Research Group: Distributed and Embedded Systems (DIES)

These publication lists might not be complete. Publications are added regularly.

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Number of items: 638.

Article

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. (2012) $A^2$thOS: availability analysis and optimisation in SLAs. International Journal of Network Management, 22 (2). pp. 104-130. ISSN 1055-7148

Hadžiosmanović, Dina and Bolzoni, Damiano and Hartel, Pieter (2012) A Log Mining Approach for Process Monitoring in SCADA. International Journal of Information Security, 11 . ISSN 1615-5262

Böhm, Klemens and Etalle, Sandro and Hartog, Jerry den and Hütter, Christian and Trabelsi, Slim and Trivellato, Daniel and Zannone, Nicola (2010) A flexible architecture for privacy-aware trust management. Journal of Theoretical and Applied Electronic Commerce Research, 5 (2). pp. 77-96. ISSN 0718-1876

Trivellato, Daniel and Zannone, Nicola and Glaundrup, Maurice and Skowronek, Jacek and Etalle, Sandro (2013) A semantic security framework for systems of systems. International journal of cooperative information systems, 22 (1). pp. 1-35. ISSN 0218-8430

Kargl, Frank and Papadimitratos, Panos (2011) ACM WiSec 2011 poster and demo session. ACM SIGMOBILE Mobile Computing and Communications Review, 15 (3). p. 34. ISSN 1559-1662

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2010) ANWB-enquête niet democratisch. NRC handelsblad, 40 (25-01-). p. 6. ISSN 0002-5259

Gnesi, S. and Lenzini, G. and Martinelli, F. (2004) Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability. Electronic Notes in Theoretical Computer Science (ENTCS), 99 . pp. 111-126. ISSN 1571-0661

Stoelinga, Mariëlle and Pieters, Wolter (2013) Attack navigator vindt en verhelpt zwakke plekken. Bits & chips : tweewekelijks nieuwsmagazine voor de hightechindustrie, 4 . ISSN 1879-6443

Dekker, M.A.C. and Veugen, P.J.M. and Etalle, S. (2006) Audit-based Access Control in de Zorg. Informatiebeveiliging, 8 . pp. 19-23. ISSN 1569-1063

Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den and Lenzini, G. (2007) Audit-based compliance control. International Journal of Information Security, 6 (2-3). pp. 133-151. ISSN 1615-5262

Petit, Jonathan and Mammeri, Zoubir (2013) Authentication and consensus overhead in vehicular ad hoc networks. Telecommunication systems, 52 (4). pp. 2699-2712. ISSN 1018-4864

Haverkort, Boudewijn and Remke, Anne and Hartel, Pieter (2009) Betere beveiliging Scada-systemen vitaal voor Nederlandse infrastructuren. Bits & chips : tweewekelijks nieuwsmagazine voor de hightechindustrie, 11 (16). p. 23. ISSN 1879-6443

Pieters, W. (2008) Betrouwbaarheid of vertrouwbaarheid : Vertrouwen in technologie en bestuur. Openbaar bestuur, 18 (10). pp. 27-30. ISSN 0925-7322

Hartel, Pieter (2012) Book review: The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / by P. Engebretson. - Waltham, MA : Syngress Publishing, 2011. - ISBN 978-1-597496-55-1. Computing Reviews (CR140206). ISSN 1530-6585

Cobben, Peter L.H.M. and Egberink, Richard J.M. and Bomer, J.G. and Schouwenaar, Robert and Brzozka, Zbigniew and Bergveld, Piet and Reinhoudt, David N. and Bos, Martinus (1993) Chemically modified ion-sensitive field-effect transistors: elimination of the liquid juction potential in a double sensor flow-injection analysis cell. Analytica Chimica Acta, 276 (2). pp. 347-352. ISSN 0003-2670

Pieters, Wolter (2011) Cloud security in vogelvlucht. Informatiebeveiliging, 2011 (1). pp. 16-17. ISSN 1569-1063

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2008) Cluster-based service discovery for heterogeneous wireless sensor networks. International Journal of Parallel, Emergent and Distributed Systems, 23 (4). pp. 325-346. ISSN 1744-5760

Makri, Eleftheria and Konstantinou, Elisavet (2011) Constant round group key agreement protocols: A comparative study. Computers & Security, 30 (8). pp. 643-678. ISSN 0167-4048

Domingo-Ferrer, Josep and Hartel, Pieter (2001) Current directions in smart cards. Computer Networks, 36 (4). pp. 377-379. ISSN 1389-1286

Casalicchio, E. and Caselli, M. and Coletta, A. and Nai Fovino, I. (2013) DNS as critical infrastructure, the energy system case study. International journal of critical infrastructures, 9 (1-2). pp. 111-129. ISSN 1475-3219

Hartel, Pieter and Jacobs, Bart (2001) De Smartcard van 2010. (Smart)Cards in Business, 6 (7). pp. 14-16. ISSN 1569-1179

Pieters, Wolter (2009) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2008 (3). pp. 18-20. ISSN 1569-1063

Leinmüller, Tim and Schoch, Elmar and Kargl, Frank and Maihöfer, Christian (2010) Decentralized position verification in geographic ad hoc routing. Security and communication networks, 3 (4). pp. 289-302. ISSN 1939-0122

Etalle, Sandro and Hartel, Pieter H. and Vree, Willem G. (1999) Declarative solutions to partitioned-grid problems. Software: Practice and Experience, 29 (13). pp. 1173-1200. ISSN 0038-0644

Croo de Jongh, du, M.S.L. and Doumen, J.M. and Leeuwen, van, J.M.J. (1999) Density matrix technique for ground state calculations. Computer Physics Communications, 121/12 (Sept/O). pp. 483-488. ISSN 0010-4655

Brinkman, R. and Feng, L. and Doumen, J. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Information systems security, 13 (3). pp. 14-21. ISSN 1065-898X

Peter, Andreas and Tews, Erik and Katzenbeisser, Stefan (2013) Efficiently outsourcing multiparty computation under multiple keys. IEEE transactions on information forensics and security, 8 (12). pp. 2046-2058. ISSN 1556-6013

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2010) Embedding renewable cryptographic keys into noisy data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262

Khatib, Mohammed G. and Hartel, Pieter H. and Dijk, Hylke W. van (2008) Energy-Efficient Streaming Using Non-volatile Memory. Journal of Signal Processing Systems . ISSN 1939-8018

Law, Y.W. and Palaniswami, M. and van Hoesel, L.F.W. and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2009) Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks, 5 (1). p. 6. ISSN 1550-4859

Beemster, M. and Hartel, P.H. and Hertzberger, L.O. and Hofman, R.F.H. and Langendoen, K.G. and Li, L.L. and Milikowski, R. and Vree, W.G. and Barendregt, H.P. and Mulder, J.C. (1993) Experience with a clustered parallel reduction machine. Future Generation Computer Systems, 9 (3). pp. 175-200. ISSN 0167-739X

Pieters, Wolter (2010) Explanation and trust: what to tell the user in security and AI? Ethics and Information Technology . ISSN 1388-1957

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2010) Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. International Journal of Computational Models and Algorithms in Medicine, 1 (2). pp. 1-21. ISSN 1947-3133

Tang, Qiang and Chen, Liqun (2011) Extended KCI attack against two-party key establishment protocols. Information Processing Letters, 111 (15). pp. 744-747. ISSN 0020-0190

Hartel, Pieter H. and Moreau, Luc (2001) Formalizing the Safety of Java, the Java Virtual Machine and Java Card. ACM computing surveys, 33 (4). pp. 517-558. ISSN 03600300

De Beule, Jan and Edel, Yves and Käsper, Emilia and Klein, Andreas and Nikova, Svetla and Preneel, Bart and Schillewaert, Jeroen and Storme, Leo (2010) Galois geometries and applications. Designs, Codes and Cryptography, 56 (2-3). pp. 85-86. ISSN 0925-1022

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2010) Gooi eigen servers en pc’s niet weg. Best Practice Magazine, 4 (1). pp. 8-10. ISSN 1877-9557

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2009) Gooi eigen servers en pc’s niet weg. TIEM, Tijdschrift voor Informatie en Management, 34 . pp. 8-9. ISSN 1572-5472

Dietzel, Stefan and Petit, Jonathan and Heijenk, Geert and Kargl, Frank (2013) Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols. IEEE Transactions on vehicular technology, 62 (4). pp. 1505-1518. ISSN 0018-9545

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013) Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, codes and cryptography, 67 (2). pp. 209-232. ISSN 1573-7586

Pieters, Wolter (2011) High security, human significance: Informatiebeveiliging in Twente. Informatiebeveiliging, 2011 (2). pp. 14-17. ISSN 1569-1063

Rocha, Bruno P.S. and Conti, Mauro and Etalle, Sandro and Crispo, Bruno (2013) Hybrid static-runtime information flow and declassification enforcement. IEEE transactions on information forensics and security, 8 (8). pp. 1294-1305. ISSN 1556-6013

Blakey, Ed and Coecke, Bob and Mislove, Mislove and Pavlovic, Dusko (2013) Information security as a resource. Information and computation, 226 . pp. 1-2. ISSN 0890-5401

Bos, Jan van den and Plasmeijer, Marinus J. and Hartel, Pieter H. (1983) Input-output tools: a language facility for interactive and real-time systems. IEEE Transactions on Software Engineering, 9 (3). pp. 247-259. ISSN 0098-5589

Hanssen, Ferdy (2003) Installing fonts in LaTeX a user's experience. MAPS, 29 . pp. 61-64. ISSN 1574-4620

Delzanno, Giorgio and Etalle, Sandro and Gabbrielli, Maurizio (2006) Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. Theory and Practice of Logic Programming, 6 (3). pp. 225-226. ISSN 1471-0684

Law, Yee Wei and Moniava, Giorgi and Gong, Zheng and Hartel, Pieter and Palaniswami, Marimuthu (2010) KALwEN: a new practical and interoperable key management scheme for body sensor networks. Security and communication networks, 4 (11). pp. 1309-1329. ISSN 1939-0122

Hartel, Pieter H. (1999) LETOS - a lightweight execution tool for operational semantics. Software: Practice and Experience, 29 (15). pp. 1379-1416. ISSN 0038-0644

Chong, C.N. and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Y.W. and Tokmakoff, A. (2006) LicenseScript: A Logical Language for Digital Rights Management. Annals of telecommunications special issue on Network and Information systems security, 61 (3-4). pp. 284-331. ISSN 0003-4347

Baydere, S. and Safkan, Y. and Durmaz Incel, O. (2005) Lifetime Analysis of Reliable Wireless Sensor Networks. IEICE transactions on communications, E88-B . pp. 2465-2472. ISSN 09168516

Etalle, Sandro and Winsborough, William H. (2009) Maintaining control while delegating trust: Integrity constraints in trust management. ACM Transactions on Information and System Security, 13 (1). p. 5. ISSN 1094-9224

Kelkboom, E.J.C. and Breebaart, J. and Buhan, I.R. and Veldhuis, R.N.J. (2012) Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources. IEEE Transactions on information forensics and security, 7 (4). pp. 1225-1241. ISSN 1556-6013

Ma, Zhendong and Kargl, Frank and Weber, Michael (2010) Measuring long-term location privacy in vehicular communication systems. Computer Communications, 33 (12). pp. 1414-1427. ISSN 0140-3664

Casalicchio, E. and Caselli, M. and Coletta, A. (2013) Measuring the global domain name system. IEEE Network, 27 (1). pp. 25-31. ISSN 0890-8044

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. and Hartel, Pieter (2010) Model-based Qualitative Risk Assessment for Availability of IT Infrastructures. Software and Systems Modeling . ISSN 1619-1366

Dietzel, Stefan and Kargl, Frank and Heijenk, Geert and Schaub, Florian (2011) Modeling In-Network Aggregation in VANETs. IEEE Communications Magazine, 49 (11). pp. 142-148. ISSN 0163-6804

Hartel, Pieter H. and Starreveld, Dolf (1985) Modula-2 implementation overview. Journal of Pascal, Ada & Modula-2, 4 . pp. 9-23. ISSN 07471351

Pavlovic, Dusko (2013) Monoidal computer I: Basic computability by string diagrams. Information and computation, 226 . pp. 94-116. ISSN 0890-5401

Kalker, T. and Epema, D.H.J. and Hartel, P.H. and Lagendijk, R.L. and van Steen, M. (2004) Music2Share - Copyright-Compliant Music Sharing in P2P Systems (Invited paper). Proceedings of the IEEE Special Issue on Digital Rights Management, 92 (6). pp. 961-970. ISSN 0018-9219

Kalker, Ton and Epema, Dick H.J. and Hartel, Pieter H. and Lagendijk, R. (Inald) L. and Steen, Maarten van (2004) Music2Share-Copyright-Compliant Music Sharing in P2P Systems. Proceedings of the IEEE, 92 (6). pp. 961-970. ISSN 0018-9219

Czenko, Marcin and Tran, Ha and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Hartog, Jerry den (2006) Nonmonotonic Trust Management for P2P Applications. Electronic Notes in Theoretical Computer Science (ENTCS), 157 (3). pp. 113-130. ISSN 1571-0661

Bossi, Annalisa and Cocco, Nicoletta and Rossi, Sabina and Etalle, Sandro (2002) On Modular Termination Proofs of General Logic Programs. Theory and Practice of Logic Programming, 2 (3). pp. 263-291. ISSN 1471-0684

Schaub, Florian and Hipp, Markus and Kargl, Frank and Weber, Michael (2012) On credibility improvements for automotive navigation systems. Journal of personal and ubiquitous computing, 17 (5). pp. 803-813. ISSN 1617-4909

Pieters, Wolter (2013) On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology . ISSN 1388-1957

Khatib, Mohammed G. and Hartel, Pieter H. (2010) Optimizing MEMS-Based Storage Devices for Mobile Battery-Powered Systems. ACM Transactions on Storage, 6 (1). pp. 1-37. ISSN 1553-3077

Gong, Z. and Long, Y. and Hong, X. and Chen, Kefei (2008) Practical Certificateless Aggregate Signatures From Bilinear Maps. Journal of Information Science and Engineering, accept . ISSN 1016-2364 (In Press)

Bauer, Lujo and Etalle, Sandro and Hartog, Jerry den and Viganò, Luca (2010) Preface of Special Issue on “Computer Security: Foundations and Automated Reasoning”. Journal of Automated Reasoning, 46 (3-4). pp. 223-224. ISSN 0168-7433

Etalle, Sandro and Samarati, Pierangela (2007) Preface of special issue of the proceedings of theSecond International Workshop on Security and Trust Management (STM 2006). Electronic Notes in Theoretical Computer Science, 179 . pp. 1-2. ISSN 1571-0661

Diehl, Stephan and Hartel, Pieter and Sestoft, Peter (2000) Principles of abstract machines : guest editorial. Future generation computer systems, 16 (7). V-VI. ISSN 0167-739X

Bos, M. and Bos, A. and Linden, W.E. van der (1990) Processing of signals from an ion-elective electrode array by a neural network. Analytica Chimica Acta, 223 . pp. 31-39. ISSN 0003-2670

Bossi, Annalisa and Rossi, Sabina and Etalle, Sandro (2002) Properties of Input-Consuming Derivations. Theory and Practice of Logic Programming, 2 (2). pp. 125-154. ISSN 1471-0684

Luo, Yiyuan and Lai, Xuejia and Gong, Zheng (2010) Pseudorandomness analysis of the (extended) Lai–Massey scheme. Information Processing Letters, 111 (2). pp. 90-96. ISSN 0020-0190

