EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Classification: SCS-Cybersecurity
Home Policy Brochure Browse Search User Area Contact Help

2017

Chomsiri, T. and He, Xiangjian and Nanda, P. and Tan, Zhiyuan (2017) Hybrid tree-rule firewall for high speed data transmission. IEEE Transactions on Cloud Computing, online pre-publication. pp. 1-13. ISSN 2168-7161
Lammers, I. and Vasenev, A. (2017) Grid resilience governance of the future: analyzing the role of associations in experimental smart grid projects in the Netherlands. In: 2nd EAI International Conference on Smart Grid Inspired Future, 27-28 March 2017, London, United Kingdom. pp. 1-6. Springer Verlag.
Tseng Lau, Eng and Keong Chai, Kok and Chen, Yue and Vasenev, A. (2017) Towards Improving Resilience of Smart Urban Electricity Networks by Interactively Assessing Potential Microgrids. In: 6th International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), 22-24 April 2017, Porto, Portugal. pp. 1-8. SCITEPRESS Digital Library.
Vasenev, A. and Ionita, D. and Zoppi, T. and Ceccarelli, A. and Wieringa, R.J. (2017) Towards Security Requirements: Iconicity as a Feature of an Informal Modeling Language. In: Joint Proceedings of the REFSQ 2017 Co-Located Events, 27 Feb 2017, Essen, Germany. pp. 1-15. CEUR Workshop Proceedings online pre-publication. CEUR Workshop Proceedings. ISSN 1613-0073
Vasenev, A. and Montoya Morales, A.L. and Ionita, D. (2017) Outlining an ‘Evaluation continuum’: Structuring evaluation methodologies for infrastructure-related decision making tools. In: 2nd EAI International Conference on Smart Grid Inspired Future, 27-28 March 2017, London, United Kingdom. pp. 1-6. Springer Verlag.
Zoppi, T. and Bessler, S. and Ceccarelli, A. and Lambert, E. and Tseng Lau, Eng and Vasenev, A. (2017) A Modeling Framework to Support Resilient Evolution Planning of Smart Grids. In: 2nd EAI International Conference on Smart Grid Inspired Future, 27 Mar 2017, London. pp. 1-10. Springer Verlag.

2016

Abbasi, A. (2016) Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O. Technical Report TR-CTIT-16-02, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Abbasi, A. and Hashemi, M. (2016) Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack. In: Black Hat Europe, 03-04 Nov 2016, London, United Kingdom. pp. 1-35. Black Hat. ISBN not assigned
Ambusaidi, M. A. and He, Xiangjian and Nanda, P. and Tan, Zhiyuan (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE transactions on computers, 65 (10). pp. 2986-2998. ISSN 0018-9340 *** ISI Impact 1,723 ***
Belov, A. and Vasenev, A. and Havinga, P.J.M. and Meratnia, N. (2016) Enhancing user comfort models for Demand Response solutions for domestic water heating systems. In: Proceedings of the 5th International Conference on Smart Cities and Green ICT Systems, April 23-25, 2016, Rome, Italy. pp. 201-212. ScitePress. ISBN 978-989-758-184-7
Bullee, J.H. and Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2016) Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. In: Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016), 14-15 Jan 2016, Singapore, Singapore. pp. 107-114. Cryptology and Information Security Series 14. IOS Press. ISSN 1871-6431 ISBN 978-1-61499-616-3
Caselli, M. (2016) Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security. PhD thesis, Univ. of Twente. CTIT Ph.D. Thesis Series No. 16-401 ISBN 978-90-365-4177-0
Caselli, M. and Zambon, Emmanuele and Amann, J. and Sommer, R. and Kargl, F. (2016) Specification Mining for Intrusion Detection in Networked Control Systems. In: Proceedings of the 25th USENIX Security Symposium, 10-12 Aug 2016, Austin, TX, USA. pp. 791-806. USENIX Association. ISBN 978-1-931971-32-4
Chomsiri, T. and He, Xiangjian and Nanda, P. and Tan, Zhiyuan (2016) An improvement of tree-Rule firewall for a large network: supporting large rule size and low delay. In: 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 23-26 August 2016, Tianjin, China. pp. 178-184. IEEE Computer Society. ISSN 2324-9013
Esquivel Vargas, H.T. (2016) Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol. Master's thesis, Univ. of Twente.
Feiri, M.P. (2016) Scalable Broadcast Authentication for V2V Communication. PhD thesis, Univ. of Twente. CTIT Ph.D. Thesis Series No. 16-407 ISBN 978-90-365-4200-5
Hartel, P.H. and Junger, M. (2016) Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition. Crime Science, 5. 10:1-10:3. ISSN 2193-7680
Ionita, D. and Gordijn, J. and Yesuf, A.S. and Wieringa, R.J. (2016) Value-Driven Risk Analysis of Coordination Models. In: The Practice of Enterprise Modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Proceedings, 8-10 Nov 2016, Skovde, Sweden. pp. 102-116. Lecture Notes in Business Information Processing 267. Springer Verlag. ISBN 978-3-319-48392-4
Ionita, D. and Kaidalova, J. and Vasenev, A. and Wieringa, R.J. (2016) A study on tangible participative enterprise modelling. In: ER 2016 Workshops AHA, MoBID, MORE-BI, MReBA, QMMQ, and WM2SP, Gifu, Japan, November 14-17, 2016, Proceedings, Nov. 14-17, 2016, Gifu, Japan. pp. 139-148. Lecture Notes in Computer Science 9975. Springer Verlag. ISBN 978-3-319-47716-9
Ionita, D. and Wieringa, R.J. and Gordijn, J. (2016) Automated Identification and Prioritization of Business Risks in e-service Networks. In: Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016, 25-27 May 2016, Bucharest, Romania. pp. 547-560. Lecture Notes in Business Information Processing 247. Springer Verlag. ISSN 1865-1348 ISBN 978-3-319-32689-4
Jung, O. and Besser, S. and Ceccarelli, A. and Zoppi, T. and Vasenev, A. and Montoya Morales, A.L. and Clarke, T. and Chappell, K. (2016) Towards a Collaborative Framework to Improve Urban Grid Resilience. In: Proceedings of the IEEE International Energy Conference, ENERGYCON 2016, 4-8 Apr 2016, Leuven, Belgium. pp. 1-6. IEEE. ISBN 978-1-4673-8464-3
Kammüller, F. and Probst, C.W. (2016) Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal. ISSN 1932-8184 *** ISI Impact 2,114 ***
van de Kamp, T.R. and Peter, A. and Everts, M.H. and Jonker, W. (2016) Private Sharing of IOCs and Sightings. In: 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016. pp. 35-38. ACM. ISBN 978-1-4503-4565-1
Kegel, R.H.P. and Wieringa, R.J. (2016) Measuring Computer Literacy Without Questionnaires. In: Fourth International Workshop on Behavior Change Support Systems (BCSS 2016), 05 Apr 2016, Salzburg, Austria. pp. 61-65. CEUR Workshop Proceedings 1573. CEUR-WS.org. ISSN 1613-0073
Knapik, P. (2016) Automotive Security Functions; The Use of New Technologies to Tackle Vehicle-Related Crime. PhD thesis, Univ. of Twente. ISBN 978-90-365-4010-0
Koukoulis, Y. (2016) Dual Laser Fault Injection Attack. Master's thesis, Univ. of Twente.
Le, Anhtuan and Chen, Yue and Chai, Kok Keong and Vasenev, A. and Montoya Morales, A.L. (2016) Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into FAIR using Bayesian network approach. In: 1st EAI International Conference on Smart Grid Inspired Future, 19-20 May 2016, Liverpool, United Kingdom. pp. 43-51. Springer Verlag. ISBN 978-3-319-47729-9
Montoya Morales, A.L. and Junger, M. and Ongena, Y.P. (2016) The Relation Between Residential Property and its Surroundings and Day- and Night-Time Residential Burglary. Environment and behavior, 48 (4). pp. 515-549. ISSN 0013-9165 *** ISI Impact 2,892 ***
Noort, W. (2016) Gathering Intelligence from the Bitcoin Peer-to-Peer network. Master's thesis, University of Twente.
Pieters, W. and Hadžiosmanović, D. and Dechesne, F. (2016) Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics, 22 (3). pp. 831-850. ISSN 1353-3452 *** ISI Impact 1,454 ***
Vasenev, A. and Hartmann, T. and Miller, S.R. and Dorée, A.G. (2016) Visualization environment for reviewing and experimenting with compaction equipment trajectories in context. Advanced engineering informatics, 30 (2). pp. 95-108. ISSN 1474-0346 *** ISI Impact 2,000 ***
Vasenev, A. and Montoya Morales, A.L. (2016) Analysing non-malicious threats to urban smart grids by interrelating threats and threat taxonomies. In: 2016 IEEE International Smart Cities Conference (ISC2), 12-15 Sept 2016, Trento, Italy. pp. 1-4. IEEE. ISBN 978-1-5090-1847-5
Vasenev, A. and Montoya Morales, A.L. and Ceccarelli, A. (2016) A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events. In: 11th International Conference on Availability, Reliability and Security, ARES 2016, 31 Aug - 02 Sept 2016, Salzburg, Austria. pp. 223-228. IEEE. ISBN 978-1-5090-0990-9
Vasenev, A. and Montoya Morales, A.L. and Ceccarelli, A. and Le, A. and Ionita, D. (2016) Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids. In: 1st EAI International Conference on Smart Grid Inspired Future, 19-20 May 2016, Liverpool, United Kingdom. pp. 184-192. Springer Verlag. ISBN 978-3-319-47729-9
de Vries, S.H.S. (2016) Achieving 128-bit Security Against Quantum Computer Attacks in Open VPN. Master's thesis, University of Twente.
Yüksel, Ö. and den Hartog, J.I. and Etalle, S. (2016) Reading between the fields: practical, effective intrusion detection for industrial control systems. In: SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing, April 4-8, 2016, Pisa, Italy. pp. 2063-2070. ACM. ISBN 978-1-4503-3739-7

2015

Alì, G. and Bilotta, E. and Gabriele, L. and Pantano, P. and Sepulveda, J. and Servidio, R. and Vasenev, A. (2015) eLearning in industrial mathematics with applications to nanoelectronics. In: Coupled multiscale simulation and optimization in nanoelectronics. The European Consortium for Mathematics in Industry 21. Springer Verlag, Berlin, pp. 503-559. ISBN 978-3-662-46671-1
Aslanyan, Z. and Ivanova, M.G. and Nielson, F. and Probst, C.W. (2015) Modeling and Analysing Socio-Technical Systems. In: 1st International Workshop on Socio-Technical Perspective in IS development (STPIS), 9 Jun 2015, Stockholm, Sweden. pp. 121-124. CEUR Workshop Proceedings 1374. CEUR. ISSN 1613-0073
Bakondi, B.G. and Peter, A. and Everts, M.H. and Hartel, P.H. and Jonker, W. (2015) Publicly Verifiable Private Aggregation of Time-Series Data. In: 10th International Conference on Availability, Reliability and Security, ARES 2015, 24-27 Aug 2015, Toulouse, France. pp. 50-59. IEEE. ISBN 978-1-4673-6590-1
Bösch, C.T. (2015) Cryptographically Enforced Search Pattern Hiding. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 14-340 ISBN 978-90-365-3817-6
Belov, A. and Vasenev, A. and Havinga, P.J.M. and Meratnia, N. and van der Zwaag, B.J. (2015) Reducing user discomfort in direct load control of domestic water heaters. In: Proceedings of the IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA 2015), 3-6 Nov 2015, Bangkok, Thailand. pp. 1-6. IEEE Computer Society. ISBN 978-1-5090-1237-4
Bilgin, B. (2015) Threshold Implementations, As Countermeasure Against Higher-Order Differential Power Analysis (Cum Laude). PhD thesis, Univ. of Twente. CTIT Ph.D. thesis series No. 14-337 ISBN 978-90-365-3891-6
Bilgin, B. and Nikova, S.I. and Nikov, V. and Rijmen, V. and Tokareva, N. and Vitkup, V. (2015) Threshold implementations of Small S-boxes. Cryptography and Communications, 7 (1). pp. 3-33. ISSN 1936-2447 *** ISI Impact 0,742 ***
Bortolameotti, R. and Peter, A. and Everts, M.H. and Bolzoni, D. (2015) Indicators of Malicious SSL Connections. In: 9th International Conference on Network and System Security, NSS 2015, 3-5 Nov 2015, New York, USA. pp. 162-175. Lecture Notes in Computer Science 9408. Springer Verlag. ISBN 978-3-319-25645-0
Bullee, J.H. and Montoya Morales, A.L. and Pieters, W. and Junger, M. and Hartel, P.H. (2015) The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of Experimental Criminology, 11 (1). pp. 97-115. ISSN 1573-3750 *** ISI Impact 2,229 ***
Bullee, J.H. and Montoya Morales, A.L. and Pieters, W. and Junger, M. and Hartel, P.H. (2015) Regression Nodes: Extending attack trees with data from social sciences. In: Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015), 13 Jul 2015, Verona, Italy. pp. 17-23. IEEE Computer Society. ISBN 978-1-5090-0178-1
Carvajal Gallardo, I. (2015) Privacy-Preserving Social DNA-Based Recommender. Master's thesis, Univ. of Twente.
Caselli, M. and Zambon, Emmanuele and Kargl, F. (2015) Sequence-aware intrusion detection in industrial control systems. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 14-17 April 2015, Singapore. pp. 13-24. CPSS Workshop - AsiaCCS'15. ACM. ISBN 978-1-4503-3448-8
Caselli, M. and Zambon, Emmanuele and Petit, J.Y. and Kargl, F. (2015) Modeling message sequences for intrusion detection in industrial control systems. In: Proceedings of the Ninth IFIP 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2015, 16-18 March 2015, Arlington, Virginia, US. pp. 49-71. Critical Infrastructure Protection IX. Springer Verlag. ISSN 1868-4238 ISBN 978-3-319-26566-7
van Cleeff, A. (2015) Physical and Digital Security Mechanisms: Properties, Combinations and Trade-offs. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 15-360 ISBN 978-90-365-3884-8
Dietzel, S. (2015) Resilient In-Network Aggregation for Vehicular Networks. PhD thesis, Univ. of Twente. CTIT Ph.D. thesis series No. 14-336 ISBN 978-90-365-3852-7
Dietzel, S. and Peter, A. and Kargl, F. (2015) Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks. In: IEEE 81st Vehicular Technology Conference, VTC Spring 2015, 11-14 May 2015, Glasgow, UK. pp. 1-5. IEEE. ISBN 978-1-4799-8088-8
Gollmann, D. and Herley, C. and Koenig, V. and Pieters, W. and Sasse, M. A. (2015) Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports, 4 (12). pp. 1-28. ISSN 2192-5283
Herley, C. and Pieters, W. (2015) “If you were attacked, you’d be sorry”: Counterfactuals as security arguments. In: New Security Paradigm Workshop (NSPW), 8-11 Sept 2015, Twente, Netherlands. pp. 112-123. ACM. ISBN 978-1-4503-3754-0
Ionita, D. and Wieringa, R.J. and Bullee, J.H. and Vasenev, A. (2015) Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group. In: 34th International Conference on Conceptual Modeling, ER 2015, 19-22 Oct 2015, Stockholm, Sweden. pp. 558-565. Lecture Notes in Computer Science 9381. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-25263-6
Ionita, D. and Wieringa, R.J. and Wolos, L. and Gordijn, J. and Pieters, W. (2015) Using Value Models for Business Risk Analysis in e-Service Networks. In: 8th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modelling, PoEM 2015, 10-12 Nov 2015, Valencia, Spain. pp. 239-253. Lecture Notes in Business Information Processing 235. Springer Verlag. ISSN 1865-1348 ISBN 978-3-319-25896-6
Karampatzakis, E. (2015) Evaluation of the robustness of payment terminals with the use of fuzzing. Master's thesis, Univ. of Twente.
Kegel, R.H.P. (2015) The Personal Information Security Assistant. In: 2015 IEEE 23rd International Requirements Engineering Conference (RE) , 24-28 Aug 2015, Ottawa, Canada. pp. 393-397. IEEE . ISSN 1090-705X ISBN 978-146736905-3
Kegel, R.H.P. and Wieringa, R.J. (2015) Behavior Change Support Systems for Privacy and Security. In: Proceedings of the Third International Workshop on Behavior Change Support Systems, 03 Jun 2015, Chicago, IL, United States. pp. 51-55. CEUR Workshop Proceedings Vol-1369. CEUR.org. ISSN 1613-0073
Kleber, S. and van der Heijden, R.W. and Kopp, H. and Kargl, F. (2015) Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions. In: 2015 International Conference and Workshops on Networked Systems (NetSys), March 9-12 2015, Cottbus, Germany. pp. 1-8. IEEE Computer Society. ISBN 978-1-4799-5804-7
Kumar, A. (2015) Security Analysis of Mobile Payment Systems. Master's thesis, Univ. of Twente.
Müller, M.C. (2015) SIDekICk: SuspIcious DomaIn Classification in the .nl zone. Master's thesis, Univ. of Twente.
Mian, U.S. and den Hartog, J.I. and Etalle, S. and Zannone, N. (2015) Auditing with incomplete logs. In: Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015, 18 Apr 2015, London, UK. pp. 1-23. Technische Universiteit Eindhoven. ISBN not assigned
Montoya Morales, A.L. (2015) Modelling urban crime through workforce size: a test of the activity support concept. Environment and Planning B: Planning and Design, 42 (3). pp. 399-414. ISSN 0265-8135 *** ISI Impact 1,195 ***
Petit, J.Y. and Schaub, F. and Feiri, M.P. and Kargl, F. (2015) Pseudonym schemes in vehicular networks: a survey. IEEE communications surveys & tutorials, 17 (1). pp. 228-255. ISSN 1553-877X *** ISI Impact 9,220 ***
Pieters, W. and Davarynejad, M. (2015) Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. In: 9th International Workshop on Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (DPM), 10-11 Sep 2014, Wroclaw, Poland. pp. 201-215. Lecture Notes in Computer Science 8872 . Springer. ISSN 0302-9743 ISBN 978-3-319-17015-2
Pieters, W. and Padget, J. and Dechesne, F. and Dignum, V. and Aldewereld, H. (2015) Effectiveness of qualitative and quantitative security obligations. Journal of Information Security and Applications, 22. pp. 3-16. ISSN 2214-2126
Scrinzi, F. (2015) Behavioral Analysis of obfuscated Code. Master's thesis, Univ. of Twente.
Tan, Zhiyuan and Jamdagni, Aruna and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping and Hu, Jiankun (2015) Detection of denial-of-service attacks based on computer vision techniques. IEEE transactions on computers, 64 (9). pp. 2519-2533. ISSN 0018-9340 *** ISI Impact 1,723 ***
Vriezekolk, E. and Etalle, S. and Wieringa, R.J. (2015) Experimental Validation of a Risk Assessment Method. In: 21st International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2015, 23-26 Mar 2015, Essen, Germany. pp. 1-16. Lecture Notes in Computer Science 9013. Springer. ISSN 0302-9743 ISBN 978-3-319-16100-6
Vriezekolk, E. and Etalle, S. and Wieringa, R.J. (2015) Validating the raster risk assessment method in practice. In: Proceedings of the ISCRAM 2015 Conference, 24-27 May 2015, Kristiansand, Norway. International Association for Information Systems for Crisis Response and Management (ISCRAM). ISSN 2411-3387 ISBN 978-82-7117-788-1

