Research Group: Distributed and Embedded Systems (DIES)

These publication lists might not be complete. Publications are added regularly.

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Jump to: 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1993 | 1992 | 1990 | 1989 | 1988 | 1985 | 1984 | 1983
Number of items: 646.

2014

Jeckmans, Adrianus Johannus Paulus (2014) Cryptographically-enhanced privacy for recommender systems. thesis.

2013

Trivellato, Daniel and Zannone, Nicola and Glaundrup, Maurice and Skowronek, Jacek and Etalle, Sandro (2013) A semantic security framework for systems of systems. International journal of cooperative information systems, 22 (1). pp. 1-35. ISSN 0218-8430

Lastdrager, E.E.H. and Montoya, Lorena and Hartel, Pieter and Junger, Marianne (2013) Applying the Lost-Letter Technique to Assess IT Risk Behaviour. In: 3rd Workshop on Socio-Technical Aspects in Security and Trust, 29 June 2013, New Orleans, LA, USA (pp. pp. 24-9).

Stoelinga, Mariëlle and Pieters, Wolter (2013) Attack navigator vindt en verhelpt zwakke plekken. Bits & chips : tweewekelijks nieuwsmagazine voor de hightechindustrie, 4 . ISSN 1879-6443

Petit, Jonathan and Mammeri, Zoubir (2013) Authentication and consensus overhead in vehicular ad hoc networks. Telecommunication systems, 52 (4). pp. 2699-2712. ISSN 1018-4864

Pavlovic, Dusko (2013) Bicompletions of distance matrices. In: Computation, logic, games, and quantum foundations. Lecture notes in computer science, 7860 . Springer, Berlin, Germany, pp. 291-310. ISBN 9783642381638

Bissmeyer, Norbert and Petit, Jonathan and Bayarou, Kpatcha M. (2013) Copra: conditional pseudonym resolution algorithm in VANETs. In: 10th Annual Conference on Wireless On-Demand Network Systems and Services, WONS 2013, 18-20 March 2013, Banff, Canada (pp. pp. 9-16).

Pieters, W. and Probst, C.W. and Lukszo, S. and Montoya, A.L. (2013) Cost-effectiveness of Security Measures: A model-based Framework. In: Approaches and processes for managing the economics of information systems. IGI Global, Hershey, PA, USA, p. 18.

Luiijf, Eric and Hartel, Pieter (2013) Critical information infrastructures security - Preface. In: 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, 16-18 September 2013, Amsterdam, the Netherlands (pp. v-vi).

Ionita, Dan and Hartel, Pieter and Pieters, Wolter and Wieringa, Roel (2013) Current established risk assessment methodologies and tools. [Report]

Casalicchio, E. and Caselli, M. and Coletta, A. and Nai Fovino, I. (2013) DNS as critical infrastructure, the energy system case study. International journal of critical infrastructures, 9 (1-2). pp. 111-129. ISSN 1475-3219

Pieters, Wolter (2013) Defining "The weakest link" comparative security in complex systems of systems. In: IEEE 5th International Conference on Cloud Computing Technology and Science, CloudÇom 2013, 2-5 December 2013, Bristol, UK (pp. pp. 39-44).

Bleikertz, Sören and Mastelic, Toni and Pape, Sebastian and Pieters, Wolter and Dimkov, Trajce (2013) Defining the cloud battlefield - supporting security assessments by cloud customers. In: International Conference on Cloud Engineering, IC2E, 25-27 March 2013, Redwood City, CA, USA (pp. pp. 78-87).

Kargl, Frank and Friedman, Arik and Boreli, Roksana (2013) Differential privacy in intelligent transportation systems. In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, 17-19 April 2013, Budapest, Hungary (pp. pp. 107-112).

Bilgin, Begül and Daemen, Joan and Nikov, Ventzislav and Nikova, Svetla and Rijmen, Vincent and Van Assche, Gilles (2013) Efficient and First-Order DPA Resistant Implementations of Keccak. In: 12th Smart Card Research and Advanced Application Conference, CARDIS 2014, 27-29 November 2013, Berlin, Germany (pp. pp. 187-199).

Feiri, Michael and Petit, Jonathan and Kargl, Frank (2013) Efficient and secure storage of private keys for pseudonymous vehicular communication. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security, ACM CCS 2013, 4 November 2013, Berlin, Germany (pp. pp. 9-18).

Jeckmans, Arjan and Peter, Andreas and Hartel, Pieter (2013) Efficient privacy-enhanced familiarity-based recommender system. In: 18th European Symposium on Research in Computer Security, ESORICS 2013, 9-13 September 2013, Egham, UK (pp. pp. 400-417).

Peter, Andreas and Tews, Erik and Katzenbeisser, Stefan (2013) Efficiently outsourcing multiparty computation under multiple keys. IEEE transactions on information forensics and security, 8 (12). pp. 2046-2058. ISSN 1556-6013

Knapik, Peter and Schoch, Elmar and Kargl, Frank (2013) Electronic decal: a security function based on V2X communication. In: 77th IEEE Vehicular Technology Conference, VTC 2013-Spring, 2-5 June 2013, Dresden, Germany.

Gozalvez, Javier and Haerri, Jerome and Hartenstein, Hannes and Heijenk, Geert and Kargl, Frank and Petit, Jonathan and Scheuermann, Björn and Tieler, Tessa (2013) Fundamentals: IVC and computer science. In: Inter-Vehicular Communication - Quo Vadis (Dagstuhl Seminar 13392), 22 - 25 September 2013, Dagstuhl, Germany (pp. pp. 205-206).

Dietzel, Stefan and Petit, Jonathan and Heijenk, Geert and Kargl, Frank (2013) Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols. IEEE Transactions on vehicular technology, 62 (4). pp. 1505-1518. ISSN 0018-9545

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013) Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, codes and cryptography, 67 (2). pp. 209-232. ISSN 1573-7586

Montoya, Lorena and Junger, Marianne and Hartel, Pieter (2013) How 'digital' is traditional crime? In: European Intelligence and Security Informatics Conference, EISIC 2013, 12-14 August 2013, Uppsala, Sweden.

Rocha, Bruno P.S. and Conti, Mauro and Etalle, Sandro and Crispo, Bruno (2013) Hybrid static-runtime information flow and declassification enforcement. IEEE transactions on information forensics and security, 8 (8). pp. 1294-1305. ISSN 1556-6013

Blakey, Ed and Coecke, Bob and Mislove, Mislove and Pavlovic, Dusko (2013) Information security as a resource. Information and computation, 226 . pp. 1-2. ISSN 0890-5401

Etalle, Sandro (2013) Innovatie en R&D – Een inleiding. Magazine nationale veiligheid en crisisbeheersing, 11 (1). pp. 3-5. ISSN 1875-7561

Brusó, Mayla and Chatzikokolakis, Konstantinos and Etalle, Sandro and Hartog, Jerry den (2013) Linking unlinkability. In: 7th International Symposium on Trustworthy Global Computing, TGC 2012, September 7-8, 2012, Newcastle upon Tyne, UK (pp. pp. 129-144).

Casalicchio, E. and Caselli, M. and Coletta, A. (2013) Measuring the global domain name system. IEEE Network, 27 (1). pp. 25-31. ISSN 0890-8044

Heijden, Rens van der and Dietzel, Stefan and Kargl, Frank (2013) Misbehavior detection in vehicular ad-hoc networks. In: 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication, FG-IVC 2013, 21-22 February 2013, Innsbruck, Austria.

Junger, M. and Montoya, L. and Hartel, P.H. and Karemaker, M. (2013) Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit. [Report]

Montoya, Lorena and Junger, Marianne and Hartel, Pieter (2013) Modus operandi study of information and communication technology (ICT) facilitated crime. In: NVC Congres, 13-14 June 2013, Leiden, The Netherlands (pp. pp. 93-94).

Pavlovic, Dusko (2013) Monoidal computer I: Basic computability by string diagrams. Information and computation, 226 . pp. 94-116. ISSN 0890-5401

Pieters, Wolter and Padget, Julian and Dechesne, Francien and Dignum, Virginia and Aldewereld, Huib (2013) Obligations to enforce prohibitions: on the adequacy of security policies. In: 6th International Conference on Security of Information and Networks, SIN 2013, 26-28 November 2013, Aksaray, Turkey (pp. pp. 54-61).

Jansen, Jurjen and Junger, Marianne and Montoya, Lorena and Hartel, Peter (2013) Offenders in a digitized society. In: Cybercrime and the police. Safety & security studies . Eleven International Publishing, The Hague, The Netherlands, pp. 45-59. ISBN 9789462360693

Caselli, Marco and Hadziosmanovic, Dina and Zambon, Emmanuele and Kargl, Frank (2013) On the feasibility of device fingerprinting in industrial control systems. In: 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, 16-18 September 2013, Amsterdam, the Netherlands (pp. pp. 155-166).

Pieters, Wolter (2013) On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology . ISSN 1388-1957

Höfer, Christina and Petit, Jonathan and Schmidt, Robert and Kargl, Frank (2013) POPCORN: privacy-preserving charging for e-mobility. In: 29. VDI/VW-Gemeinschaftstagung Automotive Security, 25-26 September 2013, Kassel, Germany (pp. pp. 33-46).

Höfer, Christina and Petit, Jonathan and Schmidt, Robert K. and Kargl, Frank (2013) POPCORN: privacy-preserving charging for eMobility. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security, ACM CCS 2013, 4 November 2013, Berlin, Germany (pp. pp. 37-48).

Etalle, Sandro and Hinrichs, Timothy L. and Lee, Adam J. and Trivellato, Daniel and Zannone, Nicola (2013) Policy administration in tag-based authorization. In: 5th International Symposium on Foundations and Practice of Security, FPS 2012, October 25-26, 2012, Montreal, QC, Canada (pp. pp. 162-179).

Jeckmans, Arjan and Beye, Michael and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2013) Privacy in recommender systems. In: Social media retrieval. Computer Communications and Networks . Springer Verlag, London, pp. 263-281. ISBN 9781447145547

Peter, A. and Hartman, T. and Muller, S. and Katzenbeisser, S. (2013) Privacy-preserving architecture for forensic image recognition. In: IEEE International Workshop on Information Forensics and Security, WIFS 2012, 2-5 December 2012, Tenerife, Spain (pp. pp. 79-84).

Arnold, Florian and Pieters, Wolter and Stoelinga, Mariëlle (2013) Quantitative penetration testing with item response theory (extended version). [Report]

Labraoui, Nabila and Gueroui, Mourad and Aliouat, Makhlouf and Petit, Jonathan (2013) Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommunication systems, 54 (1). pp. 3-17. ISSN 1018-4864

Wieringa, Roel and Eck, Pascal van and Mylopoulos, John (2013) Requirements Engineering Conferences: wither industry tracks? Unabridged version with a track history of the RE Conferences. [Report]

Heijden, Rens van der and Dietzel, Stefan and Kargl, Frank (2013) SeDyA: secure dynamic aggregation in VANETs. In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, 17-19 April 2013, Budapest, Hungary (pp. pp. 131-142).

Dacier, Marc and Kargl, Frank and Valdes, Alfonso (2013) Securing critical infrastructures from targeted attacks (Dagstuhl Seminar 12502). Dagstuhl Reports, 2 (12). pp. 49-63. ISSN 2192-5283

Kargl, Frank (2013) Securing the intelligent vehicles of the future. [Lecture]

Knapik, Peter and Schoch, Elmar and Kargl, Frank (2013) Security-Funktionen zur Bekämpfung fahrzeugbezogener Kriminalität. In: 29. VDI/VW-Gemeinschaftstagung Automotive Security, 24-25 September 2013, Kassel, Germany (pp. pp. 47-62).

Dietzel, Stefan and Balanici, Mihail and Kargl, Frank (2013) Short Paper: Towards Data-similarity-based Clustering for Inter-vehicle Communication. In: IEEE Vehicular Networking Conference, VNC 2013, 16-18 December 2013, Boston, MA, USA (pp. pp. 238-241).

Knapik, Peter and Schoch, Elmar and Kargl, Frank (2013) Simulation of a security function based on vehicle-to-X communication and automotive lighting. In: Second International Conference on Advances in Vehicular Systems, Technologies and Applications, Vehicular 2013, 21-26 July 2013, Nice, France (pp. pp. 8-11).

Kargl, Frank and Rooij, Jolein de (2013) Softwarepech op de weg. Computer Idee, 2013 (6). pp. 18-21. ISSN 1388-2376

Trivellato, Daniel and Etalle, Sandro and Luit, Erik and Zannone, Nicola (2013) The POLIPO security framework. In: Situation awareness with systems of systems. Springer, New York, NY, USA, pp. 189-208. ISBN 9781461462293

Montoya, Lorena (2013) The TREsPASS project. In: ICTOpen 2013, 27-28 November 2013, Eindhoven, the Netherlands (pp. p. 1).

Hartel, P.H. and Berg, J. van den and Junger, M. (2013) Wat gaan we doen tegen de cyberaanvallen? Informatiebeveiliging, 4 (4). pp. 10-11. ISSN 1569-1063

2012

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. (2012) $A^2$thOS: availability analysis and optimisation in SLAs. International Journal of Network Management, 22 (2). pp. 104-130. ISSN 1055-7148

Altintas, Onur and Chen, Wai and Heijenk, Geert and Oh, Hyun Seo and Chung, Jong-Moon and Dressler, Falko and Kargl, Frank and Pau, Giovanni and Schoch, Elmar , eds. (2012) 2012 IEEE Vehicular Networking Conference (VNC): Demo Summaries. CTIT workshop proceedings series ; WP 12-03 (WP 12-03). University of Twente, Enschede, the Netherlands.

Hadžiosmanović, Dina and Bolzoni, Damiano and Hartel, Pieter (2012) A Log Mining Approach for Process Monitoring in SCADA. International Journal of Information Security, 11 . ISSN 1615-5262

Pieters, W. and Ven, S. van der and Probst, C. (2012) A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability. In: Proceedings of the 2012 workshop on New security paradigms (NSPW 2012), 18-21 Sep 2012, Bertinoro, Italy (pp. pp. 1-14).

Coecke, Bob and Pavlovic, Dusko and Vicary, Jamie (2012) A new description of orthogonal bases. Mathematical structures in computer science, 23 (3). pp. 555-567. ISSN 0960-1295

Pavlovic, Dusko and Meadows, Catherine (2012) Actor-Network Procedures. In: 8th International Conference on Distributed Computing and Internet Technology, ICDCIT 2012, 2-4 February 2012, Bhubaneswar, India (pp. pp. 7-26).

Peter, A. and Kronberg, M. and Trei, W. and Katzenbeisser, S. (2012) Additively homomorphic encryption with a double decryption mechanism, revisited. In: 15th International Conference on Information Security, ISC 2012, 19-21 September 2012, Passau, Germany (pp. pp. 242-257).

Dimkov, Trajce (2012) Alignment of organizational security policies : theory and practice. thesis.

Bißmeyer, N. and Mauthofer, S. and Kpatcha, B. and Kargl, F. (2012) Assessment of Node Trustworthiness in VANETs Using Data Plausibility Checks with Particle Filters. In: IEEE Vehicular Networking Conference, VNC 2012, 14-16 November 2012, Seoul, Korea (pp. pp. 78-85).

Bullee, Jan-Willem and Veldhuis, Raymond (2012) Biometric features and privacy : condemned, based upon your finger print. In: 33rd WIC Symposium on Information Theory in the Benelux and the 2nd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 24-25 May 2012, Boekelo, The Netherlands (pp. pp. 44-51).

Hartel, Pieter (2012) Book review: The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / by P. Engebretson. - Waltham, MA : Syngress Publishing, 2011. - ISBN 978-1-597496-55-1. Computing Reviews (CR140206). ISSN 1530-6585

Dietzel, Stefan and Kost, Martin and Schaub, Florian and Kargl, Frank (2012) CANE: A Controlled Application Environment for Privacy Protection in ITS. In: 12th International Conference on Intelligent Transport Systems Telecommunications, ITST 2012, 5-8 November 2012, Taipeh, Taiwan.