Tang, Qiang (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. International journal of applied cryptography, 2 (4). pp. 304-321. ISSN 1753-0563

Tang, Qiang (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Security and communication networks, 5 (12). pp. 1351-1362. ISSN 1939-0122

Labraoui, Nabila and Gueroui, Mourad and Aliouat, Makhlouf and Petit, Jonathan (2011) RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks. Journal of Universal Computer Science, 17 (11). pp. 1550-1571. ISSN 0948-695X

Labraoui, Nabila and Gueroui, Mourad and Aliouat, Makhlouf and Petit, Jonathan (2013) Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommunication systems, 54 (1). pp. 3-17. ISSN 1018-4864

Bistarelli, Stefano and Cervesato, Iliano and Lenzini, Gabriele and Martinelli, Fabio (2005) Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis. Journal of computer security, 13 (1). pp. 3-47. ISSN 0926227X

Pavlovic, Dusko (2011) Relating Toy Models of Quantum Computation: Comprehension, Complementarity and Dagger Mix Autonomous Categories. Electronic Notes in Theoretical Computer Science (ENTCS), 270 (2). pp. 121-139. ISSN 1571-0661

Pieters, Wolter (2011) Representing humans in system security models: An actor-network approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2 (1). pp. 75-92. ISSN 2093-5374

Dressler, Falko and Kargl, Frank and Ott, Jörg and Tonguz, Ozan K. and Wischof, Lars (2011) Research Challenges in Intervehicular Communication: Lessons of the 2010 Dagstuhl Seminar. IEEE Communications Magazine, 49 (5). pp. 158-164. ISSN 0163-6804

Dietzel, Stefan and Schoch, Elmar and Kargl, Frank and Könings, Bastian and Weber, Michael (2010) Resilient Secure Aggregation for Vehicular Networks. IEEE Network, 24 (1). pp. 26-31. ISSN 0890-8044

Qiu, Weidong and Gong, Zheng and Liu, Bozhong and Long, Yu and Chen, Kefei (2010) Restrictive partially blind signature for resource-constrained information systems. Knowledge and Information Systems . ISSN 0219-3116 (In Press)

Pieters, Wolter (2010) Reve(a,i)ling the risks: a phenomenology of information security. Techné: Research in Philosophy and Technology, 14 (3). pp. 176-188. ISSN 1091-8264

Hartel, Pieter (1999) Review of Cousineau G. and Mauny, M. The Functional Approach to Programming. Journal of Functional Programming, 9 (4). pp. 479-481. ISSN 0956-7968

Nikova, Svetla and Rijmen, Vincent and Schläffer, Martin (2010) Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. Journal of Cryptology . ISSN 0933-2790

Buhan, I.R. and Boom, B.J. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2009) Secure pairing with biometrics. International Journal of Security and Networks, 4 (1/2). pp. 27-42. ISSN 1747-8405

Dacier, Marc and Kargl, Frank and Valdes, Alfonso (2013) Securing critical infrastructures from targeted attacks (Dagstuhl Seminar 12502). Dagstuhl Reports, 2 (12). pp. 49-63. ISSN 2192-5283

Pieters, W. and Dimkov, T. and Pavlovic, D. (2012) Security Policy Alignment: A Formal Approach. IEEE Systems Journal . ISSN 1932-8184

Bossi, Annalisa and Etalle, Sandro and Rossi, Sabina (2000) Semantics of Well-Moded Input-Consuming Programs. Computer Languages, 26 (1). pp. 1-25. ISSN 0096-0551

Hartel, Pieter H. and Muller, Henk L. (2011) Simple algebraic data types for C. Software: Practice and Experience . ISSN 0038-0644

Kargl, Frank and Rooij, Jolein de (2013) Softwarepech op de weg. Computer Idee, 2013 (6). pp. 18-21. ISSN 1388-2376

Hartel, Pieter H. and Veen, Arthur H. (1988) Statistics on graph reduction of SASL programs. Software: Practice and Experience, 18 (3). pp. 239-253. ISSN 0038-0644

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2006) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks, 2 (1). pp. 65-93. ISSN 1550-4859

Beek, Maurice H. ter and Lenzini, Gabriele and Petrocchi, Marinella (2004) Team Automata for Security - A Survey -. Electronic Notes in Theoretical Computer Science (ENTCS), 128 (5). pp. 105-119. ISSN 1571-0661

Hafkamp, Wim (2002) Telt een gewaarschuwde organisatie voor twee? Management & Informatie, 10 (6). pp. 19-26. ISSN 0920-1792

Pieters, W. and van Haren, R. (2007) Temptations of turnout and modernisation: e-voting discourses in the UK and the Netherlands. Journal of Information, Communication and Ethics in Society, 5 (4). pp. 276-292. ISSN 1477-996X

Bossi, Annalisa and Etalle, Sandro and Rossi, Sabina and Smaus, Jan-Georg (2004) Termination of Simply Moded Logic Programs with Dynamic Scheduling. ACM Transactions on Computational Logic, 15 (3). pp. 470-507. ISSN 1529-3785

Pieters, Wolter (2011) The (social) construction of information security. The Information Society, 27 (5). pp. 326-335. ISSN 0197-2243

Hartel, Pieter and Muller, Henk and Glaser, Hugh (2004) The Functional "C" experience. Journal of Functional Programming, 14 (2). pp. 129-135. ISSN 0956-7968

Pieters, Wolter and Cleeff, André van (2009) The Precautionary Principle in a World of Digital Dependencies. Computer, 42 (6). pp. 50-56. ISSN 0018-9162

Hartel, Pieter H. and Harmelen, Frank A. van (1984) The analysis of modular structures with respect to their interconnect topology. Interfaces in Computing, 2 (1). pp. 81-91. ISSN 0252-7308

Jansen, P.G. and Laan, R. (1999) The stack resource protocol based on real time transactions. IEE Proceedings: Software, 1999 (2). pp. 112-119. ISSN 1462-5970

Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2007) Timed Analysis of Security Protocols. Journal of Computer Security, 15 (6). pp. 619-645. ISSN 0926-227X

Tang, Qiang and Jeckmans, Arjan (2011) Towards a security model for computational puzzle schemes. International Journal of Computer Mathematics, 88 (11). pp. 2246-2257. ISSN 0020-7160

Dressler, Falko and Kargl, Frank (2012) Towards security in nano-communication: challenges and opportunities. Nano communication networks, 3 (3). pp. 151-160. ISSN 1878-7789

Etalle, Sandro and Gabbrielli, Maurizio and Meo, Maria Chiara (2001) Transformations of CCP programs. ACM Transactions on Programming Languages and Systems (TOPLAS), 23 (3). pp. 304-395. ISSN 0164-0925

Czenko, Marcin and Doumen, Jeroen and Etalle, Sandro (2005) Trust in Virtual Communities. ERCIM News -- Special: Security and Trust Management, 63 . pp. 29-30.

Pieters, W. (2005) Veilig online stemmen vanuit San Francisco? Idee, tijdschrift van het kenniscentrum van D66, 26 (1). pp. 8-10. ISSN 0927-2518

Hartog, J.I. den and Vink, E.P. de (2002) Verifying probabilistic programs using a hoare like logic. International journal of foundations of computer science, 13 (3). pp. 315-340. ISSN 0129-0541

Pieters, Wolter and Cleeff, André van and Wieringa, Roel (2009) Voor goede keuzes heb je tijd nodig. Trouw, 67 (19855,). p. 25.

Pieters, W. and Consoli, L. (2009) Vulnerabilities and responsibilities: dealing with monsters in computer security. Journal of Information, Communication and Ethics in Society, 7 (4). pp. 243-257. ISSN 1477-996X

Hartel, P.H. and Berg, J. van den and Junger, M. (2013) Wat gaan we doen tegen de cyberaanvallen? Informatiebeveiliging, 4 (4). pp. 10-11. ISSN 1569-1063

Barreto, Paulo and Nikov, Ventzislav and Nikova, Svetla and Rijmen, Vincent and Tischhouser, Elmar (2010) Whirlwind: a new cryptographic hash function. Designs, Codes and Cryptography, 56 (2-3). pp. 141-162. ISSN 0925-1022

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2010) Zorg liever voor een overzichtelijk stembiljet. NRC handelsblad, 40 (07-06-). p. 6. ISSN 0002-5259

Article News

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2005) Timed Analysis of Security Protocols (version 2, oct. 2005).

Book

Hartel, P.H. and Plasmeijer, M.J. , eds. (1995) 1st Functional Programming languages in Education (FPLE). Springer-Verlag, Berlin. ISBN 9783540606758

Altintas, Onur and Chen, Wai and Heijenk, Geert and Oh, Hyun Seo and Chung, Jong-Moon and Dressler, Falko and Kargl, Frank and Pau, Giovanni and Schoch, Elmar , eds. (2012) 2012 IEEE Vehicular Networking Conference (VNC): Demo Summaries. CTIT workshop proceedings series ; WP 12-03 (WP 12-03). University of Twente, Enschede, the Netherlands.

Hartel, P.H. and Paradinas, P. and Quisquater, J.-J. , eds. (1996) 2nd Smart Card Research and Advanced Application (CARDIS). CWI, Amsterdam. ISBN 9789061964650

Glaser, H. and Hartel, P.H. and Kuchen, H. , eds. (1997) 9th Programming Languages: Implementations, Logics and Programs (PLILP). Springer-Verlag, Berlin. ISBN 9783540633983

Johnson, Michael and Pavlovic, Dusko , eds. (2011) Algebraic methodology and software technology : 13th international conference, AMAST 2010, Lac-Beauport, QC, Canada, June 23-25, 2010: revised selected papers. Lecture notes in computer science, 6486 . Springer Verlag, Berlin, Germany. ISBN 9783642177958

Preneel, Bart and Dodunekov, Stefan and Rijmen, Vincent and Nikova, Svetla , eds. (2009) Enhancing cryptographic primitives with techniques from error correcting codes. NATO Science for Peace and Security Series D - Information and Communication Security, 23 . IOS Press, Amsterdam. ISBN 9781607500025

Degano, Pierpaolo and Etalle, Sandro and Guttman, Joshua , eds. (2011) Formal aspects of security and trust : 7th international workshop, FAST 2010 Pisa, Italy, September 16-17, 2010: revised selected papers. Lecture notes in computer science, 6561 . Springer Verlag, Berlin, Germany. ISBN 9783642197512

Barthe, Gilles and Datta, Anupam and Etalle, Sandro , eds. (2011) Formal aspects of security and trust : 8th international workshop, FAST 2011 Leuven, Belgium, September 12-14, 2011: revised selected papers. Lecture notes in computer science, 7140 . Springer Verlag, Berlin, Germany. ISBN 9783642294198

Hartel, Pieter and Muller, Henk (1997) Functional C. Addison Wesley Longman, Harlow, UK. ISBN 9780201419504

Vervoort, Wiek (2006) Informatica aan de THT. Universiteit Twente, Enschede. ISBN 9789036523547

Etalle, S. , ed. (2004) Logic Based Program Synthesis and Transformation 14th International Symposium, LOPSTR 2004, Verona, Italy, August 26 – 28, 2004, Revised Selected Papers. Lecture Notes in Computer Science, 3573 . Springer-Verlag, Berlin. ISBN 9783540266556

Book Review

Hartel, Pieter (2012) Review of: Smartening the crowds: computational techniques for improving human verification to fight phishing scams / by G. Liu, G. Xiang, B. Pendleton, J. Hong, W. Liu. [Review of the book ] Computing reviews , ACM, New York, NY, USA, CR139837. ISSN 0010-4884

Book Section

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2009) A Taxonomy of Service Discovery Systems. In: Context-Aware Computing and Self-Managing Systems. CRC Studies in Informatics . Chapman and Hall, Boca Raton, pp. 43-77. ISBN 9781420077711

Corin, Ricardo and Durante, Antonio and Etalle, Sandro and Hartel, Pieter (2005) A Trace Logic for Local Security Properties. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003). Electronic Notes in Theoretical Computer Science, 118 (1). Elsevier, pp. 129-143.

Hartel, Pieter H. and Jong, Eduard de (2000) A programming and a modelling perspective on the evaluation of Java card implementations. In: Java on Smart Cards:Programming and Security. Springer-Verlag, Berlin, Germany, pp. 52-72. ISBN 9783540421672

Czenko, Marcin and Etalle, Sandro and Li, Dongyi and Winsborough, William H. (2007) An Introduction to the Role Based Trust Management Framework RT. In: Foundations of Security Analysis and Design IV - FOSAD 2006/2007 Tutorial Lectures. Lecture Notes in Computer Science, 4677 . Springer Verlag, Berlin, Germany, pp. 246-281. ISBN 9783540748090

Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro (2004) Analysing Password Protocol Security Against Off-line Dictionary Attacks. In: Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004). Electronic Notes in Theoretical Computer Science, 121 (4). Elsevier, pp. 47-63.

Langer, Lucie and Jonker, Hugo and Pieters, Wolter (2010) Anonymity and Verifiability in Voting: Understanding (Un)Linkability. In: Information and Communications Security. Lecture Notes in Computer Science, 6476 . Springer Verlag, Berlin, pp. 296-310. ISBN 9783642176494

Jonker, Hugo and Pieters, Wolter (2010) Anonymity in voting revisited. In: Towards Trustworthy Elections: New Directions in Electronic Voting. Lecture Notes in Computer Science, 6000 . Springer Verlag, Berlin, pp. 216-230. ISBN 9783642129797

Bolzoni, D. and Etalle, S. (2008) Approaches in Anomaly-based Network Intrusion Detection Systems. In: Intrusion Detection Systems. Advances in Information Security, 38 . Springer Verlag, London, pp. 1-15. ISBN 9780387772653

Pavlovic, Dusko (2013) Bicompletions of distance matrices. In: Computation, logic, games, and quantum foundations. Lecture notes in computer science, 7860 . Springer, Berlin, Germany, pp. 291-310. ISBN 9783642381638

Hartel, Pieter H. (1983) Comparing Pascal and Modula-2 as systems programming languages. In: Programming languages and system design: proceedings of the IFIP TC 2 Working conference on programming languages and system design, Dresden, GDR, 7-10 March, 1983. North-Holland, Amsterdam, pp. 187-198. ISBN 9780444867940

Pieters, W. and Probst, C.W. and Lukszo, S. and Montoya, A.L. (2013) Cost-effectiveness of Security Measures: A model-based Framework. In: Approaches and processes for managing the economics of information systems. IGI Global, Hershey, PA, USA, p. 18.