2014

Kordy, B. and Mauw, S. and Pieters, W., ed. (2014) Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014. EPTCS 148. EPTCS.ORG. ISSN 2075-2180
Abbasi, A. and Wetzel, J. (2014) APTs way: Evading Your EBNIDS. In: Black Hat Europe, 16-19 Oct 2014, Amsterdam, The Netherlands. pp. 1-87. Black Hat. ISBN not assigned
Abbasi, A. and Wetzel, J. and Bokslag, W. and Zambon, Emmanuele and Etalle, S. (2014) On Emulation-Based Network Intrusion Detection Systems. In: Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 17-19 September 2014, Gothenburg, Sweden. pp. 384-404. Lecture Notes in Computer Science 8688. Springer. ISSN 0302-9743 ISBN 978-3-319-11379-1
Ambusaidi, Mohammed A. and He, Xiangjian and Tan, Zhiyuan and Nanda, Priyadarsi and Lu, Liang Fu and Nagar, Upasana T. (2014) A novel feature selection approach for intrusion detection data classification. In: Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 Sep 2014, Beijing, China. 246. IEEE Computer Society.
Ambusaidi, Mohammed A. and Tan, Zhiyuan and He, Xiangjian and Nanda, Priyadarsi and Lu, Liang Fu and Jamdagni, Aruna (2014) Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8 (2/3). pp. 77-86. ISSN 1743-8217
Amrin, N. (2014) The Impact of Cyber Security on SMEs. Master's thesis, Univ. of Twente.
Andreeva, E. and Bilgin, B. and Bogdanov, A. and Luykx, A. and Mennink, B. and Mouha, N. and Yasuda, K. (2014) APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. In: 21st International Workshop on Fast Software Encryption (FSE), 3-5 March 2014, London, UK. pp. 168-186. LNCS 8540. Springer Verlag. ISBN 978-3-662-46706-0
Armknecht, F. and Gagliardoni, T. and Katzenbeisser, S. and Peter, A. (2014) General Impossibility of Group Homomorphic Encryption in the Quantum World. In: 17th International Conference on Practice and Theory in Public-Key Cryptography. PKC 2014, 26-28 Mar 2014, Buenos Aires, Argentina. pp. 556-573. Lecture Notes in Computer Science 8383. Springer Verlag. ISBN 978-3-642-54630-3
Badarinath Hampiholi, B. (2014) Secure and privacy-preserving national eID systems with Attribute-based credential technologies. Master's thesis, Univ. of Twente.
Bösch, C.T. and Hartel, P.H. and Jonker, W. and Peter, A. (2014) A Survey of Provably Secure Searchable Encryption. ACM computing surveys, 47 (2). 18:1-18:51. ISSN 0360-0300 *** ISI Impact 5,243 ***
Bösch, C.T. and Peter, A. and Hartel, P.H. and Jonker, W. (2014) SOFIR: Securely Outsourced Forensic Image Recognition. In: 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, May 4-9, 2014, Florence, Italy. pp. 2694-2698. IEEE. ISBN 978-1-4799-2893-4
Bösch, C.T. and Peter, A. and Leenders, B. and Lim, Hoon Wei and Tang, Qiang and Wang, Huaxiong and Hartel, P.H. and Jonker, W. (2014) Distributed Searchable Symmetric Encryption. In: Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014, 23-24 July 2014, Toronto, Canada. pp. 330-337. IEEE. ISBN 978-1-4799-3502-4
Biedermann, S. and Karvelas, N. and Katzenbeisser, S. and Strufe, T. and Peter, A. (2014) ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. In: Proceedings of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014), 26-29 Jan 2014, Nový Smokovec, Slovakia. pp. 114-125. Lecture Notes in Computer Science 8327. Springer Verlag. ISBN 978-3-319-04297-8
Bilgin, B. and Gierlichs, B. and Nikov, V. and Nikova, S.I. and Rijmen, V. (2014) Higher-Order Threshold Implementation. In: Proceedings of Advances in Cryptology (ASIACRYPT), 07-11 Dec 2014, Kaohsiung, Taiwan (R.O.C.). pp. 326-343. Lecture Notes in Computer Science (8874). Springer Verlag. ISSN 0302-9743 ISBN 978-3-662-45607-1
Bilgin, B. and Gierlichs, B. and Nikova, S.I. and Nikov, V. and Rijmen, V. (2014) A More Efficient AES Threshold Implementation. In: Proceedings of 7th International Conference on Cryptology in Africa (AfricaCrypt), 28-30 May 2014, Marrakesh, Morocco. pp. 267-284. Lecture Notes in Computer Science 8469. Springer. ISBN 978-3-319-06733-9
Bortolameotti, R. (2014) C&C Botnet detection over SSL. Master's thesis, Univ. of Twente.
Broekhuis, D. (2014) Sousveillance on Intelligent Transportations Systems. Master's thesis, University of Twente.
Broenink, R. (2014) Finding Relations Between Botnet C&Cs for Forensic Purposes. Master's thesis, Univ. of Twente.
Buchenscheit, A. and Könings, B. and Neubert, A. and Schaub, F. and Schneider, M. and Kargl, F. (2014) Privacy implications of presence sharing in mobile messaging applications. In: Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia (IEEE MUM 2014), 25-28 Sept 2014, Melbourne, Victoria, Australia. pp. 20-29. ACM. ISBN 978-1-4503-3304-7
Caselli, M. and Kargl, F. (2014) A Security Assessment Methodology for Critical Infrastructures. In: Critical Information Infrastructures Security: Ninth International Conference, CRITIS 2014, 13-15 Oct 2014, Limassol, Cyprus. pp. 332-343. Critical Information Infrastructures Security. Springer Verlag. ISBN 978-3-319-31663-5
Chomsiri, Thawatchai and He, Xiangjian and Nanda, Priyadarsi and Tan, Zhiyuan (2014) A stateful mechanism for the tree-rule firewall. In: Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 Sep 2014, Beijing, China. 256. IEEE Computer Society.
Constante, E. and den Hartog, J.I. and Petkovic, M. and Etalle, S. and Pechenizkiy, M. (2014) Hunting the Unknown. In: 28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec), July 14-16, 2014, Vienna, Austria. pp. 243-259. Lecture Notes in Computer Science 8566. Springer. ISBN 978-3-662-43936-4
Corradin, M.C. (2014) Then and Now: On The Maturity of Cybercrime Markets. Master's thesis, University of Twente.
Dacer, M.C. and Kargl, F. and König, H. and Valdes, A. (2014) Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292). Dagstuhl Reports, 4 (7). pp. 62-79. ISSN 2192-5283
Dacier, M.C and Kargl, F. and van der Heijden, R. and König, H. and Valdes, A. (2014) Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures. Informatik Spektrum, 37 (6). pp. 605-607. ISSN 0170-6012
Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield. Master's thesis, University of Twente.
Dechesne, F. and Hadžiosmanović, D. and Pieters, W. (2014) Experimenting with Incentives: Security in Pilots for Future Grids. IEEE Security & Privacy, 12 (6). pp. 59-66. ISSN 1540-7993 *** ISI Impact 0,902 ***
Dietzel, S. and Gürtler, J.Y. and van der Heijden, R. and Kargl, F. (2014) Redundancy-based Statistical Analysis for Insider Attack Detection in VANET Aggregation Schemes. In: Proceedings of the IEEE Vehicular Networking Conference 2014 (VNC 2014), 3-5 Dec 2014, Paderborn, Germany. pp. 135-142. IEEE. ISBN 978-1-4799-7660-7
Dietzel, S. and van der Heijden, R. and Decke, H and Kargl, F. (2014) A flexible, subjective logic-based framework for misbehavior detection in V2V networks. In: IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2014, 16-19 Jun 2014, Sydney, Australia. pp. 513-516. IEEE. ISBN 978-1-4799-4785-0
Dietzel, S. and Petit, J.Y. and Kargl, F. and Scheuermann, B. (2014) In-Network Aggregation for Vehicular Ad Hoc Networks. IEEE communications surveys & tutorials, 16 (4). pp. 1909-1932. ISSN 1553-877X *** ISI Impact 9,220 ***
Dutta, A. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2014) A Bayesian model for predicting face recognition performance using image quality. In: 2014 IEEE International Joint Conference on Biometrics (IJCB), 29 Sep - 02 Oct 2014, Clearwater, FL, USA. pp. 1-8. IEEE. ISBN 978-1-4799-3584-0
Förster, D. and Kargl, F. and Löhr, H. (2014) PUCA: A Pseudonym Scheme with User-Controlled Anonymity for Vehicular Ad-Hoc Networks (VANET). In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2014), 3-5 Dec 2014, Paderborn, Germany. pp. 25-32. IEEE. ISBN 978-1-4799-7660-7
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2014) Real world privacy expectations in VANETs real world privacy expectations in VANETs. In: Proceedings of the 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014), 20-21 Feb 2014, Luxembourg City, Luxembourg. pp. 30-32. Vehicular Lab, University of Luxembourg. ISBN 978-2-87971-124-9
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2014) An evaluation framework for pre-distribution strategies of certificates in VANETs. In: Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014), 20-21 February 2014, Luxembourg City, Luxembourg. pp. 22-23. Vehicular Lab, University of Luxemburg. ISBN 978-2-87971-124-9
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2014) Formal Model of Certificate Omission Schemes in VANET. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2014), 3-5 Dec 2014, Paderborn, Germany. pp. 41-44. IEEE. ISBN 978-1-4799-7660-7
van Galen, R. (2014) Design and feasibility of mobile peer-to-peer payment systems. Master's thesis, University of Twente.
Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Tang, Shao-Hua and Zhu, Bo (2014) TuLP:A family of lightweight message authentication codes for body sensor networks. Journal of Computer Science and Technology, 29 (1). pp. 53-68. ISSN 1000-9000 *** ISI Impact 0,475 ***
Hadžiosmanović, D. (2014) The process matters: cyber security in industrial control systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 13-282 ISBN 978-90-365-3604-2
Hadžiosmanović, D. and Sommer, R. and Zambon, Emmanuele and Hartel, P.H. (2014) Through the eye of the PLC: semantic security monitoring for industrial processes. In: ACSAC'14 Proceedings of the 30th Annual Computer Security Applications Conference, 8-12 Dec 2014, New Orleans, LA, USA. pp. 126-135. ACM. ISBN 978-1-4503-3005-3
He, Xiangjian and Chomsiri, Thawatchai and Nanda , Priyadarsi and Tan, Zhiyuan (2014) Improving cloud network security using tree-rule firewall. Future Generation Computer Systems, 30. pp. 116-126. ISSN 0167-739X *** ISI Impact 2,430 ***
van der Heijden, R.W. and Kargl, F. (2014) Open issues in differentiating misbehavior and anomalies for VANETs. In: Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014), 20-21 Feb 2014, Luxembourg City, Luxembourg. pp. 24-26. Vehicular Lab, University of Luxembourg. ISBN 978-2-87971-124-9
Ionita, D. (2014) Context-sensitive Information security Risk identification and evaluation techniques. In: 22nd IEEE International Requirements Engineering Conference (RE14), 25-29 Aug. 2014, Karlskrona, Sweden. pp. 485-488. IEEE Computer Society. ISBN 978-1-4799-3033-3
Ionita, D. and Bullee, J.H. and Wieringa, R.J. (2014) Argumentation-Based Security Requirements Elicitation: The Next Round. In: Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 25 August 2014, Karlskrona, Sweden. pp. 7-12. IEEE Computer Society. ISBN 978-1-4799-6340-9
Jan, Mian Ahmad and Nanda, Priyadarsi and He, Xiangjian and Tan, Zhiyuan and Liu, Ren Ping (2014) A robust authentication scheme for observing resources in the internet of things environment. In: Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 Sep 2014, Beijing, China. 370. IEEE Computer Society.
Jeckmans, A.J.P. (2014) Cryptographically-Enhanced Privacy for Recommender Systems. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 13-290 ISBN 978-90-365-3593-9
Kargl, F. and van der Heijden, R. and König, H. and Valdes, A. and Dacier, M.C. (2014) Insights on the Security and Dependability of Industrial Control Systems. IEEE Security and Privacy Magazine, 12 (6). pp. 75-78. ISSN 1540-7993 *** ISI Impact 0,902 ***
Kegel, R.H.P. and Wieringa, R.J. (2014) Persuasive technologies: a systematic literature review and application to PISA. Technical Report TR-CTIT-14-07, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Knapik, P. and Petit, J.Y. and Kargl, F. and Schoch, E. (2014) Cooperative home light: assessment of a security function for the automotive field. International Journal on Advances in Security, 7 (1&2). pp. 1-14. ISSN 1942-2636
Lastdrager, E.E.H. (2014) Achieving a Consensual Definition of Phishing Based on a Systematic Review of the Literature. Crime Science, 3. 9:1-9:16. ISSN 2193-7680
Li, Wenjuan and Meng, Weizhi and Tan, Zhiyuan and Xiang, Yang (2014) Towards designing an email classification system using multi-view based semi-supervised learning. In: Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 Sep 2014, Beijing, China. 266. IEEE Computer Society.
Makri, E. and Everts, M.H. and de Hoogh, S. and Peter, A. and op den Akker, H. and Hartel, P.H. and Jonker, W. (2014) Privacy-Preserving Verification of Clinical Research. In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19-21 Mar 2014, Wien, Österreich. pp. 481-500. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V.. ISBN 978-3-88579-622-0
Petit, J.Y. and Feiri, M.P. and Kargl, F. (2014) Revisiting attacker model for smart vehicles. In: IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014), 14-15 Sept 2014, Vancouver, Canada. pp. 1-5. IEEE. ISBN 978-1-4799-4452-1
Pieters, W. and Hadžiosmanović, D. and Dechesne, F. (2014) Cyber Security as Social Experiment. In: NSPW '14 Proceedings of the 2014 workshop on New Security Paradigms, NSPW 2014, 15-18 Sep. 2014, Victoria, BC, Canada. pp. 15-24. ACM. ISBN 978-1-4503-3062-6
Pieters, W. and Lukszo, Z. and Hadžiosmanović, D. and van den Berg, Jan (2014) Reconciling Malicious and Accidental Risk in Cyber Security. Journal of Internet Services and Information Security, 4 (2). pp. 4-26. ISSN 2182-2069
Pieters, W. and Probst, C.W. and Lukszo, S. and Montoya Morales, A.L. (2014) Cost-effectiveness of Security Measures: A model-based Framework. In: Approaches and Processes for Managing the Economics of Information Systems. IGI Global, Hershey, PA, pp. 139-156. ISBN 978-1-4666-4983-5
Stottelaar, B. and Senden, J. and Montoya Morales, A.L. (2014) Online social sports networks as crime facilitators. Crime Science, 3 (8). pp. 1-20. ISSN 2193-7680
Tan, Zhiyuan and Jamdagni, Aruna and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping (2014) A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Transactions on Parallel and Distributed Systems, 25 (2). pp. 447-456. ISSN 1045-9219 *** ISI Impact 2,661 ***
Tan, Zhiyuan and Nagar, Upasana T. and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping and Wang, Song and Hu, Jiankun (2014) Enhancing big data security with collaborative intrusion detection. IEEE Cloud Computing, 1 (3). pp. 27-33. ISSN 2325-6095
Trivellato, D. and Zannone, N. and Etalle, S. (2014) GEM: A distributed goal evaluation algorithm for trust management. Theory and Practice of Logic Programming, 14 (3). pp. 293-337. ISSN 1471-0684 *** ISI Impact 0,952 ***
Verbij, R.P. (2014) Dutch e-voting opportunities. Risk assessment framework based on attacker resources. Master's thesis, Univ. of Twente.
Vriezekolk, E. (2014) Testing reliability of raster - report of experiment with Kerckhoffs students. Technical Report TR-CTIT-14-05, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625