Hadziosmanovic, Dina and Bolzoni, Damiano and Etalle, Sandro and Hartel, Pieter (2012) Challenges and opportunities in securing industrial control systems. In: IEEE Workshop on Complexity in Engineering, COMPENG 2012, 11-13 June 2012, Aachen, Germany (pp. pp. 1-6).

Feiri, Michael and Petit, Jonathan and Kargl, Frank (2012) Congestion-based Certificate Omission in VANETs. In: Ninth ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2012, June 25, 2012, Low Wood Bay, Lake District, UK (pp. pp. 135-138).

Kocabas, U. and Peter, A. and Katzenbeisser, S. and Sadeghi, A. (2012) Converse PUF-based authentication. In: 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, 13-15 June 2012, Vienna, Austria (pp. pp. 142-158).

Tang, Qiang (2012) Cryptographic framework for analyzing the privacy of recommender algorithms. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 May 2012, Denver, CO, USA (pp. pp. 455-462).

Kulikova, Olga and Heil, Ronald and Berg, Jan van den and Pieters, Wolter (2012) Cyber crisis management: a decision-support framework for disclosing security incident information. In: International Conference on Cyber Security, CyberSecurity 2012, 14-16 December 2012, Washington, DC, USA (pp. pp. 103-112).

Vriezekolk, Eelco and Wieringa, Roel and Etalle, Sandro (2012) Design and initial validation of the Raster method for telecom service availability risk assessment. In: 9th International Conference on Information Systems for Crisis Response and Managemen, ISCRAM 2012, 22-25 April 2012, Vancouver, Canada (pp. p. 117).

Feiri, Michael and Petit, Jonathan and Kargl, Frank (2012) Evaluation of Congestion-based Certificate Omission in VANETs. In: IEEE Vehicular Networking Conference, VNC 2012, 14-16 November 2012, Seoul, Korea (pp. pp. 101-108).

Meadows, C. and Pavlovic, D. (2012) Formalizing physical security procedures. In: 8th International Workshop on Security and Trust Management, STM 2012, September 13-14, 2012, Pisa, Italy (pp. pp. 193-208).

Pavlovic, D. (2012) Geometry of abstraction in quantum computation. In: Mathematical foundations of information flow : Clifford Lectures Information Flow in Physics, Geometry, and Logic and Computation, March 12-15, 2008, Tulane University, New Orleans, Louisiana. Proceedings of symposia in applied mathematics, 71 . American Mathematical Society, pp. 233-267. ISBN 9780821849231

Hartel, Pieter and Suryana Herman, Nanna (2012) Information Security. In: Cyber Safety: An Introduction. Eleven International Publishers, The Hague, the Netherlands, pp. 281-291. ISBN 9789490947750

Pavlovic, Dusko (2012) Logics of authentication, lieing and obscurity. [Lecture]

Kelkboom, E.J.C. and Breebaart, J. and Buhan, I.R. and Veldhuis, R.N.J. (2012) Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources. IEEE Transactions on information forensics and security, 7 (4). pp. 1225-1241. ISSN 1556-6013

Casalicchio, Emiliano and Caselli, Marco and Coletta, Alessio and Di Blasi, Salvatore and Fovino, Igor Nai (2012) Measuring name system health. In: 6th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2012, 9-21 March 2012, Washington, DC, USA (pp. pp. 155-169).

Hadžiosmanović, Dina and Simionato, Lorenzo and Bolzoni, Damiano and Zambon, Emmanuele and Etalle, Sandro (2012) N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols. In: 15th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2012, 12-14 September 2012, Amsterdam, The Netherlands (pp. pp. 354-373).

Schaub, Florian and Hipp, Markus and Kargl, Frank and Weber, Michael (2012) On credibility improvements for automotive navigation systems. Journal of personal and ubiquitous computing, 17 (5). pp. 803-813. ISSN 1617-4909

Petit, Jonathan and Bösch, Christoph and Feiri, Michael and Kargl, Frank (2012) On the Potential of PUF for Pseudonym Generation in Vehicular Networks. In: IEEE Vehicular Networking Conference, VNC 2012, 14-16 November 2012, Seoul, Korea (pp. pp. 94-100).

Schaub, Florian and Koenings, Bastian and Dietzel, Stefan and Weber, Michael and Kargl, Frank (2012) Privacy context model for dynamic privacy adaptation in ubiquitous computing. In: ACM Conference on Ubiquitous Computing, UbiComp 2012, CASEMANS 2012 Workshop, 8 September 2012, Pittsburgh, PA, USA (pp. pp. 752-757).

Beye, Michael and Jeckmans, Arjan J.P. and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2012) Privacy in Online Social Networks. In: Computational Social Networks: Security and Privacy. Springer Verlag, London, pp. 87-113. ISBN 9781447140504

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2012) Privacy-Preserving Collaborative Filtering based on Horizontally Partitioned Dataset. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 May 2012, Denver, CO, USA (pp. pp. 439-446).

Tang, Qiang (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. International journal of applied cryptography, 2 (4). pp. 304-321. ISSN 1753-0563

Tang, Qiang (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Security and communication networks, 5 (12). pp. 1351-1362. ISSN 1939-0122

Pavlovic, Dusko (2012) Quantitative Concept Analysis. In: 10th International Conference on Formal Concept Analysis, ICFCA 2012, 7-10 May 2012, Leuven, Belgium (pp. pp. 260-277).

Hartel, Pieter (2012) Review of: Smartening the crowds: computational techniques for improving human verification to fight phishing scams / by G. Liu, G. Xiang, B. Pendleton, J. Hong, W. Liu. [Review of the book ] Computing reviews , ACM, New York, NY, USA, CR139837. ISSN 0010-4884

Herrmann, Andrea and Morali, Ayse and Etalle, Sandro and Wieringa, Roel (2012) Risk and Business Goal Based Security Requirement and Countermeasure Prioritization. In: Workshops on Business Informatics Research, BIR 2011, 6-8 October 2011, Riga, Latvia (pp. pp. 64-76).

Lagana, M. and Feiri, M. and Sall, M. and Lange, M. and Tomatis, A. and Papadimitratos, P. (2012) Secure Communication in Vehicular Networks - PRESERVE Demo. In: 2012 IEEE Vehicular Networking Conference, VNC, 14-16 November 2012, Seoul, Korea (pp. pp. 11-12).

Pieters, W. and Dimkov, T. and Pavlovic, D. (2012) Security Policy Alignment: A Formal Approach. IEEE Systems Journal . ISSN 1932-8184

Cleeff, André van and Dimkov, Trajce and Pieters, Wolter and Wieringa, Roel (2012) Security Requirements with Physical Properties: A Case Study on Paper Voting. In: Proceedings of the International Conference on IT Convergence and Security 2011. Lecture Notes in Electrical Engineering, 120 . Springer Verlag, London, pp. 51-67. ISBN 9789400729100

Bösch, Christoph and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2012) Selective Document Retrieval from Encrypted Database. In: 15th International Conference on Information Security, ISC 2012, 19-21 September 2012, Passau, Germany.

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012) Shift-type homomorphic encryption and its application to fully homomorphic encryption. In: 5th International Conference on Cryptology in Africa, AFRICACRYPT 2012, 10-12 July 2012, Ifrane, Morocco (pp. pp. 234-251).

Hartel, P. and Junger, M. (2012) Teaching Information Security Students to "Think thief". [Report]

Schaub, Florian and Könings, Bastian and Weber, Michael and Kargl, Frank (2012) Towards context adaptive privacy decisions in ubiquitous computing. In: IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012, 19-23 March 2012, Lugano, Switserland (pp. pp. 407-410).

Sedghi, Saeed (2012) Towards provably secure efficiently searchable encryption. thesis.

Dressler, Falko and Kargl, Frank (2012) Towards security in nano-communication: challenges and opportunities. Nano communication networks, 3 (3). pp. 151-160. ISSN 1878-7789

Pavlovic, Dusko (2012) Tracing the man in the middle in monoidal categories. In: 11th International Workshop on Coalgebraic Methods in Computer Science, CMCS 2012, 31 March - 1 April 2012, Tallinn, Estonia (pp. pp. 191-217).

Knapik, Peter and Schoch, Elmar and Müller, Maik and Kargl, Frank (2012) Understanding vehicle related crime to elaborate on countermeasures based on ADAS and V2X communication. In: IEEE Vehicular Networking Conference, VNC 2012, 14-16 November 2012, Seoul, Korea (pp. pp. 86-93).

2011

Bolzoni, Damiano and Schade, Christiaan and Etalle, Sandro (2011) A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. In: 25th Large Installation System Administration Conference, LISA 2011, 4-9 December 2011, Boston, MA, USA (pp. pp. 201-216).

Trivellato, Daniel and Zannone, Nicola and Etalle, Sandro (2011) A Security Framework for Systems of Systems. In: IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2011, 6-8 June 2011, Pisa, Italy (pp. pp. 182-183).

Kargl, Frank and Papadimitratos, Panos (2011) ACM WiSec 2011 poster and demo session. ACM SIGMOBILE Mobile Computing and Communications Review, 15 (3). p. 34. ISSN 1559-1662

Schmidt, Robert K. and Brakemeier, Achim and Leinmüller, Tim and Kargl, Frank and Schäfer, Günther (2011) Advanced carrier sensing to resolve local channel congestion. In: Eighth ACM international workshop on Vehicular inter-networking, VANET 2011, 23 September 2011, Las Vegas, NV, USA (pp. pp. 11-20).

Johnson, Michael and Pavlovic, Dusko , eds. (2011) Algebraic methodology and software technology : 13th international conference, AMAST 2010, Lac-Beauport, QC, Canada, June 23-25, 2010: revised selected papers. Lecture notes in computer science, 6486 . Springer Verlag, Berlin, Germany. ISBN 9783642177958

Pieters, Wolter (2011) Cloud security in vogelvlucht. Informatiebeveiliging, 2011 (1). pp. 16-17. ISSN 1569-1063

Bösch, Christoph and Brinkman, Richard and Hartel, Pieter and Jonker, Willem (2011) Conjunctive Wildcard Search over Encrypted Data. In: 8th VLDB Workshop on Secure Data Management, SDM 2011, 2 September 2011, Seattle, WA, USA (pp. pp. 114-127).

Makri, Eleftheria and Konstantinou, Elisavet (2011) Constant round group key agreement protocols: A comparative study. Computers & Security, 30 (8). pp. 643-678. ISSN 0167-4048

Ibraimi, Luan (2011) Cryptographically enforced distributed data access control. thesis.

Petit, Jonathan and Mammeri, Zoubir (2011) Dynamic Consensus for Secured Vehicular Ad Hoc Networks. In: 7th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, IEEE WiMob 2011, 10-12 October 2011, Shanghai, China.

Tang, Qiang and Chen, Liqun (2011) Extended KCI attack against two-party key establishment protocols. Information Processing Letters, 111 (15). pp. 744-747. ISSN 0020-0190

Degano, Pierpaolo and Etalle, Sandro and Guttman, Joshua , eds. (2011) Formal aspects of security and trust : 7th international workshop, FAST 2010 Pisa, Italy, September 16-17, 2010: revised selected papers. Lecture notes in computer science, 6561 . Springer Verlag, Berlin, Germany. ISBN 9783642197512

Barthe, Gilles and Datta, Anupam and Etalle, Sandro , eds. (2011) Formal aspects of security and trust : 8th international workshop, FAST 2011 Leuven, Belgium, September 12-14, 2011: revised selected papers. Lecture notes in computer science, 7140 . Springer Verlag, Berlin, Germany. ISBN 9783642294198

Pavlovic, Dusko (2011) Gaming security by obscurity. In: The New Security Paradigms Workshop (NSPW) , September 12-15, 2011, Marin County, CA, USA.

Pavlovic, Dusko (2011) Gaming security by obscurity. In: New Security Paradigms Workshop, NSPW 2011, September 12-15, 2011, Marin County, CA, USA (pp. pp. 125-140).

Pieters, Wolter (2011) High security, human significance: Informatiebeveiliging in Twente. Informatiebeveiliging, 2011 (2). pp. 14-17. ISSN 1569-1063

Vriezekolk, E. and Wieringa, R. and Etalle, S. (2011) How to assess telecom service availability risks for crisis organisations? In: 20th European Safety and Reliability Annual Conference, ESREL 2011, 18-22 September 2011, Troyes, France (pp. pp. 2653-2661).

Morali, Ayse (2011) IT architecture-based confidentiality risk assessment in networks of organizations. thesis.

Alberts, Gerard and Boersma, Kees and Broekhans, Bertien and Dijkstra, Anne and Pieters, Wolter and Popkema, Marcus and Vanheste, Tomas (2011) Inleiding: Kennisklimaat. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving, 7 . Amsterdam University Press, Amsterdam, pp. 7-11. ISBN 9789089644015

Kolesnichenko, Anna and Boer, Pieter-Tjerk de and Remke, Anne and Zambon, Emmanuele and Haverkort, Boudewijn R. (2011) Is Quantitative Analysis of Stuxnet Possible? In: 8th International Conference on Quantitative Evaluation of SysTems, QEST 2011, September 5-8, 2011, Aachen, Germany (pp. pp. 9-10).

Gong, Zheng and Nikova, Svetla and Law, Yee Wei (2011) KLEIN: A New Family of Lightweight Block Ciphers. In: 7th International Workshop on RFID, Security and Privacy, RFIDSec 2011, June 26-28, 2011, Amherst, MA, USA (pp. pp. 1-18).

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter and Etalle, Sandro (2011) MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. In: European Conference on Computer Network Defense, EC2ND 2011, 6-8 Sept 2011, Gothenburg, Sweden (pp. pp. 41-48).

Dietzel, Stefan and Kargl, Frank and Heijenk, Geert and Schaub, Florian (2011) Modeling In-Network Aggregation in VANETs. IEEE Communications Magazine, 49 (11). pp. 142-148. ISSN 0163-6804

Franz, M. and Williams, P. and Carbunar, B. and Katzenbeisser, S. and Peter, A. and Sion, R. and Sotakova, M. (2011) Oblivious outsourced storage with delegation. In: 15th International Conference on Financial Cryptography and Data Security, FC 2011, 28 February - 04 March 2011, Gros Islet, St. Lucia (pp. pp. 127-140).

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks. In: 18th ACM conference on Computer and Communications Security, CCS 2011, 17-21 October 2011 , Chicago, IL, USA (pp. pp. 793-795).

Dimkov, Trajce and Pieters, Wolter (2011) Physical Penetration Testing: A Whole New Story in Penetration Testing. [Report]

Sedghi, Saeed and Hartel, Pieter and Jonker, Willem and Nikova, Svetla (2011) Privacy Enhanced Access Control by Means of Policy Blinding. In: 7th International Conference on Information Security Practice and Experience, ISPEC 2011, May 30 - June 1, 2011, Guangzhou, China (pp. pp. 108-122).

Dietzel, Stefan (2011) Privacy Implications of In-Network Aggregation Mechanisms for VANETs. In: 8th International Conference on Wireless On-demand Network Systems and Services, 26-28 Jan 2011, Bardonecchia, Italy.

Kost, Martin and Freytag, Johann-Christoph and Kargl, Frank and Kung, Antonio (2011) Privacy Verification Using Ontologies. In: Sixth International Conference on Availability, Reliability and Security, ARES 2011, 22-26 August 2011, Vienna, Austria (pp. pp. 627-632).

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) Privacy-Preserving Profile Matching Using the Social Graph. [Report]

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) Privacy-Preserving Profile Matching Using the Social Graph. In: International Conference on Computational Aspects of Social Networks, CASoN 2011, 19-21 October 2011 , Salamanca, Spain (pp. pp. 42-47).

