Computer Science Department, University of Twente. [Report]

Sundramoorthy, V. and Glind, G.J. van de and Hartel, P.H. and Scholten, J. (2005) The performance of a second generation service discovery protocol in response to message loss. [Report]

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2007) A Taxonomy of Self-configuring Service Discovery Systems. [Report]

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2005) On consistency maintenance in service discovery. [Report]

Sundramoorthy, V. and Tan, C. and Hartel, P.H. and Hartog, J.I. den and Scholten, J. (2005) Functional principles of registry-based service discovery. [Report]

Sundramoorthy, V. and Tan, C. and Hartel, P.H. and Scholten, J. (2006) FRODO Dt-Spin Models. [Report]

Sundramoorthy, Vasughi and Scholten, Hans and Jansen, Pierre and Hartel, Pieter (2003) Service discovery at home. [Report]

Tang, Q. and Hartel, P.H. and Jonker, W. (2008) Inter-domain Identity-based Proxy Re-encryption. [Report]

Veldhuis, Raymond and Bazen, Asker and Kauffman, Joost and Hartel, Pieter (2004) Biometric verification based on grip-pattern recognition. [Report]

Vree, Willem G. and Hartel, Pieter H. (1988) Parallel graph reduction for divide-and-conquer applications - Part I: program transformations. [Report]

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. and Hartel, Pieter (2009) Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures. [Report]

Zwaag, Berend Jan van der and Khatib, Mohammed G. and Hartel, Pieter H. (2007) How migrating 0.0001% of address space saves 12% of energy in hybrid storage. [Report]

Zych, Anna and Doumen, Jeroen and Hartel, Pieter and Jonker, Willem (2005) A Diffie-Hellman based key management scheme for hierarchical access control. [Report]

Thesis

Hartel, Pieter Hendrik (1989) Performance analysis of storage management in combinator graph reduction. thesis.

This list was generated on Sat Nov 29 05:13:12 2014 CET.