Liu, Bozhong and Gong, Zheng and Chen, Xiaohong and Qiu, Weidong and Zheng, Dong (2010) Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function. In: Internet Technology and Applications, 2010 International Conference on. IEEE, pp. 1-5. ISBN 9781424451425

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro and Rossi, Sabina (2004) Declarative Semantics of Input Consuming Logic Programs. In: Program Development in Computational Logic. Lecture Notes in Computer Science (3049). Springer Verlag, Berlin, Germany, pp. 90-114. ISBN 9783540221524

Brinkman, R. (2007) Different search strategies on encrypted data compared. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications, XVIII . Springer Verlag, Berlin, pp. 183-196. ISBN 9783540698609

Weng, Jiang and Yang, Yanjiang and Tang, Qiang and Deng, Robert H. and Bao, Feng (2009) Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. In: Information Security. Lecture Notes in Computer Science, 5735 . Springer Verlag, Heidelberg, pp. 151-166. ISBN 9783642044731

Jacobs, B.P.F. and Pieters, W. (2009) Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. In: Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures. Lecture Notes in Computer Science, 5705 . Springer Verlag, Berlin, pp. 121-144. ISBN 9783642038280

Schoute, Albert and Seesink, Remco and Dierssen, Werner and Kooij, Niek (2005) Fast Data Sharing within a distributed multithreaded control framework for robot teams. In: Communicating process architectures 2005 : WoTUG-28. IOS Press, Amsterdam, pp. 147-154. ISBN 9781586035617

Pavlovic, D. (2012) Geometry of abstraction in quantum computation. In: Mathematical foundations of information flow : Clifford Lectures Information Flow in Physics, Geometry, and Logic and Computation, March 12-15, 2008, Tulane University, New Orleans, Louisiana. Proceedings of symposia in applied mathematics, 71 . American Mathematical Society, pp. 233-267. ISBN 9780821849231

Pieters, W. and Popkema, M. and Broekhans, B. and Dijkstra, A. and Boersma, K. and Alberts, G. (2009) Gevoel voor kennis: emoties in de kennissamenleving. In: Gevoel voor kennis. Jaarboek Kennissamenleving, 5 . Aksant, Amsterdam, pp. 7-20. ISBN 9789052603513

Pieters, Wolter (2010) How devices transform voting. In: Innovating Government. Normative, policy and technological dimensions of modern government. Information Technology and Law Series, 20 . T.M.C. Asser Press, The Hague. ISBN 9789067047302

Hartel, Pieter and Suryana Herman, Nanna (2012) Information Security. In: Cyber Safety: An Introduction. Eleven International Publishers, The Hague, the Netherlands, pp. 281-291. ISBN 9789490947750

Alberts, Gerard and Boersma, Kees and Broekhans, Bertien and Dijkstra, Anne and Pieters, Wolter and Popkema, Marcus and Vanheste, Tomas (2011) Inleiding: Kennisklimaat. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving, 7 . Amsterdam University Press, Amsterdam, pp. 7-11. ISBN 9789089644015

Pieters, Wolter and Boersma, K. and Alberts, G. and Timmer, J. and Dijkstra, A. and Popkema, M. (2010) Inzicht en toezicht: controle in de kennissamenleving. In: Inzicht en toezicht: controle in de kennissamenleving. Jaarboek Kennissamenleving (6). Aksant, Amsterdam, pp. 7-17. ISBN 9789052603841

Hartel, P.H. and Vree, W.G. (2007) Lambda Calculus for Engineers. In: Reflections on Type Theory, Lambda Calculus, and the Mind: Essays Dedicated to Henk Barendregt on the Occasion of his 60th Birthday. Radboud University, Nijmegen, pp. 125-138. ISBN 9789090224466

Jansen, J. and Junger, M. and Montoya, L. and Hartel, P.H. (2013) Offenders in a digitized society. In: Cybercrime and the police. Safety & security studies . Eleven International Publishing, The Hague, The Netherlands, pp. 45-59. ISBN 9789462360693

Etalle, Sandro and Mukhopadhyay, Supratik and Roychoudhury, Abhik (2003) Preface [of the proceedings of the First international Workshop on Software Verification and Validation (SVV)]. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003). Electronic Notes in Theoretical Computer Science, 118 (1). Elsevier.

Dekker, Marnix and Etalle, Sandro and Hartog, Jerry den (2007) Privacy Policies. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications, XVIII . Springer Verlag, Berlin, Germany, pp. 383-397. ISBN 9783540698609

Beye, Michael and Jeckmans, Arjan J.P. and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2012) Privacy in Online Social Networks. In: Computational Social Networks: Security and Privacy. Springer Verlag, London, pp. 87-113. ISBN 9781447140504

Jeckmans, Arjan and Beye, Michael and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2013) Privacy in recommender systems. In: Social media retrieval. Computer Communications and Networks . Springer Verlag, London, pp. 263-281. ISBN 9781447145547

Pieters, Wolter (2011) Risicopersonalisatie en haar falen in collectieve vraagstukken. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving, 7 . Amsterdam University Press, Amsterdam, pp. 197-207. ISBN 9789089644015

Cleeff, André van and Dimkov, Trajce and Pieters, Wolter and Wieringa, Roel (2012) Security Requirements with Physical Properties: A Case Study on Paper Voting. In: Proceedings of the International Conference on IT Convergence and Security 2011. Lecture Notes in Electrical Engineering, 120 . Springer Verlag, London, pp. 51-67. ISBN 9789400729100

Pieters, Wolter (2011) Security and privacy in the clouds: a bird's eye view. In: Computers, Privacy and Data Protection: an Element of Choice. Springer, Dordrecht, pp. 445-457. ISBN 9789400706408

Dimkov, Trajce (2009) The Future of Information Society – The Key-free Society. In: Living the ICT future. Centre for Telematics and Information Technology, Enschede, pp. 28-29. ISBN 9789036529631

Trivellato, Daniel and Etalle, Sandro and Luit, Erik and Zannone, Nicola (2013) The POLIPO security framework. In: Situation awareness with systems of systems. Springer, New York, NY, USA, pp. 189-208. ISBN 9781461462293

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro (2002) Transformation Systems and Nondeclarative Properties. In: Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski Part 1. Lecture Notes in Computer Science, 2407 . Springer-Verlag, Berlin, Germany, pp. 162-186. ISBN 9783540439592

Pieters, Wolter (2010) Verifiability of electronic voting: between confidence and trust. In: Data Protection in a Profiled World. Springer, Dordrecht, pp. 157-175. ISBN 9789048188642

Pieters, W. (2008) Vertrouwen en werkelijkheid in de stemcomputercontroverse. In: Burger in Uitvoering. Jaarboek Kennissamenleving, 4 . Aksant, Amsterdam, pp. 17-25. ISBN 9789052603070

Conference or Workshop Item

Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. In: 11th International Workshop on Exploring Modeling Methods in Systems Analysis and Design (EMMSAD2006), 5-9 Jun 2006, Luxembourg (pp. pp. 465-472).

Bolzoni, Damiano and Schade, Christiaan and Etalle, Sandro (2011) A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. In: 25th Large Installation System Administration Conference, LISA 2011, 4-9 December 2011, Boston, MA, USA (pp. pp. 201-216).

Buhan, Ileana and Bazen, Asker and Hartel, Pieter and Veldhuis, Raymond (2005) A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems. In: International Conference on Biometrics, ICB, January 5 - 7, 2006, Hong Kong, China (pp. pp. 728-736).

Corin, Ricardo and Di Caprio, Gaetano and Etalle, Sandro and Gnesi, Stefania and Lenzini, Gabriele and Moiso, Corrado (2005) A Formal Security Analysis of an OSA/Parlay Authentication interface. In: 7th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, FMOODS 2005, June 15-17, 2005, Athens, Greece (pp. pp. 131-146).

Tang, Q. and Bringer, J. and Chabanne, H. and Pointcheval, D. (2008) A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, April 21-23, 2008, Sydney, Australia (pp. pp. 56-70).

Law, Yee Wei and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter H. (2003) A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. In: IFIP-TC6 8th International Conference on Personal Wireless Communications, PWC 2003, September 23-25, 2003, Venice, Italy (pp. pp. 27-39).

Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks. In: Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA-08), 10-12 Dec 2008, Sydney, Australia (pp. pp. 863-870).

Poll, Erik and Hartel, Pieter and Jong, Eduard de (2002) A Java Reference Model of Transacted Memory for Smart Cards. In: Fifth Smart Card Research and Advanced Application Conference, CARDIS 2002, November 21-22, 2002, San Jose, CA (pp. pp. 75-86).

Corin, R. and Etalle, S. and Hartog, J. den and Lenzini, G. and Staicu, I. (2004) A Logic for Auditing Accountability in Decentralized Systems. In: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France (pp. pp. 187-201).

Corin, R.J. and Saptawijaya, A. and Etalle, S. (2006) A Logic for Constraint-based Security Protocol Analysis. In: IEEE Symposium on Security and Privacy, 21-25 May 2006, Oakland, US (pp. pp. 155-168).

Pieters, W. and van der Ven, S. and Probst, C. (2012) A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability. In: Proceedings of the 2012 workshop on New security paradigms (NSPW 2012), 18-21 Sep 2012, Bertinoro, Italy (pp. pp. 1-14).

Etalle, Sandro and Winsborough, William H. (2007) A Posteriori Compliance Control. In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, 20-22 June 2007, Nice, France (pp. pp. 11-20).

Hanssen, Ferdy and Hartel, Pieter and Jansen, Pierre and Scholten, Hans and Vervoort, Wiek (2001) A Real time network at home. In: PROGRESS 2001 Workshop on Embedded Systems, October 18, 2001, Veldhoven, the Netherlands (pp. pp. 67-72).

Hanssen, F. and Hartel, P. and Hattink, T. and Jansen, P. and Wijnberg, J. and Scholten, J. (2002) A Real-Time Ethernet Network at Home. In: Euromicro International Conference on Real-Time Systems, June 19 - 21, 2002, Vienna, Austria (pp. pp. 5-8).

Trivellato, Daniel and Zannone, Nicola and Etalle, Sandro (2011) A Security Framework for Systems of Systems. In: IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2011, 6-8 June 2011, Pisa, Italy (pp. pp. 182-183).

Hartel, P.H. (2005) A Trace Semantics for Positive Core XPath. In: 12th Int. Symp. on Temporal Representation and Reasoning (TIME), Burlington, Vermont (pp. pp. 103-112).

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: 5th VLDB Workshop on Secure Data Management, SDM, August 24, 2008, Auckland, New Zealand (pp. pp. 185-198).

Zambon, Emmanuele and Bolzoni, Damiano and Etalle, Sandro and Salvato, Marco (2007) A model supporting Business Continuity auditing & planning in Information Systems. In: Second International Conference on Internet Monitoring and Protection, ICIMP 2007, 1-5 July 2007, San Jose, CA, USA (pp. p. 33).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) A unifying view on template protection schemes. In: 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands (pp. pp. 353-42).

Bolzoni, Damiano and Crispo, Bruno and Etalle, Sandro (2007) ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. In: 21st Large Installation System Administration Conference, LISA 2007, 11-16 November 2007, Dallas, TX, USA (pp. pp. 141-152).

Pieters, W. (2006) Acceptance of voting technology: between confidence and trust. In: K. Stølen et al.(eds) iTrust 2006 (pp. pp. 283-297).

Pavlovic, Dusko and Meadows, Catherine (2012) Actor-Network Procedures. In: 8th International Conference on Distributed Computing and Internet Technology, ICDCIT 2012, 2-4 February 2012, Bhubaneswar, India (pp. pp. 7-26).

Peter, A. and Kronberg, M. and Trei, W. and Katzenbeisser, S. (2012) Additively homomorphic encryption with a double decryption mechanism, revisited. In: 15th International Conference on Information Security, ISC 2012, 19-21 September 2012, Passau, Germany (pp. pp. 242-257).

Schmidt, Robert K. and Brakemeier, Achim and Leinmüller, Tim and Kargl, Frank and Schäfer, Günther (2011) Advanced carrier sensing to resolve local channel congestion. In: Eighth ACM international workshop on Vehicular inter-networking, VANET 2011, 23 September 2011, Las Vegas, NV, USA (pp. pp. 11-20).

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den (2005) An Audit Logic for Accountability. In: Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005, 6-8 June 2005, Stockholm, Sweden (pp. pp. 34-43).

Morali, A. and Varela, L. and Varela, C.A. (2005) An Electronic Marketplace: Agent-based Coordination Models for Online Auctions. In: Obras Completas CLEI2005, Volumen: XXXI Conferencia Latinoamericana de Informatica, 10-14 Oct 2005, Cali, Colombia (pp. pp. 573-586).

Corin, Ricardo and Etalle, Sandro (2002) An Improved Constraint-based system for the verification of security protocols. In: 9th International Symposium on Static Analysis, SAS 2002, September 17-20, 2002 , Madrid, Spain (pp. pp. 239-265).

Evers, Leon and Bach, Wouter and Dam, Dennis and Jonker, Mischa and Scholten, Hans (2002) An Iterative Quality-Based Localization Algorithm for Ad Hoc Networks. In: First International Conference on Pervasive Computing, August 26-28, 2002, Zürich, Switzerland.

Cederquist, Jan and Dashti, Muhammad Torabi (2006) An intruder model for verifying liveness in security protocols. In: Fourth ACM Workshop on Formal Methods in Security, FMSE '06, November 3, 2006, Alexandria, Virginia, USA (pp. pp. 23-32).

Lastdrager, E.E.H. and Montoya, Lorena and Hartel, Pieter and Junger, Marianne (2013) Applying the Lost-Letter Technique to Assess IT Risk Behaviour. In: 3rd Workshop on Socio-Technical Aspects in Security and Trust, 29 June 2013, New Orleans, LA, USA.

Chong, Cheun Ngen and Law, Yee Wei and Etalle, Sandro and Hartel, Pieter H. (2003) Approximating Fair Use in LicenseScript. In: 6th International Conference on Asian Digital Libraries, ICADL 2003, December 8-12, 2003, Kuala Lumpur, Malaysia (pp. pp. 432-443).

Law, Y.W. and Dulman, S. and Etalle, S. and Havinga, P. (2003) Assessing Security-Critical Energy-Efficient Sensor Networks. In: 18th IFIP TC11 International Conference on Information Security, Security and Privacy in the Age of Uncertainty, SEC 2003, May 26-28, 2003, Athens, Greece (pp. pp. 459-463).

Bißmeyer, N. and Mauthofer, S. and Kpatcha, B. and Kargl, F. (2012) Assessment of Node Trustworthiness in VANETs Using Data Plausibility Checks with Particle Filters. In: IEEE Vehicular Networking Conference, VNC 2012, 14-16 November 2012, Seoul, Korea (pp. pp. 78-85).

Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. In: Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA), 16-17 Sept 2006, Bertinoro, Italy (pp. pp. 221-236).

Pavlovic, Dusko and Meadows, Catherine (2010) Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol. In: 26th Conference on the Mathematical Foundations of Programming Semantics, MFPS 2010, 6-10 May 2010, Ottawa, Ontario, Canada (pp. pp. 97-122).

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2004) Benchmarking Block Ciphers for Wireless Sensor Networks. In: IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004 (pp. pp. 447-456).

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2004) Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract). In: IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2004, 25-27 October 2004, Fort Lauderdale, FL, USA (pp. pp. 447-456).

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2010) Benefits of Location-Based Access Control:A Literature Study. In: 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010, 18-20 Dec 2010, Hangzhou, China.

Veldhuis, Raymond and Bazen, Asker and Kauffman, Joost and Hartel, Pieter (2004) Biometric Verification Based on Grip-pattern Recognition. In: Security, Steganography, and Watermarking of Multimedia Contents VI, 19 January 2004, San Jose, California, USA (pp. pp. 634-641).

Bullee, Jan-Willem and Veldhuis, Raymond (2012) Biometric features and privacy : condemned, based upon your finger print. In: 33rd WIC Symposium on Information Theory in the Benelux and the 2nd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 24-25 May 2012, Boekelo, The Netherlands (pp. pp. 44-51).

Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. In: Confederated International Conferences On the Move to Meaningful Internet Systems (OTM), November 9-14, 2008, Monterrey, Mexico (pp. pp. 938-955).

Dietzel, Stefan and Kost, Martin and Schaub, Florian and Kargl, Frank (2012) CANE: A Controlled Application Environment for Privacy Protection in ITS. In: 12th International Conference on Intelligent Transport Systems Telecommunications, ITST 2012, 5-8 November 2012, Taipeh, Taiwan.

