EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Classification: CR-D.4.6
Home Policy Brochure Browse Search User Area Contact Help

2010

Gong, Zheng (2010) Review of "Robust defenses for cross-site request forgery" by A. Barth, C. Jackson, J. Mitchell. Computing reviews. CR137694. ISSN 1530-6585

2009

Buhan, I.R. and Boom, B.J. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2009) Secure pairing with biometrics. International Journal of Security and Networks, 4 (1/2). pp. 27-42. ISSN 1747-8405

2008

Dekker, M.A.C. and Crampton, J. and Etalle, S. (2008) RBAC administration in distributed systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, 11-13 June 2008, Estes Park, Colorado, USA. pp. 93-102. ACM. ISBN 978-1-60558-129-3
Kelkboom, E.J.C. and Garcia Molina, G. and Kevenaar, T.A.M. and Veldhuis, R.N.J. and Jonker, W. (2008) Binary Biometrics: An Analytic Framework to Estimate the Bit Error Probability under Gaussian Assumption. In: Biometrics: Theory, Applications and BTAS 2008. 2nd IEEE International Conference on Biometrics: Theory Applications and Systems, 2008., 29 Sep - 1 Oct 2008, Washington, USA. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-2729-1
Scholten, J. and van Dijk, H.W. (2008) Home Network Security. In: ICN2008, The Seventh International Conference on Networking, 13-18 Apr 2008, Cancun, Mexico. pp. 249-255. IEEE Computer Society. ISBN 978-0-7695-3106-9

2007

Etalle, S. and Marsh, S., ed. (2007) Trust Management, Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada. IFIP International Federation for Information Processing 238. Springer Verlag, Berlin. ISBN 978-0-387-73654-9
Alvisi, L. and Doumen, J.M. and Guerraoui, R. and Koldehofe, B. and Li, H. and van Renesse, R. and Tredan, G. (2007) How robust are gossip-based communication protocols? Operating Systems Review, 41 (5). pp. 14-18. ISSN 0163-5980
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2007) Audit-based compliance control. International Journal of Information Security, 6 (2-3). pp. 133-151. ISSN 1615-5262 *** ISI Impact 1,279 ***
Etalle, S. and Winsborough, W.H. (2007) A Posteriori Compliance Control. In: 12th ACM Symposium on Access Control Models and Technologies (SACMAT), 20-22 June 2007, Nice, France. pp. 11-20. ACM Press. ISBN 978-1-59593-745-2
Meyer, U. and Tschofenig, H. and Karagiannis, G. (2007) On the security of the Mobile IP protocol family. (Invited) In: Proceedings of 1st IEEE Workshop on Enabling the Future Service-Oriented Internet, Workshop of GLOBECOM 2007, 26-30 Nov 2007, USA. 2. IEEE Communications Society. ISBN not assigned
Ooms, W.S. and Karagiannis, G. and van Deventer, M.O. and Veldhuizen, J. (2007) AAA architectures applied in multi-domain IMS (IP multimedia subsystem). In: Proceedings of 1st IEEE Workshop on Enabling the Future Service-Oriented Internet, Workshop of GLOBECOM 2007, 26-30 Nov 2007, USA. 6. IEEE Communications Society. ISBN 978-1-4244-2024-7