Kung, Antonio and Freytag, Johann-Christoph and Kargl, Frank (2011) Privacy-by-Design in ITS Applications : The Way Forward. In: Second International Workshop on Data Security and PrivAcy in wireless Networks, D-SPAN 2011, 20 June 2011, Lucca, Italy.

Trivellato, Daniel and Zannone, Nicola and Etalle, Sandro (2011) Protecting Information in Systems of Systems. In: 18th ACM conference on Computer and Communications Security, CCS 2011, 17-21 October 2011 , Chicago, IL, USA (pp. pp. 865-867).

Tang, Qiang (2011) Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization. [Report]

Ibraimi, Luan and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2011) Public-Key Encryption with Delegated Search. In: 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, June 7-10, 2011, Nerja, Malaga, Spain (pp. pp. 532-549).

Labraoui, Nabila and Gueroui, Mourad and Aliouat, Makhlouf and Petit, Jonathan (2011) RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks. Journal of Universal Computer Science, 17 (11). pp. 1550-1571. ISSN 0948-695X

Pieters, Wolter and Coles-Kemp, Lizzie (2011) Reducing normative conflicts in information security. In: 2011 New Security Paradigms Workshop, NSPW 2011, 12-15 September 2011, Marin County, CA (pp. pp. 11-24).

Pavlovic, Dusko (2011) Relating Toy Models of Quantum Computation: Comprehension, Complementarity and Dagger Mix Autonomous Categories. Electronic Notes in Theoretical Computer Science (ENTCS), 270 (2). pp. 121-139. ISSN 1571-0661

Pieters, Wolter (2011) Representing humans in system security models: An actor-network approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2 (1). pp. 75-92. ISSN 2093-5374

Dressler, Falko and Kargl, Frank and Ott, Jörg and Tonguz, Ozan K. and Wischof, Lars (2011) Research Challenges in Intervehicular Communication: Lessons of the 2010 Dagstuhl Seminar. IEEE Communications Magazine, 49 (5). pp. 158-164. ISSN 0163-6804

Pieters, Wolter (2011) Risicopersonalisatie en haar falen in collectieve vraagstukken. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving, 7 . Amsterdam University Press, Amsterdam, pp. 197-207. ISBN 9789089644015

Herrmann, Andrea and Morali, Ayse and Etalle, Sandro and Wieringa, Roel (2011) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization. In: 1st International Workshop on Alignment of Business Process and Security Modelling, ABPSM 2011, 6-8 Oct 2011, Riga, Latvia (pp. pp. 1-8).

Pieters, Wolter (2011) Security and privacy in the clouds: a bird's eye view. In: Computers, Privacy and Data Protection: an Element of Choice. Springer, Dordrecht, pp. 445-457. ISBN 9789400706408

Hartel, Pieter H. and Muller, Henk L. (2011) Simple algebraic data types for C. Software: Practice and Experience . ISSN 0038-0644

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter (2011) Smart Device Profiling for Smart SCADA. In: 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, 20-21 Sept 2011, Menlo Park, California, USA.

Petit, Jonathan and Feiri, Michael and Kargl, Frank (2011) Spoofed Data Detection in VANETs using Dynamic Thresholds. In: IEEE Vehicular Networking Conference, VNC 2011, 14-16 November 2011, Amsterdam, The Netherlands (pp. pp. 25-32).

Pieters, Wolter (2011) The (social) construction of information security. The Information Society, 27 (5). pp. 326-335. ISSN 0197-2243

Tang, Qiang (2011) Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. In: Proceedings of the 16th Australian conference on information security and privacy, 11-13 Jul 2011, Melbourne, Australia.

Tang, Qiang and Jeckmans, Arjan (2011) Towards a security model for computational puzzle schemes. International Journal of Computer Mathematics, 88 (11). pp. 2246-2257. ISSN 0020-7160

Zambon, Emmanuele (2011) Towards optimal IT availability planning: methods and tools. thesis.

2010

Böhm, Klemens and Etalle, Sandro and Hartog, Jerry den and Hütter, Christian and Trabelsi, Slim and Trivellato, Daniel and Zannone, Nicola (2010) A flexible architecture for privacy-aware trust management. Journal of Theoretical and Applied Electronic Commerce Research, 5 (2). pp. 77-96. ISSN 0718-1876

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. (2010) A2THOS: Availability Analysis and Optimisation in SLAs. [Report]

Pieters, Wolter (2010) ANKH: Information Threat Analysis with Actor-NetworK Hypergraphs. [Report]

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2010) ANWB-enquête niet democratisch. NRC handelsblad, 40 (25-01-). p. 6. ISSN 0002-5259

Ibraimi, Luan and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2010) An Identity-Based Group Signature with Membership Revocation in the Standard Model. [Report]

Langer, Lucie and Jonker, Hugo and Pieters, Wolter (2010) Anonymity and Verifiability in Voting: Understanding (Un)Linkability. In: Information and Communications Security. Lecture Notes in Computer Science, 6476 . Springer Verlag, Berlin, pp. 296-310. ISBN 9783642176494

Jonker, Hugo and Pieters, Wolter (2010) Anonymity in voting revisited. In: Towards Trustworthy Elections: New Directions in Electronic Voting. Lecture Notes in Computer Science, 6000 . Springer Verlag, Berlin, pp. 216-230. ISBN 9783642129797

Pavlovic, Dusko and Meadows, Catherine (2010) Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol. In: 26th Conference on the Mathematical Foundations of Programming Semantics, MFPS 2010, 6-10 May 2010, Ottawa, Ontario, Canada (pp. pp. 97-122).

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2010) Benefits of Location-Based Access Control:A Literature Study. In: 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010, 18-20 Dec 2010, Hangzhou, China.

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel (2010) CRAC: Confidentiality Risk Assessment and IT-Architecture Comparison. In: Proceedings of the 6th International Conference on Network and Service Management, CNSM 2010, 25-29 Oct 2010, Niagara Falls, Canada. (In Press)

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel (2010) CRAC: Confidentiality Risk Assessment and IT-Infrastructure Comparison. In: 25th IFIP International Information Security Conference, SEC 2010: "Security & Privacy - Silver Linings in the Cloud", 20-23 Sep 2010, Brisbane, Australia. (In Press)

Liesdonk, Peter van and Sedghi, Saeed and Doumen, Jeroen and Hartel, Pieter and Jonker, Willem (2010) Computationally Efficient Searchable Symmetric Encryption. In: 7th VLDB Workshop on Secure Data Management, SDM 2010, 17 Sep 2010, Singapore (pp. pp. 87-100).

Liu, Bozhong and Gong, Zheng and Chen, Xiaohong and Qiu, Weidong and Zheng, Dong (2010) Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function. In: Internet Technology and Applications, 2010 International Conference on. IEEE, pp. 1-5. ISBN 9781424451425

Hartel, Pieter and Junger, Marianne and Wieringa, Roel (2010) Cyber-crime Science = Crime Science + Information Security. [Report]

Leinmüller, Tim and Schoch, Elmar and Kargl, Frank and Maihöfer, Christian (2010) Decentralized position verification in geographic ad hoc routing. Security and communication networks, 3 (4). pp. 289-302. ISSN 1939-0122

Schoch, Elmar and Bako, Boto and Dietzel, Stefan and Kargl, Frank (2010) Dependable and Secure Geocast in Vehicular Networks. In: Seventh ACM International Workshop on VehiculAr InterNETworking, VANET 2010, September 24, 2010, Chicago, US (pp. pp. 61-68).

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations. In: 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010, 18-20 Dec 2010, Hangzhou, China.

Tang, Qiang and Jeckmans, Arjan (2010) Efficient Client Puzzle Schemes to Mitigate DoS Attacks. In: International Conference on Computational Intelligence and Security, CIS 2010, 11-14 dec 2010, Nanning, China.

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2010) Embedding renewable cryptographic keys into noisy data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262

Pieters, Wolter (2010) Explanation and trust: what to tell the user in security and AI? Ethics and Information Technology . ISSN 1388-1957

Pieters, Wolter (2010) Explanation and trust: what to tell the user in security and AI? [Report]

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2010) Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. International Journal of Computational Models and Algorithms in Medicine, 1 (2). pp. 1-21. ISSN 1947-3133

Pavlovic, Dusko and Pepper, Peter and Smith, Douglas R. (2010) Formal Derivation of Concurrent Garbage Collectors. In: 10th International Conference on Mathematics of Program Construction, MPC 2010, June 21-23, 2010, Québec City, Canada (pp. pp. 353-376).

Tang, Qiang (2010) From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. [Report]

De Beule, Jan and Edel, Yves and Käsper, Emilia and Klein, Andreas and Nikova, Svetla and Preneel, Bart and Schillewaert, Jeroen and Storme, Leo (2010) Galois geometries and applications. Designs, Codes and Cryptography, 56 (2-3). pp. 85-86. ISSN 0925-1022

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2010) Gooi eigen servers en pc’s niet weg. Best Practice Magazine, 4 (1). pp. 8-10. ISSN 1877-9557

Pieters, Wolter (2010) How devices transform voting. In: Innovating Government. Normative, policy and technological dimensions of modern government. Information Technology and Law Series, 20 . T.M.C. Asser Press, The Hague. ISBN 9789067047302

Pieters, Wolter (2010) Informational precaution. In: 8th Conference on Computing and Philosophy, ECAP10, 4-6 Oct 2010, Munich, Germany (pp. pp. 320-325).

Hipp, Markus and Schaub, Florian and Kargl, Frank and Weber, Michael (2010) Interaction Weaknesses of Personal Navigation Devices. In: Second International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI 2010, 11-12 Nov 2010, Pittsburgh, Pennsylvania (pp. pp. 129-136).

Pieters, Wolter and Boersma, K. and Alberts, G. and Timmer, J. and Dijkstra, A. and Popkema, M. (2010) Inzicht en toezicht: controle in de kennissamenleving. In: Inzicht en toezicht: controle in de kennissamenleving. Jaarboek Kennissamenleving (6). Aksant, Amsterdam, pp. 7-17. ISBN 9789052603841

Gong, Zheng and Tang, Qiang and Law, Yee Wei and Chen, Hongyang (2010) KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. In: International Conference on Information Security and Cryptology, INSCRYPT 2010, 20-24 Oct 2010, Shanghai, China.

Law, Yee Wei and Moniava, Giorgi and Gong, Zheng and Hartel, Pieter and Palaniswami, Marimuthu (2010) KALwEN: a new practical and interoperable key management scheme for body sensor networks. Security and communication networks, 4 (11). pp. 1309-1329. ISSN 1939-0122

Gong, Zheng and Nikova, Svetla and Law, Yee-Wei (2010) KLEIN: A New Family of Lightweight Block Ciphers. [Report]

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. In: 17th ACM Conference on Computer and Communications Security, CCS 2010, 4-8 Oct 2010, Chicago, Illinois, US (pp. pp. 666-668).

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. [Report]

Beye, Michael and Jeckmans, Arjan and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2010) Literature Overview - Privacy in Online Social Networks. [Report]

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter (2010) MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. In: 13th International Symposium on Recent Advances in Intrusion Detection, RAID 2010, 15-17 Sep 2010, Ottawa, Canada (pp. pp. 500-501).

Kargl, Frank and Schaub, Florian and Dietzel, Stefan (2010) Mandatory Enforcement of Privacy Policies using Trusted Computing Principles. In: Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA (pp. pp. 104-109).

Ma, Zhendong and Kargl, Frank and Weber, Michael (2010) Measuring long-term location privacy in vehicular communication systems. Computer Communications, 33 (12). pp. 1414-1427. ISSN 0140-3664

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. and Hartel, Pieter (2010) Model-based Qualitative Risk Assessment for Availability of IT Infrastructures. Software and Systems Modeling . ISSN 1619-1366

Tang, Qiang and Jeckmans, Arjan (2010) On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. [Report]

Schoch, Elmar and Kargl, Frank (2010) On the Efficiency of Secure Beaconing in VANETs. In: Proceedings of the third ACM conference on Wireless network security (ACM WiSec 2010), Hoboken, New Jersey, USA (pp. pp. 111-116).

Dietzel, Stefan and Kargl, Frank and Heijenk, Geert and Schaub, Florian (2010) On the Potential of Generic Modeling for VANET Data Aggregation Protocols. In: Proceedings of the 2nd IEEE Vehicular Networking Conference, 13-15 Dec 2010, Jersey City, New Jersey, USA (pp. pp. 78-85).

Khatib, Mohammed G. and Hartel, Pieter H. (2010) Optimizing MEMS-Based Storage Devices for Mobile Battery-Powered Systems. ACM Transactions on Storage, 6 (1). pp. 1-37. ISSN 1553-3077

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Portunes: analyzing multi-domain insider threats. [Report]

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Portunes: representing attack scenarios spanning through the physical, digital and social domain. In: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS '10, 27-28 March 2010, Paphos, Cyprus. (In Press)

Bauer, Lujo and Etalle, Sandro and Hartog, Jerry den and Viganò, Luca (2010) Preface of Special Issue on “Computer Security: Foundations and Automated Reasoning”. Journal of Automated Reasoning, 46 (3-4). pp. 223-224. ISSN 0168-7433

Tang, Qiang (2010) Privacy Preserving Mapping Schemes Supporting Comparison. In: ACM Cloud Computing Security Workshop, CCSW 2010, 9 oct 2010, Chicago, Illinois.

Wiedersheim, B. and Ma, Zhendong and Kargl, F. and Papadimitratos, P. (2010) Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough. In: The Seventh International Conference on Wireless On-demand Network Systems and Services (WONS 2010), 3-5 Feb. 2010, Kranska Gora, Slovenia (pp. pp. 176-183).

Luo, Yiyuan and Lai, Xuejia and Gong, Zheng (2010) Pseudorandomness analysis of the (extended) Lai–Massey scheme. Information Processing Letters, 111 (2). pp. 90-96. ISSN 0020-0190

Pavlovic, D. (2010) Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks. In: 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, 16-17 September 2010, Pisa, Italy (pp. pp. 1-17).

Brzuska, C. and Busch, H. and Dagdelen, O. and Fischlin, M. and Franz, M. and Katzenbeisser, S. and Manulis, M. and Onete, C. and Peter, A. and Poetering, B. and Schröder, D. (2010) Redactable signatures for tree-structured data: definitions and constructions. In: 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, 22-25 June 2010, Beijing, China (pp. pp. 87-104).

Dietzel, Stefan and Schoch, Elmar and Kargl, Frank and Könings, Bastian and Weber, Michael (2010) Resilient Secure Aggregation for Vehicular Networks. IEEE Network, 24 (1). pp. 26-31. ISSN 0890-8044

Qiu, Weidong and Gong, Zheng and Liu, Bozhong and Long, Yu and Chen, Kefei (2010) Restrictive partially blind signature for resource-constrained information systems. Knowledge and Information Systems . ISSN 0219-3116 (In Press)

Pieters, Wolter (2010) Reve(a,i)ling the risks: a phenomenology of information security. Techné: Research in Philosophy and Technology, 14 (3). pp. 176-188. ISSN 1091-8264

Morali, Ayse and Wieringa, Roel (2010) Risk-Based Confidentiality Requirements Specification for Outsourced IT Systems. [Report]

Morali, Ayse and Wieringa, Roel (2010) Risk-Based Confidentiality Requirements Specification for Outsourced IT Systems. In: 18th IEEE International Requirements Engineering Conference, RE 2010, 27 Sept - 1 Oct 2010, Sydney, Australia. (In Press)

Herrmann, Andrea and Morali, Ayse (2010) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization (extended version). [Report]

Sedghi, S. and Liesdonk, Peter van and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2010) Searching Keywords with Wildcards on Encrypted Data. [Report]

Sedghi, Saeed and Liesdonk, Peter van and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2010) Searching Keywords with Wildcards on Encrypted Data. In: Seventh international Conference on Security and Cryptography for Networks, SCN 2010, September 13-15, 2010, Amalfy, Italy (pp. pp. 138-153).

