EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Group: EWI-DIES: Distributed and Embedded Security
Home Policy Brochure Browse Search User Area Contact Help

2013

Gozalvez, J. and Kargl, F. and Mittag, J. and Kravets, R. and Tsai, M., ed. (2013) VANET '13: Proceeding of the Tenth ACM International Workshop on Vehicular Inter-networking, Systems, and Applications. ACM, New York. ISBN 978-1-4503-2073-3
Abbasi, A. (2013) Critical Infrastructure Vulnerability Assessment and Protection from Protocol Layer to Hardware Layer. Master's thesis, Tsinghua Univ., Beijing, China.
Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013) Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, Codes and Cryptography, 67 (2). pp. 209-232. ISSN 0925-1022 *** ISI Impact 0,78 ***
Arnold, F. and Pieters, W. and Stoelinga, M.I.A. (2013) Quantitative penetration testing with item response theory (extended version). Technical Report TR-CTIT-13-20, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Arnold, F. and Pieters, W. and Stoelinga, M.I.A. (2013) Quantitative penetration testing with item response theory. In: Information Assurance and Security (IAS), 2013 9th International Conference on, 4-6 Dec 2013, Gammarth, Tunisia. pp. 49-54. Information Assurance and Security (IAS), 2013 9th International Conference on. IEEE. ISBN 978-1-4799-2989-4
Bilgin, B. and Bogdanov, A. and Knezevic, M. and Mendel, F. and Wang, Qingju (2013) Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. In: Cryptographic Hardware and Embedded Systems, CHES 2013, 20-23 Aug 2013, Santa Barbara, CA, USA. pp. 142-158. Lecture Notes in Computer Science 8086. Springer Berlin Heidelberg. ISBN 978-3-642-40348-4
Bilgin, B. and Daemen, J. and Nikov, V. and Nikova, S.I. and Rijmen, V. and Van Assche, G. (2013) Efficient and First-Order DPA Resistant Implementations of Keccak. In: 12th Smart Card Research and Advanced Application Conference (CARDIS), 27-29 Nov 2013, Berlin, Germany. pp. 187-199. Lecture Notes in Computer Science (8419). Springer International Publishing. ISBN 978-3-319-08302-5
Bissmeyer, N. and Petit, J.Y. and Bayarou, K. (2013) Copra: Conditional pseudonym resolution algorithm in VANETs. In: 10th Annual Conference on Wireless On-Demand Network Systems and Services, WONS 2013, 18-20 Mar 2013, Banff, Canada. pp. 9-16. IEEE Communications Society. ISBN 978-1-4799-0747-2
Bissmeyer, N. and Schroder, K. and Petit, J.Y. and Mauthofer, S. and Bayarou, K. (2013) Short paper: Experimental analysis of misbehavior detection and prevention in VANETs. In: Fifth IEEE Vehicular Networking Conference, VNC 2013. pp. 198-201. IEEE Communications Society. ISBN 978-1-4799-2687-9
Blakey, E. and Coecke, B. and Mislove, M. and Pavlovic, D. (2013) Information security as a resource. Information and computation, 226. pp. 1-2. ISSN 0890-5401 *** ISI Impact 0,70 ***
Bleikertz, S. and Mastelic, T. and Pape, S. and Pieters, W. and Dimkov, T. (2013) Defining the cloud battlefield - supporting security assessments by cloud customers. In: International Conference on Cloud Engineering (IC2E 2013), 25-27 Mar 2013 , Redwood City, CA . pp. 78-87. IEEE Computer Society. ISBN 978-1-4673-6473-7
Bullee, J.H. (2013) Detection of leadership in informal (small)groups based on CCTV information. Master's thesis, University of Twente.