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel (2010) CRAC: Confidentiality Risk Assessment and IT-Architecture Comparison. In: Proceedings of the 6th International Conference on Network and Service Management, CNSM 2010, 25-29 Oct 2010, Niagara Falls, Canada. (In Press)

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel (2010) CRAC: Confidentiality Risk Assessment and IT-Infrastructure Comparison. In: 25th IFIP International Information Security Conference, SEC 2010: "Security & Privacy - Silver Linings in the Cloud", 20-23 Sep 2010, Brisbane, Australia. (In Press)

Hadziosmanovic, Dina and Bolzoni, Damiano and Etalle, Sandro and Hartel, Pieter (2012) Challenges and opportunities in securing industrial control systems. In: IEEE Workshop on Complexity in Engineering, COMPENG 2012, 11-13 June 2012, Aachen, Germany (pp. pp. 1-6).

Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. In: E-Voting and Identity: Second International Conference, VOTE-ID 2009, 7-8 Sep 2009, Luxembourg city, Luxembourg (pp. pp. 172-190).

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter H. (2003) Comparing Logic-based and XML-based Rights Expression Languages. In: OTM Confederated International Workshops: On The Move to Meaningful Internet Systems, November 3-7, 2003, Catania, Sicily, Italy (pp. pp. 779-792).

Liesdonk, Peter van and Sedghi, Saeed and Doumen, Jeroen and Hartel, Pieter and Jonker, Willem (2010) Computationally Efficient Searchable Symmetric Encryption. In: 7th VLDB Workshop on Secure Data Management, SDM 2010, 17 Sep 2010, Singapore (pp. pp. 87-100).

Feiri, Michael and Petit, Jonathan and Kargl, Frank (2012) Congestion-based Certificate Omission in VANETs. In: Ninth ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2012, June 25, 2012, Low Wood Bay, Lake District, UK (pp. pp. 135-138).

Bösch, Christoph and Brinkman, Richard and Hartel, Pieter and Jonker, Willem (2011) Conjunctive Wildcard Search over Encrypted Data. In: 8th VLDB Workshop on Secure Data Management, SDM 2011, 2 September 2011, Seattle, WA, USA (pp. pp. 114-127).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter (2008) Controlling Leakage Of Biometric Information Using Dithering. In: 16th European Signal Processing Conference, EUSIPCO, 25-29 August 2008, Lausanne, Switzerland.

Pieters, W. (2009) Converging technologies and de-perimeterisation: towards risky active insulation. In: Proceedings of SPT 2009: Converging technologies, changing societies, 7-10 Jul 2009, Enschede, The Netherlands (pp. pp. 58-60).

Kocabas, U. and Peter, A. and Katzenbeisser, S. and Sadeghi, A. (2012) Converse PUF-based authentication. In: 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, 13-15 June 2012, Vienna, Austria (pp. pp. 142-158).

Bissmeyer, Norbert and Petit, Jonathan and Bayarou, Kpatcha M. (2013) Copra: conditional pseudonym resolution algorithm in VANETs. In: 10th Annual Conference on Wireless On-Demand Network Systems and Services, WONS 2013, 18-20 March 2013, Banff, Canada (pp. pp. 9-16).

Czenko, Marcin and Etalle, Sandro (2007) Core TuLiP - Logic Programming for Trust Management. In: 23rd International Conference on Logic Programming, ICLP 2007, 8-13 September 2007, Porto, Portugal (pp. pp. 380-394).

Luiijf, Eric and Hartel, Pieter (2013) Critical information infrastructures security - Preface. In: 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, 16-18 September 2013, Amsterdam, the Netherlands (pp. v-vi).

Tang, Qiang (2012) Cryptographic framework for analyzing the privacy of recommender algorithms. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 May 2012, Denver, CO, USA (pp. pp. 455-462).

Kulikova, Olga and Heil, Ronald and Berg, Jan van den and Pieters, Wolter (2012) Cyber crisis management: a decision-support framework for disclosing security incident information. In: International Conference on Cyber Security, CyberSecurity 2012, 14-16 December 2012, Washington, DC, USA (pp. pp. 103-112).

Pieters, W. and Tang, Q. (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada (pp. pp. 240-251).

Bleikertz, Sören and Mastelic, Toni and Pape, Sebastian and Pieters, Wolter and Dimkov, Trajce (2013) Defining the cloud battlefield - supporting security assessments by cloud customers. In: International Conference on Cloud Engineering, IC2E, 25-27 March 2013, Redwood City, CA, USA (pp. pp. 78-87).

Schoch, Elmar and Bako, Boto and Dietzel, Stefan and Kargl, Frank (2010) Dependable and Secure Geocast in Vehicular Networks. In: Seventh ACM International Workshop on VehiculAr InterNETworking, VANET 2010, September 24, 2010, Chicago, US (pp. pp. 61-68).

Vriezekolk, Eelco and Wieringa, Roel and Etalle, Sandro (2012) Design and initial validation of the Raster method for telecom service availability risk assessment. In: 9th International Conference on Information Systems for Crisis Response and Managemen, ISCRAM 2012, 22-25 April 2012, Vancouver, Canada (pp. p. 117).

Davarynejad, M. and Sedghi, S. and Bahrepour, M. and Ahn, C.W. and Akbarzadeh, M. and Coello Coello, C. A. (2008) Detecting Hidden Information from Watermarked Signal using Granulation Based Fitness Approximation. In: Advances in Intelligent and Soft Computing, 10-28 Nov 2008, Online Conference (pp. pp. 463-472).

Dini, Gianluca and Helme, Arne and Stabell-Kulo, Tage (1998) Detecting Key-Dependencies. In: 3rd Australasian Conference on Information Security and Privacy, ACISP 1998, July 13-15, 1998, Brisbane, Queensland, Australia.

Kargl, Frank and Friedman, Arik and Boreli, Roksana (2013) Differential privacy in intelligent transportation systems. In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, 17-19 April 2013, Budapest, Hungary (pp. pp. 107-112).

Petit, Jonathan and Mammeri, Zoubir (2011) Dynamic Consensus for Secured Vehicular Ad Hoc Networks. In: 7th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, IEEE WiMob 2011, 10-12 October 2011, Shanghai, China.

Havinga, Paul and Etalle, Sandro and Karl, Holger and Petrioli, Chiara and Zorzi, Michele and Kip, Harry and Lentsch, Thomas (2003) EYES - Energy Efficient Sensor Networks. In: IFIP-TC6 8th International Conference on Personal Wireless Communications, PWC 2003, September 23-25, 2003, Venice, Italy (pp. pp. 198-201).

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations. In: 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010, 18-20 Dec 2010, Hangzhou, China.

Tang, Qiang and Jeckmans, Arjan (2010) Efficient Client Puzzle Schemes to Mitigate DoS Attacks. In: International Conference on Computational Intelligence and Security, CIS 2010, 11-14 dec 2010, Nanning, China.

Brinkman, R. and Feng, L. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. In: Proceedings of the 2nd International Workshop on Security In Information Systems (WOSIS), 13-14 Apr 2004, Porto, Portugal (pp. pp. 126-135).

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2009) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. In: 5th International Conference on Information Security Practice and Experience, ISPEC, 12-15 April 2009, Xi'an, China (pp. pp. 1-12).

Feiri, Michael and Petit, Jonathan and Kargl, Frank (2013) Efficient and secure storage of private keys for pseudonymous vehicular communication. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security, ACM CCS 2013, 4 November 2013, Berlin, Germany (pp. pp. 9-18).

Jeckmans, Arjan and Peter, Andreas and Hartel, Pieter (2013) Efficient privacy-enhanced familiarity-based recommender system. In: 18th European Symposium on Research in Computer Security, ESORICS 2013, 9-13 September 2013, Egham, UK (pp. pp. 400-417).

Knapik, Peter and Schoch, Elmar and Kargl, Frank (2013) Electronic decal: a security function based on V2X communication. In: 77th IEEE Vehicular Technology Conference, VTC 2013-Spring, 2-5 June 2013, Dresden, Germany.

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, ICICS, October 20-22, 2008, Birmingham, UK (pp. pp. 294-310).

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2003) EnergY-Efficient Sensor CRYptographic Module. In: Proceedings of the 14th ProRISC workshop on Circuits, Systems and Signal Processing.

Bijlsma, Tjerk and Jansen, Pierre (2006) Energy Conservation with EDFI scheduling. In: First European Conference on Smart Sensing and Context, EuroSSC 2006, 25-27 Oct 2006, Enschede, the Netherlands (pp. pp. 259-261).

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. In: Sixth International Workshop on Wireless Local Networks, 14-16 Nov 2006, Tampa, Florida (pp. pp. 931-938).

Law, Yee Wei and Hoesel, Lodewijk van and Doumen, Jeroen and Hartel, Pieter and Havinga, Paul (2005) Energy-Efficient Link-Layer Jamming Attacks against Three Wireless Sensor Network MAC Protocols. In: 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN, November 07, 2005, Alexandria, VA, USA (pp. pp. 76-88).

Pieters, W. and Becker, M.J. (2005) Ethics of e-voting: an essay on requirements and values in Internet elections. In: Ethics of New Information Technology: Proceedings of the Sixth International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005), 17-19 Jul 2005, Enschede (pp. pp. 307-318).

Feiri, Michael and Petit, Jonathan and Kargl, Frank (2012) Evaluation of Congestion-based Certificate Omission in VANETs. In: IEEE Vehicular Networking Conference, VNC 2012, 14-16 November 2012, Seoul, Korea (pp. pp. 101-108).

Brinkman, R. and Schoenmakers, B. and Doumen, J.M. and Jonker, W. (2005) Experiments With Queries Over Encrypted Data Using Secret Sharing. In: VLDB Workshop on Secure Data Management (SDM), Trondheim, Norway (pp. pp. 33-46).

Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2007) Extended Privilege Inheritance in RBAC. In: 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, March 20-22, 2007, Singapore, Thailand (pp. pp. 383-385).

Morali, Ayse and Zambon, Emmanuele and Houmb, Siv Hilde and Sallhammar, Karin and Etalle, Sandro (2009) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. In: 31th IEEE International Conference on Software Engineering, ICSE 2009, 16-24 May 2009, Vancouver, Canada. (In Press)

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Feeling Is Believing: A Secure Template Exchange Protocol. In: International Conference on Biometrics, ICB 2007, August 27-29, 2007, Seoul, Korea (pp. pp. 897-906).

Cederquist, Jan and Dashti, Muhammad Torabi (2005) Formal Analysis of a Fair Payment Protocol. In: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France (pp. pp. 41-54).

Pavlovic, Dusko and Pepper, Peter and Smith, Douglas R. (2010) Formal Derivation of Concurrent Garbage Collectors. In: 10th International Conference on Mathematics of Program Construction, MPC 2010, June 21-23, 2010, Québec City, Canada (pp. pp. 353-376).

Meadows, C. and Pavlovic, D. (2012) Formalizing physical security procedures. In: 8th International Workshop on Security and Trust Management, STM 2012, September 13-14, 2012, Pisa, Italy (pp. pp. 193-208).

Sundramoorthy, V. and Tan, C. and Hartel, P.H. and Hartog, J.I. den and Scholten, J. (2005) Functional Principles of Registry-based Service Discovery. In: 30th Annual IEEE Conf. on Local Computer Networks, LCN, 15-17 Nov. 2005, Sydney, Australia (pp. pp. 209-217).

Gozalvez, Javier and Haerri, Jerome and Hartenstein, Hannes and Heijenk, Geert and Kargl, Frank and Petit, Jonathan and Scheuermann, Björn and Tieler, Tessa (2013) Fundamentals: IVC and computer science. In: Inter-Vehicular Communication - Quo Vadis (Dagstuhl Seminar 13392), 22 - 25 September 2013, Dagstuhl, Germany (pp. pp. 205-206).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Fuzzy extractors for continuous distributions. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS, 20-22 March 2007, Singapore (pp. pp. 353-355).

Pavlovic, Dusko (2011) Gaming security by obscurity. In: The New Security Paradigms Workshop (NSPW) , September 12-15, 2011, Marin County, CA, USA.

Pavlovic, Dusko (2011) Gaming security by obscurity. In: New Security Paradigms Workshop, NSPW 2011, September 12-15, 2011, Marin County, CA, USA (pp. pp. 125-140).

Corin, Ricardo and Malladi, Sreekanth and Alves-Foss, Jim and Etalle, Sandro (2003) Guess what? Here is a new tool that finds some new guessing attacks. In: IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security, WITS '03, April 5-6, 2003, Warsaw, Poland (pp. pp. 62-71).

Rein, H. van and Brinkman, R. (2000) Home-grown CASE tools with XML and XSLT. In: International Workshop on Model Engineering, IWME 2000, Sophia Antipolis, France (pp. pp. 105-112).

Montoya, Lorena and Junger, Marianne and Hartel, Pieter (2013) How 'digital' is traditional crime? In: European Intelligence and Security Informatics Conference, EISIC 2013, 12-14 August 2013, Uppsala, Sweden.

Vriezekolk, E. and Wieringa, R. and Etalle, S. (2011) How to assess telecom service availability risks for crisis organisations? In: 20th European Safety and Reliability Annual Conference, ESREL 2011, 18-22 September 2011, Troyes, France (pp. pp. 2653-2661).

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Overbeek, Paul (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. In: Third IEEE International Workshop on Business-Driven IT Management, 07 Apr 2008, Salvador, Brazil (pp. pp. 31-40).

Pieters, Wolter (2010) Informational precaution. In: 8th Conference on Computing and Philosophy, ECAP10, 4-6 Oct 2010, Munich, Germany (pp. pp. 320-325).

Saake, Gunter and Hartel, Peter and Jungclaus, Ralf and Wieringa, Roel and Feenstra, Remco (1994) Inheritance conditions for object life cycle diagrams. In: EMISA-Workshop Formale Grundlagen fur den Entwurf von Informationsystemen, 24-26 May 1994, Tutzing, Germany (pp. pp. 79-88).

Etalle, Sandro and Winsborough, William H. (2005) Integrity Constraints in Trust Management (Extended Abstract). In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, June 1-3, 2005, Stockholm, Sweden.

Tang, Q. and Hartel, P.H. and Jonker, W. (2009) Inter-domain Identity-Based Proxy Re-encryption. In: Information Security and Cryptology, 4th International Conference (Inscrypt), December 14-17, 2008, Beijing China (pp. pp. 332-347).

Hipp, Markus and Schaub, Florian and Kargl, Frank and Weber, Michael (2010) Interaction Weaknesses of Personal Navigation Devices. In: Second International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI 2010, 11-12 Nov 2010, Pittsburgh, Pennsylvania (pp. pp. 129-136).

Pieters, W. (2006) Internet voting: a conceptual challenge to democracy. In: Social Inclusion: Societal and Organizational Implications for Information Systems: IFIP TC8 WG8.2 International Working Conference, 12-15 Jul 2006, Limerick, Ireland (pp. pp. 89-103).

Pieters, W. (2006) Internet voting: a monstrous alliance between democracy and technology? In: Fifth international conference on Cultural Attitudes towards Technology and Communication 2006, 28 Jun - 1 Jul 2006, Tartu, Estonia (pp. pp. 115-129).

Khatib, M.G. and Zwaag, B.J. van der and Hartel, P.H. and Smit, G.J.M. (2007) Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. In: IEE/ACM/IFIP Workshop on Embedded Systems for Real-Time Multimedia, ESTImedia 2207, 4-5 Oct 2007, Salzburg, Austria (pp. pp. 7-12).