Nikova, Svetla and Rijmen, Vincent and Schläffer, Martin (2010) Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. Journal of Cryptology . ISSN 0933-2790

Pieters, Wolter (2010) Security in the clouds: a bird's eye view. [Report]

Hartel, Pieter and Muller, Henk (2010) Simple algebraic data types for C. [Report]

Könings, Bastian and Schaub, Florian and Weber, Michael and Kargl, Frank (2010) Territorial Privacy in Smart Environments. In: Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA (pp. pp. 113-118).

Pavlovic, Dusko (2010) The Unreasonable Ineffectiveness of Security Engineering: An Overview. In: 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010, 13-18 Sep 2010, Pisa, Italy (pp. pp. 12-18).

Zannone, Nicola and Petkovic, Milan and Etalle, Sandro (2010) Towards Data Protection Compliance. In: 5th International Conference on Security and Cryptography, SECRYPT 2010, 26-28 July 2010, Athens, Greece (pp. pp. 213-216).

Morali, Ayse and Wieringa, Roel (2010) Towards Validating Risk Indicators Based on Measurement Theory. In: First International Workshop on Risk and Trust in Extended Enterprises, November 1-4, 2010, San Jose, CA, USA.

Morali, Ayse and Wieringa, Roel (2010) Towards Validating Risk Indicators Based on Measurement Theory (Extended version). [Report]

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter (2010) Towards securing SCADA systems against process-related threats. [Report]

Rocha, Bruno P.S. and Bandhakavi, Sruthi and Hartog, Jerry den and Winsborough, William H. and Etalle, Sandro (2010) Towards static flow-based declassification for legacy and untrusted programs. In: IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, California (pp. pp. 93-108).

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Training Students to Steal: A Practical Assignment in Computer Security Education. In: 42nd ACM Technical Symposium on Computer Science Education, SIGCSE’11, March 9-12, 2011, Dallas, Texas, USA.

Nasution, Sandy and Hartel, Pieter and Suryana, Nanna and Azman, Nur and Shahib, Shahrin (2010) Trust Level and Routing Selection for Mobile Agents in a Smart Home. In: Second International Conference on Computer Modeling and Simulation, ICCMS, 22-24 Jan. 2010, Sanya, China (pp. pp. 445-450).

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Two methodologies for physical penetration testing using social engineering. In: Annual Computer Security Applications Conference, ACSAC '10, 6-10 Dec 2010, Austin, Texas, USA.

Tang, Qiang (2010) User-friendly matching protocol for online social networks. In: 17th ACM Conference on Computer and Communications Security, 4-8 oct 2010, Chicago, IL (pp. pp. 732-734).

Schaub, Florian and Kargl, Frank and Ma, Zhendong and Weber, Michael (2010) V-Tokens for Conditional Pseudonymity in VANETs. In: IEEE Wireless Communications and Networking Conference (WCNC 2010), 18-21 April 2010, Sydney, Australia (pp. pp. 1-6).

Pieters, Wolter (2010) Verifiability of electronic voting: between confidence and trust. In: Data Protection in a Profiled World. Springer, Dordrecht, pp. 157-175. ISBN 9789048188642

Barreto, Paulo and Nikov, Ventzislav and Nikova, Svetla and Rijmen, Vincent and Tischhouser, Elmar (2010) Whirlwind: a new cryptographic hash function. Designs, Codes and Cryptography, 56 (2-3). pp. 141-162. ISSN 0925-1022

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2010) Zorg liever voor een overzichtelijk stembiljet. NRC handelsblad, 40 (07-06-). p. 6. ISSN 0002-5259

2009

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2009) A Taxonomy of Service Discovery Systems. In: Context-Aware Computing and Self-Managing Systems. CRC Studies in Informatics . Chapman and Hall, Boca Raton, pp. 43-77. ISBN 9781420077711

Sedghi, S. and Liesdonk, P. van and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2009) Adaptively Secure Computationally Efficient Searchable Symmetric Encryption. [Report]

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. and Hartel, Pieter (2009) Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures. [Report]

Haverkort, Boudewijn and Remke, Anne and Hartel, Pieter (2009) Betere beveiliging Scada-systemen vitaal voor Nederlandse infrastructuren. Bits & chips : tweewekelijks nieuwsmagazine voor de hightechindustrie, 11 (16). p. 23. ISSN 1879-6443

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel (2009) CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks. [Report]

Ibraimi, Luan and Petkovic, Milan and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2009) Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes (extended version). [Report]

Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. [Report]

Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. In: E-Voting and Identity: Second International Conference, VOTE-ID 2009, 7-8 Sep 2009, Luxembourg city, Luxembourg (pp. pp. 172-190).

Pieters, W. (2009) Converging technologies and de-perimeterisation: towards risky active insulation. In: Proceedings of SPT 2009: Converging technologies, changing societies, 7-10 Jul 2009, Enschede, The Netherlands (pp. pp. 58-60).

Pieters, W. and Tang, Q. (2009) Data is key: introducing the data-based access control paradigm. [Report]

Pieters, W. and Tang, Q. (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada (pp. pp. 240-251).

Pieters, Wolter (2009) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2008 (3). pp. 18-20. ISSN 1569-1063

Saffarian, M. and Tang, Q. and Jonker, W. and Hartel, P.H. (2009) Dynamic User Role Assignment in Remote Access Control. [Report]

Weng, Jiang and Yang, Yanjiang and Tang, Qiang and Deng, Robert H. and Bao, Feng (2009) Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. In: Information Security. Lecture Notes in Computer Science, 5735 . Springer Verlag, Heidelberg, pp. 151-166. ISBN 9783642044731

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2009) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. In: 5th International Conference on Information Security Practice and Experience, ISPEC, 12-15 April 2009, Xi'an, China (pp. pp. 1-12).

Jacobs, B.P.F. and Pieters, W. (2009) Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. In: Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures. Lecture Notes in Computer Science, 5705 . Springer Verlag, Berlin, pp. 121-144. ISBN 9783642038280

Law, Y.W. and Palaniswami, M. and Hoesel, L.F.W. van and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2009) Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks, 5 (1). p. 6. ISSN 1550-4859

Preneel, Bart and Dodunekov, Stefan and Rijmen, Vincent and Nikova, Svetla , eds. (2009) Enhancing cryptographic primitives with techniques from error correcting codes. NATO Science for Peace and Security Series D - Information and Communication Security, 23 . IOS Press, Amsterdam. ISBN 9781607500025

Morali, Ayse and Zambon, Emmanuele and Houmb, Siv Hilde and Sallhammar, Karin and Etalle, Sandro (2009) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. In: 31th IEEE International Conference on Software Engineering, ICSE 2009, 16-24 May 2009, Vancouver, Canada. (In Press)

Pieters, W. and Popkema, M. and Broekhans, B. and Dijkstra, A. and Boersma, K. and Alberts, G. (2009) Gevoel voor kennis: emoties in de kennissamenleving. In: Gevoel voor kennis. Jaarboek Kennissamenleving, 5 . Aksant, Amsterdam, pp. 7-20. ISBN 9789052603513

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2009) Gooi eigen servers en pc’s niet weg. TIEM, Tijdschrift voor Informatie en Management, 34 . pp. 8-9. ISSN 1572-5472

Tang, Q. and Hartel, P.H. and Jonker, W. (2009) Inter-domain Identity-Based Proxy Re-encryption. In: Information Security and Cryptology, 4th International Conference (Inscrypt), December 14-17, 2008, Beijing China (pp. pp. 332-347).

Spiessens, F. and Hartog, J.I. den and Etalle, S. (2009) Know what you trust. In: Formal Aspects in Security and Trust, 5th International Workshop, Malaga, Spain (pp. pp. 129-142).

Czenko, Marcin and Etalle, Sandro (2009) LP with Flexible Grouping and Aggregates Using Modes. In: 19th International Symposium on Logic-Based Program Synthesis and Transformation LOPSTR 2009, 9-11 Sep 2009, Coimbra, Portugal (pp. pp. 59-73).

Etalle, Sandro and Winsborough, William H. (2009) Maintaining control while delegating trust: Integrity constraints in trust management. ACM Transactions on Information and System Security, 13 (1). p. 5. ISSN 1094-9224

Ibraimi, Luan and Petkovic, Milan and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In: 10th International Workshop on Information Security Applications, WISA, 25-27 August 2009, Busan, Korea (pp. pp. 309-323).

Hartel, P.H. (2009) On the Cost and Benefits of Building a High-Quality Institutional Repository. [Report]

Trivellato, Daniel and Spiessens, Fred and Zannone, Nicola and Etalle, Sandro (2009) POLIPO: Policies & ontologies for interoperability, portability, an autonomy. In: IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY, 20-22 July 2009, London, UK (pp. pp. 110-113).

Bolzoni, Damiano and Etalle, Sandro and Hartel, Pieter (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. [Report]

Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. In: Recent Advances in Intrusion Detection (pp. pp. 1-20).

Khatib, M.G. and Hartel, P.H. (2009) Policies for Probe-Wear Leveling in MEMS-Based Storage Devices. In: Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 21-23 Sep 2009, London, UK (pp. pp. 152-161).

Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain. [Report]

Tang, Q. and Chen, Liqun (2009) Public-key Encryption with Registered Keyword Search. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. (In Press)

Trivellato, Daniel and Spiessens, Fred and Zannone, Nicola and Etalle, Sandro (2009) Reputation-based ontology alignment for autonomy and interoperability in distributed access control. In: 12th IEEE International conference on Computational Science and Engineering, CSE, 29-31 Aug. 2009, Vancouver BC, Canada (pp. pp. 252-258).

Sinderen, M.J. van and Pras, A. and Haverkort, B.R.H.M. and Apers, P.M.G. and Hartel, P.H. and Pol, J.C. van de and Nijholt, A. and Wieringa, R.J. and Havinga, P.J.M. and Aksit, M. (2009) Research Self-Evaluation 2003-2008, Computer Science Department, University of Twente. [Report]

Pieters, W. (2009) Reve\{a,i\}ling the risks: a phenomenology of information security. [Report]

Bolzoni, Damiano (2009) Revisiting anomaly-based network intrusion detection systems. thesis.

Buhan, I.R. and Boom, B.J. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2009) Secure pairing with biometrics. International Journal of Security and Networks, 4 (1/2). pp. 27-42. ISSN 1747-8405

Jonker, Willem and Brinkman, Richard and Maubach, Stefan (2009) Secure storage system and method for secure storing. Patent.

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2009) Security Implications of Virtualization: A Literature Study. [Report]

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2009) Security Implications of Virtualization: A Literature Study. In: 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), 29 Aug - 31 Aug, Vancouver, BC, Canada (pp. pp. 353-358).

Nasution, S. and Suryana, N. and Shahib, S. and Abu, N.A. and Hartel, P.H. (2009) The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home. In: International Technology, Education and Development Conference (INTED), 9-11 March 2009, Valencia, Spain (pp. p. 702).

Dimkov, Trajce (2009) The Future of Information Society – The Key-free Society. In: Living the ICT future. Centre for Telematics and Information Technology, Enschede, pp. 28-29. ISBN 9789036529631

Pieters, Wolter and Cleeff, André van (2009) The Precautionary Principle in a World of Digital Dependencies. Computer, 42 (6). pp. 50-56. ISSN 0018-9162

Pieters, Wolter and Cleeff, André van (2009) The precautionary principle in a world of digital dependencies. [Report]

Tang, Q. (2009) Timed-Ephemerizer: Make Assured Data Appear and Disappear. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. (In Press)

Gong, Zheng and Hartel, Pieter and Nikova, Svetla and Zhu, Bo (2009) Towards Secure and Practical MACs for Body Sensor Networks. In: 10th International Conference on Cryptology - INDOCRYPT 2009, December 13-16, 2009, New Delhi, India (pp. pp. 182-198).

Gong, Z. and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) Towards Secure and Practical MACs for Body Sensor Networks. [Report]

Nasution, S. and Hartel, P.H. and Suryana, N. and Azman, N. and Shahib, S. (2009) Trust Level and Routing Selection for Mobile Agents in a Smart Home. [Report]

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2009) Two methodologies for physical penetration testing using social engineering. [Report]

Pieters, Wolter and Cleeff, André van and Wieringa, Roel (2009) Voor goede keuzes heb je tijd nodig. Trouw, 67 (19855,). p. 25.

Pieters, W. and Consoli, L. (2009) Vulnerabilities and responsibilities: dealing with monsters in computer security. Journal of Information, Communication and Ethics in Society, 7 (4). pp. 243-257. ISSN 1477-996X

2008

Tang, Q. and Bringer, J. and Chabanne, H. and Pointcheval, D. (2008) A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, April 21-23, 2008, Sydney, Australia (pp. pp. 56-70).

Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks. In: Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA-08), 10-12 Dec 2008, Sydney, Australia (pp. pp. 863-870).

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. [Report]

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: 5th VLDB Workshop on Secure Data Management, SDM, August 24, 2008, Auckland, New Zealand (pp. pp. 185-198).

Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A generalized clustering algorithm for dynamic wireless sensor networks. [Report]

Bolzoni, D. and Crispo, B. and Etalle, S. (2008) ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems. [Report]

Bolzoni, D. and Etalle, S. (2008) Approaches in Anomaly-based Network Intrusion Detection Systems. In: Intrusion Detection Systems. Advances in Information Security, 38 . Springer Verlag, London, pp. 1-15. ISBN 9780387772653

Pieters, W. (2008) Betrouwbaarheid of vertrouwbaarheid : Vertrouwen in technologie en bestuur. Openbaar bestuur, 18 (10). pp. 27-30. ISSN 0925-7322

Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. [Report]

Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. In: Confederated International Conferences On the Move to Meaningful Internet Systems (OTM), November 9-14, 2008, Monterrey, Mexico (pp. pp. 938-955).

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2008) Cluster-based service discovery for heterogeneous wireless sensor networks. International Journal of Parallel, Emergent and Distributed Systems, 23 (4). pp. 325-346. ISSN 1744-5760

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter (2008) Controlling Leakage Of Biometric Information Using Dithering. In: 16th European Signal Processing Conference, EUSIPCO, 25-29 August 2008, Lausanne, Switzerland.

Buhan, Ileana Rozalia (2008) Cryptographic keys from noisy data, theory and applications. thesis.

Davarynejad, M. and Sedghi, S. and Bahrepour, M. and Ahn, C.W. and Akbarzadeh, M. and Coello Coello, C. A. (2008) Detecting Hidden Information from Watermarked Signal using Granulation Based Fitness Approximation. In: Advances in Intelligent and Soft Computing, 10-28 Nov 2008, Online Conference (pp. pp. 463-472).

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, ICICS, October 20-22, 2008, Birmingham, UK (pp. pp. 294-310).

Khatib, Mohammed G. and Hartel, Pieter H. and Dijk, Hylke W. van (2008) Energy-Efficient Streaming Using Non-volatile Memory. Journal of Signal Processing Systems . ISSN 1939-8018

Morali, Ayse and Zambon, Emmanuele and Houmb, Siv Hilde and Sallhammar, Karin and Etalle, Sandro (2008) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. [Report]

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Overbeek, Paul (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. [Report]

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Overbeek, Paul (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. In: Third IEEE International Workshop on Business-Driven IT Management, 07 Apr 2008, Salvador, Brazil (pp. pp. 31-40).

Tang, Q. and Hartel, P.H. and Jonker, W. (2008) Inter-domain Identity-based Proxy Re-encryption. [Report]

Law, Y.W. and Moniava, G. and Gong, Z. and Hartel, P.H. and Palaniswami, M. (2008) KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks. [Report]

Czenko, Marcin and Etalle, Sandro (2008) LP with Flexible Grouping and Aggregates Using Modes. [Report]

Pieters, W. (2008) La volonté machinale: understanding the electronic voting controversy. thesis.