Casalicchio, E. and Caselli, M. and Coletta, A. (2013) Measuring the global domain name system. IEEE Network, 27. pp. 25-31. ISSN 0890-8044 *** ISI Impact 2,85 ***
Casalicchio, E. and Caselli, M. and Coletta, A. and Nai Fovino, I. (2013) DNS as critical infrastructure, the energy system case study. International Journal of Critical Infrastructures, 9 (1-2). pp. 111-129. ISSN 1475-3219
Caselli, M. and Hadžiosmanović, D. and Zambon, Emmanuele and Kargl, F. (2013) On the feasibility of device fingerprinting in industrial control systems. In: Critical Information Infrastructures Security, 16-18 Sept 2013, Amsterdam. pp. 155-166. Lecture Notes in Computer Science (8328). Springer. ISSN 0302-9743 ISBN 978-3-319-03963-3
Dacier, M. and Kargl, F. and Valdes, A. (2013) Securing critical infrastructures from targeted attacks (Dagstuhl Seminar 12502). Dagstuhl Reports, 2 (12). pp. 49-63. ISSN 2192-5283
De Meyer, L. and Bilgin, B. and Preneel, B. (2013) Extended Analysis of DES S-boxes. In: Proceedings of the 34rd Symposium on Information Theory in the Benelux, 30-31 May 2013, Leuven, Belgium. pp. 140-146. Twente University Press. ISBN 978-90-365-0000-5
Dietzel, S. and Balanici, M. and Kargl, F. (2013) Short Paper: Towards Data-similarity-based Clustering for Inter-vehicle Communication. In: Proceedings of the IEEE Vehicular Networking Conference 2013 (VNC 2013), 16-18 Dec 2013, Boston, MA, USA. pp. 238-241. IEEE Communications Society. ISBN 978-1-4799-2687-9
Dietzel, S. and Petit, J.Y. and Heijenk, G.J. and Kargl, F. (2013) Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols. IEEE Transactions on Vehicular Technology, 62 (4). pp. 1505-1518. ISSN 0018-9545 *** ISI Impact 2,06 ***
Etalle, S. (2013) Innovatie en R&D -- een Inleiding. Magazine nationale veiligheid en crisisbeheersing, 11 (1). pp. 3-5. ISSN 1875-7561
Etalle, S. and Hinrichs, T. and Lee, A. and Trivellato, D. and Zannone, N. (2013) Policy administration in tag-based authorization. In: 5th International Symposium on Foundations and Practice of Security, FPS 2012, 25-26 Oct 2012, Montreal, QC, Canada. pp. 162-179. Lecture Notes in Computer Science 7743. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-37119-6
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2013) Efficient and secure storage of private keys for pseudonymous vehicular communication. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), 04 Nov 2013, Berlin, Germany. pp. 9-18. ACM. ISBN 978-1-4503-2487-8
Feiri, M.P. and Petit, J.Y. and Schmidt, R. and Kargl, F. (2013) The impact of security on cooperative awareness in VANET. In: Fifth IEEE Vehicular Networking Conference, VNC 2013. pp. 127-134. IEEE Communications Society. ISBN 978-1-4799-2687-9
Gozalvez, J. and Haerri, J. and Hartenstein, H. and Heijenk, G.J. and Kargl, F. and Petit, J.Y. and Scheuermann, B. and Tieler, T. (2013) Fundamentals: IVC and Computer Science. In: Inter-Vehicular Communication - Quo Vadis (Dagstuhl Seminar 13392), 22 - 25 Sep 2013, Dagstuhl, Germany. pp. 205-206. Dagstuhl Reports 3 (9). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik. ISSN 2192-5283
Hartel, P.H. (2013) Situative Prävention von Cybercrime: ein chancenreicher Bekämpfungsansatz. In: Cybercrime - Bedrohung, Intervention, Abwehr, 12-13 Nov 2013, Wiesbaden, Germany. pp. 96-108. Bundeskriminalamt. ISBN not assigned
Hartel, P.H. and van den Berg, Jan and Junger, M. (2013) Wat gaan we doen tegen de cyberaanvallen? Informatiebeveiliging, 4 (4). pp. 10-11. ISSN 1569-1063
Hartel, P.H. and Luiijf, E. (2013) Critical information infrastructures security - preface. In: 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, 16-18 Sep 2013, Amsterdam. v-vi. Lecture Notes in Computer Science 8328. Springer. ISBN 978-3-319-03963-3
Höfer, C.N. (2013) POPCORN: Privacy-preserving charging for eMobility. Master's thesis, University of Twente.
van der Heijden, R. and Dietzel, S. and Kargl, F. (2013) SeDyA: secure dynamic aggregation in VANETs. In: WiSec '13 Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 17-19 April 2013, Budapest, Hungary. pp. 131-142. ACM. ISBN 978-1-4503-1998-0
van der Heijden, R. and Dietzel, S. and Kargl, F. (2013) Misbehavior detection in vehicular ad-hoc networks. In: Proceedings of 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2013), 21-22 Feb 2013, Innsbruck, Austria. University of Innsbruck. ISBN not assigned
Hoefer, C. and Petit, J.Y. and Schmidt, R. and Kargl, F. (2013) POPCORN: privacy-preserving charging for eMobility. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), 04 Nov 2013, Berlin, Germany. pp. 37-48. ACM. ISBN 978-1-4503-2487-8
Hoefer, C. and Petit, J.Y. and Schmidt, R. and Kargl, F. (2013) POPCORN: Privacy-preserving Charging for e-Mobility. In: 29. VDI/VW-Gemeinschaftstagung Automotive Security, 25-26 Sep 2013, Kassel, Germany. pp. 33-46. VDI. ISBN not assigned
Ionita, D. (2013) Current established Risk Assessment methodologies and tools. Master's thesis, University of Twente.