Kolesnichenko, Anna and Boer, Pieter-Tjerk de and Remke, Anne and Zambon, Emmanuele and Haverkort, Boudewijn R. (2011) Is Quantitative Analysis of Stuxnet Possible? In: 8th International Conference on Quantitative Evaluation of SysTems, QEST 2011, September 5-8, 2011, Aachen, Germany (pp. pp. 9-10).

Gong, Zheng and Tang, Qiang and Law, Yee Wei and Chen, Hongyang (2010) KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. In: International Conference on Information Security and Cryptology, INSCRYPT 2010, 20-24 Oct 2010, Shanghai, China.

Gong, Zheng and Nikova, Svetla and Law, Yee Wei (2011) KLEIN: A New Family of Lightweight Block Ciphers. In: 7th International Workshop on RFID, Security and Privacy, RFIDSec 2011, June 26-28, 2011, Amherst, MA, USA (pp. pp. 1-18).

Jansen, Pierre G. and Sijben, Paul (1995) Kernel Support in a Distributed Multimedia Environment. In: First International Workshop on Real-Time Computing Systems and Applications, 14-16 December 1994, Seoul, Korea (pp. pp. 117-121).

Spiessens, F. and den Hartog, J.I. and Etalle, S. (2009) Know what you trust. In: Formal Aspects in Security and Trust, 5th International Workshop, Malaga, Spain (pp. pp. 129-142).

Di Pietro, Roberto and Mancini, Luigi V. and Law, Yee Wei and Etalle, Sandro and Havinga, Paul (2003) LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In: 32nd International Conference on Parallel Processing Workshops, 6-9 October 2003, Kaohsiung, Taiwan (pp. pp. 397-406).

Czenko, Marcin and Etalle, Sandro (2009) LP with Flexible Grouping and Aggregates Using Modes. In: 19th International Symposium on Logic-Based Program Synthesis and Transformation LOPSTR 2009, 9-11 Sep 2009, Coimbra, Portugal (pp. pp. 59-73).

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. In: 17th ACM Conference on Computer and Communications Security, CCS 2010, 4-8 Oct 2010, Chicago, Illinois, US (pp. pp. 666-668).

Chong, Cheun Ngen and Ren, Bin and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Corin, Ricardo (2004) License protection with a tamper-resistant token. In: 5th International Workshop Information Security Applications, WISA 2004, August 23-25, 2004, Jeju Island, Korea (pp. pp. 223-238).

Chong, Cheun Ngen and Law, Yee Wei and Etalle, Sandro and Hartel, Pieter (2002) LicenseScript- A Language and Framework for Calculating Licenses on Information over Constrained Domains. In: 7th Cabernet Radicals Workshop, 13-16 October 2002, Bertinoro (Forlì), Italy.

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language. In: IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, May 22-24, 2003, Ilmenau, Germany (pp. pp. 104-115).

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Jonker, Willem and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. In: Third International Conference on Web Delivering of Music, WEDELMUSIC 2003, 15-17 September 2003, Leeds, UK (pp. pp. 122-129).

Law, Yee Wei and Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Corin, Ricardo (2004) Licensing Structured Data with Ease. In: IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, May 22-24, 2003, Ilmenau, Germany.

Law, Yee Wei and Hartel, Pieter and Hartog, Jerry den and Havinga, Paul (2005) Link-layer jamming attacks on S-MAC. In: Second European Workshop on Wireless Sensor Networks, EWSN, 31 Jan. - 2 Feb. 2005, Istanbul, Turkey (pp. pp. 217-225).

Brusó, Mayla and Chatzikokolakis, Konstantinos and Etalle, Sandro and Hartog, Jerry den (2013) Linking unlinkability. In: 7th International Symposium on Trustworthy Global Computing, TGC 2012, September 7-8, 2012, Newcastle upon Tyne, UK (pp. pp. 129-144).

Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2002) Low-Cost Planar PTF Sensors for the Identity Verification of Smartcard Holders. In: 1st IEEE Int. Conf. on Sensors, 12-14 June 2002, Orlando, Florida (pp. pp. 1614-1619).

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter (2010) MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. In: 13th International Symposium on Recent Advances in Intrusion Detection, RAID 2010, 15-17 Sep 2010, Ottawa, Canada (pp. pp. 500-501).

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter and Etalle, Sandro (2011) MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. In: European Conference on Computer Network Defense, EC2ND 2011, 6-8 Sept 2011, Gothenburg, Sweden (pp. pp. 41-48).

Gebska, Maura and Montoya, Lorena and Paresi, Chris (2003) Manage data – manage hazards – development of urban hazard information infrastructure for Windhoek (Namibia). In: First International ICSC Symposium on Information Technologies in Environmental Engineering, ITEE 2003, 24-27 June 2003, Gdansk, Poland (pp. -70).

Kargl, Frank and Schaub, Florian and Dietzel, Stefan (2010) Mandatory Enforcement of Privacy Policies using Trusted Computing Principles. In: Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA (pp. pp. 104-109).

Casalicchio, Emiliano and Caselli, Marco and Coletta, Alessio and Di Blasi, Salvatore and Fovino, Igor Nai (2012) Measuring name system health. In: 6th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2012, 9-21 March 2012, Washington, DC, USA (pp. pp. 155-169).

Ibraimi, Luan and Petkovic, Milan and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In: 10th International Workshop on Information Security Applications, WISA, 25-27 August 2009, Busan, Korea (pp. pp. 309-323).

Bolks, Mathieu and Hanssen, Ferdy and Abelmann, Leon and Havinga, Paul and Hartel, Pieter and Jansen, Pierre and Lodder, Cock and Smit, Gerard (2001) Micro Scanning Probe Array memory (µSPAM). In: PROGRESS 2001 2nd Workshop on Embedded Systems, October 18, 2001, Veldhoven, the Netherlands (pp. pp. 17-26).

Heijden, Rens van der and Dietzel, Stefan and Kargl, Frank (2013) Misbehavior detection in vehicular ad-hoc networks. In: 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication, FG-IVC 2013, 21-22 February 2013, Innsbruck, Austria.

Zambon, Emmanuele and Bolzoni, Damiano and Etalle, Sandro and Salvato, Marco (2007) Model-Based Mitigation of Availability Risks. In: Second IEEE/IFIP International Workshop on Business-Driven IT Management, 21 May 2007, Munich, Germany (pp. pp. 75-83).

Hartel, Pieter and Eck, Pascal van and Etalle, Sandro and Wieringa, Roel (2004) Modelling mobility aspects of security policies (Invited paper). In: Construction and Analysis of Safe, Secure and Interoperable Smart Cards, CASSIS, March 10-14, 2004, Marseille, France (pp. pp. 172-191).

Montoya, Lorena and Junger, Marianne and Hartel, Pieter (2013) Modus operandi study of information and communication technology (ICT) facilitated crime. In: NVC Congres, 13-14 June 2013, Leiden, The Netherlands (pp. pp. 93-94).

Durmaz Incel, Ozlem and Dulman, Stefan and Jansen, Pierre (2006) Multi-channel Support for Dense Wireless Sensor Networking. In: First European Conference on Smart Sensing and Context, EuroSSC 2006, 25-27 Oct 2006, Enschede, the Netherlands (pp. pp. 1-14).

Scholten, H. and Jansen, P. and Hanssen, F. and Hartel, P. and Hattink, T. and Sundramoorthy, V. (2002) Multimedia QoS in low-cost home networks. In: 27th Annual IEEE Conference on Local Computer Networks, LCN, 6-8 Nov. 2002 , Tampa, Florida (pp. pp. 327-328).

Hadžiosmanović, Dina and Simionato, Lorenzo and Bolzoni, Damiano and Zambon, Emmanuele and Etalle, Sandro (2012) N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols. In: 15th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2012, 12-14 September 2012, Amsterdam, The Netherlands (pp. pp. 354-373).

Law, Y.W. and Chan, K.Y. (2002) NECTAR: Simulation and Visualization in a 3D Collaborative Environment. In: EUROMEDIA 2002, Modena, Italy (pp. pp. 15-17).

Pieters, Wolter and Padget, Julian and Dechesne, Francien and Dignum, Virginia and Aldewereld, Huib (2013) Obligations to enforce prohibitions: on the adequacy of security policies. In: 6th International Conference on Security of Information and Networks, SIN 2013, 26-28 November 2013, Aksaray, Turkey (pp. pp. 54-61).

Franz, M. and Williams, P. and Carbunar, B. and Katzenbeisser, S. and Peter, A. and Sion, R. and Sotakova, M. (2011) Oblivious outsourced storage with delegation. In: 15th International Conference on Financial Cryptography and Data Security, FC 2011, 28 February - 04 March 2011, Gros Islet, St. Lucia (pp. pp. 127-140).

Helme, Arne and Stabell-Kulo, Tage (1999) Off-line Delegation. In: 8th USENIX Security Symposium 1999, August 23-26, 1999, Washington, DC, USA.

Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Mader, Angelika (2003) On Modelling Real-time and Security properties of Distributed Systems. In: 5th Plenary Cabernet Workshop, 5-7 November 2003, Porto Santo, Portugal.

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2006) On consistency maintenance in service discovery. In: 20th International Parallel and Distributed Processing Symposium, IPDPS, 25-29 April, Rhodes Island, Greece.

Schoch, Elmar and Kargl, Frank (2010) On the Efficiency of Secure Beaconing in VANETs. In: Proceedings of the third ACM conference on Wireless network security (ACM WiSec 2010), Hoboken, New Jersey, USA (pp. pp. 111-116).

Dietzel, Stefan and Kargl, Frank and Heijenk, Geert and Schaub, Florian (2010) On the Potential of Generic Modeling for VANET Data Aggregation Protocols. In: Proceedings of the 2nd IEEE Vehicular Networking Conference, 13-15 Dec 2010, Jersey City, New Jersey, USA (pp. pp. 78-85).

Petit, Jonathan and Bösch, Christoph and Feiri, Michael and Kargl, Frank (2012) On the Potential of PUF for Pseudonym Generation in Vehicular Networks. In: IEEE Vehicular Networking Conference, VNC 2012, 14-16 November 2012, Seoul, Korea (pp. pp. 94-100).

Cederquist, J. and Corin, R. and Dashti, M. Torabi (2005) On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. In: 7th International Conference on Information and Communications Security, ICICS 2005, December 10-13, 2005, Beijing, China (pp. pp. 27-37).

Caselli, Marco and Hadziosmanovic, Dina and Zambon, Emmanuele and Kargl, Frank (2013) On the feasibility of device fingerprinting in industrial control systems. In: 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, 16-18 September 2013, Amsterdam, the Netherlands (pp. pp. 155-166).

Dimkov, Trajce and Tang, Qiang and Hartel, Pieter (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. In: Workshop on Modeling Security, MODSEC 2008, 28 Sep 2008, Toulouse, France (pp. pp. 1-13).

Bosch, Peter (1996) PFS: A Distributed and Customizable File System. In: Fifth International Workshop on Object Orientation in Operating Systems, IWOOOS, 27-28 Oct. 1996, Seattle, Washington (pp. pp. 78-85).

Trivellato, Daniel and Spiessens, Fred and Zannone, Nicola and Etalle, Sandro (2009) POLIPO: Policies & ontologies for interoperability, portability, an autonomy. In: IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY, 20-22 July 2009, London, UK (pp. pp. 110-113).

Höfer, Christina and Petit, Jonathan and Schmidt, Robert and Kargl, Frank (2013) POPCORN: privacy-preserving charging for e-mobility. In: 29. VDI/VW-Gemeinschaftstagung Automotive Security, 25-26 September 2013, Kassel, Germany (pp. pp. 33-46).

Höfer, Christina and Petit, Jonathan and Schmidt, Robert K. and Kargl, Frank (2013) POPCORN: privacy-preserving charging for eMobility. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security, ACM CCS 2013, 4 November 2013, Berlin, Germany (pp. pp. 37-48).

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks. In: 18th ACM conference on Computer and Communications Security, CCS 2011, 17-21 October 2011 , Chicago, IL, USA (pp. pp. 793-795).

Corin, Ricardo and Saptawijaya, Ari and Etalle, Sandro (2005) PS-LTL for Constraint-based Security Protocol Analysis. In: International Conference [on] Logic Programming, ICLP : 21 (Sitges), October 2-5, 2005, Sitges, Spain (pp. pp. 439-440).

Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. In: Recent Advances in Intrusion Detection (pp. pp. 1-20).

Field, A.N. and Hartel, P.H. and Mooij, W. (2001) Personal DJ, an Architecture for personalised content delivery. In: 10th Int. World Wide Web conference , Hong Kong may 2001 (pp. pp. 1-8).

Khatib, M.G. and Hartel, P.H. (2009) Policies for Probe-Wear Leveling in MEMS-Based Storage Devices. In: Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 21-23 Sep 2009, London, UK (pp. pp. 152-161).

Etalle, Sandro and Hinrichs, Timothy L. and Lee, Adam J. and Trivellato, Daniel and Zannone, Nicola (2013) Policy administration in tag-based authorization. In: 5th International Symposium on Foundations and Practice of Security, FPS 2012, October 25-26, 2012, Montreal, QC, Canada (pp. pp. 162-179).

Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2001) Polymer thick-film sensors: possibilities for smartcard biometrics. In: 11th Conference on Sensors and Their Applications, 3-6 September 2001, London, UK (pp. pp. 83-88).

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Portunes: representing attack scenarios spanning through the physical, digital and social domain. In: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS '10, 27-28 March 2010, Paphos, Cyprus. (In Press)

Bolzoni, Damiano and Zambon, Emmanuele and Etalle, Sandro and Hartel, Pieter (2006) Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System. In: Fourth IEEE International Workshop on Information Assurance, IWIA 2006, 13-14 Apr 2006, London, UK (pp. pp. 144-156).

Khatib, M.G. and Hartel, P.H. (2008) Power Management of MEMS-Based Storage Devices for Mobile Systems. In: Proceedings of the 8th ACM & IEEE International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES '08), 19-24 Oct 2008, Atlanta, USA (pp. pp. 245-254).

Sedghi, Saeed and Hartel, Pieter and Jonker, Willem and Nikova, Svetla (2011) Privacy Enhanced Access Control by Means of Policy Blinding. In: 7th International Conference on Information Security Practice and Experience, ISPEC 2011, May 30 - June 1, 2011, Guangzhou, China (pp. pp. 108-122).

Dietzel, Stefan (2011) Privacy Implications of In-Network Aggregation Mechanisms for VANETs. In: 8th International Conference on Wireless On-demand Network Systems and Services, 26-28 Jan 2011, Bardonecchia, Italy.

Tang, Qiang (2010) Privacy Preserving Mapping Schemes Supporting Comparison. In: ACM Cloud Computing Security Workshop, CCSW 2010, 9 oct 2010, Chicago, Illinois.

Kost, Martin and Freytag, Johann-Christoph and Kargl, Frank and Kung, Antonio (2011) Privacy Verification Using Ontologies. In: Sixth International Conference on Availability, Reliability and Security, ARES 2011, 22-26 August 2011, Vienna, Austria (pp. pp. 627-632).

Schaub, Florian and Koenings, Bastian and Dietzel, Stefan and Weber, Michael and Kargl, Frank (2012) Privacy context model for dynamic privacy adaptation in ubiquitous computing. In: ACM Conference on Ubiquitous Computing, UbiComp 2012, CASEMANS 2012 Workshop, 8 September 2012, Pittsburgh, PA, USA (pp. pp. 752-757).

Wiedersheim, B. and Ma, Zhendong and Kargl, F. and Papadimitratos, P. (2010) Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough. In: The Seventh International Conference on Wireless On-demand Network Systems and Services (WONS 2010), 3-5 Feb. 2010, Kranska Gora, Slovenia (pp. pp. 176-183).