2013

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013) Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, Codes and Cryptography, 67 (2). pp. 209-232. ISSN 0925-1022 *** ISI Impact 0,781 ***
Arnold, F. and Pieters, W. and Stoelinga, M.I.A. (2013) Quantitative penetration testing with item response theory (extended version). Technical Report TR-CTIT-13-20, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Blakey, E. and Coecke, B. and Mislove, M. and Pavlovic, D. (2013) Information security as a resource. Information and computation, 226. pp. 1-2. ISSN 0890-5401 *** ISI Impact 0,873 ***
Bleikertz, S. and Mastelic, T. and Pape, S. and Pieters, W. and Dimkov, T. (2013) Defining the cloud battlefield - supporting security assessments by cloud customers. In: International Conference on Cloud Engineering (IC2E 2013), 25-27 Mar 2013 , Redwood City, CA . pp. 78-87. IEEE Computer Society. ISBN 978-1-4673-6473-7
Caselli, M. and Hadžiosmanović, D. and Zambon, Emmanuele and Kargl, F. (2013) On the feasibility of device fingerprinting in industrial control systems. In: Critical Information Infrastructures Security, 16-18 Sept 2013, Amsterdam. pp. 155-166. Lecture Notes in Computer Science (8328). Springer. ISSN 0302-9743 ISBN 978-3-319-03963-3
Dacier, M. and Kargl, F. and Valdes, A. (2013) Securing critical infrastructures from targeted attacks (Dagstuhl Seminar 12502). Dagstuhl Reports, 2 (12). pp. 49-63. ISSN 2192-5283
Dietzel, S. and Balanici, M. and Kargl, F. (2013) Short Paper: Towards Data-similarity-based Clustering for Inter-vehicle Communication. In: Proceedings of the IEEE Vehicular Networking Conference 2013 (VNC 2013), 16-18 Dec 2013, Boston, MA, USA. pp. 238-241. IEEE Communications Society. ISBN 978-1-4799-2687-9
Dietzel, S. and Petit, J.Y. and Heijenk, G.J. and Kargl, F. (2013) Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols. IEEE Transactions on Vehicular Technology, 62 (4). pp. 1505-1518. ISSN 0018-9545 *** ISI Impact 2,243 ***
Etalle, S. (2013) Innovatie en R&D -- een Inleiding. Magazine nationale veiligheid en crisisbeheersing, 11 (1). pp. 3-5. ISSN 1875-7561
Etalle, S. and Hinrichs, T. and Lee, A. and Trivellato, D. and Zannone, N. (2013) Policy administration in tag-based authorization. In: 5th International Symposium on Foundations and Practice of Security, FPS 2012, 25-26 Oct 2012, Montreal, QC, Canada. pp. 162-179. Lecture Notes in Computer Science 7743. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-37119-6
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2013) Efficient and secure storage of private keys for pseudonymous vehicular communication. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), 04 Nov 2013, Berlin, Germany. pp. 9-18. ACM. ISBN 978-1-4503-2487-8
Feiri, M.P. and Petit, J.Y. and Schmidt, R. and Kargl, F. (2013) The impact of security on cooperative awareness in VANET. In: Fifth IEEE Vehicular Networking Conference, VNC 2013. pp. 127-134. IEEE Communications Society. ISBN 978-1-4799-2687-9
Gozalvez, J. and Haerri, J. and Hartenstein, H. and Heijenk, G.J. and Kargl, F. and Petit, J.Y. and Scheuermann, B. and Tieler, T. (2013) Fundamentals: IVC and Computer Science. In: Inter-Vehicular Communication - Quo Vadis (Dagstuhl Seminar 13392), 22 - 25 Sep 2013, Dagstuhl, Germany. pp. 205-206. Dagstuhl Reports 3 (9). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik. ISSN 2192-5283
Hartel, P.H. (2013) Situative Prävention von Cybercrime: ein chancenreicher Bekämpfungsansatz. In: Cybercrime - Bedrohung, Intervention, Abwehr, 12-13 Nov 2013, Wiesbaden, Germany. pp. 96-108. Bundeskriminalamt. ISBN not assigned
Hartel, P.H. and van den Berg, Jan and Junger, M. (2013) Wat gaan we doen tegen de cyberaanvallen? Informatiebeveiliging, 4 (4). pp. 10-11. ISSN 1569-1063
Hartel, P.H. and Luiijf, E. (2013) Critical information infrastructures security - preface. In: 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, 16-18 Sep 2013, Amsterdam. v-vi. Lecture Notes in Computer Science 8328. Springer. ISBN 978-3-319-03963-3
van der Heijden, R. and Dietzel, S. and Kargl, F. (2013) SeDyA: secure dynamic aggregation in VANETs. In: WiSec '13 Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 17-19 April 2013, Budapest, Hungary. pp. 131-142. ACM. ISBN 978-1-4503-1998-0
van der Heijden, R. and Dietzel, S. and Kargl, F. (2013) Misbehavior detection in vehicular ad-hoc networks. In: Proceedings of 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2013), 21-22 Feb 2013, Innsbruck, Austria. University of Innsbruck. ISBN not assigned
Hoefer, C. and Petit, J.Y. and Schmidt, R. and Kargl, F. (2013) POPCORN: privacy-preserving charging for eMobility. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), 04 Nov 2013, Berlin, Germany. pp. 37-48. ACM. ISBN 978-1-4503-2487-8
Hoefer, C. and Petit, J.Y. and Schmidt, R. and Kargl, F. (2013) POPCORN: Privacy-preserving Charging for e-Mobility. In: 29. VDI/VW-Gemeinschaftstagung Automotive Security, 25-26 Sep 2013, Kassel, Germany. pp. 33-46. VDI. ISBN not assigned
Ionita, D. and Hartel, P.H. and Pieters, W. and Wieringa, R.J. (2013) Current established risk assessment methodologies and tools. Technical Report TR-CTIT-14-04, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Jamdagni, Aruna and Tan, Zhiyuan and Nanda, Priyadarsi and He, Xiangjian and Liu, Ren Ping (2013) RePIDS: a multi tier real-time payload-based intrusion detection system. Computer networks, 57 (3). pp. 811-824. ISSN 1389-1286 *** ISI Impact 1,446 ***
Jansen, J. and Junger, M. and Montoya Morales, A.L. and Hartel, P.H. (2013) Offenders in a digitized society. In: Cybercrime and the police. Safety & Security Studies. Eleven International Publishing, The Hague, The Netherlands, pp. 45-59. ISBN 978-94-6236-069-3
Jeckmans, A.J.P. and Beye, M.R.T. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2013) Privacy in Recommender Systems. In: Social Media Retrieval. Computer Communications and Networks. Springer Verlag, London, pp. 263-281. ISSN 1617-7975 ISBN 978-1-4471-4554-7
Jeckmans, A.J.P. and Peter, A. and Hartel, P.H. (2013) Efficient privacy-enhanced familiarity-based recommender system. In: Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013, 9-13 Sep 2013, Egham, UK. pp. 400-417. Lecture Notes in Computer Science 8134. Springer. ISBN 978-3-642-40203-6
Junger, M. and Montoya Morales, A.L. and Hartel, P.H. and Karemaker, M. (2013) Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit. Technical Report TR-CTIT-13-07, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Kargl, F. (2013) Softwarepech op de weg. Computer Idee, 2013 (6). pp. 18-21. ISSN 1388-2376
Kargl, F. and Friedman, A. and Boreli, R. (2013) Differential privacy in intelligent transportation systems. In: WiSec '13 Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 17-19 April 2013, Budapest, Hungary. pp. 107-112. ACM. ISBN 978-1-4503-1998-0
Knapik, P. and Schoch, E. and Kargl, F. (2013) Electronic decal: a security function based on V2X communication. In: 77th IEEE Vehicular Technology Conference (VTC 2013-Spring), 02-05 Jun 2013, Dresden, Germany. pp. 1-5. IEEE Vehicular Technology Society. ISSN 1550-2252
Knapik, P. and Schoch, E. and Kargl, F. (2013) Simulation of a Security Function Based on Vehicle-to-X Communication and Automotive Lighting. In: The Second International Conference on Advances in Vehicular Systems, Technologies and Applications (Vehicular 2013), 21-26 Jul 2013, Nice, France. pp. 8-11. IARIA. ISSN 2327-2058 ISBN 978-1-61208-288-2
Knapik, P. and Schoch, E. and Kargl, F. (2013) Security-Funktionen zur Bekämpfung fahrzeugbezogener Kriminalität. In: 29. VDI/VW-Gemeinschaftstagung Automotive Security, 24-25 Sep 2013, Kassel, Germany. pp. 47-62. VDI. ISBN not assigned
Lastdrager, E.E.H. and Montoya Morales, A.L. and Hartel, P.H. and Junger, M. (2013) Applying the Lost-Letter Technique to Assess IT Risk Behaviour. In: Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust, 29 Jun 2013, New Orleans, USA. pp. 2-9. IEEE Computer Society. ISBN 978-0-7695-5065-7
Lefevre, S. and Petit, J.Y. and Bajcsy, R. and Laugier, C. and Kargl, F. (2013) Impact of V2X privacy strategies on Intersection Collision Avoidance systems. In: Fifth IEEE Vehicular Networking Conference, VNC 2013. pp. 71-78. IEEE Computer Society. ISBN 978-1-4799-2687-9
Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2013) How 'Digital' is Traditional Crime? In: European Intelligence and Security Informatics Conference, EISIC 2013, 12-14 Aug 2013, Uppsala, Sweden. pp. 31-37. IEEE Computer Society. ISBN 978-0-7695-5062-6
Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2013) Modus operandi study of information and communication technology (ICT) facilitated crime. In: NVC Congres, 13-14 June 2013, Leiden, The Netherlands. 93. Nederlandse Vereniging voor Criminologie. ISBN not assigned
Peter, A. and Hartman, T. and Muller, S. and Katzenbeisser, S. (2013) Privacy-preserving architecture for forensic image recognition. In: IEEE International Workshop on Information Forensics and Security, WIFS 2012, 2-5 Dec 2012, Tenerife, Spain. pp. 79-84. Information Forensics and Security (WIFS), 2012 IEEE International Workshop (13249609). IEEE Computer Society. ISBN 978-1-4673-2285-0
Peter, A. and Tews, E. and Katzenbeisser, S. (2013) Efficiently outsourcing multiparty computation under multiple keys. IEEE transactions on information forensics and security, 8 (12). pp. 2046-2058. ISSN 1556-6013 *** ISI Impact 2,441 ***
Pieters, W. (2013) On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology, 15 (3). pp. 195-208. ISSN 1388-1957 *** ISI Impact 0,739 ***
Pieters, W. (2013) Defining "The Weakest Link" Comparative Security in Complex Systems of Systems. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, CloudCom, 2-5 Dec 2013, Bristol, United Kingdom. pp. 39-44. IEEE Computer Society. ISBN 978-0-7695-5095-4
Pieters, W. and Dimkov, T. and Pavlovic, D. (2013) Security Policy Alignment: A Formal Approach. IEEE Systems Journal, 7 (2). pp. 275-287. ISSN 1932-8184 *** ISI Impact 2,114 ***
Pieters, W. and Padget, J. and Dechesne, F. and Dignum, V. and Aldewereld, H. (2013) Obligations to enforce prohibitions: on the adequacy of security policies. In: SIN '13 - Proceedings of the 6th International Conference on Security of Information and Networks, 26-28 Nov 2013, Aksaray, Turkey. pp. 54-61. Proceeding. ACM. ISBN 978-1-4503-2498-4
Rocha, B.P.S. and Conti, M. and Etalle, S. and Crispo, B. (2013) Hybrid static-runtime information flow and declassification enforcement. IEEE transactions on information forensics and security, 8 (8). pp. 1294-1305. ISSN 1556-6013 *** ISI Impact 2,441 ***
Schaub, F. and Hipp, M. and Kargl, F. and Weber, M. (2013) On Credibility Improvements for Automotive Navigation Systems. Journal of Personal and Ubiquitous Computing, 17 (5). pp. 803-813. ISSN 1617-4909 *** ISI Impact 1,498 ***
Stoelinga, M.I.A. and Pieters, W. (2013) Attack navigator vindt en verhelpt zwakke plekken. Bits en chips, 4. ISSN 1879-6443
Trivellato, D. and Etalle, S. and Luit, E. and Zannone, N. (2013) The POLIPO Security Framework. In: Situation Awareness with Systems of Systems. Springer Verlag, New York, pp. 189-208. ISBN 978-1-4614-6229-3
Trivellato, D. and Zannone, N. and Glaundrup, M. and Skowronek, J. and Etalle, S. (2013) A semantic security framework for systems of systems. International journal of cooperative information systems, 22 (1). pp. 1-35. ISSN 0218-8430 *** ISI Impact 0,526 ***

2012

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012) Shift-type homomorphic encryption and its application to fully homomorphic encryption. In: 5th International Conference on Cryptology in Africa, AFRICACRYPT 2012, 10-12 Jul 2012, Ifrane, Morocco. pp. 234-251. Lecture Notes in Computer Science 7374. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-31410-0
Bösch, C.T. and Brinkman, R. and Hartel, P.H. and Jonker, W. (2012) Method and System of Monitoring a Data Stream. Patent P31230NL00/HSE (Application).
Bösch, C.T. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2012) Selective Document Retrieval from Encrypted Database. In: 15th International Conference on Information Security (ISC), 19-21 Sep 2012, Passau, Germany. pp. 224-241. Lecture Notes in Computer Science 7483. Springer Verlag. ISBN 978-3-642-33383-5
Beye, M.R.T. and Jeckmans, A.J.P. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2012) Privacy in Online Social Networks. In: Computational Social Networks: Security and Privacy. Springer Verlag, London, pp. 87-113. ISBN 978-1-4471-4050-4
Bißmeyer, N. and Mauthofer, S. and Bayarou, K.M. and Kargl, F. (2012) Assessment of Node Trustworthiness in VANETs Using Data Plausibility Checks with Particle Filters. In: Proceedings of the IEEE Vehicular Networking Conference 2012 (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 78-85. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Bilgin, B. and Nikova, S.I. and Rijmen, V. and Nikov, V. and Stütz, G. (2012) Threshold Implementations of all 3×3 and 4×4 S-boxes. In: Cryptographic Hardware and Embedded Systems, CHES 2012, 9-12 Sep 2012, Leuven, Belgium. pp. 76-91. Lecture Notes in Computer Science 7428. Springer Berlin Heidelberg. ISBN 978-3-642-33026-1
Brusó, M. and Chatzikokolakis, K. and Etalle, S. and den Hartog, J.I. (2012) Linking unlinkability. In: 7th International Symposium on Trustworthy Global Computing (TGC 2012), 07-08 Sep 2012, Newcastle upon Tyne, UK. pp. 129-144. Lecture Notes in Computer Science 8191. Springer Verlag. ISBN 978-3-642-41156-4
Dietzel, S. and Kost, M. and Schaub, F. and Kargl, F. (2012) CANE: A Controlled Application Environment for Privacy Protection in ITS. In: Proceedings of the 12th International Conference on Intelligent Transport Systems Telecommunications (ITST 2012), 5-8 Nov 2012, Taipeh, Taiwan. pp. 71-76. IEEE Communications Society. ISBN 978-1-4673-3070-1
Dietzel, S. and Petit, J.Y. and Kargl, F. and Heijenk, G.J. (2012) Analyzing Dissemination Redundancy to Achieve Data Consistency in VANETs. In: Proceedings of the Ninth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2012), 25 June 2012, Low Wood Bay, UK. pp. 131-134. ACM. ISBN 978-1-4503-1317-9
Dressler, F. and Kargl, F. (2012) Security in Nano Communication: Challenges and Open Research Issues. In: Proceedings of the IEEE International Workshop on Molecular and Nanoscale Communications (MoNaCom 2012) at IEEE International Conference on Communications (ICC 2012), 11 Jun 2012, Ottawa, Canada. pp. 6183-6187. IEEE Communications Society. ISBN 978-1-4577-2052-9
Dressler, F. and Kargl, F. (2012) Towards security in nano-communication: Challenges and opportunities. Nano Communication Networks, 3 (3). pp. 151-160. ISSN 1878-7789
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2012) Congestion-based Certificate Omission in VANETs. In: Ninth ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2012, June 25, 2012, Low Wood Bay, Lake District, United Kingdom. pp. 135-138. ACM. ISBN 978-1-4503-1317-9
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2012) Evaluation of Congestion-based Certificate Omission in VANETs. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 101-108. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Hadžiosmanović, D. and Bolzoni, D. and Etalle, S. and Hartel, P.H. (2012) Challenges and opportunities in securing industrial control systems. In: Proceedings of the IEEE Workshop on Complexity in Engineering, COMPENG 2012, 11-13 June 2012, Aachen, Germany. pp. 1-6. IEEE. ISBN 978-1-4673-1614-9
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2012) A Log Mining Approach for Process Monitoring in SCADA. International Journal of Information Security, 11 (4). pp. 231-251. ISSN 1615-5262 *** ISI Impact 1,279 ***
Hadžiosmanović, D. and Simionato, L. and Bolzoni, D. and Zambon, Emmanuele and Etalle, S. (2012) N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols. In: Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012), 12-14 Sep 2012, Amsterdam, The Netherlands. pp. 354-373. Lecture Notes in Computer Science 7462. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-33337-8
Hartel, P.H. and Junger, M. (2012) Teaching Engineering students to "Think thief". Technical Report TR-CTIT-12-19, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Muller, H.L. (2012) Simple algebraic data types for C. Software: Practice and Experience, 42 (2). pp. 191-210. ISSN 0038-0644 *** ISI Impact 0,652 ***
Hartel, P.H. and Suryana, N. (2012) Information Security. In: Cyber Safety: An Introduction. Eleven International Publishers, The Hague, pp. 281-291. ISBN 978-94-90947-75-0
Herrmann, A. and Morali, A. and Etalle, S. and Wieringa, R.J. (2012) Risk and Business Goal Based Security Requirement and Countermeasure Prioritization. In: Workshops on Business Informatics Research (BIR 2011), 6-8 Oct 2011, Riga, Latvia. pp. 64-76. Lecture Notes in Business Information Processing 106. Springer Verlag. ISSN 1865-1348 ISBN 978-3-642-29230-9
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2012) Privacy-Preserving Collaborative Filtering based on Horizontally Partitioned Dataset. In: International Conference on Collaboration Technologies and Systems (CTS 2012), 21-25 May 2012, Denver, CO, USA. pp. 439-446. IEEE Computer Society. ISBN 978-1-4673-1381-0
Junger, M. and Laycock, G. and Hartel, P.H. and Ratcliffe, J. (2012) Crime science: editorial statement. Crime science, 1 (1). 1:1-1:3. ISSN 2193-7680
Junger, M. and Ottenhof, R.H.J. and Hartel, P.H. (2012) New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students. In: KLM Van Dijk : Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Wolf Legal Publishers, Nijmegen, pp. 191-206. ISBN 978-90-5850-932-1
Knapik, P. and Schoch, E. and Müller, M. and Kargl, F. (2012) Understanding Vehicle Related Crime to Elaborate on Countermeasures Based on ADAS and V2X Communication. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 86-93. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Kocabas, U. and Peter, A. and Katzenbeisser, S. and Sadeghi, A. (2012) Converse PUF-based authentication. In: 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, 13-15 Jun 2012, Vienna, Austria. pp. 142-158. Lecture Notes in Computer Science 7344. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-30920-5
Kulikova, O. and Heil, R. and van den Berg, Jan and Pieters, W. (2012) Cyber crisis management: a decision-support framework for disclosing security incident information. In: International Conference on Cyber Security, CyberSecurity 2012, 14-16 Dec 2012, Washington, USA. pp. 103-112. Cyber Security (CyberSecurity), 2012 International Conference . IEEE Computer Society. ISBN 978-1-4799-0219-4
Meadows, C. and Pavlovic, D. (2012) Formalizing physical security procedures. In: 8th International Workshop on Security and Trust Management, STM 2012, 13-14 Sep 2012, Pisa, Italy. pp. 193-208. Lecture Notes in Computer Science 7783. Springer Verlag. ISBN 978-3-642-38004-4
Pavlovic, D. (2012) Tracing the Man in the Middle in Monoidal Categories. In: 11th International Workshop on Coalgebraic Methods in Computer Science, CMCS 2012, 31 Mrt - 01 Apr 2012, Tallinn, Estonia. pp. 191-217. Lecture Notes in Computer Science 7399. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-32783-4
Peter, A. and Kronberg, M. and Trei, W. and Katzenbeisser, S. (2012) Additively homomorphic encryption with a double decryption mechanism, revisited. In: 15th International Conference on Information Security, ISC 2012, 19-21 Sep 2012, Passau, Gemany. pp. 242-257. Lecture Notes in Computer Science 7483. Springer Verlag. ISSN 1611-3349 ISBN 978-3-642-33383-5
Petit, J.Y. and Bösch, C.T. and Feiri, M.P. and Kargl, F. (2012) On the Potential of PUF for Pseudonym Generation in Vehicular Networks. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 94-100. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Pieters, W. and van der Ven, S. and Probst, C.W. (2012) A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability. In: Proceedings of the 2012 workshop on New security paradigms (NSPW 2012), 18-21 Sep 2012, Bertinoro, Italy. pp. 1-14. ACM. ISBN 978-1-4503-1794-8
Probst, C.W. and Sasse, A.M. and Pieters, W. and Dimkov, T. and Luysterborg, E. and Arnaud, M. (2012) Privacy penetration testing -- how to establish trust in your cloud provider. In: European Data Protection: In Good Health? International, Foreign and Comparative Law XVIII. Springer, London, pp. 251-266. ISBN 978-94-007-2902-5
Schaub, F. and Könings, B. and Weber, M. and Kargl, F. (2012) Towards context adaptive privacy decisions in ubiquitous computing. In: IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 19-23 Mar 2012, Lugano, Switzerland. pp. 407-410. IEEE Computer Society. ISBN 978-1-4673-0905-9
Schaub, F. and Koenings, B. and Dietzel, S. and Weber, M. and Kargl, F. (2012) Privacy context model for dynamic privacy adaptation in ubiquitous computing. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp 2012, CASEMANS 2012 Workshop, 8 Sep 2012, Pittsburgh, PA, USA. pp. 752-757. ACM. ISBN 978-1-4503-1224-0
Tang, Qiang (2012) Cryptographic framework for analyzing the privacy of recommender algorithms. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 may. 2012, Denver, USA. pp. 455-462. IEEE Computer Society. ISBN 978-1-4673-1381-0
Tang, Qiang (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5 (12). pp. 1351-1362. ISSN 1939-0114 *** ISI Impact 0,806 ***
Tang, Qiang (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2 (4). pp. 304-321. ISSN 1753-0563
Vriezekolk, E. and Wieringa, R.J. and Etalle, S. (2012) Design and initial validation of the Raster method for telecom service availability risk assessment. In: Proceedings of the 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012), 22-25 April 2012, Vancouver, Canada. 117. Simon Fraser University. ISBN 978-0-86491-332-6
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2012) A2thOS: availability analysis and optimisation in SLAs International Journal of Network Management, 22 (2). pp. 104-130. ISSN 1055-7148 *** ISI Impact 0,681 ***