Zych, Anna K. and Doumen, Jeroen M. and Jonker, Willem and Hartel, Pieter H. and Petkovic, Milan (2008) Method of Key Management. Patent.

Etalle, Sandro (2008) Nice to know. [Lecture]

Tang, Q. (2008) On Using Encryption Techniques to Enhance Sticky Policies Enforcement. [Report]

Gong, Z. and Lai, X.J. and Chen, Kefei (2008) On the Design of Secure and Fast Double Block Length Hash Functions. [Report]

Dimkov, T. and Tang, Q. and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. [Report]

Dimkov, Trajce and Tang, Qiang and Hartel, Pieter (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. In: Workshop on Modeling Security, MODSEC 2008, 28 Sep 2008, Toulouse, France (pp. pp. 1-13).

Khatib, M.G. and Hartel, P.H. (2008) Power Management of MEMS-Based Storage Devices for Mobile Systems. In: Proceedings of the 8th ACM & IEEE International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES '08), 19-24 Oct 2008, Atlanta, USA (pp. pp. 245-254).

Gong, Z. and Long, Yu and Hong, Xuan and Chen, Kefei (2008) Practical Certificateless Aggregate Signatures From Bilinear Maps. [Report]

Gong, Z. and Long, Y. and Hong, X. and Chen, Kefei (2008) Practical Certificateless Aggregate Signatures From Bilinear Maps. Journal of Information Science and Engineering, accept . ISSN 1016-2364 (In Press)

Dekker, M.A.C. and Crampton, J. and Etalle, S. (2008) RBAC administration in distributed systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, 11-13 June 2008, Estes Park, Colorado, USA (pp. pp. 93-102).

Tang, Q. (2008) Revisit the Concept of PEKS: Problems and a Possible Solution. [Report]

Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow. In: 8th Int. Conf. on Formal Methods in Computer Aided Design (FMCAD), 17-20 Nov. 2008, Portland, Oregon (pp. pp. 161-170).

Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow (with appendix). [Report]

Hartel, P.H. and Abelmann, L. and Khatib, M.G. (2008) Towards Tamper-Evident Storage on Patterned Media. In: 6th USENIX Conference on File and Storage Technologies, FAST 2008, February 26-29, 2008, San Jose, CA, USA (pp. pp. 283-296).

Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption. In: 10th international conference on information and communication security, 20-22 Oct 2008, Birmingham, UK (pp. pp. 345-360).

Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version). [Report]

Czenko, Marcin and Doumen, Jeroen and Etalle, Sandro (2008) Trust Management in P2P Systems Using Standard TuLiP. In: IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway (pp. pp. 1-16).

Czenko, Marcin and Doumen, Jeroen and Etalle, Sandro (2008) Trust Management in P2P systems using Standard TuLiP. [Report]

Tang, Q. (2008) Type-Based Proxy Re-encryption and Its Construction. In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, December 14-17, 2008, Kharagpur, India (pp. pp. 130-144).

Tang, Q. (2008) Type-based Proxy Re-encryption and its Construction. [Report]

Nikova, S.I. and Rijmen, V. and Schlaffer, M. (2008) Using normal bases for compact hardware implementations of the AES S-box. In: 6th International Conference Security in Communication Networks (SCN), 10-12 Sep 2008, Amalfi, Italy (pp. pp. 236-245).

Pieters, W. (2008) Vertrouwen en werkelijkheid in de stemcomputercontroverse. In: Burger in Uitvoering. Jaarboek Kennissamenleving, 4 . Aksant, Amsterdam, pp. 17-25. ISBN 9789052603070

Khatib, M.G. and Miller, E.L. and Hartel, P.H. (2008) Workload-Based Configuration of MEMS-Based Storage Devices for Mobile Systems. In: Proceedings of the 8th ACM & IEEE International Conference on Embedded Software (EMSOFT '08), 19-24 Oct 2008, Atlanta, USA (pp. pp. 41-50).

2007

Etalle, Sandro and Winsborough, William H. (2007) A Posteriori Compliance Control. In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, 20-22 June 2007, Nice, France (pp. pp. 11-20).

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2007) A Taxonomy of Self-configuring Service Discovery Systems. [Report]

Zambon, Emmanuele and Bolzoni, Damiano and Etalle, Sandro and Salvato, Marco (2007) A model supporting Business Continuity auditing & planning in Information Systems. [Report]

Zambon, Emmanuele and Bolzoni, Damiano and Etalle, Sandro and Salvato, Marco (2007) A model supporting Business Continuity auditing & planning in Information Systems. In: Second International Conference on Internet Monitoring and Protection, ICIMP 2007, 1-5 July 2007, San Jose, CA, USA (pp. p. 33).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) A unifying view on template protection schemes. In: 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands (pp. pp. 353-42).

Bolzoni, Damiano and Crispo, Bruno and Etalle, Sandro (2007) ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. In: 21st Large Installation System Administration Conference, LISA 2007, 11-16 November 2007, Dallas, TX, USA (pp. pp. 141-152).

Czenko, Marcin and Etalle, Sandro and Li, Dongyi and Winsborough, William H. (2007) An Introduction to the Role Based Trust Management Framework RT. [Report]

Czenko, Marcin and Etalle, Sandro and Li, Dongyi and Winsborough, William H. (2007) An Introduction to the Role Based Trust Management Framework RT. In: Foundations of Security Analysis and Design IV - FOSAD 2006/2007 Tutorial Lectures. Lecture Notes in Computer Science, 4677 . Springer Verlag, Berlin, Germany, pp. 246-281. ISBN 9783540748090

Dekker, M.A.C. and Hartog, J.I. den and Etalle, S. (2007) Audit-based Compliance Control (AC2) for EHR Systems. [Report] (In Press)

Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den and Lenzini, G. (2007) Audit-based compliance control. International Journal of Information Security, 6 (2-3). pp. 133-151. ISSN 1615-5262

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2007) Cluster-based service discovery for heterogeneous wireless sensor networks. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Constructing practical Fuzzy Extractors using QIM. [Report]

Czenko, Marcin and Etalle, Sandro (2007) Core TuLiP. [Report]

Czenko, Marcin and Etalle, Sandro (2007) Core TuLiP - Logic Programming for Trust Management. In: 23rd International Conference on Logic Programming, ICLP 2007, 8-13 September 2007, Porto, Portugal (pp. pp. 380-394).

Brinkman, R. (2007) Different search strategies on encrypted data compared. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications, XVIII . Springer Verlag, Berlin, pp. 183-196. ISBN 9783540698609

Pieters, W. and Haren, R. van (2007) E-voting discourses in the UK and the Netherlands. [Report]

Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2007) Extended Privilege Inheritance in RBAC. In: 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, March 20-22, 2007, Singapore, Thailand (pp. pp. 383-385).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Feeling Is Believing: A Secure Template Exchange Protocol. In: International Conference on Biometrics, ICB 2007, August 27-29, 2007, Seoul, Korea (pp. pp. 897-906).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) From Watermarks to Fuzzy Extractors: a Practical Construction. [Report]

Zwaag, Berend Jan van der and Khatib, Mohammed G. and Hartel, Pieter H. (2007) How migrating 0.0001% of address space saves 12% of energy in hybrid storage. [Report]

Mouthaan, A.J. and Hartel, P.H. (2007) Interim research assessment 2003-2005 - Computer Science. [Report]

Khatib, M.G. and Zwaag, B.J. van der and Hartel, P.H. and Smit, G.J.M. (2007) Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. [Report]

Khatib, M.G. and Zwaag, B.J. van der and Hartel, P.H. and Smit, G.J.M. (2007) Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. In: IEE/ACM/IFIP Workshop on Embedded Systems for Real-Time Multimedia, ESTImedia 2207, 4-5 Oct 2007, Salzburg, Austria (pp. pp. 7-12).

Hartel, P.H. and Vree, W.G. (2007) Lambda Calculus for Engineers. In: Reflections on Type Theory, Lambda Calculus, and the Mind: Essays Dedicated to Henk Barendregt on the Occasion of his 60th Birthday. Radboud University, Nijmegen, pp. 125-138. ISBN 9789090224466

Jong, Eduard de and Hartel, Pieter H. (2007) Method and apparatus for deployment of high integrity software using static procedure return addresses. Patent.

Zambon, Emmanuele and Bolzoni, Damiano and Etalle, Sandro and Salvato, Marco (2007) Model-Based Mitigation of Availability Risks. [Report]

Zambon, Emmanuele and Bolzoni, Damiano and Etalle, Sandro and Salvato, Marco (2007) Model-Based Mitigation of Availability Risks. In: Second IEEE/IFIP International Workshop on Business-Driven IT Management, 21 May 2007, Munich, Germany (pp. pp. 75-83).

Etalle, Sandro and Samarati, Pierangela (2007) Preface of special issue of the proceedings of theSecond International Workshop on Security and Trust Management (STM 2006). Electronic Notes in Theoretical Computer Science, 179 . pp. 1-2. ISSN 1571-0661

Dekker, Marnix and Etalle, Sandro and Hartog, Jerry den (2007) Privacy Policies. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications, XVIII . Springer Verlag, Berlin, Germany, pp. 383-397. ISBN 9783540698609

Dekker, M.A.C. and Crampton, J. and Etalle, S. (2007) RBAC Administration in Distributed Systems. [Report]

Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. In: 4th VLDB Workshop on Secure Data Management, SDM 2007, 23-24 September 2007, Vienna, Austria (pp. pp. 33-46).

Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. [Report]

Brinkman, Richard (2007) Searching in encrypted data. thesis.

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. [Report]

Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. In: First International Workshop on Security for Spontaneous Interaction, 16. September 2007, Innsbruck, Austria (pp. pp. 450-456).

Corin, Ricardo and Deniélou, Pierre-Malo and Fournet, Cédric and Bhargavan, Karthikeyan and Leifer, James (2007) Secure Implementations for Typed Session Abstractions. In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy (pp. pp. 170-186).

Jonker, Willem and Brinkman, Richard and Maubach, Stefan (2007) Secure storage system and method for secure storing. Patent.

Evers, L. and Havinga, P.J.M. and Kuper, J. and Lijding, M.E.M. and Meratnia, N. (2007) SensorScheme: Supply chain management automation using Wireless Sensor Networks. In: 12th IEEE Conference on Emerging Technologies & Factory Automation, ETFA 2007, 25-28 September 2007 , Patras, Greece (pp. pp. 448-455).

Su, Xiaomeng and Bolzoni, Damiano and Eck, Pascal van (2007) Specifying Information Security Needs for the Delivery of High Quality Security Services. In: 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, BDIM '07, 21-23 May 2007, Munich, Germany (pp. pp. 112-113).

Pieters, W. and Haren, R. van (2007) Temptations of turnout and modernisation: e-voting discourses in the UK and the Netherlands. Journal of Information, Communication and Ethics in Society, 5 (4). pp. 276-292. ISSN 1477-996X

Koopman, P. and Hubbers, E.M.G.M. and Pieters, W. and Poll, E. and Vries, R. de (2007) Testing the eSTV program for the Scottish Local Government Elections. [Report]

Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. In: Fourth Int. Conf. on Trust, Privacy and Security in Digital Business, TRUSTBUS 2007, 4-6 September 2007, Germany (pp. pp. 145-154).

Etalle, Sandro and Massacci, Fabio and Yautsiukhin, Artsiom (2007) The Meaning of Logs. [Report]

Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2007) Timed Analysis of Security Protocols. Journal of Computer Security, 15 (6). pp. 619-645. ISSN 0926-227X

Hartel, P.H. and Abelmann, L. (2007) Towards compliant data retention with probe storage on patterned media. [Report]

Hartog, Jerry den (2007) Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic. [Report]

Etalle, S. and Hartog, J.I. den and Marsh, S. (2007) Trust and Punishment (Invited paper). In: Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics, Rome, Italy.

Su, Xiaomeng and Bolzoni, Damiano and Eck, Pascal van (2007) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. In: International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain (pp. pp. 107-114).

Pieters, W. and Jonker, H.L. (2007) Vote buying revisited: implications for receipt-freeness. In: Proceedings of the 2nd Benelux Workshop on Information and System Security (WISSec 2007), 20-21 Sep 2007, Luxembourg city, Luxembourg.

2006

Su, X. and Bolzoni, D. and Eck, P.A.T. van (2006) A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. [Report]

Su, X. and Bolzoni, D. and Eck, P.A.T. van (2006) A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. In: 11th International Workshop on Exploring Modeling Methods in Systems Analysis and Design (EMMSAD2006), 5-9 Jun 2006, Luxembourg (pp. pp. 465-472).

Corin, R.J. and Saptawijaya, A. and Etalle, S. (2006) A Logic for Constraint-based Security Protocol Analysis. In: IEEE Symposium on Security and Privacy, 21-25 May 2006, Oakland, US (pp. pp. 155-168).

Kavaldjiev, Nikolay Krasimirov (2006) A run-time reconfigurable network-on-chip for streaming DSP applications. thesis.

Bolzoni, D. and Etalle, S. (2006) APHRODITE: an Anomaly-based Architecture for False Positive Reduction. [Report]

Pieters, W. (2006) Acceptance of voting technology: between confidence and trust. In: K. Stølen et al.(eds) iTrust 2006 (pp. pp. 283-297).

Cederquist, Jan and Dashti, Muhammad Torabi (2006) An intruder model for verifying liveness in security protocols. In: Fourth ACM Workshop on Formal Methods in Security, FMSE '06, November 3, 2006, Alexandria, Virginia, USA (pp. pp. 23-32).

Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. [Report]

Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. In: Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA), 16-17 Sept 2006, Bertinoro, Italy (pp. pp. 221-236).

Dekker, M.A.C. and Veugen, P.J.M. and Etalle, S. (2006) Audit-based Access Control in de Zorg. Informatiebeveiliging, 8 . pp. 19-23. ISSN 1569-1063

Bijlsma, Tjerk and Jansen, Pierre (2006) Energy Conservation with EDFI scheduling. In: First European Conference on Smart Sensing and Context, EuroSSC 2006, 25-27 Oct 2006, Enschede, the Netherlands (pp. pp. 259-261).

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. [Report]

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. In: Sixth International Workshop on Wireless Local Networks, 14-16 Nov 2006, Tampa, Florida (pp. pp. 931-938).

Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. [Report]

Sundramoorthy, V. and Tan, C. and Hartel, P.H. and Scholten, J. (2006) FRODO Dt-Spin Models. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Fuzzy extractors for continuous distributions. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Fuzzy extractors for continuous distributions. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS, 20-22 March 2007, Singapore (pp. pp. 353-355).

Vervoort, Wiek (2006) Informatica aan de THT. Universiteit Twente, Enschede. ISBN 9789036523547

Pieters, W. (2006) Internet voting: a conceptual challenge to democracy. In: Social Inclusion: Societal and Organizational Implications for Information Systems: IFIP TC8 WG8.2 International Working Conference, 12-15 Jul 2006, Limerick, Ireland (pp. pp. 89-103).

Pieters, W. (2006) Internet voting: a monstrous alliance between democracy and technology? In: Fifth international conference on Cultural Attitudes towards Technology and Communication 2006, 28 Jun - 1 Jul 2006, Tartu, Estonia (pp. pp. 115-129).

Delzanno, Giorgio and Etalle, Sandro and Gabbrielli, Maurizio (2006) Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. Theory and Practice of Logic Programming, 6 (3). pp. 225-226. ISSN 1471-0684

Chong, C.N. and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Y.W. and Tokmakoff, A. (2006) LicenseScript: A Logical Language for Digital Rights Management. Annals of telecommunications special issue on Network and Information systems security, 61 (3-4). pp. 284-331. ISSN 0003-4347

Zych, Anna K. and Doumen, Jeroen M. and Jonker, Willem and Hartel, Pieter and Petkovic, Milan (2006) Method of Key Management. Patent.