Ionita, D. and Hartel, P.H. and Pieters, W. and Wieringa, R.J. (2013) Current established risk assessment methodologies and tools. Technical Report TR-CTIT-14-04, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Jansen, J. and Junger, M. and Montoya Morales, A.L. and Hartel, P.H. (2013) Offenders in a digitized society. In: Cybercrime and the police. Safety & Security Studies. Eleven International Publishing, The Hague, The Netherlands, pp. 45-59. ISBN 978-94-6236-069-3
Jeckmans, A.J.P. and Beye, M.R.T. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2013) Privacy in Recommender Systems. In: Social Media Retrieval. Computer Communications and Networks. Springer Verlag, London, pp. 263-281. ISSN 1617-7975 ISBN 978-1-4471-4554-7
Jeckmans, A.J.P. and Peter, A. and Hartel, P.H. (2013) Efficient privacy-enhanced familiarity-based recommender system. In: Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013, 9-13 Sep 2013, Egham, UK. pp. 400-417. Lecture Notes in Computer Science 8134. Springer. ISBN 978-3-642-40203-6
Junger, M. and Montoya Morales, A.L. and Hartel, P.H. and Karemaker, M. (2013) Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit. Technical Report TR-CTIT-13-07, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Kargl, F. (2013) Softwarepech op de weg. Computer Idee, 2013 (6). pp. 18-21. ISSN 1388-2376
Kargl, F. and Friedman, A. and Boreli, R. (2013) Differential privacy in intelligent transportation systems. In: WiSec '13 Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 17-19 April 2013, Budapest, Hungary. pp. 107-112. ACM. ISBN 978-1-4503-1998-0
Keuper, D. (2013) XNU: a security evaluation. Master's thesis, University of Twente.
Knapik, P. and Schoch, E. and Kargl, F. (2013) Electronic decal: a security function based on V2X communication. In: 77th IEEE Vehicular Technology Conference (VTC 2013-Spring), 02-05 Jun 2013, Dresden, Germany. pp. 1-5. IEEE Vehicular Technology Society. ISSN 1550-2252
Knapik, P. and Schoch, E. and Kargl, F. (2013) Simulation of a Security Function Based on Vehicle-to-X Communication and Automotive Lighting. In: The Second International Conference on Advances in Vehicular Systems, Technologies and Applications (Vehicular 2013), 21-26 Jul 2013, Nice, France. pp. 8-11. IARIA. ISSN 2327-2058 ISBN 978-1-61208-288-2
Knapik, P. and Schoch, E. and Kargl, F. (2013) Security-Funktionen zur Bekämpfung fahrzeugbezogener Kriminalität. In: 29. VDI/VW-Gemeinschaftstagung Automotive Security, 24-25 Sep 2013, Kassel, Germany. pp. 47-62. VDI. ISBN not assigned
Labraoui, N. and Gueroui, M. and Aliouat, M. and Petit, J.Y. (2013) Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommunication systems, 54 (1). pp. 3-17. ISSN 1018-4864 *** ISI Impact 1,03 ***
Lastdrager, E.E.H. and Montoya Morales, A.L. and Hartel, P.H. and Junger, M. (2013) Applying the Lost-Letter Technique to Assess IT Risk Behaviour. In: Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust, 29 Jun 2013, New Orleans, USA. pp. 2-9. IEEE Computer Society. ISBN 978-0-7695-5065-7
Lefevre, S. and Petit, J.Y. and Bajcsy, R. and Laugier, C. and Kargl, F. (2013) Impact of V2X privacy strategies on Intersection Collision Avoidance systems. In: Fifth IEEE Vehicular Networking Conference, VNC 2013. pp. 71-78. IEEE Computer Society. ISBN 978-1-4799-2687-9
Misra, G. (2013) Permeance of ICT in Crime in India. Master's thesis, University of Twente.