2011

Alberts, G. and Boersma, K. and Broekhans, B. and Dijkstra, Anne and Pieters, W. and Popkema, M. and Vanheste, T. (2011) Inleiding: Kennisklimaat. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 7-11. ISSN 1871-0034 ISBN 978-90-8964-401-5
Bösch, C.T. and Brinkman, R. and Hartel, P.H. and Jonker, W. (2011) Conjunctive Wildcard Search over Encrypted Data. In: 8th VLDB Workshop on Secure Data Management, SDM 2011, 02 Sep 2011, Seattle, WA, USA. pp. 114-127. Lecture Notes in Computer Science 6933. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-23555-9
Bolzoni, D. and Schade, C. L. and Etalle, S. (2011) A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. In: Proceedings of the 25th Large Installation System Administration Conference (LISA 2011), 4-9 Dec 2011, Boston, USA. pp. 201-216. The USENIX Association. ISBN 978-931971-881-3
van Cleeff, A. and Dimkov, T. and Pieters, W. and Wieringa, R.J. (2011) Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting. In: Proceedings of the International Conference on IT Convergence and Security (ICITCS 2011), 14-16 Dec, 2011, Suwon, South Korea. pp. 51-67. Lecture Notes in Electrical Engineering 120. Springer Verlag. ISSN 1876-1100 ISBN 978-94-007-2910-0
van Cleeff, A. and Pieters, W. and Wieringa, R.J. and van Tiel, F. (2011) Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization. Information Security Technical Report, 16 (3-4). pp. 142-149. ISSN 1363-4127
Dietzel, S. and Kargl, F. and Heijenk, G.J. and Schaub, F. (2011) Modeling In-Network Aggregation in VANETs. IEEE communications magazine, 49 (11). pp. 142-148. ISSN 0163-6804 *** ISI Impact 5,125 ***
Dimkov, T. and Pieters, W. (2011) Physical Penetration Testing: A Whole New Story in Penetration Testing. PenTest Magazine, 2011 (2). pp. 20-23. ISSN not assigned
Dimkov, T. and Pieters, W. and Hartel, P.H. (2011) Training Students to Steal: A Practical Assignment in Computer Security Education. In: Proceedings of the 42nd ACM Technical Symposium on Computer Science Education (SIGCSE 2011), 9-12 Mar 2011, Dallas, Texas, USA. pp. 21-26. ACM. ISBN 978-1-4503-0500-6
Dressler, F. and Kargl, F. and Ott, J. and Tonguz, O.K. and Wischof, L. (2011) Research Challenges in Intervehicular Communication: Lessons of the 2010 Dagstuhl Seminar. IEEE communications magazine, 49 (5). pp. 158-164. ISSN 0163-6804 *** ISI Impact 5,125 ***
Franz, M. and Williams, P. and Carbunar, B. and Katzenbeisser, S. and Peter, A. and Sion, R. and Sotakova, M. (2011) Oblivious outsourced storage with delegation. In: 15th International Conference on Financial Cryptography and Data Security, FC 2011, 28 Feb - 04 Mar 2011, Gros Islet, St. Lucia. pp. 127-140. Lecture Notes in Computer Science 7035. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-27575-3
Gong, Zheng and Nikova, S.I. and Law, Yee Wei (2011) KLEIN: A New Family of Lightweight Block Ciphers. In: 7th International Workshop on RFID, Security and Privacy (RFIDSec 2011), June 26-28, 2011, Amherst, MA, USA. pp. 1-18. Lecture Notes in Computer Science 7055. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-25285-3
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. and Etalle, S. (2011) MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. In: Proceedings of the European Conference on Computer Network Defense, EC2ND 2011, 6-8 Sept 2011, Gothenburg, Sweden. pp. 41-48. IEEE Computer Society. ISBN 978-0-7695-4762-6
Herrmann, A. and Morali, A. and Etalle, S. and Wieringa, R.J. (2011) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization. In: Perspectives in Business Informatics Research, 6-8 Oct 2011, Riga, Latvia. pp. 155-162. Riga Technical University. ISBN 978-9984-30-197-6
Ibraimi, L. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2011) Public-Key Encryption with Delegated Search. In: Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS), 7-10 Jun 2011, Nerja, Spain. pp. 532-549. Lecture Notes in Computer Science 6715. Springer Verlag. ISBN 978-3-642-21553-7
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) Privacy-Preserving Profile Matching Using the Social Graph. Technical Report TR-CTIT-11-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) Privacy-Preserving Profile Matching Using the Social Graph. In: International Conference on Computational Aspects of Social Networks, CASoN 2011, 19-21 Oct 2011 , Salamanca, Spain. pp. 42-47. IEEE Computer Society. ISBN 978-1-4577-1132-9
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks. In: Proceedings of the 18th ACM conference on Computer and communications security (CCS), 17-21 Oct 2011 , Chicago, IL, USA. pp. 793-795. ACM. ISBN 978-1-4503-0948-6
Kargl, F. and Papadimitratos, P. (2011) ACM WiSec 2011 poster and demo session. ACM SIGMOBILE Mobile Computing and Communications Review, 15 (3). pp. 34-34. ISSN 1559-1662
Kolesnichenko, A.V. and de Boer, P.T. and Remke, A.K.I. and Zambon, Emmanuele and Haverkort, B.R.H.M. (2011) Is Quantitative Analysis of Stuxnet Possible? In: QEST 2011: Fast Abstracts, 5-8 Sep 2011, Aachen, Germany. pp. 9-10. CTIT Workshop Proceedings WP11-03. Centre for Telematics and Information Technology University of Twente. ISSN 0929-0672
Kost, M. and Freytag, J.-C. and Kargl, F. and Kung, A. (2011) Privacy Verification Using Ontologies. In: Proceedings of the Sixth International Conference on Availability, Reliability and Security, ARES 2011, 22-26 Aug 2011, Vienna, Austria. pp. 627-632. IEEE Computer Society. ISBN 978-1-4577-0979-1
Kung, A. and Freytag, J.-C. and Kargl, F. (2011) Privacy-by-Design in ITS Applications : The Way Forward. In: Second International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN), 20 Jun 2011, Lucca, Italy. pp. 1-6. IEEE Computer Society. ISBN 978-1-4577-0351-5
Law, Yee Wei and Moniava, G. and Gong, Zheng and Hartel, P.H. and Palaniswami, M. (2011) KALwEN: a new practical and interoperable key management scheme for body sensor networks. Security and Communication Networks, 4 (11). pp. 1309-1329. ISSN 1939-0114 *** ISI Impact 0,806 ***
Nikova, S.I. and Rijmen, V. and Schläffer, M. (2011) Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. Journal of Cryptology, 24 (2). pp. 292-321. ISSN 0933-2790 *** ISI Impact 1,617 ***
Pavlovic, D. (2011) Gaming security by obscurity. In: New Security Paradigms Workshop, September 12-15, 2011, Marin County, California. pp. 125-140. ACM. ISBN 978-1-4503-1078-9
Petit, J.Y. and Feiri, M.P. and Kargl, F. (2011) Spoofed Data Detection in VANETs using Dynamic Thresholds. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2011), 14-16 Nov 2011, Amsterdam, Netherlands. pp. 25-32. IEEE Communications Society. ISBN 978-1-4673-0049-0
Pieters, W. (2011) Explanation and trust: what to tell the user in security and AI? Ethics and information technology, 13 (1). pp. 53-64. ISSN 1388-1957 *** ISI Impact 0,739 ***
Pieters, W. (2011) Cloud security in vogelvlucht. Informatiebeveiliging, 2011 (1). pp. 16-17. ISSN 1569-1063
Pieters, W. (2011) High security, human significance: Informatiebeveiliging in Twente. Informatiebeveiliging, 2011 (2). pp. 14-17. ISSN 1569-1063
Pieters, W. (2011) Representing humans in system security models: An actor-network approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2 (1). pp. 75-92. ISSN 2093-5374
Pieters, W. (2011) The (social) construction of information security. The Information Society, 27 (5). pp. 326-335. ISSN 0197-2243 *** ISI Impact 1,333 ***
Pieters, W. (2011) Risicopersonalisatie en haar falen in collectieve vraagstukken. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 197-207. ISSN 1871-0034 ISBN 978-90-8964-401-5
Pieters, W. (2011) Security and privacy in the clouds: a bird's eye view. In: Computers, Privacy and Data Protection: an Element of Choice. Springer, Dordrecht, pp. 445-457. ISBN 978-94-007-0640-8
Pieters, W. (2011) How devices transform voting. In: Innovating Government. Normative, policy and technological dimensions of modern government. Information Technology and Law Series 20. T.M.C. Asser Press, The Hague, pp. 439-452. ISSN 1570-2782 ISBN 978-90-6704-730-2
Pieters, W. and Coles-Kemp, L. (2011) Reducing normative conflicts in information security. In: Proceedings of the 2011 New security paradigms workshop, NSPW '11, 12-15 Sep 2011, Marin County, CA. pp. 11-24. ACM. ISBN 978-1-4503-1078-9
Popkema, M. and Pieters, W. and Boersma, K. and Broekhans, B. (2011) Epiloog: Het klimaat voor kennis in de kennissamenleving. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 225-231. ISSN 1871-0034 ISBN 978-90-8964-401-5
Schmidt, R.K. and Brakemeier, A. and Leinmüller, T. and Kargl, F. and Schäfer, G. (2011) Advanced carrier sensing to resolve local channel congestion. In: Proceedings of the Eighth ACM international workshop on Vehicular inter-networking, VANET 2011, 23 Sep 2011, Las Vegas, Nevada, USA. pp. 11-20. ACM. ISBN 978-1-4503-0869-4
Sedghi, S. and Hartel, P.H. and Jonker, W. and Nikova, S.I. (2011) Privacy Enhanced Access Control by Means of Policy Blinding. In: Proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, 30 May - 1 Jun 2011, Guangzhou, China. pp. 108-122. Lecture Notes in Computer Science 6672. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-21030-3
Tan, Zhiyuan and Jamdagni, Aruna and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping (2011) Denial-of-service attack detection based on multivariate correlation analysis. In: Neural Information Processing. Lecture Notes in Computer Science 7064. Springer Verlag, Berlin, pp. 756-765. ISSN 0302-9743
Tan, Zhiyuan and Jamdagni, Aruna and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping (2011) Multivariate correlation analysis technique based on euclidean distance map for network traffic characterization. In: Information and Communications Security. Lecture Notes in Computer Science 7043. Springer Verlag, Berlin, pp. 388-398. ISSN 0302-9743
Tang, Qiang (2011) Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. In: Proceedings of the 16th Australian conference on information security and privacy, 11-13 Jul 2011, Melbourne, Australia. pp. 389-406. Lecture Notes in Computer Science 6812. Springer Verlag. ISBN 978-3-642-22497-3
Tang, Qiang (2011) Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization. Technical Report TR-CTIT-11-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang and Chen, Liqun (2011) Extended KCI attack against two-party key establishment protocols. Information processing letters, 111 (15). pp. 744-747. ISSN 0020-0190 *** ISI Impact 0,605 ***
Tang, Qiang and Jeckmans, A.J.P. (2011) Towards a security model for computational puzzle schemes. International Journal of Computer Mathematics, 88 (11). pp. 2246-2257. ISSN 0020-7160 *** ISI Impact 0,577 ***
Trivellato, D. and Zannone, N. and Etalle, S. (2011) A Security Framework for Systems of Systems. In: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY , 6-8 Jun 2011, Pisa, Italy. pp. 182-183. IEEE Computer Society. ISBN 978-1-4244-9879-6
Trivellato, D. and Zannone, N. and Etalle, S. (2011) Protecting Information in Systems of Systems. In: 18th ACM Conference on Computer and Communications Security (CCS), 17-21 Oct 2011, Chicago, USA . pp. 865-867. ACM. ISBN 978-1-4503-0948-6
Vriezekolk, E. and Wieringa, R.J. and Etalle, S. (2011) A New Method to Assess Telecom Service Availability Risks. In: Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2011, 8-11 May 2011, Lisbon, Portugal. 196. LNEC. ISBN 978-972-49-2247-8
Vriezekolk, E. and Wieringa, R.J. and Etalle, S. (2011) How to assess telecom service availability risks for crisis organisations? In: Advances in Safety, Reliability and Risk Management, 18-22 Sep 2011, Troyes, France. pp. 2653-2661. Taylor & Francis. ISBN 978-0-415-68379-1
Zambon, Emmanuele (2011) Towards Optimal IT Availability Planning: Methods and Tools. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 10-188 ISBN 978-90-365-3102-3
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. and Hartel, P.H. (2011) Model-based Qualitative Risk Assessment for Availability of IT Infrastructures. Software and Systems Modeling, 10 (4). pp. 553-580. ISSN 1619-1366 *** ISI Impact 0,990 ***