Durmaz Incel, Ozlem and Dulman, Stefan and Jansen, Pierre (2006) Multi-channel Support for Dense Wireless Sensor Networking. In: First European Conference on Smart Sensing and Context, EuroSSC 2006, 25-27 Oct 2006, Enschede, the Netherlands (pp. pp. 1-14).

Czenko, Marcin and Tran, Ha and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Hartog, Jerry den (2006) Nonmonotonic Trust Management for P2P Applications. Electronic Notes in Theoretical Computer Science (ENTCS), 157 (3). pp. 113-130. ISSN 1571-0661

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2006) On consistency maintenance in service discovery. In: 20th International Parallel and Distributed Processing Symposium, IPDPS, 25-29 April, Rhodes Island, Greece.

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks. [Report]

Bolzoni, Damiano and Zambon, Emmanuele and Etalle, Sandro and Hartel, Pieter (2006) Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System. In: Fourth IEEE International Workshop on Information Assurance, IWIA 2006, 13-14 Apr 2006, London, UK (pp. pp. 144-156).

Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den (2006) Privacy in an Ambient World. [Report]

Jonker, H.L. and Pieters, W. (2006) Receipt-freeness as a special case of anonymity in epistemic logic. In: Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 29-30 Jun 2006, Cambridge, UK.

Corin, Ricardo and Galindo, David and Hoepman, Jaap-Henk (2006) Securing data accountability in decentralized systems. In: 1st International Workshop on Information Security, IS'06, 30 Oct - 3 Nov 2006, Montpellier, France (pp. pp. 626-635).

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2006) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks, 2 (1). pp. 65-93. ISSN 1550-4859

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den and Lenzini, G. (2006) The Audit Logic: Policy Compliance in Distributed Systems. [Report]

Sundramoorthy, V. and Glind, G.J. van de and Hartel, P.H. and Scholten, J. (2006) The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss. In: 1st Int. Conf. on Communication System Software and Middleware (COMSWARE), 08-12 Jan. 2006, New Delhi, India (pp. CDROM).

Su, X. and Bolzoni, D. and Eck, P.A.T. (2006) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. [Report]

Pieters, W. and Consoli, L. (2006) Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract). In: Proceedings of the European Computing and Philosophy Conference (E-CAP 2006), 22-24 Jun 2006, Trondheim, Norway.

Pieters, W. (2006) What proof do we prefer? Variants of verifiability in voting. In: Workshop on Electronic Voting and e-Government in the UK, 27-28 Feb 2006, Edinburgh, UK (pp. pp. 33-39).

Morali, A. (2006) ”AcTrust: A Security Model for Trust Based Computing. [Masters Thesis]

2005

Zych, Anna and Doumen, Jeroen and Hartel, Pieter and Jonker, Willem (2005) A Diffie-Hellman based key management scheme for hierarchical access control. [Report]

Buhan, Ileana and Bazen, Asker and Hartel, Pieter and Veldhuis, Raymond (2005) A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems. In: International Conference on Biometrics, ICB, January 5 - 7, 2006, Hong Kong, China (pp. pp. 728-736).

Corin, Ricardo and Di Caprio, Gaetano and Etalle, Sandro and Gnesi, Stefania and Lenzini, Gabriele and Moiso, Corrado (2005) A Formal Security Analysis of an OSA/Parlay Authentication interface. In: 7th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, FMOODS 2005, June 15-17, 2005, Athens, Greece (pp. pp. 131-146).

Corin, Ricardo and Durante, Antonio and Etalle, Sandro and Hartel, Pieter (2005) A Trace Logic for Local Security Properties. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003). Electronic Notes in Theoretical Computer Science, 118 (1). Elsevier, pp. 129-143.

Hartel, P.H. (2005) A Trace Semantics for Positive Core XPath. In: 12th Int. Symp. on Temporal Representation and Reasoning (TIME), Burlington, Vermont (pp. pp. 103-112).

Marin Perianu, Raluca and Hartel, Pieter and Scholten, Hans (2005) A classification of service discovery protocols. [Report]

Buhan, Ileana and Bazen, Asker and Hartel, Pieter and Veldhuis, Raymond (2005) A false rejection oriented threat model for the design of biometric authentication systems. [Report]

Corin, R. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A formal security analysis of an OSA/Parlay authentication interface. [Report]

Kaya, Omer Sinan (2005) A glance at peer to peer systems. [Report]

Hartel, P. (2005) A trace semantics for positive core XPath. [Report]

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den (2005) An Audit Logic for Accountability. In: Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005, 6-8 June 2005, Stockholm, Sweden (pp. pp. 34-43).

Morali, A. and Varela, L. and Varela, C.A. (2005) An Electronic Marketplace: Agent-based Coordination Models for Online Auctions. In: Obras Completas CLEI2005, Volumen: XXXI Conferencia Latinoamericana de Informatica, 10-14 Oct 2005, Cali, Colombia (pp. pp. 573-586).

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den (2005) An audit logic for accountability. [Report]

Cederquist, Jan and Dashti, M.T. (2005) An intruder model for verifying termination in security protocols. [Report]

Law, Yee Wei and Doumen, Jeroen and Hartel, Pieter (2005) Benchmarking block ciphers for wireless sensor networks. [Report]

Law, Yee Wei and Hoesel, Lodewijk van and Doumen, Jeroen and Hartel, Pieter and Havinga, Paul (2005) Energy-Efficient Link-Layer Jamming Attacks against Three Wireless Sensor Network MAC Protocols. In: 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN, November 07, 2005, Alexandria, VA, USA (pp. pp. 76-88).

Law, Yee Wei and Hoesel, Lodewijk van and Doumen, Jeroen and Hartel, Pieter and Havinga, Paul (2005) Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. [Report]

Pieters, W. and Becker, M.J. (2005) Ethics of e-voting: an essay on requirements and values in Internet elections. In: Ethics of New Information Technology: Proceedings of the Sixth International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005), 17-19 Jul 2005, Enschede (pp. pp. 307-318).

Brinkman, R. and Schoenmakers, B. and Doumen, J.M. and Jonker, W. (2005) Experiments With Queries Over Encrypted Data Using Secret Sharing. In: VLDB Workshop on Secure Data Management (SDM), Trondheim, Norway (pp. pp. 33-46).

Schoute, Albert and Seesink, Remco and Dierssen, Werner and Kooij, Niek (2005) Fast Data Sharing within a distributed multithreaded control framework for robot teams. In: Communicating process architectures 2005 : WoTUG-28. IOS Press, Amsterdam, pp. 147-154. ISBN 9781586035617

Cederquist, Jan and Dashti, Muhammad Torabi (2005) Formal Analysis of a Fair Payment Protocol. In: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France (pp. pp. 41-54).

Sundramoorthy, V. and Tan, C. and Hartel, P.H. and Hartog, J.I. den and Scholten, J. (2005) Functional Principles of Registry-based Service Discovery. In: 30th Annual IEEE Conf. on Local Computer Networks, LCN, 15-17 Nov. 2005, Sydney, Australia (pp. pp. 209-217).

Sundramoorthy, V. and Tan, C. and Hartel, P.H. and Hartog, J.I. den and Scholten, J. (2005) Functional principles of registry-based service discovery. [Report]

Etalle, Sandro and Winsborough, William H. (2005) Integrity Constraints in Trust Management (Extended Abstract). In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, June 1-3, 2005, Stockholm, Sweden.

Etalle, Sandro and Winsborough, William H. (2005) Integrity constraints in trust management. [Report]

Jong, Eduard de and Hartel, Pieter and Peyret, Patrice and Cattaneo, Peter (2005) Java Card: an analysis of the most successful smart card operating system to date. [Report]

Law, Yee Wei (2005) Key management and link-layer security of wireless sensor networks : Energy-efficient attack and defense. thesis.

Chong, Cheun Ngen and Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei and Tokmakoff, Andrew (2005) LicenseScript : a logical language for digital rights management. [Report]

Baydere, S. and Safkan, Y. and Durmaz Incel, O. (2005) Lifetime Analysis of Reliable Wireless Sensor Networks. IEICE transactions on communications, E88-B . pp. 2465-2472. ISSN 09168516

Law, Yee Wei and Hartel, Pieter and Hartog, Jerry den and Havinga, Paul (2005) Link-layer jamming attacks on S-MAC. In: Second European Workshop on Wireless Sensor Networks, EWSN, 31 Jan. - 2 Feb. 2005, Istanbul, Turkey (pp. pp. 217-225).

Jonker, Willem and Brinkman, Richard and Doumen, Jeroen M. and Schoenmakers, Berry (2005) Method of and device for querying of protected structured data. Patent.

Czenko, Marcin and Tran, Ha and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Hartog, Jerry den (2005) Nonmonotonic trust management for P2P applications. [Report]

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2005) On consistency maintenance in service discovery. [Report]

Cederquist, J. and Corin, R. and Dashti, M. Torabi (2005) On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. In: 7th International Conference on Information and Communications Security, ICICS 2005, December 10-13, 2005, Beijing, China (pp. pp. 27-37).

Cederquist, Jan and Corin, Ricardo and Dashti, Muhammad Torabi (2005) On the quest for impartiality: design and analysis of a fair non-repudiation protocol. [Report]

Law, Yee Wei and Hartel, Pieter and Etalle, Sandro and Havinga, Paul and Di Pietro, Roberto and Mancini, Luigi (2005) Overview of security research in EYES. [Report]

Corin, Ricardo and Saptawijaya, Ari and Etalle, Sandro (2005) PS-LTL for Constraint-based Security Protocol Analysis. In: International Conference [on] Logic Programming, ICLP : 21 (Sitges), October 2-5, 2005, Sitges, Spain (pp. pp. 439-440).

Bolzoni, Damiano and Zambon, Emmanuele and Etalle, Sandro and Hartel, Pieter (2005) Poseidon: a 2-tier anomaly-based intrusion detection system. [Report]

Garcia, F.D. and Hasuo, I. and Pieters, W. and Rossum, P.J.B. van (2005) Provable anonymity. In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, Fairfax, VA, USA (pp. pp. 63-72).

Hubbers, E.M.G.M. and Jacobs, B.P.F. and Pieters, W. (2005) RIES: Internet voting in action. In: 29th Annual International Computer Software and Applications Conference (COMPSAC 2005), 26-28 Jul 2005 (pp. pp. 417-424).

Bistarelli, Stefano and Cervesato, Iliano and Lenzini, Gabriele and Martinelli, Fabio (2005) Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis. Journal of computer security, 13 (1). pp. 3-47. ISSN 0926227X

Bistarelli, Stefano and Cervesato, Iliano and Lenzini, Gabriele and Martinelli, Fabio (2005) Relating multiset rewriting and process algebras for security protocol analysis. [Report]

Cheng, Jieyin and Chong, Cheun Ngen and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Nikolaus, Stefan (2005) STREAMTO: Streaming Content using a Tamper-Resistant Token (Workshop paper). In: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (pp. pp. 601-612).

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Joosten, Rieks and Kleinhuis, Geert (2005) Service brokerage with Prolog. [Report]

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Joosten, Rieks and Kleinhuis, Geert (2005) Service brokerage with Prolog (Poster paper). In: 7th International Conference on Enterprise Information Systems, ICEIS 2005, May 24-28, 2005, Miami, FL, USA (pp. pp. 409-412).

Jacobs, B.P.F. and Pieters, W. and Warnier, M. (2005) Statically checking confidentiality via dynamic labels. In: WITS '05: Proceedings of the 2005 workshop on Issues in the theory of security, 10-11 Jan 2005, Long Beach, CA (pp. pp. 50-56).

Sundramoorthy, V. and Glind, G.J. van de and Hartel, P.H. and Scholten, J. (2005) The performance of a second generation service discovery protocol in response to message loss. [Report]

Buhan, Ileana and Hartel, Pieter (2005) The state of the art in abuse of biometrics. [Report]

Schoute, Albert L. (2005) Time-optimal collision avoidance of automatically guided vehicles (Extended Abstract). In: 10th International Workshop on Computer Aided Sytems Theory: Cast and Tools for Robotics, Vehicular and Communication Systems, February 7-11, 2005, Las Palmas de Gran Canaria, Spain (pp. pp. 286-289).

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2005) Timed Analysis of Security Protocols (version 2, oct. 2005).

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2005) Timed analysis of security protocols. [Report]

Czenko, Marcin and Doumen, Jeroen and Etalle, Sandro (2005) Trust in Virtual Communities. ERCIM News -- Special: Security and Trust Management, 63 . pp. 29-30.

Pieters, W. (2005) Veilig online stemmen vanuit San Francisco? Idee, tijdschrift van het kenniscentrum van D66, 26 (1). pp. 8-10. ISSN 0927-2518

2004

Corin, R. and Etalle, S. and Hartog, J. den and Lenzini, G. and Staicu, I. (2004) A Logic for Auditing Accountability in Decentralized Systems. In: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France (pp. pp. 187-201).

Corin, Ricardo and Etalle, Sandro (2004) A Simple procedure for finding guessing attacks (extended abstract). [Report]

Corin, R. and Etalle, S. and Hartog, J. den and Lenzini, G. and Staicu, I. (2004) A logic for auditing accountability in decentralized systems. [Report]

Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro (2004) Analysing Password Protocol Security Against Off-line Dictionary Attacks. In: Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004). Electronic Notes in Theoretical Computer Science, 121 (4). Elsevier, pp. 47-63.

Gnesi, S. and Lenzini, G. and Martinelli, F. (2004) Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability. Electronic Notes in Theoretical Computer Science (ENTCS), 99 . pp. 111-126. ISSN 1571-0661

Gnesi, Stefania and Lenzini, Gabriele and Martinelli, Fabio (2004) Applying generalized non deducibility on compositions (GNDC) approach in dependability. [Report]

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2004) Benchmarking Block Ciphers for Wireless Sensor Networks. In: IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004 (pp. pp. 447-456).

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2004) Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract). In: IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2004, 25-27 October 2004, Fort Lauderdale, FL, USA (pp. pp. 447-456).

Veldhuis, Raymond and Bazen, Asker and Kauffman, Joost and Hartel, Pieter (2004) Biometric Verification Based on Grip-pattern Recognition. In: Security, Steganography, and Watermarking of Multimedia Contents VI, 19 January 2004, San Jose, California, USA (pp. pp. 634-641).

Veldhuis, Raymond and Bazen, Asker and Kauffman, Joost and Hartel, Pieter (2004) Biometric verification based on grip-pattern recognition. [Report]

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro and Rossi, Sabina (2004) Declarative Semantics of Input Consuming Logic Programs. In: Program Development in Computational Logic. Lecture Notes in Computer Science (3049). Springer Verlag, Berlin, Germany, pp. 90-114. ISBN 9783540221524

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro and Rossi, Sabina (2004) Declarative semantics of input consuming logic programs. [Report]

Brinkman, R. and Feng, L. and Doumen, J. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Information systems security, 13 (3). pp. 14-21. ISSN 1065-898X

Brinkman, R. and Feng, L. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. In: Proceedings of the 2nd International Workshop on Security In Information Systems (WOSIS), 13-14 Apr 2004, Porto, Portugal (pp. pp. 126-135).

Brinkman, R. and Feng, L. and Doumen, J. and Hartel, P.H. and Jonker, W. (2004) Efficient tree search in encrypted data. [Report]

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Joosten, Rieks and Kleinhuis, Geert (2004) Inter-library service brokerage in LicenseScript. [Report]

Chong, Cheun Ngen and Ren, Bin and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Corin, Ricardo (2004) License protection with a tamper-resistant token. In: 5th International Workshop Information Security Applications, WISA 2004, August 23-25, 2004, Jeju Island, Korea (pp. pp. 223-238).

Chong, Cheun Ngen and Ren, Bin and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Corin, Ricardo (2004) License protection with a tamper-resistant token. [Report]

Law, Yee Wei and Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Corin, Ricardo (2004) Licensing Structured Data with Ease. In: IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, May 22-24, 2003, Ilmenau, Germany.