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2012) Privacy-Preserving Collaborative Filtering based on Horizontally Partitioned Dataset. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 May 2012, Denver, CO, USA (pp. pp. 439-446).

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) Privacy-Preserving Profile Matching Using the Social Graph. In: International Conference on Computational Aspects of Social Networks, CASoN 2011, 19-21 October 2011 , Salamanca, Spain (pp. pp. 42-47).

Kung, Antonio and Freytag, Johann-Christoph and Kargl, Frank (2011) Privacy-by-Design in ITS Applications : The Way Forward. In: Second International Workshop on Data Security and PrivAcy in wireless Networks, D-SPAN 2011, 20 June 2011, Lucca, Italy.

Peter, A. and Hartman, T. and Muller, S. and Katzenbeisser, S. (2013) Privacy-preserving architecture for forensic image recognition. In: IEEE International Workshop on Information Forensics and Security, WIFS 2012, 2-5 December 2012, Tenerife, Spain (pp. pp. 79-84).

Delzanno, Giorgio and Etalle, Sandro (2001) Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. In: 11th International Workshop on Logic Based Program Synthesis and Transformation, LOPSTR 2001, November 28-30, 2001, Paphos, Greece (pp. pp. 76-90).

Trivellato, Daniel and Zannone, Nicola and Etalle, Sandro (2011) Protecting Information in Systems of Systems. In: 18th ACM conference on Computer and Communications Security, CCS 2011, 17-21 October 2011 , Chicago, IL, USA (pp. pp. 865-867).

Garcia, F.D. and Hasuo, I. and Pieters, W. and van Rossum, P.J.B. (2005) Provable anonymity. In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, Fairfax, VA, USA (pp. pp. 63-72).

Ibraimi, Luan and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2011) Public-Key Encryption with Delegated Search. In: 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, June 7-10, 2011, Nerja, Malaga, Spain (pp. pp. 532-549).

Tang, Q. and Chen, Liqun (2009) Public-key Encryption with Registered Keyword Search. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. (In Press)

Pavlovic, D. (2010) Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks. In: 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, 16-17 September 2010, Pisa, Italy (pp. pp. 1-17).

Pavlovic, Dusko (2012) Quantitative Concept Analysis. In: 10th International Conference on Formal Concept Analysis, ICFCA 2012, 7-10 May 2012, Leuven, Belgium (pp. pp. 260-277).

Dekker, M.A.C. and Crampton, J. and Etalle, S. (2008) RBAC administration in distributed systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, 11-13 June 2008, Estes Park, Colorado, USA (pp. pp. 93-102).

Hubbers, E.M.G.M. and Jacobs, B.P.F. and Pieters, W. (2005) RIES: Internet voting in action. In: 29th Annual International Computer Software and Applications Conference (COMPSAC 2005), 26-28 Jul 2005 (pp. pp. 417-424).

Jonker, H.L. and Pieters, W. (2006) Receipt-freeness as a special case of anonymity in epistemic logic. In: Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 29-30 Jun 2006, Cambridge, UK.

Brzuska, C. and Busch, H. and Dagdelen, O. and Fischlin, M. and Franz, M. and Katzenbeisser, S. and Manulis, M. and Onete, C. and Peter, A. and Poetering, B. and Schröder, D. (2010) Redactable signatures for tree-structured data: definitions and constructions. In: 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, 22-25 June 2010, Beijing, China (pp. pp. 87-104).

Pieters, Wolter and Coles-Kemp, Lizzie (2011) Reducing normative conflicts in information security. In: 2011 New Security Paradigms Workshop, NSPW 2011, 12-15 September 2011, Marin County, CA (pp. pp. 11-24).

Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. In: 4th VLDB Workshop on Secure Data Management, SDM 2007, 23-24 September 2007, Vienna, Austria (pp. pp. 33-46).

Bistarelli, S. and Cervesato, I. and Lenzini, G. and Martinelli, F. (2003) Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. In: 2nd Int. Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (pp. pp. 86-99).

Martinelli, F. and Bistarelli, S. and Cervesato, I. and Lenzini, G. and Marangoni, R. (2003) Representing Biological Systems with Multiset Rewriting. In: EUROCAST 2003: 9th International Workshop on Computer Aided Systems Theory, Las Palmas de Gran Canaria, Spain (pp. pp. 415-426).

Trivellato, Daniel and Spiessens, Fred and Zannone, Nicola and Etalle, Sandro (2009) Reputation-based ontology alignment for autonomy and interoperability in distributed access control. In: 12th IEEE International conference on Computational Science and Engineering, CSE, 29-31 Aug. 2009, Vancouver BC, Canada (pp. pp. 252-258).

Herrmann, Andrea and Morali, Ayse and Etalle, Sandro and Wieringa, Roel (2012) Risk and Business Goal Based Security Requirement and Countermeasure Prioritization. In: Workshops on Business Informatics Research, BIR 2011, 6-8 October 2011, Riga, Latvia (pp. pp. 64-76).

Morali, Ayse and Wieringa, Roel (2010) Risk-Based Confidentiality Requirements Specification for Outsourced IT Systems. In: 18th IEEE International Requirements Engineering Conference, RE 2010, 27 Sept - 1 Oct 2010, Sydney, Australia. (In Press)

Herrmann, Andrea and Morali, Ayse and Etalle, Sandro and Wieringa, Roel (2011) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization. In: 1st International Workshop on Alignment of Business Process and Security Modelling, ABPSM 2011, 6-8 Oct 2011, Riga, Latvia (pp. pp. 1-8).

Cheng, Jieyin and Chong, Cheun Ngen and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Nikolaus, Stefan (2005) STREAMTO: Streaming Content using a Tamper-Resistant Token (Workshop paper). In: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (pp. pp. 601-612).

Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow. In: 8th Int. Conf. on Formal Methods in Computer Aided Design (FMCAD), 17-20 Nov. 2008, Portland, Oregon (pp. pp. 161-170).

Mansour, O. and Etalle, S. and Krol, T. (2001) Scheduling and Allocation of Non-Manifest Loops on Hardware Graph-Models. In: 2nd PROGRESS Workshop on Embedded Systems, 2001, 18 October 2001, Veldhoven, The Netherlands (pp. pp. 153-160).

Jansen, Pierre G. and Hanssen, Ferdy and Lijding, Maria Eva (2003) Scheduling of Early Quantum Tasks. In: 15th Euromicro Conference on Real-Time Systems, 2-4 July 2003, Porto, Portugal (pp. pp. 203-210).

Heijden, Rens van der and Dietzel, Stefan and Kargl, Frank (2013) SeDyA: secure dynamic aggregation in VANETs. In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, 17-19 April 2013, Budapest, Hungary (pp. pp. 131-142).

Sedghi, Saeed and Liesdonk, Peter van and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2010) Searching Keywords with Wildcards on Encrypted Data. In: Seventh international Conference on Security and Cryptography for Networks, SCN 2010, September 13-15, 2010, Amalfy, Italy (pp. pp. 138-153).

Doumen, J.M. and Brinkman, R. and Jonker, W. (2004) Searching in Encrypted Data. In: Finite Fields: Theory and Applications, 5-11 Dec 2004, Oberwolfach, Germany (pp. p. 2951).

Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. In: First International Workshop on Security for Spontaneous Interaction, 16. September 2007, Innsbruck, Austria (pp. pp. 450-456).

Chong, C.N. and Peng, Z. and Hartel, P.H. (2003) Secure Audit Logging with Tamper-Resistant Hardware. In: 18th IFIP TC11 Int. Conf. on Information Security, Security and Privacy in the Age of Uncertainty (pp. pp. 73-84).

Corin, Ricardo and Deniélou, Pierre-Malo and Fournet, Cédric and Bhargavan, Karthikeyan and Leifer, James (2007) Secure Implementations for Typed Session Abstractions. In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy (pp. pp. 170-186).

Brinkman, Richard and Hoepman, Jaap-Henk (2002) Secure Method Invocation in JASON. In: Fifth Smart Card Research and Advanced Applications Conference, CARDIS 2002, November 21-22, 2002, San Jose, CA (pp. pp. 180-193).

Bhargavan, K. and Corin, R.J. and Fournet, C. and Gordon, A.D. (2004) Secure Sessions for Web Services. In: Proceedings ACM Workshop on Secure Web Services.

Corin, Ricardo and Galindo, David and Hoepman, Jaap-Henk (2006) Securing data accountability in decentralized systems. In: 1st International Workshop on Information Security, IS'06, 30 Oct - 3 Nov 2006, Montpellier, France (pp. pp. 626-635).

Corin, R. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security Analysis of Parlay/OSA Framework. In: 9th International Conference on Intelligence in Service Delivery Networks, ICIN '04, October 18-21, 2004, Bordeaux, France (pp. pp. 54-59).

Chong, Jordan C.N. and Buuren, René van and Hartel, Pieter H. and Kleinhuis, Geert (2002) Security Attributes Based Digital Rights Management. In: Joint International Workshops on Interactive Distributed Multimedia Systems and Protocols for Multimedia Systems, IDMS/PROMS 2002, November 26-29, 2002, Coimbra, Portugal (pp. pp. 339-352).

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2009) Security Implications of Virtualization: A Literature Study. In: 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), 29 Aug - 31 Aug, Vancouver, BC, Canada (pp. pp. 353-358).

Knapik, Peter and Schoch, Elmar and Kargl, Frank (2013) Security-Funktionen zur Bekämpfung fahrzeugbezogener Kriminalität. In: 29. VDI/VW-Gemeinschaftstagung Automotive Security, 24-25 September 2013, Kassel, Germany (pp. pp. 47-62).

Bösch, Christoph and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2012) Selective Document Retrieval from Encrypted Database. In: 15th International Conference on Information Security, ISC 2012, 19-21 September 2012, Passau, Germany.

Etalle, Sandro and Bossi, Annalisa and Rossi, Sabina and Smaus, Jan-Georg (2001) Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling. In: 10th European Symposium on Programming, ESOP 2001, April 2-6, 2001, Genova, Italy (pp. pp. 402-416).

Henderson, N.J. and White, N.M. and Veldhuis, R.N.J. and Hartel, P.H. and Slump, C.H. (2002) Sensing pressure for authentication. In: 3rd IEEE Benelux Signal Processing Symp. (pp. pp. 241-244).

Evers, L. and Havinga, P.J.M. and Kuper, J. and Lijding, M.E.M. and Meratnia, N. (2007) SensorScheme: Supply chain management automation using Wireless Sensor Networks. In: 12th IEEE Conference on Emerging Technologies & Factory Automation, ETFA 2007, 25-28 September 2007 , Patras, Greece (pp. pp. 448-455).

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Joosten, Rieks and Kleinhuis, Geert (2005) Service brokerage with Prolog (Poster paper). In: 7th International Conference on Enterprise Information Systems, ICEIS 2005, May 24-28, 2005, Miami, FL, USA (pp. pp. 409-412).

Sundramoorthy, Vasughi and Scholten, Hans and Jansen, Pierre and Hartel, Pieter (2003) Service discovery at home. In: Joint Conference of the Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia, 2003, 15-18 Dec. 2003 , Singapore (pp. pp. 1929-1933).

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012) Shift-type homomorphic encryption and its application to fully homomorphic encryption. In: 5th International Conference on Cryptology in Africa, AFRICACRYPT 2012, 10-12 July 2012, Ifrane, Morocco (pp. pp. 234-251).

Knapik, Peter and Schoch, Elmar and Kargl, Frank (2013) Simulation of a security function based on vehicle-to-X communication and automotive lighting. In: Second International Conference on Advances in Vehicular Systems, Technologies and Applications, Vehicular 2013, 21-26 July 2013, Nice, France (pp. pp. 8-11).

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter (2011) Smart Device Profiling for Smart SCADA. In: 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, 20-21 Sept 2011, Menlo Park, California, USA.

Laud, P. and Corin, R.J. (2004) Sound Computational Interpretation of Formal Encryption with Composed Keys. In: LNCS, 6th Annual Int. Conf. on Information Security and Cryptology, Seoul, Korea (pp. pp. 55-66).

Su, Xiaomeng and Bolzoni, Damiano and Eck, Pascal van (2007) Specifying Information Security Needs for the Delivery of High Quality Security Services. In: 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, BDIM '07, 21-23 May 2007, Munich, Germany (pp. pp. 112-113).

Petit, Jonathan and Feiri, Michael and Kargl, Frank (2011) Spoofed Data Detection in VANETs using Dynamic Thresholds. In: IEEE Vehicular Networking Conference, VNC 2011, 14-16 November 2011, Amsterdam, The Netherlands (pp. pp. 25-32).

Jacobs, B.P.F. and Pieters, W. and Warnier, M. (2005) Statically checking confidentiality via dynamic labels. In: WITS '05: Proceedings of the 2005 workshop on Issues in the theory of security, 10-11 Jan 2005, Long Beach, CA (pp. pp. 50-56).

Mader, Angelika (1995) Tableau Recycling. In: 4th International Workshop Computer Aided Verification, CAV 1992, June 29 - July 1, 1992, Montreal, Canada (pp. pp. 330-342).

Könings, Bastian and Schaub, Florian and Weber, Michael and Kargl, Frank (2010) Territorial Privacy in Smart Environments. In: Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA (pp. pp. 113-118).

Nasution, S. and Suryana, N. and Shahib, S. and Abu, N.A. and Hartel, P.H. (2009) The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home. In: International Technology, Education and Development Conference (INTED), 9-11 March 2009, Valencia, Spain (pp. p. 702).

Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. In: Fourth Int. Conf. on Trust, Privacy and Security in Digital Business, TRUSTBUS 2007, 4-6 September 2007, Germany (pp. pp. 145-154).

Sundramoorthy, V. and van de Glind, G.J. and Hartel, P.H. and Scholten, J. (2006) The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss. In: 1st Int. Conf. on Communication System Software and Middleware (COMSWARE), 08-12 Jan. 2006, New Delhi, India (pp. CDROM).

Pavlovic, Dusko (2010) The Unreasonable Ineffectiveness of Security Engineering: An Overview. In: 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010, 13-18 Sep 2010, Pisa, Italy (pp. pp. 12-18).

Schoute, Albert L. (2005) Time-optimal collision avoidance of automatically guided vehicles (Extended Abstract). In: 10th International Workshop on Computer Aided Sytems Theory: Cast and Tools for Robotics, Vehicular and Communication Systems, February 7-11, 2005, Las Palmas de Gran Canaria, Spain (pp. pp. 286-289).

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2004) Timed Model Checking of Security Protocols. In: 2nd ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, October 25-29, 2004, Washington, DC, USA (pp. pp. 23-32).

Tang, Q. (2009) Timed-Ephemerizer: Make Assured Data Appear and Disappear. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. (In Press)

Zannone, Nicola and Petkovic, Milan and Etalle, Sandro (2010) Towards Data Protection Compliance. In: 5th International Conference on Security and Cryptography, SECRYPT 2010, 26-28 July 2010, Athens, Greece (pp. pp. 213-216).

Tang, Qiang (2011) Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. In: Proceedings of the 16th Australian conference on information security and privacy, 11-13 Jul 2011, Melbourne, Australia.

Gong, Zheng and Hartel, Pieter and Nikova, Svetla and Zhu, Bo (2009) Towards Secure and Practical MACs for Body Sensor Networks. In: 10th International Conference on Cryptology - INDOCRYPT 2009, December 13-16, 2009, New Delhi, India (pp. pp. 182-198).