2010

Barreto, P.S. and Nikov, V. and Nikova, S.I. and Rijmen, V. and Tischhouser, E. (2010) Wirlwind: a New Cryptographic Hash Function. Designs, Codes and Cryptography, 56 (2-3). pp. 141-162. ISSN 0925-1022 *** ISI Impact 0,781 ***
Bauer, L. and Etalle, S. and den Hartog, J.I. and Viganò, L. (2010) Preface of Special Issue on “Computer Security: Foundations and Automated Reasoning”. Journal of Automated Reasoning, 46 (3-4). pp. 223-224. ISSN 0168-7433 *** ISI Impact 2,113 ***
Böhm, K. and Etalle, S. and den Hartog, J.I. and Hütter, C. and Trabelsi, S. and Trivellato, D. and Zannone, N. (2010) A flexible architecture for privacy-aware trust management. Journal of Theoretical and Applied Electronic Commerce Research, 5 (2). pp. 77-96. ISSN 0718-1876
de Beule, J. and Edel, Y. and Käsper, E. and Klein, Andreas and Nikova, S.I. and Preneel, B. and Schillewaert, J. and Storme, L. (2010) Galois geometries and applications. Designs, Codes and Cryptography, 56 (2-3). pp. 85-86. ISSN 0925-1022 *** ISI Impact 0,781 ***
Beye, M. and Jeckmans, A.J.P. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2010) Literature Overview - Privacy in Online Social Networks. Technical Report TR-CTIT-10-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brzuska, C. and Busch, H. and Dagdelen, O. and Fischlin, M. and Franz, M. and Katzenbeisser, S. and Manulis, M. and Onete, C. and Peter, A. and Poetering, B. and Schröder, D. (2010) Redactable signatures for tree-structured data: definitions and constructions. In: 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, 22-25 Jun 2010, Beijing, China. pp. 87-104. Lecture Notes in Computer Science 6123. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-13707-5
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Tang, Qiang and Veldhuis, R.N.J. (2010) Embedding Renewable Cryptographic Keys into Noisy Data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262 *** ISI Impact 1,279 ***
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) ANWB-enquête niet democratisch. NRC handelsblad, 40 (25-01-2010). 6. ISSN 0002-5259
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Zorg liever voor een overzichtelijk stembiljet. NRC handelsblad, 40 (07-06-2010). pp. 6-6. ISSN 0002-5259
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Benefits of Location-Based Access Control:A Literature Study. In: Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010), 18-20 Dec, 2010, Hangzhou, China. pp. 739-746. IEEE Computer Society. ISBN 978-1-4244-9779-9
Dietzel, S. and Kargl, F. and Heijenk, G.J. and Schaub, F. (2010) On the Potential of Generic Modeling for VANET Data Aggregation Protocols. In: Proceedings of the 2nd IEEE Vehicular Networking Conference, 13-15 Dec 2010, Jersey City, New Jersey, USA. pp. 78-85. IEEE Communications Society. ISBN 978-1-4244-9524-5
Dietzel, S. and Schoch, E. and Kargl, F. and Könings, B. and Weber, M. (2010) Resilient Secure Aggregation for Vehicular Networks. IEEE Network, 24 (1). pp. 26-31. ISSN 0890-8044 *** ISI Impact 2,899 ***
Dimkov, T. and van Cleeff, A. and Pieters, W. and Hartel, P.H. (2010) Two methodologies for physical penetration testing using social engineering. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), 06-10 Dec 2010, Austin, Texas, USA. pp. 399-408. ACM. ISBN 978-1-4503-0133-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: representing attack scenarios spanning through the physical, digital and social domain. In: Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers, 27-28 March 2010, Paphos, Cyprus. pp. 112-129. Lecture Notes in Computer Science 6186. Springer Verlag. ISBN 978-3-642-16074-5
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. Technical Report TR-CTIT-10-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: analyzing multi-domain insider threats. Technical Report TR-CTIT-10-39, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), 4-8 Oct 2010, Chicago, Illinois, US. pp. 666-668. ACM. ISBN 978-1-4503-0245-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations. In: Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010), 18-20 Dec 2010, Hangzhou, China. pp. 727-732. IEEE Computer Society. ISBN 978-1-4244-9779-9
Gong, Zheng (2010) Review of "Robust defenses for cross-site request forgery" by A. Barth, C. Jackson, J. Mitchell. Computing reviews. CR137694. ISSN 1530-6585
Gong, Zheng and Long, Yu and Hong, Xuan and Chen, Kefei (2010) Practical Certificateless Aggregate Signatures From Bilinear Maps. Journal of Information Science and Engineering, 26 (6). pp. 2093-2106. ISSN 1016-2364 *** ISI Impact 0,392 ***
Gong, Zheng and Nikova, S.I. and Law, Yee Wei (2010) KLEIN: A New Family of Lightweight Block Ciphers. Technical Report TR-CTIT-10-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Gong, Zheng and Tang, Qiang and Law, Yee Wei and Chen, Hongyang (2010) KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. In: Proceedings of the International Conference on Information Security and Cryptology, INSCRYPT 2010, 20-24 Oct 2010, Shanghai, China. pp. 268-283. Lecture Notes in Computer Science 6584. Springer Verlag. ISBN 978-3-642-21517-9
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2010) A Log Mining Approach for Process Monitoring in SCADA. Technical Report TR-CTIT-10-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2010) MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. In: Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), 15-17 Sep 2010, Ottawa, Canada. pp. 500-501. Lecture Notes in Computer Science 6307. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-15511-6
Hartel, P.H. and Junger, M. and Wieringa, R.J. (2010) Cyber-crime Science = Crime Science + Information Security. Technical Report TR-CTIT-10-34, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Muller, H.L. (2010) Simple algebraic data types for C. Technical Report TR-CTIT-10-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hipp, M. and Schaub, F. and Kargl, F. and Weber, M. (2010) Interaction Weaknesses of Personal Navigation Devices. In: Proceedings of the Second International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI 2010, 11-12 Nov 2010, Pittsburgh, USA. pp. 129-136. ACM. ISBN 978-1-4503-0437-5
Ibraimi, L. and Nikova, S.I. and Jonker, W. and Hartel, P.H. (2010) An Identity-Based Group Signature with Membership Revocation in the Standard Model. Technical Report TR-CTIT-10-26, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2010) Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. International Journal of Computational Models and Algorithms in Medicine (IJCMAM), 1 (2). pp. 1-21. ISSN 1947-3133
Jonker, H.L. and Pieters, W. (2010) Anonymity in voting revisited. In: Towards Trustworthy Elections: New Directions in Electronic Voting. Lecture Notes in Computer Science 6000. Springer Verlag, Berlin, pp. 216-230. ISSN 0302-9743 ISBN 978-3-642-12979-7
Kargl, F. and Schaub, F. and Dietzel, S. (2010) Mandatory Enforcement of Privacy Policies using Trusted Computing Principles. In: Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA. pp. 104-109. AAAI. ISBN 978-1-57735-459-8
Könings, B. and Schaub, F. and Kargl, F. and Weber, M. (2010) Towards Territorial Privacy in Smart Environments. In: Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA. pp. 113-118. AAAI. ISBN 978-1-57735-459-8
Khatib, M.G. and Hartel, P.H. and van Dijk, H.W. (2010) Energy-Efficient Streaming Using Non-volatile Memory. Journal of Signal Processing Systems, 60 (2). pp. 149-168. ISSN 1939-8018 *** ISI Impact 0,508 ***
Langer, L. and Jonker, H.L. and Pieters, W. (2010) Anonymity and Verifiability in Voting: Understanding (Un)Linkability. In: 12th International Conference Information and Communications Security, ICICS 2010, 15-17 Dec 2010, Barcelona, Spain. pp. 296-310. Lecture Notes in Computer Science 6476. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-17649-4
Leinmüller, T. and Schoch, E. and Kargl, F. and Maihöfer, C. (2010) Decentralized position verification in geographic ad hoc routing. Security and Communication Networks, 3 (4). pp. 289-302. ISSN 1939-0114 *** ISI Impact 0,806 ***
van Liesdonk, P. and Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2010) Computationally Efficient Searchable Symmetric Encryption. In: Proceedings of the Seventh International Workshop on Secure Data Management, SDM 2010, 17 Sep 2010, Singapore. pp. 87-100. Lecture Notes in Computer Science (6358). Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-15545-1
Luo, Y. and Lai, X. and Gong, Zheng (2010) Pseudorandomness analysis of the (extended) Lai–Massey scheme. Information processing letters, 111 (2). pp. 90-96. ISSN 0020-0190 *** ISI Impact 0,605 ***
Ma, Zhendong and Kargl, F. and Weber, M. (2010) Measuring long-term location privacy in vehicular communication systems. Computer communications, 33 (12). pp. 1414-1427. ISSN 0140-3664 *** ISI Impact 2,099 ***
Morali, A. and Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2010) CRAC: Confidentiality Risk Assessment and IT-Architecture Comparison. In: Proceedings of the 6th International Conference on Network and Service Management (CNSM 2010), 25-29 Oct 2010, Niagara Falls, Canada. pp. 322-325. IEEE Computer Society. ISBN 978-1-4244-8910-7
Nasution, S. and Hartel, P.H. and Suryana, N. and Azman, N. and Shahib, S. (2010) Trust Level and Routing Selection for Mobile Agents in a Smart Home. In: Second International Conference on Computer Modeling and Simulation (ICCMS), 22-24 Jan. 2010, Sanya, China. pp. 445-450. IEEE Computer Society. ISBN 978-0-7695-3941-6
Pavlovic, D. (2010) Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks. In: 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, 16-17 September 2010, Pisa, Italy. pp. 1-17. Lecture Notes in Computer Science 6561. Springer. ISBN 978-3-642-19751-2
Pavlovic, D. (2010) The Unreasonable Ineffectiveness of Security Engineering: An Overview. In: 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010, 13-18 Sep 2010, Pisa, Italy. pp. 12-18. Software Engineering and Formal Methods. IEEE Computer Society. ISBN 978-1-4244-8289-4
Pavlovic, D. and Meadows, C. (2010) Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol. In: Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics (MFPS 2010), 6-10 May 2010, Ottawa, Ontario, Canada . pp. 97-122. Electronic Notes in Theoretical Computer Science 265. Elsevier. ISSN 1571-0661
Pieters, W. (2010) ANKH: Information Threat Analysis with Actor-NetworK Hypergraphs. Technical Report TR-CTIT-10-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Explanation and trust: what to tell the user in security and AI? Technical Report TR-CTIT-10-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Security and privacy in the clouds: a bird's eye view. Technical Report TR-CTIT-10-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Reve{a,i}ling the risks: a phenomenology of information security Techné: Research in Philosophy and Technology, 14 (3). pp. 176-188. ISSN 1091-8264
Pieters, W. (2010) Verifiability of electronic voting: between confidence and trust. In: Data Protection in a Profiled World. Springer, Dordrecht, pp. 157-175. ISBN 978-90-481-8864-2
Pieters, W. (2010) Informational precaution. In: 8th Conference on Computing and Philosophy (ECAP10), 4-6 Oct 2010, Munich, Germany. pp. 320-325. Verlag Dr. Hut. ISBN 978-3-86853-546-4
Pieters, W. and Boersma, K. and Alberts, G. and Timmer, J. and Dijkstra, Anne and Popkema, M. (2010) Inzicht en toezicht: controle in de kennissamenleving. In: Inzicht en toezicht: controle in de kennissamenleving. Jaarboek Kennissamenleving (6). Aksant, Amsterdam, pp. 7-17. ISSN 1871-0034 ISBN 978-90-5260-384-1
Pontes Soares Rocha, B. and Bandhakavi, S. and den Hartog, J.I. and Winsborough, W.H. and Etalle, S. (2010) Towards static flow-based declassification for legacy and untrusted programs. In: IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, California. pp. 93-108. IEEE Computer Society. ISBN 978-0-7695-4035-1
Qiu, Weidong and Gong, Zheng and Liu, Bozhong and Long, Yu and Chen, Kefei (2010) Restrictive partially blind signature for resource-constrained information systems. Knowledge and Information Systems, 26 (1). pp. 87-103. ISSN 0219-1377 *** ISI Impact 1,702 ***
Schaub, F. and Kargl, F. and Ma, Zhendong and Weber, M. (2010) V-Tokens for Conditional Pseudonymity in VANETs. In: IEEE Wireless Communications and Networking Conference (WCNC 2010), Sydney, Australia. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-6396-1
Schmidt, R.K. and Leinmüller, T. and Schoch, E. and Kargl, F. and Schäfer, G. (2010) Exploration of Adaptive Beaconing for Efficient Intervehicle Safety Communication. IEEE Network, 24 (1). pp. 14-19. ISSN 0890-8044 *** ISI Impact 2,899 ***
Schoch, E. and Bako, B. and Dietzel, S. and Kargl, F. (2010) Dependable and Secure Geocast in Vehicular Networks. In: Proceedings of the Seventh ACM international workshop on VehiculAr InterNETworking, VANET 2010, 24 Sep 2010, Chicago, US. pp. 61-68. ACM. ISBN 978-1-4503-0145-9
Schoch, E. and Kargl, F. (2010) On the Efficiency of Secure Beaconing in VANETs. In: Proceedings of the third ACM conference on Wireless network security (ACM WiSec 2010), Hoboken, New Jersey, USA. pp. 111-116. ACM. ISBN 978-1-60558-923-7
Sedghi, S. and van Liesdonk, P. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2010) Searching Keywords with Wildcards on Encrypted Data. Technical Report TR-CTIT-10-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and van Liesdonk, P. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2010) Searching Keywords with Wildcards on Encrypted Data. In: Proceedings of the Seventh international Conference on Security and Cryptography for Networks (SCN), 13-15 September 2010, Amalfi, Italy. pp. 138-153. Lecture Notes in Computer Science 6280. Springer Verlag. ISBN 978-3-642-15316-7
Tan, Zhiyuan and Jamdagni, Aruna and Nanda, Priyadarsi and He, Xiangjian and Liu, Ren Ping and Jia, Wenjing and Yeh, Wei-chang (2010) A two-tier system for web attack detection using linear discriminant method. In: Information and Communications Security. Lecture Notes in Computer Science 6476. Springer Verlag, Berlin, pp. 459-471. ISSN 0302-9743
Tang, Qiang (2010) From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. Technical Report TR-CTIT-10-01, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2010) User-friendly matching protocol for online social networks. In: ACM Conference on Computer and Communications Security, 4-8 Oct 2010, Chicago, IL, USA. pp. 732-734. ACM. ISBN 978-1-4503-0245-6
Tang, Qiang (2010) Privacy Preserving Mapping Schemes Supporting Comparison. In: ACM Cloud Computing Security Workshop (CCSW), 9 Oct 2010, Chicago, Illinois. pp. 53-58. ACM. ISBN 978-1-4503-0089-6
Tang, Qiang and Jeckmans, A.J.P. (2010) On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. Technical Report TR-CTIT-10-02, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang and Jeckmans, A.J.P. (2010) Efficient Client Puzzle Schemes to Mitigate DoS Attacks. In: International Conference on Computational Intelligence and Security (CIS 2010), 11-14 dec 2010, Nanning, China. pp. 293-297. IEEE Computational Intelligence Society. ISBN 978-1-4244-9114-8
Wiedersheim, B. and Kargl, F. and Ma, Zhendong and Papadimitratos, P. (2010) Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough. In: The Seventh International Conference on Wireless On-demand Network Systems and Services (WONS 2010), Kranska Gora, Slovenia. pp. 176-183. IEEE Computer Society. ISBN 978-1-4244-6059-5
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2010) A2THOS: Availability Analysis and Optimisation in SLAs Technical Report TR-CTIT-10-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zannone, N. and Petkovic, M. and Etalle, S. (2010) Towards Data Protection Compliance. In: Proceedings of the 5th International Conference on Security and Cryptography (SECRYPT 2010), 26-28 July 2010, Athens, Greece. pp. 213-216. SciTePress. ISBN 978-989-8425-18-8

2009

Bolzoni, D. (2009) Revisiting Anomaly-based Network Intrusion Detection Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-147 ISBN 978-90-365-2853-5
Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. Technical Report TR-CTIT-09-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. In: Recent Advances in Intrusion Detection (RAID). pp. 1-20. Lecture Notes in Computer Science 5758. Springer Verlag. ISBN 978-3-642-04341-3
Buhan, I.R. and Boom, B.J. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2009) Secure pairing with biometrics. International Journal of Security and Networks, 4 (1/2). pp. 27-42. ISSN 1747-8405
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Security Implications of Virtualization: A Literature Study. Technical Report TR-CTIT-09-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Security Implications of Virtualization: A Literature Study. In: 2009 IEEE International Conference on Computational Science and Engineering (CSE09), volume 3, 29 Aug - 31 Aug, Vancouver, BC, Canada. pp. 353-358. IEEE Computer Society. ISBN 978-0-7695-3823-5
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Gooi eigen servers en pc's niet weg. TIEM, Tijdschrift voor Informatie en Management, 34. pp. 8-9. ISSN 1572-5472
Czenko, M.R. and Etalle, S. (2009) LP with Flexible Grouping and Aggregates Using Modes. In: 19th International Symposium, LOPSTR, Revised Selected Papers, 9-11 Sep 2009, Coimbra, Portugal. pp. 67-81. LNCS 6037. Springer. ISBN 978-3-642-12591-1
Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain. Technical Report TR-CTIT-09-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Two methodologies for physical penetration testing using social engineering. Technical Report TR-CTIT-09-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Winsborough, W.H. (2009) Maintaining control while delegating trust: Integrity constraints in trust management. ACM Transactions on Information and System Security, 13 (1). 5:1-5:27. ISSN 1094-9224 *** ISI Impact 0,759 ***
Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) TuLP: A Family of Secure and Practical Message Authentication Codes for Body Sensor Networks. Technical Report TR-CTIT-09-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) Towards Secure and Practical MACs for Body Sensor Networks. In: 10th International Conference on Cryptology in India (INDOCRYPT), 13-16 Dec 2009, New Delhi, India. pp. 182-198. Lecture Notes in Computer Science 5922. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-10627-9
Hartel, P.H. (2009) On the Cost and Benefits of Building a High-Quality Institutional Repository. Technical Report TR-CTIT-09-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Haverkort, B.R.H.M. and Remke, A.K.I. and Hartel, P.H. (2009) Betere beveiliging Scada-systemen vitaal voor Nederlandse infrastructuren. Bits en chips, 11 (16). pp. 23-23. ISSN 1879-6443
Ibraimi, L. and Petkovic, M. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and its Application (extended version). Technical Report TR-CTIT-09-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Petkovic, M. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In: Information Security Applications, 25-27 August 2009, Busan, Korea. pp. 309-323. Lecture Notes in Computer Science 5932/2009. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-10837-2
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. In: 5th Information Security Practice and Experience Conference (ISPEC), 12-15 April 2009, Xi'an, China. pp. 1-12. Lecture Notes in Computer Science 5451. Springer. ISSN 0302-9743 ISBN 978-3-642-00842-9
Jacobs, B.P.F. and Pieters, W. (2009) Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. In: Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures. Lecture Notes in Computer Science 5705. Springer Verlag, Berlin, pp. 121-144. ISSN 0302-9743 ISBN 978-3-642-03828-0
Law, Yee Wei and Palaniswami, M. and van Hoesel, L.F.W. and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2009) Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks, 5 (1). 6:1-6:38. ISSN 1550-4859 *** ISI Impact 1,448 ***
Morali, A. and Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2009) CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks (extended version). Technical Report TR-CTIT-09-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Houmb, S.H. and Sallhammar, K. and Etalle, S. (2009) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. In: 31st International Conference on Software Engineering - Companion Volume, 16-24 May 2009, Vancouver, Canada. pp. 130-140. IEEE Computer Society. ISBN 978-1-4244-3494-7
Nasution, S. and Hartel, P.H. and Suryana, N. and Azman, N. and Shahib, S. (2009) Trust Level and Routing Selection for Mobile Agents in a Smart Home (Extended version). Technical Report TR-CTIT-09-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nasution, S. and Suryana, N. and Shahib, S. and Abu, N.A. and Hartel, P.H. (2009) The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home. In: International Technology, Education and Development Conference (INTED), 9-11 March 2009, Valencia, Spain. 702. International Association of Technology, Education and Development (IATED). ISBN 978-84-612-7578-6
Pieters, W. (2009) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2009 (3). pp. 23-25. ISSN 1569-1063
Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. Technical Report TR-CTIT-09-21, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2009) Converging technologies and de-perimeterisation: towards risky active insulation. In: Proceedings of SPT 2009: Converging technologies, changing societies, 7-10 Jul 2009, Enschede, The Netherlands. pp. 58-60. CEPTES, University of Twente. ISBN not assigned
Pieters, W. (2009) Reve{a,i}ling the risks: a phenomenology of information security Technical Report TR-CTIT-09-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. In: E-Voting and Identity: Second International Conference, VOTE-ID 2009, 7-8 Sep 2009, Luxembourg city, Luxembourg. pp. 172-190. Lecture Notes in Computer Science 5767. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-04134-1
Pieters, W. and van Cleeff, A. (2009) The Precautionary Principle in a World of Digital Dependencies. IEEE Computer, 42 (6). pp. 50-56. ISSN 0018-9162 *** ISI Impact 1,115 ***
Pieters, W. and van Cleeff, A. (2009) The precautionary principle in a world of digital dependencies. Technical Report TR-CTIT-09-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and van Cleeff, A. and Wieringa, R.J. (2009) Voor goede keuzes heb je tijd nodig. Trouw, 67 (19855, 5 Aug 2009). 25. ISSN not assigned
Pieters, W. and Consoli, L. (2009) Vulnerabilities and responsibilities: dealing with monsters in computer security. Journal of information, communication and ethics in society, 7 (4). pp. 243-257. ISSN 1477-996X
Pieters, W. and Popkema, M. and Broekhans, B. and Dijkstra, Anne and Boersma, K. and Alberts, G. (2009) Gevoel voor kennis: emoties in de kennissamenleving. In: Gevoel voor kennis. Jaarboek Kennissamenleving 5. Aksant, Amsterdam, pp. 7-20. ISSN 1871-0034 ISBN 978-90-5260-351-3
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. Technical Report TR-CTIT-09-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada. pp. 240-251. Lecture Notes in Computer Science 5645. Springer Verlag. ISBN 978-3-642-03006-2
Saffarian, M. and Tang, Qiang and Jonker, W. and Hartel, P.H. (2009) Dynamic User Role Assignment in Remote Access Control. Technical Report TR-CTIT-09-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and van Liesdonk, P. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2009) Adaptively Secure Computationally Efficient Searchable Symmetric Encryption. Technical Report TR-CTIT-09-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Sinderen, M.J. and Pras, A. and Haverkort, B.R.H.M. and Apers, P.M.G. and Hartel, P.H. and van de Pol, J.C. and Nijholt, A. and Wieringa, R.J. and Havinga, P.J.M. and Akşit, M. (2009) Research Self-Evaluation 2003-2008, Computer Science Department, University of Twente. Technical Report Number UNSPECIFIED, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Spiessens, F. and den Hartog, J.I. and Etalle, S. (2009) Know what you trust. In: Formal Aspects in Security and Trust, 5th International Workshop, Malaga, Spain. pp. 129-142. Lecture Notes in Computer Science 5491. Springer Verlag. ISBN 978-3-642-01464-2
Tang, Qiang (2009) Timed-Ephemerizer: Make Assured Data Appear and Disappear. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. pp. 195-208. Lecture Notes in Computer Science 6391. Springer Verlag. ISBN 978-3-642-16440-8
Tang, Qiang and Chen, Liqun (2009) Public-key Encryption with Registered Keyword Search. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. pp. 163-178. Lecture Notes in Computer Science 6391. Springer Verlag. ISBN 3-642-16440-4
Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Inter-domain Identity-Based Proxy Re-encryption. In: Information Security and Cryptology, 4th International Conference (Inscrypt), December 14-17, 2008, Beijing China. pp. 332-347. Lecture Notes in Computer Science 5487. Springer Verlag. ISBN 978-3-642-01439-0
Trivellato, D. and Spiessens, A.O.D. and Zannone, N. and Etalle, S. (2009) Reputation-based ontology alignment for autonomy and interoperability in distributed access control. In: Proceedings 12th IEEE International conference on Computational Science and Engineering, 29-31 Aug. 2009, Vancouver BC, Canada. pp. 252-258. IEEE. ISBN 978-0-7695-3823-5
Trivellato, D. and Spiessens, A.O.D. and Zonnone, N. and Etalle, S. (2009) POLIPO: Policies & ontologies for interoperability, portability, and autonomy. In: IEEE International Symposium on Policies for Distributed Systems and Networks, 20-22 July 2009, London, UK. pp. 110-113. IEEE. ISBN 978-0-7695-3742-9
Weng, J. and Yang, Yanjiang and Tang, Qiang and Deng, R. and Bao, F. (2009) Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. In: Information Security - 12th International Conference, ISC, Pisa, Italy, September 7-9, 2009, Pisa, Italy. pp. 151-166. Lecture Notes in Computer Science 5735. Springer Verlag. ISBN 978-3-642-04473-1
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. and Hartel, P.H. (2009) Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures. Technical Report TR-CTIT-09-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2008