Law, Yee Wei and Hartel, Pieter and Hartog, Jerry den and Havinga, Paul (2004) Link-layer jamming attacks on S-MAC. [Report]

Etalle, S. , ed. (2004) Logic Based Program Synthesis and Transformation 14th International Symposium, LOPSTR 2004, Verona, Italy, August 26 – 28, 2004, Revised Selected Papers. Lecture Notes in Computer Science, 3573 . Springer-Verlag, Berlin. ISBN 9783540266556

Hartel, Pieter and Eck, Pascal van and Etalle, Sandro and Wieringa, Roel (2004) Modelling mobility aspects of security policies. [Report]

Hartel, Pieter and Eck, Pascal van and Etalle, Sandro and Wieringa, Roel (2004) Modelling mobility aspects of security policies (Invited paper). In: Construction and Analysis of Safe, Secure and Interoperable Smart Cards, CASSIS, March 10-14, 2004, Marseille, France (pp. pp. 172-191).

Kalker, T. and Epema, D.H.J. and Hartel, P.H. and Lagendijk, R.L. and Steen, M. van (2004) Music2Share - Copyright-Compliant Music Sharing in P2P Systems (Invited paper). Proceedings of the IEEE Special Issue on Digital Rights Management, 92 (6). pp. 961-970. ISSN 0018-9219

Kalker, Ton and Epema, Dick H.J. and Hartel, Pieter H. and Lagendijk, R. (Inald) L. and Steen, Maarten van (2004) Music2Share-Copyright-Compliant Music Sharing in P2P Systems. Proceedings of the IEEE, 92 (6). pp. 961-970. ISSN 0018-9219

Hubbers, E.M.G.M. and Jacobs, B.P.F. and Pieters, W. (2004) RIES: Internet voting in action. [Report]

Cheng, Jieyin and Chong, Cheun Ngen and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Nikolaus, Stefan (2004) STREAMTO: streaming content using a tamper-resistant token. [Report]

Doumen, J.M. and Brinkman, R. and Jonker, W. (2004) Searching in Encrypted Data. In: Finite Fields: Theory and Applications, 5-11 Dec 2004, Oberwolfach, Germany (pp. p. 2951).

Bhargavan, K. and Corin, R.J. and Fournet, C. and Gordon, A.D. (2004) Secure Sessions for Web Services. In: Proceedings ACM Workshop on Secure Web Services.

Corin, R. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security Analysis of Parlay/OSA Framework. In: 9th International Conference on Intelligence in Service Delivery Networks, ICIN '04, October 18-21, 2004, Bordeaux, France (pp. pp. 54-59).

Corin, R. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security analysis of parlay/OSA framework. [Report]

Laud, P. and Corin, R.J. (2004) Sound Computational Interpretation of Formal Encryption with Composed Keys. In: LNCS, 6th Annual Int. Conf. on Information Security and Cryptology, Seoul, Korea (pp. pp. 55-66).

Law, Yee Wei and Doumen, Jeroen and Hartel, Pieter (2004) Survey and benchmark of block ciphers for wireless sensor networks. [Report]

Beek, Maurice H. ter and Lenzini, Gabriele and Petrocchi, Marinella (2004) Team Automata for Security - A Survey -. Electronic Notes in Theoretical Computer Science (ENTCS), 128 (5). pp. 105-119. ISSN 1571-0661

Beek, Maurice H. ter and Lenzini, Gabriele and Petrocchi, Marinella (2004) Team automata for security analysis. [Report]

Bossi, Annalisa and Etalle, Sandro and Rossi, Sabina and Smaus, Jan-Georg (2004) Termination of Simply Moded Logic Programs with Dynamic Scheduling. ACM Transactions on Computational Logic, 15 (3). pp. 470-507. ISSN 1529-3785

Hartel, Pieter and Muller, Henk and Glaser, Hugh (2004) The Functional "C" experience. Journal of Functional Programming, 14 (2). pp. 129-135. ISSN 0956-7968

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2004) Timed Model Checking of Security Protocols. In: 2nd ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, October 25-29, 2004, Washington, DC, USA (pp. pp. 23-32).

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2004) Timed model checking of security protocols. [Report]

Brinkman, R. and Doumen, J.M. and Jonker, W. (2004) Using secret sharing for searching in encrypted data. In: VLDB 2004 Workshop on Secure data management, SDM 2004, Toronto, Canada (pp. pp. 18-27).

Brinkman, Richard and Doumen, Jeroen and Jonker, Willem (2004) Using secret sharing for searching in encrypted data. [Report]

Hartog, J.I. den and Vink, E.P. de (2004) Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. In: Proceedings 2nd Int. Workshop on Formal Aspect of Security and Trust (pp. pp. 85-98).

Hartog, J.I. den and Vink, E.P. de (2004) Virtual analysis and reduction of side-channel vulnerabilities of smartcards. [Report]

2003

Law, Yee Wei and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter H. (2003) A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. In: IFIP-TC6 8th International Conference on Personal Wireless Communications, PWC 2003, September 23-25, 2003, Venice, Italy (pp. pp. 27-39).

Law, Yee Wei and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter H. (2003) A formally verified decentralized key management architecture for wireless sensor networks. [Report]

Pieters, W. (2003) A pragmatic phenomenological approach in environmental planning. [Masters Thesis]

Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro (2003) Analysing password protocol security against off-line dictionary attacks. [Report]

Chong, Cheun Ngen and Law, Yee Wei and Etalle, Sandro and Hartel, Pieter H. (2003) Approximating Fair Use in LicenseScript. In: 6th International Conference on Asian Digital Libraries, ICADL 2003, December 8-12, 2003, Kuala Lumpur, Malaysia (pp. pp. 432-443).

Chong, Cheun Ngen and Law, Yee Wei and Etalle, Sandro and Hartel, Pieter H. (2003) Approximating fair use in LicenseScript. [Report]

Law, Y.W. and Dulman, S. and Etalle, S. and Havinga, P. (2003) Assessing Security-Critical Energy-Efficient Sensor Networks. In: 18th IFIP TC11 International Conference on Information Security, Security and Privacy in the Age of Uncertainty, SEC 2003, May 26-28, 2003, Athens, Greece (pp. pp. 459-463).

Benz, Hartmut (2003) Casual multimedia process annotations, CoMPAs. thesis.

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter H. (2003) Comparing Logic-based and XML-based Rights Expression Languages. In: OTM Confederated International Workshops: On The Move to Meaningful Internet Systems, November 3-7, 2003, Catania, Sicily, Italy (pp. pp. 779-792).

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter H. (2003) Comparing logic-based and XML-based rights expression languages. [Report]

Havinga, Paul and Etalle, Sandro and Karl, Holger and Petrioli, Chiara and Zorzi, Michele and Kip, Harry and Lentsch, Thomas (2003) EYES - Energy Efficient Sensor Networks. In: IFIP-TC6 8th International Conference on Personal Wireless Communications, PWC 2003, September 23-25, 2003, Venice, Italy (pp. pp. 198-201).

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2003) EnergY-Efficient Sensor CRYptographic Module. In: Proceedings of the 14th ProRISC workshop on Circuits, Systems and Signal Processing.

Brinkman, Richard and Feng, Ling and Etalle, Sandro and Hartel, Pieter and Jonker, Willem (2003) Experimenting with linear search in encrypted data. [Report]

Schoute, Albert and Seesink, Remco and Dierssen, Werner and Kooij, Niek (2003) Fast data sharing within a distributed, multithreaded control framework for robot teams. [Report]

Corin, Ricardo and Malladi, Sreekanth and Alves-Foss, Jim and Etalle, Sandro (2003) Guess what? Here is a new tool that finds some new guessing attacks. In: IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security, WITS '03, April 5-6, 2003, Warsaw, Poland (pp. pp. 62-71).

Corin, R.J. and Malladi, S. and Alves-Foss, J. and Etalle, S. (2003) Guess what? Here is a new tool that finds some new guessing attacks (Extended abstract). [Report]

Corin, Ricardo and Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter (2003) How to pay in LicenseScript. [Report]

Hanssen, Ferdy (2003) Installing fonts in LaTeX a user's experience. MAPS, 29 . pp. 61-64. ISSN 1574-4620

Di Pietro, Roberto and Mancini, Luigi V. and Law, Yee Wei and Etalle, Sandro and Havinga, Paul (2003) LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In: 32nd International Conference on Parallel Processing Workshops, 6-9 October 2003, Kaohsiung, Taiwan (pp. pp. 397-406).

Di Pietro, Roberto and Mancini, Luigi V. and Law, Yee Wei and Etalle, Sandro and Havinga, Paul (2003) LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks. [Report]

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language. In: IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, May 22-24, 2003, Ilmenau, Germany (pp. pp. 104-115).

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Jonker, Willem and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. In: Third International Conference on Web Delivering of Music, WEDELMUSIC 2003, 15-17 September 2003, Leeds, UK (pp. pp. 122-129).

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Jonker, Willem and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. [Report]

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei (2003) LicenseScript: a novel digital rights language. [Report]

Law, Yee Wei and Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Corin, Ricardo (2003) Licensing structured data with ease. [Report]

Jansen, Pierre G. and Mullender, Sape J. and Havinga, Paul J.M. and Scholten, Hans (2003) Lightweight EDF scheduling with deadline inheritance. [Report]

Gebska, Maura and Montoya, Lorena and Paresi, Chris (2003) Manage data – manage hazards – development of urban hazard information infrastructure for Windhoek (Namibia). In: First International ICSC Symposium on Information Technologies in Environmental Engineering, ITEE 2003, 24-27 June 2003, Gdansk, Poland (pp. -70).

Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Mader, Angelika (2003) On Modelling Real-time and Security properties of Distributed Systems. In: 5th Plenary Cabernet Workshop, 5-7 November 2003, Porto Santo, Portugal.

Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Mader, Angelika (2003) On modelling real-time and security properties of distributed systems. [Report]

Dillema, F.W. and Stabell-Kulø, T. (2003) Pesto flavoured security. [Report]

Etalle, Sandro and Mukhopadhyay, Supratik and Roychoudhury, Abhik (2003) Preface [of the proceedings of the First international Workshop on Software Verification and Validation (SVV)]. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003). Electronic Notes in Theoretical Computer Science, 118 (1). Elsevier.

Hanssen, Ferdy and Jansen, Pierre G. (2003) Real-time communication protocols: an overview. [Report]

Lijding, Maria Eva Magdalena (2003) Real-time scheduling of tertiary storage. thesis.

Bistarelli, S. and Cervesato, I. and Lenzini, G. and Martinelli, F. (2003) Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. In: 2nd Int. Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (pp. pp. 86-99).

Martinelli, F. and Bistarelli, S. and Cervesato, I. and Lenzini, G. and Marangoni, R. (2003) Representing Biological Systems with Multiset Rewriting. In: EUROCAST 2003: 9th International Workshop on Computer Aided Systems Theory, Las Palmas de Gran Canaria, Spain (pp. pp. 415-426).

Jansen, Pierre G. and Hanssen, Ferdy and Lijding, Maria Eva (2003) Scheduling of Early Quantum Tasks. In: 15th Euromicro Conference on Real-Time Systems, 2-4 July 2003, Porto, Portugal (pp. pp. 203-210).

Chong, C.N. and Peng, Z. and Hartel, P.H. (2003) Secure Audit Logging with Tamper-Resistant Hardware. In: 18th IFIP TC11 Int. Conf. on Information Security, Security and Privacy in the Age of Uncertainty (pp. pp. 73-84).

Sundramoorthy, Vasughi and Scholten, Hans and Jansen, Pierre and Hartel, Pieter (2003) Service discovery at home. In: Joint Conference of the Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia, 2003, 15-18 Dec. 2003 , Singapore (pp. pp. 1929-1933).

Sundramoorthy, Vasughi and Scholten, Hans and Jansen, Pierre and Hartel, Pieter (2003) Service discovery at home. [Report]

Bossi, Annalisa and Etalle, Sandro and Rossi, Sabina and Smaus, Jan-Georg (2003) Termination of simply moded logic programs with dynamic scheduling. [Report]

Corin, Ricardo and Durante, Antonio and Etalle, Sandro and Hartel, Pieter (2003) trace logic for local security properties. [Report]

2002

Poll, Erik and Hartel, Pieter and Jong, Eduard de (2002) A Java Reference Model of Transacted Memory for Smart Cards. In: Fifth Smart Card Research and Advanced Application Conference, CARDIS 2002, November 21-22, 2002, San Jose, CA (pp. pp. 75-86).

Poll, Erik and Hartel, Pieter and Jong, Eduard de (2002) A Java Reference Model of Transacted Memory for Smart Cards. [Report]

Hanssen, F. and Hartel, P. and Hattink, T. and Jansen, P. and Wijnberg, J. and Scholten, J. (2002) A Real-Time Ethernet Network at Home. In: Euromicro International Conference on Real-Time Systems, June 19 - 21, 2002, Vienna, Austria (pp. pp. 5-8).

Hanssen, F. and Hartel, P. and Hattink, T. and Jansen, P. and Scholten, J. and Wijnberg, J. (2002) A Real-Time Ethernet Network at Home. [Report]

Lijding, Maria Eva and Hanssen, Ferdy and Jansen, Pierre G. (2002) A case against periodic jukebox scheduling. [Report]

Corin, Ricardo and Etalle, Sandro (2002) An Improved Constraint-based system for the verification of security protocols. In: 9th International Symposium on Static Analysis, SAS 2002, September 17-20, 2002 , Madrid, Spain (pp. pp. 239-265).

Evers, Leon and Bach, Wouter and Dam, Dennis and Jonker, Mischa and Scholten, Hans (2002) An Iterative Quality-Based Localization Algorithm for Ad Hoc Networks. In: First International Conference on Pervasive Computing, August 26-28, 2002, Zürich, Switzerland.

Corin, Ricardo and Etalle, Sandro (2002) An improved constraint-based system for the verification of security protocols. [Report]

Law, Y.W. and Dulman, S. and Etalle, S. and Havinga, P. (2002) Assessing Security-Critical Energy-Efficient Sensor Networks. [Report]

Pieters, W. (2002) Case-based techniques for conversational agents in virtual environments. [Masters Thesis]

Abelmann, Leon and Chong, Jordan and Hartel, Pieter and Lodder, Cock (2002) Design rationale for secure probe storage based on patterned magnetic media. [Report]

Jansen, P.G. and Hanssen, F. and Lijding, M. (2002) Early quantum task scheduling. [Report]

Law, Yee Wei and Etalle, Sandro and Hartel, Peter (2002) Key management with group-wise pre-deployed keying and secret sharing pre-deployed keying. [Report]

Chong, C.N. and Law, Y.W. and Etalle, S. and Hartel, P.H. (2002) LicenseScript : a language and framework for calculating licenses on information over constrained domains. [Report]

Chong, Cheun Ngen and Law, Yee Wei and Etalle, Sandro and Hartel, Pieter (2002) LicenseScript- A Language and Framework for Calculating Licenses on Information over Constrained Domains. In: 7th Cabernet Radicals Workshop, 13-16 October 2002, Bertinoro (Forlì), Italy.

Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2002) Low-Cost Planar PTF Sensors for the Identity Verification of Smartcard Holders. In: 1st IEEE Int. Conf. on Sensors, 12-14 June 2002, Orlando, Florida (pp. pp. 1614-1619).

Scholten, H. and Jansen, P. and Hanssen, F. and Hartel, P. and Hattink, T. and Sundramoorthy, V. (2002) Multimedia QoS in low-cost home networks. In: 27th Annual IEEE Conference on Local Computer Networks, LCN, 6-8 Nov. 2002 , Tampa, Florida (pp. pp. 327-328).