Hartel, P.H. and Abelmann, L. and Khatib, M.G. (2008) Towards Tamper-Evident Storage on Patterned Media. In: 6th USENIX Conference on File and Storage Technologies, FAST 2008, February 26-29, 2008, San Jose, CA, USA (pp. pp. 283-296).

Morali, Ayse and Wieringa, Roel (2010) Towards Validating Risk Indicators Based on Measurement Theory. In: First International Workshop on Risk and Trust in Extended Enterprises, November 1-4, 2010, San Jose, CA, USA.

Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption. In: 10th international conference on information and communication security, 20-22 Oct 2008, Birmingham, UK (pp. pp. 345-360).

Schaub, Florian and Könings, Bastian and Weber, Michael and Kargl, Frank (2012) Towards context adaptive privacy decisions in ubiquitous computing. In: IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012, 19-23 March 2012, Lugano, Switserland (pp. pp. 407-410).

Rocha, Bruno P.S. and Bandhakavi, Sruthi and Hartog, Jerry den and Winsborough, William H. and Etalle, Sandro (2010) Towards static flow-based declassification for legacy and untrusted programs. In: IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, California (pp. pp. 93-108).

Pavlovic, Dusko (2012) Tracing the man in the middle in monoidal categories. In: 11th International Workshop on Coalgebraic Methods in Computer Science, CMCS 2012, 31 March - 1 April 2012, Tallinn, Estonia (pp. pp. 191-217).

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Training Students to Steal: A Practical Assignment in Computer Security Education. In: 42nd ACM Technical Symposium on Computer Science Education, SIGCSE’11, March 9-12, 2011, Dallas, Texas, USA.

Hartel, Pieter H. and Butler, Michael J. and Jong, Eduard de and Longley, Mark (2001) Transacted Memory for Smart Cards. In: International Symposium of Formal Methods Europe, FME 2001, March 12–16, 2001, Berlin, Germany (pp. pp. 478-499).

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro (1992) Transforming Normal Programs by Replacement. In: 3rd International Workshop on Meta Programming in Logic, META 1992, June 10-12, 1992, Uppsala, Sweden (pp. pp. 265-279).

Nasution, Sandy and Hartel, Pieter and Suryana, Nanna and Azman, Nur and Shahib, Shahrin (2010) Trust Level and Routing Selection for Mobile Agents in a Smart Home. In: Second International Conference on Computer Modeling and Simulation, ICCMS, 22-24 Jan. 2010, Sanya, China (pp. pp. 445-450).

Czenko, Marcin and Doumen, Jeroen and Etalle, Sandro (2008) Trust Management in P2P Systems Using Standard TuLiP. In: IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway (pp. pp. 1-16).

Etalle, S. and den Hartog, J.I. and Marsh, S. (2007) Trust and Punishment (Invited paper). In: Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics, Rome, Italy.

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Two methodologies for physical penetration testing using social engineering. In: Annual Computer Security Applications Conference, ACSAC '10, 6-10 Dec 2010, Austin, Texas, USA.

Tang, Q. (2008) Type-Based Proxy Re-encryption and Its Construction. In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, December 14-17, 2008, Kharagpur, India (pp. pp. 130-144).

Su, Xiaomeng and Bolzoni, Damiano and Eck, Pascal van (2007) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. In: International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain (pp. pp. 107-114).

Knapik, Peter and Schoch, Elmar and Müller, Maik and Kargl, Frank (2012) Understanding vehicle related crime to elaborate on countermeasures based on ADAS and V2X communication. In: IEEE Vehicular Networking Conference, VNC 2012, 14-16 November 2012, Seoul, Korea (pp. pp. 86-93).

Tang, Qiang (2010) User-friendly matching protocol for online social networks. In: 17th ACM Conference on Computer and Communications Security, 4-8 oct 2010, Chicago, IL (pp. pp. 732-734).

Corin, Ricardo and Durante, Antonio and Etalle, Sandro and Hartel, Pieter (2002) Using Trace Formulae for Security Protocol Design. In: 7th Cabernet Radicals Workshop, 13-16 October 2002, Bertinoro (Forlì), Italy.

Nikova, S.I. and Rijmen, V. and Schlaffer, M. (2008) Using normal bases for compact hardware implementations of the AES S-box. In: 6th International Conference Security in Communication Networks (SCN), 10-12 Sep 2008, Amalfi, Italy (pp. pp. 236-245).

Brinkman, R. and Doumen, J.M. and Jonker, W. (2004) Using secret sharing for searching in encrypted data. In: VLDB 2004 Workshop on Secure data management, SDM 2004, Toronto, Canada (pp. pp. 18-27).

Schaub, Florian and Kargl, Frank and Ma, Zhendong and Weber, Michael (2010) V-Tokens for Conditional Pseudonymity in VANETs. In: IEEE Wireless Communications and Networking Conference (WCNC 2010), 18-21 April 2010, Sydney, Australia (pp. pp. 1-6).

Hartog, J.I. den and Vink, E.P. de (2004) Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. In: Proceedings 2nd Int. Workshop on Formal Aspect of Security and Trust (pp. pp. 85-98).

Glaser, Hugh and Hartel, Pieter H. and Jong Frz, Eduard K.J. de (1996) Visualising the Structure of an IC-card Security Architecture. In: Smart Card Convention 1996 - Technology and markets, February 1996, Peterborough, UK (pp. pp. 22-34).

Pieters, W. and Jonker, H.L. (2007) Vote buying revisited: implications for receipt-freeness. In: Proceedings of the 2nd Benelux Workshop on Information and System Security (WISSec 2007), 20-21 Sep 2007, Luxembourg city, Luxembourg.

Pieters, W. and Consoli, L. (2006) Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract). In: Proceedings of the European Computing and Philosophy Conference (E-CAP 2006), 22-24 Jun 2006, Trondheim, Norway.

Pieters, W. (2006) What proof do we prefer? Variants of verifiability in voting. In: Workshop on Electronic Voting and e-Government in the UK, 27-28 Feb 2006, Edinburgh, UK (pp. pp. 33-39).

Khatib, M.G. and Miller, E.L. and Hartel, P.H. (2008) Workload-Based Configuration of MEMS-Based Storage Devices for Mobile Systems. In: Proceedings of the 8th ACM & IEEE International Conference on Embedded Software (EMSOFT '08), 19-24 Oct 2008, Atlanta, USA (pp. pp. 41-50).

Henderson, Neil J. and White, Neil M. and Hartel, Pieter H. (2001) iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric. In: International Conference on Research in Smart Cards, E-smart 2001 , September 19–21, 2001 , Cannes, France (pp. pp. 124-134).

Henderson, N.J. and White, N.M. and Hartel, P.H. (2001) iButton enrolment and verification times for the pressure sequence smartcard biometric. In: 2nd Conf. Smart card Programming and Security (E-smart), Cannes, France (pp. pp. 124-134).

Lecture

Pavlovic, Dusko (2012) Logics of authentication, lieing and obscurity. [Lecture]

Etalle, Sandro (2008) Nice to know. [Lecture]

Kargl, Frank (2013) Securing the intelligent vehicles of the future. [Lecture]

Hartel, Pieter (2001) Veiligheid in Gedistribueerde Systemen. [Lecture]

Patent

Jong, Eduard de and Hartel, Pieter H. (2007) Method and apparatus for deployment of high integrity software using static procedure return addresses. Patent.

Zych, Anna K. and Doumen, Jeroen M. and Jonker, Willem and Hartel, Pieter H. and Petkovic, Milan (2008) Method of Key Management. Patent.

Zych, Anna K. and Doumen, Jeroen M. and Jonker, Willem and Hartel, Pieter and Petkovic, Milan (2006) Method of Key Management. Patent.

Jonker, Willem and Brinkman, Richard and Doumen, Jeroen M. and Schoenmakers, Berry (2005) Method of and device for querying of protected structured data. Patent.

Jonker, Willem and Brinkman, Richard and Maubach, Stefan (2009) Secure storage system and method for secure storing. Patent.

Jonker, Willem and Brinkman, Richard and Maubach, Stefan (2007) Secure storage system and method for secure storing. Patent.

Report

Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. [Report]

Zych, Anna and Doumen, Jeroen and Hartel, Pieter and Jonker, Willem (2005) A Diffie-Hellman based key management scheme for hierarchical access control. [Report]

Poll, Erik and Hartel, Pieter and Jong, Eduard de (2002) A Java Reference Model of Transacted Memory for Smart Cards. [Report]

Hanssen, F. and Hartel, P. and Hattink, T. and Jansen, P. and Scholten, J. and Wijnberg, J. (2002) A Real-Time Ethernet Network at Home. [Report]

Hanssen, Ferdy and Hartel, Pieter and Jansen, Pierre and Scholten, Hans and Vervoort, Wiek (2001) A Real-time Network at Home. [Report]

Corin, Ricardo and Etalle, Sandro (2004) A Simple procedure for finding guessing attacks (extended abstract). [Report]

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2007) A Taxonomy of Self-configuring Service Discovery Systems. [Report]

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. [Report]

Lijding, Maria Eva and Hanssen, Ferdy and Jansen, Pierre G. (2002) A case against periodic jukebox scheduling. [Report]

Marin Perianu, Raluca and Hartel, Pieter and Scholten, Hans (2005) A classification of service discovery protocols. [Report]

Buhan, Ileana and Bazen, Asker and Hartel, Pieter and Veldhuis, Raymond (2005) A false rejection oriented threat model for the design of biometric authentication systems. [Report]

Corin, R. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A formal security analysis of an OSA/Parlay authentication interface. [Report]

Law, Yee Wei and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter H. (2003) A formally verified decentralized key management architecture for wireless sensor networks. [Report]

Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A generalized clustering algorithm for dynamic wireless sensor networks. [Report]

Kaya, Omer Sinan (2005) A glance at peer to peer systems. [Report]

Corin, R. and Etalle, S. and Hartog, J. den and Lenzini, G. and Staicu, I. (2004) A logic for auditing accountability in decentralized systems. [Report]

Zambon, Emmanuele and Bolzoni, Damiano and Etalle, Sandro and Salvato, Marco (2007) A model supporting Business Continuity auditing & planning in Information Systems. [Report]

Hartel, P. (2005) A trace semantics for positive core XPath. [Report]

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. (2010) A2THOS: Availability Analysis and Optimisation in SLAs. [Report]

Pieters, Wolter (2010) ANKH: Information Threat Analysis with Actor-NetworK Hypergraphs. [Report]

Bolzoni, D. and Etalle, S. (2006) APHRODITE: an Anomaly-based Architecture for False Positive Reduction. [Report]

Bolzoni, D. and Crispo, B. and Etalle, S. (2008) ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems. [Report]

Sedghi, S. and van Liesdonk, P. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2009) Adaptively Secure Computationally Efficient Searchable Symmetric Encryption. [Report]

Ibraimi, Luan and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2010) An Identity-Based Group Signature with Membership Revocation in the Standard Model. [Report]

Czenko, Marcin and Etalle, Sandro and Li, Dongyi and Winsborough, William H. (2007) An Introduction to the Role Based Trust Management Framework RT. [Report]

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den (2005) An audit logic for accountability. [Report]

Corin, Ricardo and Etalle, Sandro (2002) An improved constraint-based system for the verification of security protocols. [Report]

Cederquist, Jan and Dashti, M.T. (2005) An intruder model for verifying termination in security protocols. [Report]

Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro (2003) Analysing password protocol security against off-line dictionary attacks. [Report]

Gnesi, Stefania and Lenzini, Gabriele and Martinelli, Fabio (2004) Applying generalized non deducibility on compositions (GNDC) approach in dependability. [Report]

Chong, Cheun Ngen and Law, Yee Wei and Etalle, Sandro and Hartel, Pieter H. (2003) Approximating fair use in LicenseScript. [Report]

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. and Hartel, Pieter (2009) Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures. [Report]

Law, Y.W. and Dulman, S. and Etalle, S. and Havinga, P. (2002) Assessing Security-Critical Energy-Efficient Sensor Networks. [Report]

Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. [Report]

Dekker, M.A.C. and den Hartog, J.I. and Etalle, S. (2007) Audit-based Compliance Control (AC2) for EHR Systems. [Report] (In Press)

Law, Yee Wei and Doumen, Jeroen and Hartel, Pieter (2005) Benchmarking block ciphers for wireless sensor networks. [Report]

Veldhuis, Raymond and Bazen, Asker and Kauffman, Joost and Hartel, Pieter (2004) Biometric verification based on grip-pattern recognition. [Report]

Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. [Report]

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel (2009) CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks. [Report]

Ibraimi, Luan and Petkovic, Milan and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2009) Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes (extended version). [Report]

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2007) Cluster-based service discovery for heterogeneous wireless sensor networks. [Report]

Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. [Report]

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter H. (2003) Comparing logic-based and XML-based rights expression languages. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Constructing practical Fuzzy Extractors using QIM. [Report]

Czenko, Marcin and Etalle, Sandro (2007) Core TuLiP. [Report]

Ionita, Dan and Hartel, Pieter and Pieters, Wolter and Wieringa, Roel (2013) Current established risk assessment methodologies and tools. [Report]

Hartel, Pieter and Junger, Marianne and Wieringa, Roel (2010) Cyber-crime Science = Crime Science + Information Security. [Report]

Pieters, W. and Tang, Q. (2009) Data is key: introducing the data-based access control paradigm. [Report]

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro and Rossi, Sabina (2004) Declarative semantics of input consuming logic programs. [Report]

Abelmann, Leon and Chong, Jordan and Hartel, Pieter and Lodder, Cock (2002) Design rationale for secure probe storage based on patterned magnetic media. [Report]

Saffarian, M. and Tang, Q. and Jonker, W. and Hartel, P.H. (2009) Dynamic User Role Assignment in Remote Access Control. [Report]

Pieters, W. and van Haren, R. (2007) E-voting discourses in the UK and the Netherlands. [Report]

Jansen, P.G. and Hanssen, F. and Lijding, M. (2002) Early quantum task scheduling. [Report]

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. [Report]

Brinkman, R. and Feng, L. and Doumen, J. and Hartel, P.H. and Jonker, W. (2004) Efficient tree search in encrypted data. [Report]

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. [Report]

Law, Yee Wei and Hoesel, Lodewijk van and Doumen, Jeroen and Hartel, Pieter and Havinga, Paul (2005) Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. [Report]

Brinkman, Richard and Feng, Ling and Etalle, Sandro and Hartel, Pieter and Jonker, Willem (2003) Experimenting with linear search in encrypted data. [Report]

Pieters, Wolter (2010) Explanation and trust: what to tell the user in security and AI? [Report]

Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. [Report]

Morali, Ayse and Zambon, Emmanuele and Houmb, Siv Hilde and Sallhammar, Karin and Etalle, Sandro (2008) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. [Report]

Sundramoorthy, V. and Tan, C. and Hartel, P.H. and Scholten, J. (2006) FRODO Dt-Spin Models. [Report]

Schoute, Albert and Seesink, Remco and Dierssen, Werner and Kooij, Niek (2003) Fast data sharing within a distributed, multithreaded control framework for robot teams. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis. [Report]

Jansen, Pierre G. and Wygerink, Emiel (1996) Flexible Scheduling by Deadline Inheritance in Soft Real Time Kernels. [Report]

Hartel, P.H. and Moreau, L.A.V. (2001) Formalising the safety of Java, the Java Virtual Machine and Java Card. [Report]

Pieters, W. (2001) Free will and intelligent machines: Why case-based reasoning systems do what they do. [Report]

Tang, Qiang (2010) From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) From Watermarks to Fuzzy Extractors: a Practical Construction. [Report]