Barosso, D. and Bartle, R. and Chazeran, C. and de Zwart, M. and Doumen, J.M. and Gorniak, S. and Kaźmierczak, M. and Kaskenmaa, M. and Benavente López, D. and Martin, A. and Naumann, I. and Reynolds, R. and Richardson, J. and Rossow, C. and Rywczyoska, A. and Thumann, M. (2008) Security and privacy in massively-multiplayer online games and social and corporate virtual worlds. ENISA Position Paper 1 ENISA (European Network and Information Security Agency), Crete. ISSN not assigned
Bolzoni, D. and Crispo, B. and Etalle, S. (2008) ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems. Technical Report TR-CTIT-08-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. (2008) Approaches in Anomaly-based Network Intrusion Detection Systems. In: Intrusion Detection Systems. Advances in Information Security 38. Springer Verlag, London, pp. 1-16. ISBN 978-0-387-77265-3
Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. Technical Report TR-CTIT-08-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. In: Confederated International Conferences On the Move to Meaningful Internet Systems (OTM), November 9-14, 2008, Monterrey, Mexico. pp. 938-955. Lecture Notes in Computer Science 5332. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-88872-7
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. (2008) Controlling Leakage of Biometric Information using Dithering. In: 16th European Signal Processing Conference, 25-29 Aug 2008, Lausanne, Switzerland. 1569105382. EUSIPCO. EURASIP, European Association for Signal, Speech and Image Processing. ISBN 978-2-8399-0450-6
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Tang, Qiang and Veldhuis, R.N.J. (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, 20 - 22 October, 2008, Birmingham, UK. pp. 294-310. Lecture Notes in Computer Science 5308. Springer. ISBN 978-3-540-88624-2
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2008) Trust Management in P2P systems using Standard TuLiP. Technical Report TR-CTIT-08-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2008) Trust Management in P2P Systems Using Standard TuLiP. In: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway. pp. 1-16. IFIP International Federation for Information Processing 263/2008. Springer. ISSN 1571-5736 ISBN 978-0-387-09427-4
Czenko, M.R. and Etalle, S. (2008) LP with Flexible Grouping and Aggregates Using Modes. Technical Report TR-CTIT-08-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Crampton, J. and Etalle, S. (2008) RBAC administration in distributed systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, 11-13 June 2008, Estes Park, Colorado, USA. pp. 93-102. ACM. ISBN 978-1-60558-129-3
Dimkov, T. and Tang, Qiang and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. In: Proceedings of the Workshop on Modeling Security (MODSEC08), 28 Sep 2008, Toulouse. 18. CEUR Workshop Proceedings. ISSN 1613-0073
Dimkov, T. and Tang, Qiang and Hartel, P.H. (2008) Inability of existing security models to cope with data mobility in dynamic organizations. Technical Report TR-CTIT-08-57, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. (2008) Nice to know. Technical University of Eindhoven, Eindhoven. ISBN 978-90-386-1427-4
Gong, Zheng and Lai, X.J. and Chen, Kefei (2008) On the Design of Secure and Fast Double Block Length Hash Functions. Technical Report TR-CTIT-08-71, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Gong, Zheng and Long, Yu and Hong, Xuan and Chen, Kefei (2008) Practical Certificateless Aggregate Signatures From Bilinear Maps. Technical Report TR-CTIT-08-74, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Abelmann, L. and Khatib, M.G. (2008) Towards Tamper-Evident Storage on Patterned Media. In: 6th USENIX Conf. on File and Storage Technologies (FAST), Feb. 26-29, 2008, San Jose, California. pp. 283-296. USENIX Association. ISBN 978-1-931971-56-0
Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow (with appendix). Technical Report TR-CTIT-08-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow. In: 8th Int. Conf. on Formal Methods in Computer Aided Design (FMCAD), 17-20 Nov. 2008, Portland, Oregon. pp. 161-170. IEEE Computer Society. ISBN 978-1-4244-2735-2
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. Technical Report TR-CTIT-08-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: Proceedings of the 5th VLDB Workshop, SDM 2008, August 24, 2008, Auckland, New Zealand. pp. 185-198. Lecture Notes in Computer Science 5159. Springer Verlag. ISBN 978-3-540-85258-2
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. Technical Report TR-CTIT-08-75, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Moniava, G. and Gong, Zheng and Hartel, P.H. and Palaniswami, M. (2008) KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks. Technical Report TR-CTIT-08-67, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A generalized clustering algorithm for dynamic wireless sensor networks. Technical Report TR-CTIT-08-56, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks. In: Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA-08), 10-12 Dec 2008, Sydney, Australia. pp. 863-870. IEEE Computer Society. ISBN 978-0-7695-3471-8
Morali, A. and Zambon, Emmanuele and Etalle, S. and Overbeek, P. (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. Technical Report TR-CTIT-08-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Etalle, S. and Overbeek, P. (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. In: Third IEEE International Workshop on Business-Driven IT Management, 07 Apr 2008, Salvador, Brazil. pp. 31-40. IEEE Computer Society. ISBN 978-1-4244-2191-6
Morali, A. and Zambon, Emmanuele and Houmb, S.H. and Sallhammar, K. and Etalle, S. (2008) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. Technical Report TR-CTIT-08-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nikova, S.I. and Rijmen, V. and Schlaffer, M. (2008) Using normal bases for compact hardware implementations of the AES S-box. In: 6th International Conference Security in Communication Networks (SCN), 10-12 Sep 2008, Amalfi, Italy. pp. 236-245. Lecture Notes in Computer Science 5229. Springer Verlag. ISBN 978-3-540-85854-6
Pieters, W. (2008) Vertrouwen en werkelijkheid in de stemcomputercontroverse. In: Burger in Uitvoering. Jaarboek Kennissamenleving 4. Aksant, Amsterdam, pp. 17-25. ISBN 978-90-5260-307-0
Pieters, W. (2008) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2008 (3). pp. 18-20. ISSN 1569-1063
Pieters, W. (2008) Betrouwbaarheid of vertrouwbaarheid : Vertrouwen in technologie en bestuur. Openbaar bestuur, 18 (10). pp. 27-30. ISSN 0925-7322
Pieters, W. (2008) La volonté machinale: understanding the electronic voting controversy. PhD thesis, Radboud University Nijmegen. ISBN 978-90-9022554-8
Pieters, W. and Becker, M.J. (2008) Ethics of e-voting: an essay on requirements and values in Internet elections. In: E-Democracy: Concepts and Practices. Icfai University Press, pp. 134-157. ISBN 978-81-314-1914-4
Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version). Technical Report TR-CTIT-08-50, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption. In: 10th international conference on information and communication security, 20-22 Oct 2008, Birmingham, UK. pp. 345-360. Lecture Notes in Computer Science 5308. Springer. ISSN 0302-9743 ISBN 978-3-540-88624-2
Tang, Qiang (2008) Type-based Proxy Re-encryption and its Construction. Technical Report TR-CTIT-08-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) Revisit the Concept of PEKS: Problems and a Possible Solution. Technical Report TR-CTIT-08-54, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) On Using Encryption Techniques to Enhance Sticky Policies Enforcement. Technical Report TR-CTIT-08-64, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) Type-Based Proxy Re-encryption and Its Construction. In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, December 14-17, 2008, Kharagpur, India. pp. 130-144. Lecture Notes in Computer Science 5365. Springer Verlag. ISBN 978-3-540-89753-8
Tang, Qiang and Bringer, J. and Chabanne, H. and Pointcheval, D. (2008) A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, April 21-23, 2008, Sydney, Australia. pp. 56-70. Lecture Notes in Computer Science 4991. Springer Verlag. ISBN 978-3-540-79103-4
Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Inter-domain Identity-based Proxy Re-encryption. Technical Report TR-CTIT-08-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zych, A.K. and Doumen, J.M. and Jonker, W. and Hartel, P.H. and Petkovic, M. (2008) Method of Key Management. Patent WO2008026184 (Assigned).

2007

Alvisi, L. and Doumen, J.M. and Guerraoui, R. and Koldehofe, B. and Li, H. and van Renesse, R. and Tredan, G. (2007) How robust are gossip-based communication protocols? Operating Systems Review, 41 (5). pp. 14-18. ISSN 0163-5980
Bhargavan, K. and Corin, R.J. and Fournet, C. (2007) Crypto-Verifying Protocol Implementations in ML. In: 3rd Workshop on Formal and Computational Cryptography, FCC 2007, 4-5 Jul 2007, Venice, Italy. INRIA. ISBN not assigned
Bhargavan, K. and Corin, R.J. and Fournet, C. and Gordon, A.D. (2007) Secure Sessions for Web Services. ACM Transactions on Information and System Security (TISSEC), 10 (2). 8:1-8:46. ISSN 1094-9224 *** ISI Impact 0,759 ***
Bolzoni, D. and Crispo, B. and Etalle, S. (2007) ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. In: Proceedings of the 21st Large Installation System Administration Conference (LISA '07), 11-16 November 2007, Dallas, Texas. pp. 141-152. Usenix Association. ISBN 978-1-931971-55-3
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. Technical Report TR-CTIT-07-69, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Constructing practical Fuzzy Extractors using QIM. Technical Report TR-CTIT-07-52, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. In: First International Workshop on Security for Spontaneous Interaction, 16. September 2007, Innsbruck, Austria. pp. 450-456. Ubicomp 2007 Workshop Proceedings. ISBN 978-3-00-022599-4
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) From Watermarks to Fuzzy Extractors: a Practical Construction. Technical Report TR-CTIT-07-75, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Fuzzy extractors for continuous distributions. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), 20-22 March 2007, Singapore. pp. 353-355. ACM. ISBN 1-59593-574-6
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Feeling Is Believing: A Secure Template Exchange Protocol. In: Advances in Biometrics, International Conference (ICB), 27-29 Aug 2007, Seoul, Korea. pp. 897-906. Lecture Notes in Computer Science 4642. Springer Verlag. ISBN 978-3-540-74548-8
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) A unifying view on template protection schemes. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 35-42. Werkgemeenschap voor Informatie- en Communicatietechniek. ISBN 978-90-365-2509-1
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2007) Audit-based compliance control. International Journal of Information Security, 6 (2-3). pp. 133-151. ISSN 1615-5262 *** ISI Impact 1,279 ***
Corin, R.J. (2007) Computational Soundness of Formal Encryption in Coq. In: 3rd Workshop on Formal and Computational Cryptography, FCC 2007, 4-5 Jul 2007, Venice, Italy. INRIA. ISBN not assigned
Corin, R.J. and Deniélou, P.-M. and Fournet, C. and Bhargavan, K. and Leifer, J. (2007) Secure Implementations for Typed Session Abstractions. In: 20th IEEE Computer Security Foundations Symposium (CSF), 6-8 July, Venice, Italy. pp. 170-186. IEEE Computer Society. ISBN 0-7695-2819-8
Corin, R.J. and Denielou, P-M. (2007) A Protocol Compiler for Secure Sessions in ML. In: 3rd Symposium on Trustworthy Global Computing (TGC) Revised Selected Papers, 5-6 Nov 2007, Sophia Antipolis, France. pp. 276-293. Lecture Notes in Computer Science 4912. Springer Verlag. ISBN 978-3-540-78662-7
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2007) Timed Analysis of Security Protocols. Journal of Computer Security, 15 (6). pp. 619-645. ISSN 0926-227X
Czenko, M.R. and Etalle, S. (2007) Core TuLiP. Technical Report TR-CTIT-07-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Etalle, S. (2007) Core TuLiP - Logic Programming for Trust Management. In: Proceedings of the 23rd International Conference on Logic Programming, ICLP 2007, 8-13 Sep 2007, Porto, Portugal. pp. 380-394. Lecture Notes in Computer Science 4670. Springer Verlag. ISBN 978-3-540-74608-9
Czenko, M.R. and Etalle, S. and Li, Dongyi and Winsborough, W.H. (2007) An Introduction to the Role Based Trust Management Framework RT. Technical Report TR-CTIT-07-34, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Etalle, S. and Li, Dongyi and Winsborough, W.H. (2007) An Introduction to the Role Based Trust Management Framework RT. In: Foundations of Security Analysis and Design IV -- FOSAD 2006/2007 Tutorial Lectures. Lecture Notes in Computer Science 4677. Springer Verlag, Berlin, pp. 246-281. ISBN 978-3-540-74809-0
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2007) Extended Privilege Inheritance in RBAC. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security, ASIACCS 2007, March 20-22, Singapore. pp. 383-385. Conference on Computer and Communications Security. ACM Press. ISBN 1-59593-574-6
Dekker, M.A.C. and Crampton, J. and Etalle, S. (2007) RBAC Administration in Distributed Systems. Technical Report TR-CTIT-07-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. Technical Report TR-CTIT-07-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. In: Proceedings of the fourth VLDB Workshop, SDM 2007, 23, 24 Sept 2007, Vienna, Austria. pp. 33-46. Lecture Notes in Computer Science 4721. Springer. ISBN 978-3-540-75247-9
Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2007) Privacy Policies. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 383-397. ISBN 978-3-540-69860-9
Dekker, M.A.C. and den Hartog, J.I. and Etalle, S. (2007) Audit-based Compliance Control (AC2) for EHR Systems. Technical Report TR-CTIT-07-46, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Doumen, J.M. (2007) Non-interactive fuzzy private matching. Technical Report TR-CTIT-07-45, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and den Hartog, J.I. and Marsh, S. (2007) Trust and Punishment. (Invited) In: Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics, Rome, Italy. 5:1-5:6. nstitute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST). ISBN 978-963-9799-09-7
Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. In: Fourth Int. Conf. on Trust, Privacy and Security in Digital Business, TRUSTBUS 2007, 4-6 September 2007, Germany. pp. 145-154. Lecture Notes in Computer Science 4657. Springer Verlag. ISBN 978-3-540-74408-5
Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. Technical Report TR-CTIT-07-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Samarati, P. (2007) Preface of special issue of the proceedings of theSecond International Workshop on Security and Trust Management (STM 2006). In: Proceedings of the Second International Workshop on Security and Trust Management, 20 Sep 2006, Hamburg, Germany. pp. 1-2. Electronic Notes in Theoretical Computer Science 179. Elsevier. ISSN 1571-0661
Etalle, S. and Winsborough, W.H. (2007) A Posteriori Compliance Control. In: 12th ACM Symposium on Access Control Models and Technologies (SACMAT), 20-22 June 2007, Nice, France. pp. 11-20. ACM Press. ISBN 978-1-59593-745-2
Hartel, P.H. and Abelmann, L. (2007) Towards compliant data retention with probe storage on patterned media. Technical Report TR-CTIT-07-49, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Vree, W.G. (2007) Lambda Calculus for Engineers. In: Reflections on Type Theory, Lambda Calculus, and the Mind: Essays Dedicated to Henk Barendregt on the Occasion of his 60th Birthday. Radboud University, Nijmegen, pp. 125-138. ISBN 978-90-9022446-6
de Jong, E.K. and Hartel, P.H. (2007) Method and apparatus for deployment of high integrity software using static procedure return addresses. Patent US 7,181,737 (Assigned).
Koopman, P. and Hubbers, E.M.G.M. and Pieters, W. and Poll, E. and de Vries, R. (2007) Testing the eSTV program for the Scottish Local Government Elections. LaQuSo report not assigned, Radboud University Nijmegen, Nijmegen. ISSN not assigned
Law, Yee Wei and Doumen, J.M. and Palaniswami, M. (2007) Key Management Building Blocks for Wireless Sensor Networks. Technical Report TR-CTIT-07-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Mouthaan, A.J. and Hartel, P.H. (2007) Interim research assessment 2003-2005 - Computer Science. Scientific Report 2007, Faculty of Electrical Engineering, Mathematics and Computer science, University of Twente, Enschede.
Pieters, W. and van Haren, R. (2007) Temptations of turnout and modernisation: e-voting discourses in the UK and the Netherlands. Journal of Information, Communication and Ethics in Society, 5 (4). pp. 276-292. ISSN 1477-996X
Pieters, W. and van Haren, R. (2007) E-voting discourses in the UK and the Netherlands. Technical Report ICIS-R07020, Radboud University Nijmegen, Nijmegen. ISSN 1571-5221
Pieters, W. and Jonker, H.L. (2007) Vote buying revisited: implications for receipt-freeness. In: Proceedings of the 2nd Benelux Workshop on Information and System Security (WISSec 2007), 20-21 Sep 2007, Luxembourg city, Luxembourg. University of Luxembourg. ISSN not assigned
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2007) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. In: Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE '07), October 14-20, 2007, Valencia, Spain. pp. 107-114. IEEE Computer Society. ISBN 0-7695-2989-5
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2007) Specifying Information Security Needs for the Delivery of High Quality Security Services. In: 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, BDIM '07, 21-23 May 2007, Munich, Germany. pp. 112-113. IEEE Computer Society. ISBN 1-4244-1295-1
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. In: Second International Conference on Internet Monitoring and Protection (ICIMP), 1-5 Jul 2007, San Jose, CA, USA. pp. 33-33. IEEE Computer Society. ISBN 0-7695-2911-9
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) Model-Based Mitigation of Availability Risks. Technical Report TR-CTIT-07-04, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. Technical Report TR-CTIT-07-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) Model-Based Mitigation of Availability Risks. In: Second IEEE/IFIP International Workshop on Business-Driven IT Management, 21 May 2007, Munich, Germany. pp. 75-83. IEEE Computer Society. ISBN 1-4244-1295-1
van der Zwaag, B.J. and Khatib, M.G. and Hartel, P.H. (2007) How migrating 0.0001% of address space saves 12% of energy in hybrid storage. Technical Report A4TR-2007.1, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2006