Scholten, H. and Jansen, P. and Hanssen, F. and Hartel, P.H. and Hattink, T. and Sundramoorthy, V. (2002) Multimedia Qos in low-cost home networks. [Report]

Dulman, Stefan and Nieberg, Tim and Havinga, Paul and Hartel, Pieter (2002) Multipath Routing for Data Dissemination in Energy Efficient Sensor Networks. [Report]

Law, Y.W. and Chan, K.Y. (2002) NECTAR: Simulation and Visualization in a 3D Collaborative Environment. In: EUROMEDIA 2002, Modena, Italy (pp. pp. 15-17).

Bossi, Annalisa and Cocco, Nicoletta and Rossi, Sabina and Etalle, Sandro (2002) On Modular Termination Proofs of General Logic Programs. Theory and Practice of Logic Programming, 2 (3). pp. 263-291. ISSN 1471-0684

Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2002) Polymer thick-film sensors: possibilities for smartcard biometrics. [Report]

Bossi, Annalisa and Rossi, Sabina and Etalle, Sandro (2002) Properties of Input-Consuming Derivations. Theory and Practice of Logic Programming, 2 (2). pp. 125-154. ISSN 1471-0684

Schoute, A.L. (2002) RoadPlan manual version 3.1. [Report]

Chong, C.N. and Peng, Z. and Hartel, P.H. (2002) Secure Audit Logging with Tamper-Resistant Hardware. [Report]

Brinkman, Richard and Hoepman, Jaap-Henk (2002) Secure Method Invocation in JASON. In: Fifth Smart Card Research and Advanced Applications Conference, CARDIS 2002, November 21-22, 2002, San Jose, CA (pp. pp. 180-193).

Chong, Jordan C.N. and Buuren, René van and Hartel, Pieter H. and Kleinhuis, Geert (2002) Security Attributes Based Digital Rights Management. [Report]

Chong, Jordan C.N. and Buuren, René van and Hartel, Pieter H. and Kleinhuis, Geert (2002) Security Attributes Based Digital Rights Management. In: Joint International Workshops on Interactive Distributed Multimedia Systems and Protocols for Multimedia Systems, IDMS/PROMS 2002, November 26-29, 2002, Coimbra, Portugal (pp. pp. 339-352).

Henderson, N.J. and White, N.M. and Veldhuis, R.N.J. and Hartel, P.H. and Slump, C.H. (2002) Sensing pressure for authentication. In: 3rd IEEE Benelux Signal Processing Symp. (pp. pp. 241-244).

Henderson, N.J. and White, N.M. and Veldhuis, R.N.J. and Hartel, P.H. and Slump, C.H. (2002) Sensing pressure for authentication. [Report]

Hafkamp, Wim (2002) Telt een gewaarschuwde organisatie voor twee? Management & Informatie, 10 (6). pp. 19-26. ISSN 0920-1792

Hartel, Pieter and Muller, Henk and Glaser, Hugh (2002) The Functional "C" experience. [Report]

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro (2002) Transformation Systems and Nondeclarative Properties. In: Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski Part 1. Lecture Notes in Computer Science, 2407 . Springer-Verlag, Berlin, Germany, pp. 162-186. ISBN 9783540439592

Corin, Ricardo and Durante, Antonio and Etalle, Sandro and Hartel, Pieter (2002) Using Trace Formulae for Security Protocol Design. In: 7th Cabernet Radicals Workshop, 13-16 October 2002, Bertinoro (Forlì), Italy.

Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2002) Using Trace Formulae for Security Protocol Design. [Report]

Hartog, J.I. den and Vink, E.P. de (2002) Verifying probabilistic programs using a hoare like logic. International journal of foundations of computer science, 13 (3). pp. 315-340. ISSN 0129-0541

Bach, Wouter and Dam, Dennis and Evers, Leon and Jonker, Mischa and Scholten, Hans and Havinga, Paul (2002) iterative quality-based localization algorithm for ad hoc networks. [Report]

2001

Hanssen, Ferdy and Hartel, Pieter and Jansen, Pierre and Scholten, Hans and Vervoort, Wiek (2001) A Real time network at home. In: PROGRESS 2001 Workshop on Embedded Systems, October 18, 2001, Veldhoven, the Netherlands (pp. pp. 67-72).

Hanssen, Ferdy and Hartel, Pieter and Jansen, Pierre and Scholten, Hans and Vervoort, Wiek (2001) A Real-time Network at Home. [Report]

Domingo-Ferrer, Josep and Hartel, Pieter (2001) Current directions in smart cards. Computer Networks, 36 (4). pp. 377-379. ISSN 1389-1286

Hartel, Pieter and Jacobs, Bart (2001) De Smartcard van 2010. (Smart)Cards in Business, 6 (7). pp. 14-16. ISSN 1569-1179

Hartel, P.H. and Moreau, L.A.V. (2001) Formalising the safety of Java, the Java Virtual Machine and Java Card. [Report]

Hartel, Pieter H. and Moreau, Luc (2001) Formalizing the Safety of Java, the Java Virtual Machine and Java Card. ACM computing surveys, 33 (4). pp. 517-558. ISSN 03600300

Pieters, W. (2001) Free will and intelligent machines: Why case-based reasoning systems do what they do. [Report]

Bolks, Mathieu and Hanssen, Ferdy and Abelmann, Leon and Havinga, Paul and Hartel, Pieter and Jansen, Pierre and Lodder, Cock and Smit, Gerard (2001) Micro Scanning Probe Array Memory. [Report]

Bolks, Mathieu and Hanssen, Ferdy and Abelmann, Leon and Havinga, Paul and Hartel, Pieter and Jansen, Pierre and Lodder, Cock and Smit, Gerard (2001) Micro Scanning Probe Array memory (µSPAM). In: PROGRESS 2001 2nd Workshop on Embedded Systems, October 18, 2001, Veldhoven, the Netherlands (pp. pp. 17-26).

Field, A.N. and Hartel, P.H. (2001) On the evaluation of Web Radio. [Report]

Field, A.N. and Hartel, P.H. and Mooij, W.G.P. (2001) Personal DJ, an Architecture for Personalized Content Delivery. [Report]

Field, A.N. and Hartel, P.H. and Mooij, W. (2001) Personal DJ, an Architecture for personalised content delivery. In: 10th Int. World Wide Web conference , Hong Kong may 2001 (pp. pp. 1-8).

Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2001) Polymer thick-film sensors: possibilities for smartcard biometrics. In: 11th Conference on Sensors and Their Applications, 3-6 September 2001, London, UK (pp. pp. 83-88).

Delzanno, Giorgio and Etalle, Sandro (2001) Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. In: 11th International Workshop on Logic Based Program Synthesis and Transformation, LOPSTR 2001, November 28-30, 2001, Paphos, Greece (pp. pp. 76-90).

Mansour, O. and Etalle, S. and Krol, T. (2001) Scheduling and Allocation of Non-Manifest Loops on Hardware Graph-Models. In: 2nd PROGRESS Workshop on Embedded Systems, 2001, 18 October 2001, Veldhoven, The Netherlands (pp. pp. 153-160).

Etalle, Sandro and Bossi, Annalisa and Rossi, Sabina and Smaus, Jan-Georg (2001) Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling. In: 10th European Symposium on Programming, ESOP 2001, April 2-6, 2001, Genova, Italy (pp. pp. 402-416).

Hartel, Pieter H. and Butler, Michael J. and Jong, Eduard de and Longley, Mark (2001) Transacted Memory for Smart Cards. In: International Symposium of Formal Methods Europe, FME 2001, March 12–16, 2001, Berlin, Germany (pp. pp. 478-499).

Etalle, Sandro and Gabbrielli, Maurizio and Meo, Maria Chiara (2001) Transformations of CCP programs. ACM Transactions on Programming Languages and Systems (TOPLAS), 23 (3). pp. 304-395. ISSN 0164-0925

Hartel, Pieter (2001) Veiligheid in Gedistribueerde Systemen. [Lecture]

Henderson, Neil J. and White, Neil M. and Hartel, Pieter H. (2001) iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric. In: International Conference on Research in Smart Cards, E-smart 2001 , September 19–21, 2001 , Cannes, France (pp. pp. 124-134).

Henderson, N.J. and White, N.M. and Hartel, P.H. (2001) iButton enrolment and verification times for the pressure sequence smartcard biometric. In: 2nd Conf. Smart card Programming and Security (E-smart), Cannes, France (pp. pp. 124-134).

2000

Hartel, Pieter H. and Jong, Eduard de (2000) A programming and a modelling perspective on the evaluation of Java card implementations. In: Java on Smart Cards:Programming and Security. Springer-Verlag, Berlin, Germany, pp. 52-72. ISBN 9783540421672

Rein, H. van and Brinkman, R. (2000) Home-grown CASE tools with XML and XSLT. In: International Workshop on Model Engineering, IWME 2000, Sophia Antipolis, France (pp. pp. 105-112).

Diehl, Stephan and Hartel, Pieter and Sestoft, Peter (2000) Principles of abstract machines : guest editorial. Future generation computer systems, 16 (7). V-VI. ISSN 0167-739X

Bossi, Annalisa and Etalle, Sandro and Rossi, Sabina (2000) Semantics of Well-Moded Input-Consuming Programs. Computer Languages, 26 (1). pp. 1-25. ISSN 0096-0551

1999

Etalle, Sandro and Hartel, Pieter H. and Vree, Willem G. (1999) Declarative solutions to partitioned-grid problems. Software: Practice and Experience, 29 (13). pp. 1173-1200. ISSN 0038-0644

Croo de Jongh, du, M.S.L. and Doumen, J.M. and Leeuwen, van, J.M.J. (1999) Density matrix technique for ground state calculations. Computer Physics Communications, 121/12 (Sept/O). pp. 483-488. ISSN 0010-4655

Hartel, Pieter H. (1999) LETOS - a lightweight execution tool for operational semantics. Software: Practice and Experience, 29 (15). pp. 1379-1416. ISSN 0038-0644

Bosch, Hendrikus Gerardus Petrus (1999) Mixed-Media File Systems. thesis.

Helme, Arne and Stabell-Kulo, Tage (1999) Off-line Delegation. In: 8th USENIX Security Symposium 1999, August 23-26, 1999, Washington, DC, USA.

Hartel, Pieter (1999) Review of Cousineau G. and Mauny, M. The Functional Approach to Programming. Journal of Functional Programming, 9 (4). pp. 479-481. ISSN 0956-7968

Jansen, P.G. and Laan, R. (1999) The stack resource protocol based on real time transactions. IEE Proceedings: Software, 1999 (2). pp. 112-119. ISSN 1462-5970

1998

Dini, Gianluca and Helme, Arne and Stabell-Kulo, Tage (1998) Detecting Key-Dependencies. In: 3rd Australasian Conference on Information Security and Privacy, ACISP 1998, July 13-15, 1998, Brisbane, Queensland, Australia.

1997

Glaser, H. and Hartel, P.H. and Kuchen, H. , eds. (1997) 9th Programming Languages: Implementations, Logics and Programs (PLILP). Springer-Verlag, Berlin. ISBN 9783540633983

Helme, Arne (1997) A System for Secure User-Controlled Electronic Transactions. thesis.

Hartel, Pieter and Muller, Henk (1997) Functional C. Addison Wesley Longman, Harlow, UK. ISBN 9780201419504

1996

Hartel, P.H. and Paradinas, P. and Quisquater, J.-J. , eds. (1996) 2nd Smart Card Research and Advanced Application (CARDIS). CWI, Amsterdam. ISBN 9789061964650

Jansen, Pierre G. and Wygerink, Emiel (1996) Flexible Scheduling by Deadline Inheritance in Soft Real Time Kernels. [Report]

Bosch, Peter (1996) PFS: A Distributed and Customizable File System. In: Fifth International Workshop on Object Orientation in Operating Systems, IWOOOS, 27-28 Oct. 1996, Seattle, Washington (pp. pp. 78-85).

Nauta, Jan Martinus (1996) Vehicle Trajectory Planning with Interval Arithmetic. thesis.

Glaser, Hugh and Hartel, Pieter H. and Jong Frz, Eduard K.J. de (1996) Visualising the Structure of an IC-card Security Architecture. In: Smart Card Convention 1996 - Technology and markets, February 1996, Peterborough, UK (pp. pp. 22-34).

1995

Hartel, P.H. and Plasmeijer, M.J. , eds. (1995) 1st Functional Programming languages in Education (FPLE). Springer-Verlag, Berlin. ISBN 9783540606758

Jansen, Pierre G. and Sijben, Paul (1995) Kernel Support in a Distributed Multimedia Environment. In: First International Workshop on Real-Time Computing Systems and Applications, 14-16 December 1994, Seoul, Korea (pp. pp. 117-121).

Mader, Angelika (1995) Tableau Recycling. In: 4th International Workshop Computer Aided Verification, CAV 1992, June 29 - July 1, 1992, Montreal, Canada (pp. pp. 330-342).

Etalle, Sandro (1995) Transformation and analysis of (constraint) logic programs. thesis.

1994

Saake, Gunter and Hartel, Peter and Jungclaus, Ralf and Wieringa, Roel and Feenstra, Remco (1994) Inheritance conditions for object life cycle diagrams. In: EMISA-Workshop Formale Grundlagen fur den Entwurf von Informationsystemen, 24-26 May 1994, Tutzing, Germany (pp. pp. 79-88).

1993

Cobben, Peter L.H.M. and Egberink, Richard J.M. and Bomer, J.G. and Schouwenaar, Robert and Brzozka, Zbigniew and Bergveld, Piet and Reinhoudt, David N. and Bos, Martinus (1993) Chemically modified ion-sensitive field-effect transistors: elimination of the liquid juction potential in a double sensor flow-injection analysis cell. Analytica Chimica Acta, 276 (2). pp. 347-352. ISSN 0003-2670

Beemster, M. and Hartel, P.H. and Hertzberger, L.O. and Hofman, R.F.H. and Langendoen, K.G. and Li, L.L. and Milikowski, R. and Vree, W.G. and Barendregt, H.P. and Mulder, J.C. (1993) Experience with a clustered parallel reduction machine. Future Generation Computer Systems, 9 (3). pp. 175-200. ISSN 0167-739X

1992

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro (1992) Transforming Normal Programs by Replacement. In: 3rd International Workshop on Meta Programming in Logic, META 1992, June 10-12, 1992, Uppsala, Sweden (pp. pp. 265-279).

1990

Bos, M. and Bos, A. and Linden, W.E. van der (1990) Processing of signals from an ion-elective electrode array by a neural network. Analytica Chimica Acta, 223 . pp. 31-39. ISSN 0003-2670

1989

Hartel, Pieter Hendrik (1989) Performance analysis of storage management in combinator graph reduction. thesis.

1988

Hartel, Pieter H. and Veen, Arthur H. (1988) Statistics on graph reduction of SASL programs. Software: Practice and Experience, 18 (3). pp. 239-253. ISSN 0038-0644

1985

Hartel, Pieter H. and Starreveld, Dolf (1985) Modula-2 implementation overview. Journal of Pascal, Ada & Modula-2, 4 . pp. 9-23. ISSN 07471351

1984

Hartel, Pieter H. and Harmelen, Frank A. van (1984) The analysis of modular structures with respect to their interconnect topology. Interfaces in Computing, 2 (1). pp. 81-91. ISSN 0252-7308

1983

Hartel, Pieter H. (1983) Comparing Pascal and Modula-2 as systems programming languages. In: Programming languages and system design: proceedings of the IFIP TC 2 Working conference on programming languages and system design, Dresden, GDR, 7-10 March, 1983. North-Holland, Amsterdam, pp. 187-198. ISBN 9780444867940

Bos, Jan van den and Plasmeijer, Marinus J. and Hartel, Pieter H. (1983) Input-output tools: a language facility for interactive and real-time systems. IEEE Transactions on Software Engineering, 9 (3). pp. 247-259. ISSN 0098-5589

This list was generated on Sun Oct 26 06:06:22 2014 CET.