Sundramoorthy, V. and Tan, C. and Hartel, P.H. and Hartog, J.I. den and Scholten, J. (2005) Functional principles of registry-based service discovery. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Fuzzy extractors for continuous distributions. [Report]

Corin, R.J. and Malladi, S. and Alves-Foss, J. and Etalle, S. (2003) Guess what? Here is a new tool that finds some new guessing attacks (Extended abstract). [Report]

Zwaag, Berend Jan van der and Khatib, Mohammed G. and Hartel, Pieter H. (2007) How migrating 0.0001% of address space saves 12% of energy in hybrid storage. [Report]

Corin, Ricardo and Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter (2003) How to pay in LicenseScript. [Report]

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Overbeek, Paul (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. [Report]

Etalle, Sandro and Winsborough, William H. (2005) Integrity constraints in trust management. [Report]

Tang, Q. and Hartel, P.H. and Jonker, W. (2008) Inter-domain Identity-based Proxy Re-encryption. [Report]

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Joosten, Rieks and Kleinhuis, Geert (2004) Inter-library service brokerage in LicenseScript. [Report]

Mouthaan, A.J. and Hartel, P.H. (2007) Interim research assessment 2003-2005 - Computer Science. [Report]

Khatib, M.G. and Zwaag, B.J. van der and Hartel, P.H. and Smit, G.J.M. (2007) Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. [Report]

Jong, Eduard de and Hartel, Pieter and Peyret, Patrice and Cattaneo, Peter (2005) Java Card: an analysis of the most successful smart card operating system to date. [Report]

Law, Y.W. and Moniava, G. and Gong, Z. and Hartel, P.H. and Palaniswami, M. (2008) KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks. [Report]

Gong, Zheng and Nikova, Svetla and Law, Yee-Wei (2010) KLEIN: A New Family of Lightweight Block Ciphers. [Report]

Law, Yee Wei and Etalle, Sandro and Hartel, Peter (2002) Key management with group-wise pre-deployed keying and secret sharing pre-deployed keying. [Report]

Di Pietro, Roberto and Mancini, Luigi V. and Law, Yee Wei and Etalle, Sandro and Havinga, Paul (2003) LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks. [Report]

Czenko, Marcin and Etalle, Sandro (2008) LP with Flexible Grouping and Aggregates Using Modes. [Report]

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. [Report]

Chong, Cheun Ngen and Ren, Bin and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Corin, Ricardo (2004) License protection with a tamper-resistant token. [Report]

Chong, C.N. and Law, Y.W. and Etalle, S. and Hartel, P.H. (2002) LicenseScript : a language and framework for calculating licenses on information over constrained domains. [Report]

Chong, Cheun Ngen and Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei and Tokmakoff, Andrew (2005) LicenseScript : a logical language for digital rights management. [Report]

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Jonker, Willem and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. [Report]

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei (2003) LicenseScript: a novel digital rights language. [Report]

Law, Yee Wei and Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Corin, Ricardo (2003) Licensing structured data with ease. [Report]

Jansen, Pierre G. and Mullender, Sape J. and Havinga, Paul J.M. and Scholten, Hans (2003) Lightweight EDF scheduling with deadline inheritance. [Report]

Law, Yee Wei and Hartel, Pieter and Hartog, Jerry den and Havinga, Paul (2004) Link-layer jamming attacks on S-MAC. [Report]

Beye, Michael and Jeckmans, Arjan and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2010) Literature Overview - Privacy in Online Social Networks. [Report]

Bolks, Mathieu and Hanssen, Ferdy and Abelmann, Leon and Havinga, Paul and Hartel, Pieter and Jansen, Pierre and Lodder, Cock and Smit, Gerard (2001) Micro Scanning Probe Array Memory. [Report]

Zambon, Emmanuele and Bolzoni, Damiano and Etalle, Sandro and Salvato, Marco (2007) Model-Based Mitigation of Availability Risks. [Report]

Hartel, Pieter and Eck, Pascal van and Etalle, Sandro and Wieringa, Roel (2004) Modelling mobility aspects of security policies. [Report]

Junger, M. and Montoya, L. and Hartel, P.H. and Karemaker, M. (2013) Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit. [Report]

Scholten, H. and Jansen, P. and Hanssen, F. and Hartel, P.H. and Hattink, T. and Sundramoorthy, V. (2002) Multimedia Qos in low-cost home networks. [Report]

Dulman, Stefan and Nieberg, Tim and Havinga, Paul and Hartel, Pieter (2002) Multipath Routing for Data Dissemination in Energy Efficient Sensor Networks. [Report]

Czenko, Marcin and Tran, Ha and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Hartog, Jerry den (2005) Nonmonotonic trust management for P2P applications. [Report]

Tang, Qiang and Jeckmans, Arjan (2010) On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. [Report]

Tang, Q. (2008) On Using Encryption Techniques to Enhance Sticky Policies Enforcement. [Report]

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2005) On consistency maintenance in service discovery. [Report]

Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Mader, Angelika (2003) On modelling real-time and security properties of distributed systems. [Report]

Hartel, P.H. (2009) On the Cost and Benefits of Building a High-Quality Institutional Repository. [Report]

Gong, Z. and Lai, X.J. and Chen, Kefei (2008) On the Design of Secure and Fast Double Block Length Hash Functions. [Report]

Field, A.N. and Hartel, P.H. (2001) On the evaluation of Web Radio. [Report]

Dimkov, T. and Tang, Q. and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. [Report]

Cederquist, Jan and Corin, Ricardo and Dashti, Muhammad Torabi (2005) On the quest for impartiality: design and analysis of a fair non-repudiation protocol. [Report]

Law, Yee Wei and Hartel, Pieter and Etalle, Sandro and Havinga, Paul and Di Pietro, Roberto and Mancini, Luigi (2005) Overview of security research in EYES. [Report]

Bolzoni, Damiano and Etalle, Sandro and Hartel, Pieter (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. [Report]

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks. [Report]

Field, A.N. and Hartel, P.H. and Mooij, W.G.P. (2001) Personal DJ, an Architecture for Personalized Content Delivery. [Report]

Dillema, F.W. and Stabell-Kulø, T. (2003) Pesto flavoured security. [Report]

Dimkov, Trajce and Pieters, Wolter (2011) Physical Penetration Testing: A Whole New Story in Penetration Testing. [Report]

Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2002) Polymer thick-film sensors: possibilities for smartcard biometrics. [Report]

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Portunes: analyzing multi-domain insider threats. [Report]

Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain. [Report]

Bolzoni, Damiano and Zambon, Emmanuele and Etalle, Sandro and Hartel, Pieter (2005) Poseidon: a 2-tier anomaly-based intrusion detection system. [Report]

Gong, Z. and Long, Yu and Hong, Xuan and Chen, Kefei (2008) Practical Certificateless Aggregate Signatures From Bilinear Maps. [Report]

Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2006) Privacy in an Ambient World. [Report]

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) Privacy-Preserving Profile Matching Using the Social Graph. [Report]

Tang, Qiang (2011) Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization. [Report]

Arnold, Florian and Pieters, Wolter and Stoelinga, Mariëlle (2013) Quantitative penetration testing with item response theory (extended version). [Report]

Dekker, M.A.C. and Crampton, J. and Etalle, S. (2007) RBAC Administration in Distributed Systems. [Report]

Hubbers, E.M.G.M. and Jacobs, B.P.F. and Pieters, W. (2004) RIES: Internet voting in action. [Report]

Hanssen, Ferdy and Jansen, Pierre G. (2003) Real-time communication protocols: an overview. [Report]

Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. [Report]

Bistarelli, Stefano and Cervesato, Iliano and Lenzini, Gabriele and Martinelli, Fabio (2005) Relating multiset rewriting and process algebras for security protocol analysis. [Report]

Wieringa, Roel and Eck, Pascal van and Mylopoulos, John (2013) Requirements Engineering Conferences: wither industry tracks? Unabridged version with a track history of the RE Conferences. [Report]

Sinderen, M.J. van and Pras, A. and Haverkort, B.R.H.M. and Apers, P.M.G. and Hartel, P.H. and Pol, J.C. van de and Nijholt, A. and Wieringa, R.J. and Havinga, P.J.M. and Aksit, M. (2009) Research Self-Evaluation 2003-2008, Computer Science Department, University of Twente. [Report]

Pieters, W. (2009) Reve\{a,i\}ling the risks: a phenomenology of information security. [Report]

Tang, Q. (2008) Revisit the Concept of PEKS: Problems and a Possible Solution. [Report]

Morali, Ayse and Wieringa, Roel (2010) Risk-Based Confidentiality Requirements Specification for Outsourced IT Systems. [Report]

Herrmann, Andrea and Morali, Ayse (2010) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization (extended version). [Report]

Schoute, A.L. (2002) RoadPlan manual version 3.1. [Report]

Cheng, Jieyin and Chong, Cheun Ngen and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Nikolaus, Stefan (2004) STREAMTO: streaming content using a tamper-resistant token. [Report]

Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow (with appendix). [Report]

Sedghi, S. and Liesdonk, Peter van and Nikova, Svetla and Hartel, Pieter and Jonker, Willem (2010) Searching Keywords with Wildcards on Encrypted Data. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. [Report]

Chong, C.N. and Peng, Z. and Hartel, P.H. (2002) Secure Audit Logging with Tamper-Resistant Hardware. [Report]

Chong, Jordan C.N. and Buuren, René van and Hartel, Pieter H. and Kleinhuis, Geert (2002) Security Attributes Based Digital Rights Management. [Report]

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2009) Security Implications of Virtualization: A Literature Study. [Report]

Corin, R. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security analysis of parlay/OSA framework. [Report]

Pieters, Wolter (2010) Security in the clouds: a bird's eye view. [Report]

Henderson, N.J. and White, N.M. and Veldhuis, R.N.J. and Hartel, P.H. and Slump, C.H. (2002) Sensing pressure for authentication. [Report]

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Joosten, Rieks and Kleinhuis, Geert (2005) Service brokerage with Prolog. [Report]

Sundramoorthy, Vasughi and Scholten, Hans and Jansen, Pierre and Hartel, Pieter (2003) Service discovery at home. [Report]

Hartel, Pieter and Muller, Henk (2010) Simple algebraic data types for C. [Report]

Law, Yee Wei and Doumen, Jeroen and Hartel, Pieter (2004) Survey and benchmark of block ciphers for wireless sensor networks. [Report]

Beek, Maurice H. ter and Lenzini, Gabriele and Petrocchi, Marinella (2004) Team automata for security analysis. [Report]

Bossi, Annalisa and Etalle, Sandro and Rossi, Sabina and Smaus, Jan-Georg (2003) Termination of simply moded logic programs with dynamic scheduling. [Report]

Koopman, P. and Hubbers, E.M.G.M. and Pieters, W. and Poll, E. and de Vries, R. (2007) Testing the eSTV program for the Scottish Local Government Elections. [Report]

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den and Lenzini, G. (2006) The Audit Logic: Policy Compliance in Distributed Systems. [Report]

Hartel, Pieter and Muller, Henk and Glaser, Hugh (2002) The Functional "C" experience. [Report]

Etalle, Sandro and Massacci, Fabio and Yautsiukhin, Artsiom (2007) The Meaning of Logs. [Report]

Sundramoorthy, V. and Glind, G.J. van de and Hartel, P.H. and Scholten, J. (2005) The performance of a second generation service discovery protocol in response to message loss. [Report]

Pieters, Wolter and Cleeff, André van (2009) The precautionary principle in a world of digital dependencies. [Report]

Buhan, Ileana and Hartel, Pieter (2005) The state of the art in abuse of biometrics. [Report]

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2005) Timed analysis of security protocols. [Report]

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2004) Timed model checking of security protocols. [Report]

Gong, Z. and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) Towards Secure and Practical MACs for Body Sensor Networks. [Report]

Morali, Ayse and Wieringa, Roel (2010) Towards Validating Risk Indicators Based on Measurement Theory (Extended version). [Report]

Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version). [Report]

Hartel, P.H. and Abelmann, L. (2007) Towards compliant data retention with probe storage on patterned media. [Report]

Hartog, Jerry den (2007) Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic. [Report]

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter (2010) Towards securing SCADA systems against process-related threats. [Report]

Nasution, S. and Hartel, P.H. and Suryana, N. and Azman, N. and Shahib, S. (2009) Trust Level and Routing Selection for Mobile Agents in a Smart Home. [Report]

Czenko, Marcin and Doumen, Jeroen and Etalle, Sandro (2008) Trust Management in P2P systems using Standard TuLiP. [Report]

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2009) Two methodologies for physical penetration testing using social engineering. [Report]

Tang, Q. (2008) Type-based Proxy Re-encryption and its Construction. [Report]

Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. [Report]

Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2002) Using Trace Formulae for Security Protocol Design. [Report]

Brinkman, Richard and Doumen, Jeroen and Jonker, Willem (2004) Using secret sharing for searching in encrypted data. [Report]

Hartog, J.I. den and Vink, E.P. de (2004) Virtual analysis and reduction of side-channel vulnerabilities of smartcards. [Report]

Bach, Wouter and Dam, Dennis and Evers, Leon and Jonker, Mischa and Scholten, Hans and Havinga, Paul (2002) iterative quality-based localization algorithm for ad hoc networks. [Report]

Corin, Ricardo and Durante, Antonio and Etalle, Sandro and Hartel, Pieter (2003) trace logic for local security properties. [Report]

Thesis

Helme, Arne (1997) A System for Secure User-Controlled Electronic Transactions. thesis.

Kavaldjiev, Nikolay Krasimirov (2006) A run-time reconfigurable network-on-chip for streaming DSP applications. thesis.

Dimkov, Trajce (2012) Alignment of organizational security policies : theory and practice. thesis.

Benz, Hartmut (2003) Casual multimedia process annotations, CoMPAs. thesis.

Buhan, Ileana Rozalia (2008) Cryptographic keys from noisy data, theory and applications. thesis.

Ibraimi, Luan (2011) Cryptographically enforced distributed data access control. thesis.

Jeckmans, Adrianus Johannus Paulus (2014) Cryptographically-enhanced privacy for recommender systems. thesis.

Morali, Ayse (2011) IT architecture-based confidentiality risk assessment in networks of organizations. thesis.

Law, Yee Wei (2005) Key management and link-layer security of wireless sensor networks : Energy-efficient attack and defense. thesis.

Pieters, W. (2008) La volonté machinale: understanding the electronic voting controversy. thesis.

Bosch, Hendrikus Gerardus Petrus (1999) Mixed-Media File Systems. thesis.

Hartel, Pieter Hendrik (1989) Performance analysis of storage management in combinator graph reduction. thesis.

Lijding, Maria Eva Magdalena (2003) Real-time scheduling of tertiary storage. thesis.

Bolzoni, Damiano (2009) Revisiting anomaly-based network intrusion detection systems. thesis.

Brinkman, Richard (2007) Searching in encrypted data. thesis.

Zambon, Emmanuele (2011) Towards optimal IT availability planning: methods and tools. thesis.

Sedghi, Saeed (2012) Towards provably secure efficiently searchable encryption. thesis.

Etalle, Sandro (1995) Transformation and analysis of (constraint) logic programs. thesis.

Nauta, Jan Martinus (1996) Vehicle Trajectory Planning with Interval Arithmetic. thesis.

Masters Thesis

Pieters, W. (2003) A pragmatic phenomenological approach in environmental planning. [Masters Thesis]

Pieters, W. (2002) Case-based techniques for conversational agents in virtual environments. [Masters Thesis]

Morali, A. (2006) ”AcTrust: A Security Model for Trust Based Computing. [Masters Thesis]

This list was generated on Thu Apr 24 06:10:07 2014 CEST.