Abadi, M. and Corin, R.J. and Fournet, C. (2006) Computational Secrecy by Typing for the Pi Calculus. In: The Fourth ASIAN Symposium on Programming Languages and Systems (APLAS 2006), 8 Nov - 10 Nov 2006, Sydney, Australia. pp. 253-269. Lecture Notes in Computer Science 4279. Springer Verlag. ISBN 3-540-48937-1
Bolzoni, D. and Etalle, S. (2006) APHRODITE: an Anomaly-based Architecture for False Positive Reduction. Technical Report TR-CTIT-06-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Zambon, Emmanuele and Etalle, S. and Hartel, P.H. (2006) Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System. In: 4th IEEE Int. Information Assurance Workshop (IWIA2006), 13-14 Apr 2006, London, UK. pp. 144-156. IEEE Computer Society. ISBN 0 7695 2564 4
Buhan, I.R. and Bazen, A.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems (Poster Paper). In: 2nd Int. Conf. on Biometrics (ICB), Hong Kong, China. pp. 728-736. Lecture Notes in Computer Science 3832. Springer-Verlag. ISBN 3-540-31111-4
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis. Technical Report TR-CTIT-06-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) Fuzzy extractors for continuous distributions. Technical Report TR-CTIT-06-72, University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2006) The Audit Logic: Policy Compliance in Distributed Systems. Technical Report TR-CTIT-06-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Torabi Dashti, M. (2006) An intruder model for verifying liveness in security protocols. In: FMSE '06: Proceedings of the fourth ACM workshop on Formal methods in security, Alexandria, Virginia, USA. pp. 23-32. ACM. ISBN 1-59593-550-9
Chong, Chuen Ngen and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Yee Wei and Tokmakoff, A. (2006) LicenseScript: A Logical Language for Digital Rights Management. Annals of telecommunications special issue on Network and Information systems security, 61 (3-4). pp. 284-331. ISSN 0003-4347 *** ISI Impact 0,722 ***
Corin, R.J. (2006) Analysis Models for Security Protocols. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 05-76 ISBN 90-365-2279-X
Corin, R.J. and Galindo, D. and Hoepman, J.H. (2006) Securing data accountability in decentralized systems. In: Proceedings of 1st International Workshop on Information Security, IS'06, 30 Oct - 3 Nov 2006, Montpellier, France. pp. 626-635. Lecture Notes in Computer Science 4277. Springer. ISBN 978-3-540-48269-7
Corin, R.J. and den Hartog, J.I. (2006) A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs. In: ICALP 2006 track C, 9-13 Jul 2006, Venice, Italy. pp. 252-263. Lecture Notes in Computer Science 4052. Springer-Verlag. ISBN 3-540-35907-9
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2006) A Logic for Constraint-based Security Protocol Analysis. In: IEEE Symposium on Security and Privacy, 21-25 May 2006, Oakland, US. pp. 155-168. IEEE Computer Society. ISBN 0-7695-2574-1
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-06-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-07-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. Technical Report TR-CTIT-06-49, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. In: Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA), 16-17 Sept 2006, Bertinoro, Italy. pp. 221-236. Elsevier Electronic Notes in Theoretical Computer Science 168. Elsevier. ISSN 1571-0661
Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2006) Privacy in an Ambient World. Technical Report TR-CTIT-06-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Veugen, P.J.M. and Etalle, S. (2006) Audit-based Access Control in de Zorg. Informatiebeveiliging, 8. pp. 19-23. ISSN 1569-1063
Delzanno, G. and Etalle, S. and Gabbrielli, M. (2006) Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. Theory and Practice of Logic Programming, 6 (3). pp. 225-226. ISSN 1471-0684 *** ISI Impact 0,952 ***
van Hoesel, L.F.W. and Law, Yee Wei and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2006) Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. Technical Report TR-CTIT-06-18, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jonker, H.L. and Pieters, W. (2006) Receipt-freeness as a special case of anonymity in epistemic logic. In: Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 29-30 Jun 2006, Cambridge, UK. Robinson College. ISBN not assigned
Law, Yee Wei and Doumen, J.M. and Hartel, P.H. (2006) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks, 2 (1). pp. 65-93. ISSN 1550-4859 *** ISI Impact 1,448 ***
Pieters, W. (2006) Acceptance of voting technology: between confidence and trust. In: K. Stølen et al.(eds) iTrust 2006. pp. 283-297. Lecture Notes in Computer Science 3986. Springer. ISBN 978-3-540-34295-3
Pieters, W. (2006) What proof do we prefer? Variants of verifiability in voting. In: Workshop on Electronic Voting and e-Government in the UK, 27-28 Feb 2006, Edinburgh, UK. pp. 33-39. e-Science Institute. ISSN not assigned
Pieters, W. (2006) Internet voting: a monstrous alliance between democracy and technology? In: Fifth international conference on Cultural Attitudes towards Technology and Communication 2006, 28 Jun - 1 Jul 2006, Tartu, Estonia. pp. 115-129. School of Information Technology, Murdoch University. ISBN 0-86905-968-8
Pieters, W. (2006) Internet voting: a conceptual challenge to democracy. In: Social Inclusion: Societal and Organizational Implications for Information Systems: IFIP TC8 WG8.2 International Working Conference, 12-15 Jul 2006, Limerick, Ireland. pp. 89-103. IFIP International Federation for Information Processing 208/2006. Springer. ISSN 1571-5736 ISBN 978-0-387-34587-1
Pieters, W. and Consoli, L. (2006) Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract). In: Proceedings of the European Computing and Philosophy Conference (E-CAP 2006), 22-24 Jun 2006, Trondheim, Norway. NTNU. ISBN not assigned
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. Technical Report TR-CTIT-06-08, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. Technical Report TR-CTIT-06-73, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. In: 11th International Workshop on Exploring Modeling Methods in Systems Analysis and Design (EMMSAD2006), 5-9 Jun 2006, Luxembourg. pp. 465-472. Presses Universitaries de Namur. ISBN 2-87037-525-5
Zych, A.K. and Doumen, J.M. and Jonker, W. and Hartel, P.H. and Petkovic, M. (2006) Method of Key Management. Patent PH006387, WO-IB2007/053498, EP-06119878.4 (Application).

2005

Bolzoni, D. and Zambon, Emmanuele and Etalle, S. and Hartel, P.H. (2005) Poseidon: A 2-tier Anomaly-based Intrusion Detection System. Technical Report TR-CTIT-05-53, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Schoenmakers, B. and Doumen, J.M. and Jonker, W. (2005) Experiments With Queries Over Encrypted Data Using Secret Sharing. Technical Report TR-CTIT-05-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Schoenmakers, B. and Doumen, J.M. and Jonker, W. (2005) Experiments With Queries Over Encrypted Data Using Secret Sharing. In: VLDB Workshop on Secure Data Management (SDM), September 2-3, 2005, Trondheim, Norway. pp. 33-46. Lecture Notes in Computer Science 3674. Springer-Verlag. ISBN 3-540-28798-1
Buhan, I.R. and Bazen, A.M. and Hartel, P.H. and Veldhuis, R.N.J. (2005) A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems. Technical Report TR-CTIT-05-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Hartel, P.H. (2005) The state of the art in abuse of biometrics. Technical Report TR-CTIT-05-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2005) An Audit Logic for Accountability. Technical Report TR-CTIT-05-11, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2005) An Audit Logic for Accountability. In: 6th International Workshop on Policies for Distributed Systems & Networks (POLICY 2005), 6-8 Jun 2005, Stockholm, Sweden. pp. 34-43. IEEE Computer Society. ISBN 0-7695-2265-3
Cederquist, J.G. and Corin, R.J. and Torabi Dashti, M. (2005) On the quest for impartiality: Design and Analysis of a fair non-repudiation protocol. Technical Report TR-CTIT-05-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Corin, R.J. and Torabi Dashti, M. (2005) On the quest for impartiality: Design and analysis of a Fair Non-repudiation protocol. In: 7th International Conference on Information and Communications Security, ICICS 2005, 10-13 Dec 2005, Beijing, China. pp. 27-39. Lecture Notes in Computer Science 3783. Springer-Verlag. ISBN 3-540-30934-9
Cederquist, J.G. and Torabi Dashti, M. (2005) An Intruder Model for Verifying Termination in Security Protocols. Technical Report TR-CTIT-05-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cheng, Jieyin and Chong, Chuen Ngen and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Nikolaus, S. (2005) STREAMTO: Streaming Content using a Tamper-Resistant Token (Workshop paper). In: 20th IFIP TC11 Int. Conf. on Security and Privacy in the Age of Ubiquitous Computing (SEC), Makuhari-Messe, Chiba, Japan. pp. 601-612. Springer-Verlag. ISBN 0-387-25658-X
Chong, Chuen Ngen and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Yee Wei and Tokmakoff, A. (2005) LicenseScript: A Logical Language for Digital Rights Management. Technical Report TR-CTIT-05-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A Formal Security Analysis of an OSA/Parlay Authentication Interface. Technical Report TR-CTIT-05-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A Formal Security Analysis of an OSA/Parlay Authentication Interface. In: 7th IFIP WG 6.1 Int. Conf. on Formal Methods for Open Object-Based Distributed Systems (FMOODS), Athens, Greece. pp. 131-146. Springer-Verlag. ISBN 3-540-26181-8
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2005) Timed Analysis of Security Protocols. Technical Report TR-CTIT-05-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2005) PS-LTL for Constraint-Based Security Protocol Analysis. In: Logic Programming, 21st International Conference, ICLP 2005, October 2-5, 2005, Sitges, Spain. pp. 439-440. Electronic Notes in Theoretical Computer Science 3668. Springer Verlag. ISBN 3-540-29208-X
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2005) Trust in Virtual Communities. ERCIM News -- Special: Security and Trust Management, 63. pp. 29-30. ISSN 0926-4981
Czenko, M.R. and Tran, H.M. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and den Hartog, J.I. (2005) Nonmonotonic Trust Management for P2P Applications. Technical Report TR-CTIT-05-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Tran, H.M. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and den Hartog, J.I. (2005) Nonmonotonic Trust Management for P2P Applications. In: 1st Int. Workshop on Security and Trust Management (STM), Milan, Italy. pp. 113-130. Electronic Notes in Theoretical Computer Science 157. Elsevier Science. ISSN 1571-0661
Doumen, J.M. and Hulsebosch, B. and Iacob, S.M. and Koster, P. and Kragt, E. and Montaner, J. and Muijen, R. and Petkovic, M. and Vrielink, K. (2005) Security Aspects of the MESEC Architecture. Technical Report TI/RS/2005/018, Telematica Instituut, Enschede.
Doumen, J.M. and Hulsebosch, B. and Iacob, S.M. and Koster, P. and Petkovic, M. (2005) User Controlled Sharing of Commercial and Personal Content. Technical Report TI/RS/2005/017, Telematica Instituut, Enschede.
Etalle, S. and Winsborough, W.H. (2005) Integrity Constraints in Trust Management. Technical Report TR-CTIT-05-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Winsborough, W.H. (2005) Integrity Constraints in Trust Management (Extended Abstract). In: 10th ACM Symp. on Access Control Models and Technologies (SACMAT), June 01 - 03, 2005, Stockholm, Sweden. pp. 1-10. ACM Press. ISBN 1-59593-045-0
Garcia, F.D. and Hasuo, I. and Pieters, W. and van Rossum, P.J.B. (2005) Provable anonymity. In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, Fairfax, VA, USA. pp. 63-72. ACM. ISBN 1-59593-231-3
Hartel, P.H. (2005) A trace semantics for Positive Core XPath. Technical Report TR-CTIT-05-03, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. (2005) A Trace Semantics for Positive Core XPath. In: 12th Int. Symp. on Temporal Representation and Reasoning (TIME), Burlington, Vermont. pp. 103-112. IEEE Computer Society. ISBN 0-7695-2370-6
Hubbers, E.M.G.M. and Jacobs, B.P.F. and Pieters, W. (2005) RIES: Internet voting in action. In: 29th Annual International Computer Software and Applications Conference (COMPSAC 2005), 26-28 Jul 2005. pp. 417-424. IEEE Computer Society. ISSN 0730-3157 ISBN 0-7695-2413-3
Jacobs, B.P.F. and Pieters, W. and Warnier, M. (2005) Statically checking confidentiality via dynamic labels. In: WITS '05: Proceedings of the 2005 workshop on Issues in the theory of security, 10-11 Jan 2005, Long Beach, CA. pp. 50-56. ACM. ISBN 1-58113-980-2
de Jong, E.K. and Hartel, P.H. and Peyret, P. and Cattaneo, P. (2005) Java Card: An analysis of the most successful smart card operating system. Technical Report TR-CTIT-05-50, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jonker, W. and Brinkman, R. and Doumen, J.M. and Schoenmakers, B. (2005) Method of and device for querying of protected structured data. Patent WO2005116792 (Assigned).
Law, Yee Wei and Doumen, J.M. and Hartel, P.H. (2005) Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract). Technical Report TR-CTIT-05-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Hartel, P.H. and Etalle, S. and Havinga, P.J.M. and Di Pietro, R. and Mancini, L.V. (2005) Overview of Security Research in EYES. Technical Report TR-CTIT-05-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Hartel, P.H. and den Hartog, J.I. and Havinga, P.J.M. (2005) Link-layer jamming attacks on S-MAC. In: 2nd European Workshop on Wireless Sensor Networks (EWSN), Istanbul, Turkey. pp. 217-225. IEEE Computer Society. ISBN 0-7803-8801-1
Law, Yee Wei and van Hoesel, L.F.W. and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2005) Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. In: 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Alexandria, Virginia. pp. 76-88. ACM Press. ISBN 1-59593-227-5
Pieters, W. (2005) Veilig online stemmen vanuit San Francisco? Idee, tijdschrift van het kenniscentrum van D66, 26 (1). pp. 8-10. ISSN 0927-2518
Pieters, W. and Becker, M.J. (2005) Ethics of e-voting: an essay on requirements and values in Internet elections. In: Ethics of New Information Technology: Proceedings of the Sixth International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005), 17-19 Jul 2005, Enschede. pp. 307-318. Centre for Telematics and Information Technology University of Twente. ISSN 1574-0846
Zych, A.K. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2005) A Diffie-Hellman based Key Management Scheme for Hierarchical Access Control. Technical Report TR-CTIT-05-57, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2004

Barthe, G. and Cederquist, J.G. and Tarento, S. (2004) A Machine-Checked Formalization of the Generic Model and the Random Oracle Model. In: 2nd International Joint Conference on Automated Reasoning, IJCAR , 4-8 Jul 2004, Cork, Ireland. pp. 385-399. Lecture Notes in Computer Science 3097. Springer-Verlag. ISBN 3-540-22345-2
Bhargavan, K. and Corin, R.J. and Fournet, C. and Gordon, A.D. (2004) Secure Sessions for Web Services. In: ACM Workshop on Secure Web Services (SWS), October 29 - 29, 200, Fairfax, Virginia. pp. 56-66. ACM Press. ISBN 1-58113-973-X
Bossi, A. and Cocco, N. and Etalle, S. and Rossi, S. (2004) Declarative Semantics of Input Consuming Logic Programs. Technical Report TR-CTIT-04-08, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Doumen, J.M. and Jonker, W. (2004) Using secret sharing for searching in encrypted data. Technical Report TR-CTIT-04-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Doumen, J.M. and Jonker, W. (2004) Using secret sharing for searching in encrypted data. In: Workshop on Secure Data Management in a Connected World (SDM), 30 Aug 2004, Toronto, Canada. pp. 18-27. Lecture Notes in Computer Science 3178. Springer-Verlag. ISSN 0302-9743 ISBN 3-540-22983-3
Brinkman, R. and Doumen, J.M. and Jonker, W. and Schoenmakers, B. (2004) Method of and device for querying of protected structured data. Patent PHNL040611 US (Application).
Brinkman, R. and Feng, Ling and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Technical Report TR-CTIT-04-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Feng, Ling and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Information Systems Security Journal, 13 (3). pp. 14-21. ISSN 1065-898X
Brinkman, R. and Feng, Ling and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. In: Proceedings of the 2nd International Workshop on Security In Information Systems (WOSIS), 13-14 Apr 2004, Porto, Portugal. pp. 126-135. INSTICC Press. ISBN 972-8865-07-4
Cederquist, J.G. and Torabi Dashti, M. (2004) Formal Analysis of a Fair Payment Protocol. In: 2nd International Workshop on Formal Aspect of Security and Trust (FAST), 22-27 Aug 2004, Toulouse, France. pp. 41-54. IFIP International Federation for Information Processing 173. Kluwer Academic Publishers. ISBN 9780387240503
Cheng, Jieyin and Chong, Chuen Ngen and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Nikolaus, S. (2004) STREAMTO: Streaming Content using a Tamper-Resistant Token. Technical Report TR-CTIT-04-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Joosten, R. and Kleinhuis, G. (2004) Inter-library Service Brokerage in LicenseScript. Technical Report TR-CTIT-04-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Ren, B. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Corin, R.J. (2004) License Protection with a Tamper-Resistant Token. Technical Report TR-CTIT-04-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Ren, B. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Corin, R.J. (2004) License protection with a tamper-resistant token. In: 5th Workshop on Information Security Applications (WISA), Jeju Island, Korea. pp. 223-237. Springer-Verlag. ISBN 3-540-24015-2
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security Analysis of Parlay/OSA Framework. Technical Report TR-CTIT-04-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security Analysis of Parlay/OSA Framework. In: 9th Int. Conf. on Intelligence in service delivery Networks ICIN, Bordeaux, France. pp. 54-59. IOS Press.
Corin, R.J. and Doumen, J.M. and Etalle, S. (2004) Analysing Password Protocol Security Against Off-line Dictionary Attacks. In: Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004), 26 June 2004, Bologna, Italy. pp. 47-63. Electronic Notes in Theoretical Computer Science 121. Elsevier. ISSN 1571-0661
Corin, R.J. and Etalle, S. (2004) A simple procedure for finding guessing attacks (Extended Abstract). Technical Report TR-CTIT-04-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2004) Timed Model Checking of Security Protocols. Technical Report TR-CTIT-04-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2004) Timed Model Checking of Security Protocols. In: 2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE), Fairfax, Virginia. pp. 23-32. ACM Press. ISBN 1-58113-971-3
Corin, R.J. and Etalle, S. and den Hartog, J.I. and Lenzini, G. and Staicu, I.S. (2004) A Logic for Auditing Accountability in Decentralized Systems. Technical Report TR-CTIT-04-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. and den Hartog, J.I. and Lenzini, G. and Staicu, I.S. (2004) A Logic for Auditing Accountability in Decentralized Systems. In: 2nd Int. Workshop on Formal Aspect of Security and Trust (FAST), Toulouse, France. pp. 187-201. Springer-Verlag. ISBN 0-387-24050-0
Doumen, J.M. and Brinkman, R. and Jonker, W. (2004) Searching in Encrypted Data. In: Finite Fields: Theory and Applications, 5-11 Dec 2004, Oberwolfach, Germany. pp. 2951-2951. Oberwolfach Reports 54/2004. European Mathematical Society. ISSN 1660-8933
Hartel, P.H. and van Eck, P.A.T. and Etalle, S. and Wieringa, R.J. (2004) Modelling mobility aspects of security policies. Technical Report TR-CTIT-04-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and van Eck, P.A.T. and Etalle, S. and Wieringa, R.J. (2004) Modelling mobility aspects of security policies. (Invited) In: Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS), March 10-14, 2004, Marseille, France. pp. 172-191. Lecture Notes in Computer Science 3362. Springer-Verlag. ISBN 3-540-24287-2
Hartel, P.H. and Muller, H.L. and Glaser, H. (2004) The Functional C Experience. Journal of Functional Programming, 14 (2). pp. 129-135. ISSN 0956-7968 *** ISI Impact 1,357 ***
Hubbers, E.M.G.M. and Jacobs, B.P.F. and Pieters, W. (2004) RIES: Internet voting in action. Technical Report NIII-R0449, Radboud University Nijmegen, Nijmegen. ISSN 1571-5221
Kalker, T. and Epema, D.H.J. and Hartel, P.H. and Lagendijk, R.L. and van Steen, M. (2004) Music2Share - Copyright-Compliant Music Sharing in P2P Systems. Proceedings of the IEEE Special Issue on Digital Rights Management, 92 (6). pp. 961-970. ISSN 0018-9219 *** ISI Impact 5,629 ***
Law, Yee Wei and Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Corin, R.J. (2004) Licensing Structured Data with Ease. In: 2nd IFIP TC6 WG6.11 Int. Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmenau, Germany. Technical Univ. Ilmenau. ISBN not assigned
Law, Yee Wei and Doumen, J.M. and Hartel, P.H. (2004) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. Technical Report TR-CTIT-04-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Doumen, J.M. and Hartel, P.H. (2004) Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract). In: 1st IEEE Int. Conf. on Mobile Ad-hoc and Sensor Systems (MASS), 25-27 Oct. 2004, Fort Lauderdale, Florida. pp. 447-456. IEEE Computer Society. ISBN 0-7803-8815-1
Law, Yee Wei and Hartel, P.H. and den Hartog, J.I. and Havinga, P.J.M. (2004) Link-layer Jamming Attacks on S-MAC. Technical Report TR-CTIT-04-52, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Veldhuis, R.N.J. and Bazen, A.M. and Kauffman, J.A. and Hartel, P.H. (2004) Biometric verification based on grip-pattern recognition. Technical Report TR-CTIT-04-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Veldhuis, R.N.J. and Bazen, A.M. and Kauffman, J.A. and Hartel, P.H. (2004) Biometric verification based on grip-pattern recognition. (Invited) In: IS&T/SPIE 16th Annual Symp. on Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California. pp. 634-641. SPIE -- The Int. Society for Optical Engineering. ISBN 0-8194-5209-2

2003

Bossi, A. and Etalle, S. and Rossi, S. and Smaus, J.G. (2003) Termination of Simply Model Logic Programs with Dynamic Scheduling. Technical Report TR-CTIT-03-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Feng, Ling and Etalle, S. and Hartel, P.H. and Jonker, W. (2003) Experimenting with linear search in encrypted data. Technical Report TR-CTIT-03-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Jonker, W. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. Technical Report TR-CTIT-03-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Jonker, W. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. In: 3rd Int. Conf. on Web Delivering of Music (WEDELMUSIC), Leeds, UK. pp. 122-129. IEEE Computer Society. ISBN 0-7695-1935-0
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language. Technical Report TR-CTIT-03-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language. In: IFIP TC6 WG6.11 Int. Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmenau, Germany. pp. 104-115. Technical Univ. Ilmenau.
Chong, Chuen Ngen and Corin, R.J. and Law, Yee Wei and Etalle, S. (2003) License Interpreter, Manager and Interface for LicenseScript. Report Type UNSPECIFIED Number UNSPECIFIED,
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. (2003) Comparing Logic-based and XML-based Rights Expression Languages. Technical Report TR-CTIT-03-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. (2003) Comparing Logic-based and XML-based Rights Expression Languages. In: Confederated Int. Workshops: On The Move to Meaningful Internet Systems (OTM), Catania, Sicily, Italy. pp. 779-792. Springer-Verlag. ISBN 3-540-20494-6
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Law, Yee Wei (2003) Approximating Fair Use in LicenseScript. In: 6th Int. Conf. of Asian Digital Libraries (ICADL), Kuala Lumpur, Malaysia. pp. 432-443. Springer-Verlag. ISBN 3-540-20608-6
Chong, Chuen Ngen and Law, Yee Wei and Etalle, S. and Hartel, P.H. (2003) Approximating Fair Use in LicenseScript. Technical Report TR-CTIT-03-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Peng, Zhonghong and Hartel, P.H. (2003) Secure Audit Logging with Tamper-Resistant Hardware. In: 18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC), Athens, Greece. pp. 73-84. Kluwer Academic Publishers. ISBN 1-4020-7449-2
Corin, R.J. and Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. (2003) How to pay in LicenseScript. Technical Report TR-CTIT-03-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Doumen, J.M. and Etalle, S. (2003) Analysing Password Protocol Security Against Off-line Dictionary Attacks. Technical Report TR-CTIT-03-52, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2003) A Trace Logic for Local Security Properties. Technical Report TR-CTIT-03-21, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2003) A Trace Logic for Local Security Properties. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003), December 14 2003, Mumbai, India. pp. 129-143. Electronic Notes in Theoretical Computer Science 118. Elsevier. ISSN 1571-0661
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2003) On Modelling Real-time and Security properties of Distributed Systems (Extended Abstract). Technical Report TR-CTIT-03-46, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Malladi, S. and Alves-Foss, J. and Etalle, S. (2003) Guess what? Here is a new tool that finds some new guessing attacks. Technical Report TR-CTIT-03-02, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Malladi, S. and Alves-Foss, J. and Etalle, S. (2003) Guess what? Here is a new tool that finds some new guessing attacks (Extended Abstract). In: IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security (WITS), Warsaw, Poland. pp. 62-71. Dipartamento di Scienze dell'Informazione Universita di Bologna.
Di Pietro, R. and Mancini, L.V. and Law, Yee Wei and Etalle, S. and Havinga, P.J.M. (2003) LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. Technical Report TR-CTIT-03-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Di Pietro, R. and Mancini, L.V. and Law, Yee Wei and Etalle, S. and Havinga, P.J.M. (2003) LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In: 32nd Int. Conf. on Parallel Processing Workshops (ICPP), Kaohsiung, Taiwan. pp. 397-406. IEEE Computer Society. ISBN 0-7695-2018-9
Doumen, J.M. (2003) Some Applications of Coding Theory in Cryptography. PhD thesis, Eindhoven University of Technology. ISBN 90-386-0702-4
de Jong, E.K. and Hartel, P.H. (2003) Method and apparatus for deployment of high integrity software using static procedure return addresses. Patent US20030177474 (Application).
Laud, P. and Corin, R.J. (2003) Sound Computational Interpretation of Formal Encryption with Composed Keys. Technical Report TR-CTIT-03-42, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Laud, P. and Corin, R.J. (2003) Sound Computational Interpretation of Formal Encryption with Composed Keys. In: 6th Annual Int. Conf. on Information Security and Cryptology (ICISC), Seoul, Korea. pp. 55-66. Springer-Verlag. ISBN 3-540-21376-7
Law, Yee Wei and Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Corin, R.J. (2003) Licensing Structured Data with Ease. Technical Report TR-CTIT-03-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Corin, R.J. and Etalle, S. and Hartel, P.H. (2003) A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. Technical Report TR-CTIT-03-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Corin, R.J. and Etalle, S. and Hartel, P.H. (2003) A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. In: 4th IFIP TC6/WG6.8 Int. Conf on Personal Wireless Communications (PWC), Venice, Italy. pp. 27-39. Springer-Verlag. ISBN 3-540-20123-8
Law, Yee Wei and Etalle, S. and Hartel, P.H. (2003) Assessing Security in Energy-Efficient Sensor Networks. In: 18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC), May 26-28, 2003, Athens, Greece. pp. 459-463. Kluwer Academic Publishers. ISBN 1-4020-7449-2
Xu, Sheng-bo and Doumen, J.M. and van Tilborg, H.C.A. (2003) On the Security of Digital Signature Schemes Based on Error-Correcting Codes. Designs, Codes and Cryptography, 28 (2). pp. 187-199. ISSN 0925-1022 *** ISI Impact 0,781 ***

2002

Abelmann, L. and Chong, Chuen Ngen and Hartel, P.H. and Lodder, J.C. (2002) Design Rationale for Secure Probe Storage based on Patterned Magnetic Media. Technical Report TR-CTIT-02-42, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Beelen, P. and Doumen, J.M. (2002) Pseudorandom sequences from elliptic curves. In: 6th Int. Conf. Finite Fields with Applications to Coding Theory, Cryptography and Related Areas, Oaxaca, Mexico. pp. 37-52. Springer-Verlag. ISBN 3540439617
Chong, Chuen Ngen and van Buuren, R. and Hartel, P.H. and Kleinhuis, G. (2002) Security Attributes Based Digital Rights Management. Technical Report TR-CTIT-02-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and van Buuren, R. and Hartel, P.H. and Kleinhuis, G. (2002) Security Attributes Based Digital Rights Management. In: Joint Int. Workshop on Interactive Distributed Multimedia Systems / Protocols for Multimedia Systems (IDMS/PROMS), Coimbra, Portugal. pp. 339-352. Springer-Verlag. ISBN 3-540-00169-7
Chong, Chuen Ngen and Law, Yee Wei and Etalle, S. and Hartel, P.H. (2002) LicenseScript - A Language and Framework for Calculating Licenses on Information over Constrained Domains. Technical Report TR-CTIT-02-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Peng, Zhonghong and Hartel, P.H. (2002) Secure Audit Logging with Tamper-Resistant Hardware. Technical Report TR-CTIT-02-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2002) Using Trace Formulae for Security Protocol Design. Technical Report TR-CTIT-02-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. (2002) An Improved Constraint-Based System for the Verification of Security Protocols. Technical Report TR-CTIT-02-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. (2002) An Improved Constraint-based system for the verification of security protocols. In: 9th Int. Static Analysis Symp. (SAS), Madrid, Spain. pp. 239-265. Springer-Verlag. ISBN 3-540-44235-9
Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2002) Polymer Thick-Film Sensors: Possibilities for Smartcard Biometrics. Technical Report TR-CTIT-02-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2002) Low-Cost Planar PTF Sensors for the Identity Verification of Smartcard Holders. (Invited) In: 1st IEEE Int. Conf. on Sensors, Orlando, Florida. pp. 1614-1619. IEEE Computer Society. ISBN 0-7803-7455-X
Henderson, N.J. and White, N.M. and Veldhuis, R.N.J. and Hartel, P.H. and Slump, C.H. (2002) Sensing pressure for authentication. Technical Report TR-CTIT-02-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Henderson, N.J. and White, N.M. and Veldhuis, R.N.J. and Hartel, P.H. and Slump, C.H. (2002) Sensing pressure for authentication. In: 3rd IEEE Benelux Signal Processing Symp. (SPS), Leuven, Belgium. pp. 241-244. ISBN not assigned
Law, Yee Wei and Dulman, S.O. and Etalle, S. and Havinga, P.J.M. (2002) Assessing Security-Critical Energy-Efficient Sensor Networks. Technical Report TR-CTIT-02-18, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Etalle, S. and Hartel, P.H. (2002) Key Management with Group-Wise Pre-Deployed Keying and Secret Sharing Pre-Deployed Keying. Technical Report TR-CTIT-02-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Poll, E. and Hartel, P.H. and de Jong, E.K. (2002) A Java Reference Model of Transacted Memory for Smart Cards. Technical Report TR-CTIT-02-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Poll, E. and Hartel, P.H. and de Jong, E.K. (2002) A Java Reference Model of Transacted Memory for Smart Cards. In: 5th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), San Jose, California. pp. 75-86. USENIX Association. ISBN 1-931971-04-8
Verheul, E. and Doumen, J.M. and van Tilborg, H.C.A. (2002) Sloppy Alice Attacks! Adaptive Chosen Ciphertext Attacks on the McEliece cryptosystem. In: Information, Coding and Mathematics. Kluwer Academic Publishers, Boston, Massachusetts, pp. 99-119. ISBN 1-4020-7079-9

2001

Domingo-Ferrer, J. and Hartel, P.H. (2001) Current directions in smart cards. Computer Networks, 36 (4). pp. 377-379. ISSN 1389-1286 *** ISI Impact 1,446 ***
Hartel, P.H. (2001) Veiligheid in Gedistribueerde Systemen. University of Twente. ISBN not assigned
Hartel, P.H. and Butler, M.J. and de Jong, E.K. and Longley, M. (2001) Transacted Memory for Smart Cards. In: 10th Formal Methods for Increasing Software Productivity (FME), Berlin, Germany. pp. 478-499. Springer-Verlag. ISBN 3-540-41791-5
Hartel, P.H. and Jacobs, B.P.F. (2001) De Smartcard van 2010. Smart Cards in Business, 6 (7). pp. 14-16. ISSN 1569-1179
Hartel, P.H. and Moreau, L.A.V. (2001) Formalising the safety of Java, the Java Virtual Machine and Java Card. Technical Report TR-CTIT-01-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Moreau, L.A.V. (2001) Formalizing the Safety of Java, the Java Virtual Machine and Java Card. ACM Computing Surveys, 33 (4). pp. 517-558. ISSN 0360-0300 *** ISI Impact 5,243 ***
Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2001) Polymer thick-film sensors: Possibilities for smartcard biometrics. In: 11th Conf. on Sensors and Their Applications, London, UK. pp. 83-88. IOP Publishing. ISBN 0750308214
Henderson, N.J. and White, N.M. and Hartel, P.H. (2001) iButton enrolment and verification times for the pressure sequence smartcard biometric. In: 2nd Conf. Smart card Programming and Security (E-smart), Cannes, France. pp. 124-134. Lecture Notes in Computer Science 2140. Springer-Verlag. ISBN 3-540-42610-8

2000

Hartel, P.H. (2000) Formalising Java safety -- An overview. In: 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), Bristol, UK. pp. 115-134. Kluwer Academic Publishers. ISBN 0-7923-7953-5
Hartel, P.H. and de Jong, E.K. (2000) A programming and a modelling perspective on the evaluation of Java Card implementations. In: 1st Java on Smart Cards: Programming and Security (Java Card Workshop), Cannes, France. pp. 52-72. Springer-Verlag. ISBN 3-540-42167-X
Henderson, N.J. and Hartel, P.H. (2000) Pressure Sequence - A Novel Method of Protecting Smart Cards. In: 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), Bristol, UK. pp. 241-256. Kluwer Academic Publishers. ISBN 0-7923-7953-5

1999

Hartel, P.H. and Butler, M.J. and Levy, M. (1999) The Operational Semantics of a Java Secure Processor. In: Formal Syntax and Semantics of Java. Springer-Verlag, Berlin, pp. 313-352. ISBN 3-540-66158-1
Revill, J.D. and Hartel, P.H. (1999) Modelling a Java Ring based implementation of an N-Count payment system. In: 2nd Workshop on Security in Communication Networks, Amalfi, Italy. pp. 139-150. Univ. of Salerno.

1998

Hartel, P.H. and Hill, J. and Sims, M. (1998) An Operational Model of QuickPay. In: 3rd Smart card research and advanced application (CARDIS), Louvain la Neuve, Belgium. pp. 19-28. Springer-Verlag. ISBN 3 540 67923 5

1997

Alberda, M.I. and Hartel, P.H. and de Jong, E.K. (1997) Using Formal Methods to Cultivate Trust in Smart Card Operating Systems. Future Generation Computer Systems, 13 (1). pp. 39-54. ISSN 0167-739X *** ISI Impact 2,430 ***
Butler, M.J. and Hartel, P.H. and de Jong, E.K. and Longley, M. (1997) Applying Formal Methods to the Design of Smart Card Software. Technical Report DSSE-TR-97-8, Department of Electronics and Computer Science, University of Southampton, University of Southampton. ISSN not assigned
Hartel, P.H. (1997) Special issue: Smart cards. Future Generation Computer Systems, 13 (1). pp. 1-2. ISSN 0167-739X *** ISI Impact 2,430 ***

1996

Glaser, H. and Hartel, P.H. and de Jong Frz, E.K.J. (1996) Visualising the Structure of an IC-card Security Architecture. In: Smart Card Convention proceedings 1996 - Technology and markets, Feb 1996, Peterborough, UK. pp. 22-34. Quality Marketing Services Ltd. ISBN not assigned
Glaser, H. and Hartel, P.H. and de Jong, E.K. (1996) Structuring and Visualising an IC-card Security Standard. In: 2nd Smart card research and advanced application (CARDIS), Amsterdam, The Netherlands. pp. 89-110. CWI (Centrum voor Wiskunde en Informatica). ISBN 90 6196 465 2
Hartel, P.H. and de Jong, E.K. (1996) Smart Cards and Card Operating Systems. In: UNIFORUM, San-Francisco, California. pp. 725-730. Uniforum.