Montoya Morales, A.L. (2013) The TREsPASS project. In: ICTOpen2013, 27-28 November 2013, Eindhoven. pp. 1-1. ICTopen. ISBN not assigned
Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2013) How 'Digital' is Traditional Crime? In: European Intelligence and Security Informatics Conference, EISIC 2013, 12-14 Aug 2013, Uppsala, Sweden. pp. 31-37. IEEE Computer Society. ISBN 978-0-7695-5062-6
Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2013) Modus operandi study of information and communication technology (ICT) facilitated crime. In: NVC Congres, 13-14 June 2013, Leiden, The Netherlands. 93. Nederlandse Vereniging voor Criminologie. ISBN not assigned
Pavlovic, D. (2013) Monoidal computer I: Basic computability by string diagrams. Information and computation, 226. pp. 94-116. ISSN 0890-5401 ISBN 978-3-642-29891-2 *** ISI Impact 0,70 ***
Pavlovic, D. (2013) Bicompletions of distance matrices. In: Computation, Logic, games, and Quantum Foundations. Lecture Notes in Computer Science 7860. Springer Verlag, Berlin, pp. 291-310. ISSN 0302-9743 ISBN 978-3-642-38163-8
Peter, A. and Hartman, T. and Muller, S. and Katzenbeisser, S. (2013) Privacy-preserving architecture for forensic image recognition. In: IEEE International Workshop on Information Forensics and Security, WIFS 2012, 2-5 Dec 2012, Tenerife, Spain. pp. 79-84. Information Forensics and Security (WIFS), 2012 IEEE International Workshop (13249609). IEEE Computer Society. ISBN 978-1-4673-2285-0
Peter, A. and Tews, E. and Katzenbeisser, S. (2013) Efficiently outsourcing multiparty computation under multiple keys. IEEE transactions on information forensics and security, 8 (12). pp. 2046-2058. ISSN 1556-6013 *** ISI Impact 1,90 ***
Petit, J.Y. and Mammeri, Z. (2013) Authentication and consensus overhead in vehicular ad hoc networks. Telecommunication systems, 52 (4). pp. 2699-2712. ISSN 1018-4864 *** ISI Impact 1,03 ***
Pieters, W. (2013) On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology, 15 (3). pp. 195-208. ISSN 1388-1957 *** ISI Impact 0,85 ***
Pieters, W. (2013) Defining "The Weakest Link" Comparative Security in Complex Systems of Systems. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, CloudCom, 2-5 Dec 2013, Bristol, United Kingdom. pp. 39-44. IEEE Computer Society. ISBN 978-0-7695-5095-4
Pieters, W. and Dimkov, T. and Pavlovic, D. (2013) Security Policy Alignment: A Formal Approach. IEEE Systems Journal, 7 (2). pp. 275-287. ISSN 1932-8184 *** ISI Impact 1,27 ***
Pieters, W. and Padget, J. and Dechesne, F. and Dignum, V. and Aldewereld, H. (2013) Obligations to enforce prohibitions: on the adequacy of security policies. In: SIN '13 - Proceedings of the 6th International Conference on Security of Information and Networks, 26-28 Nov 2013, Aksaray, Turkey. pp. 54-61. Proceeding. ACM. ISBN 978-1-4503-2498-4
Rocha, B.P.S. and Conti, M. and Etalle, S. and Crispo, B. (2013) Hybrid static-runtime information flow and declassification enforcement. IEEE transactions on information forensics and security, 8 (8). pp. 1294-1305. ISSN 1556-6013 *** ISI Impact 1,90 ***
Schaub, F. and Hipp, M. and Kargl, F. and Weber, M. (2013) On Credibility Improvements for Automotive Navigation Systems. Journal of Personal and Ubiquitous Computing, 17 (5). pp. 803-813. ISSN 1617-4909 *** ISI Impact 1,13 ***
Smulders, E. (2013) User Space Memory Analysis. Master's thesis, University of Twente.
Stoelinga, M.I.A. and Pieters, W. (2013) Attack navigator vindt en verhelpt zwakke plekken. Bits en chips, 4. ISSN 1879-6443
Trivellato, D. and Etalle, S. and Luit, E. and Zannone, N. (2013) The POLIPO Security Framework. In: Situation Awareness with Systems of Systems. Springer Verlag, New York, pp. 189-208. ISBN 978-1-4614-6229-3
Trivellato, D. and Zannone, N. and Glaundrup, M. and Skowronek, J. and Etalle, S. (2013) A semantic security framework for systems of systems. International journal of cooperative information systems, 22 (1). pp. 1-35. ISSN 0218-8430 *** ISI Impact 0,53 ***

2012

Altintas, O. and Chen, W. and Heijenk, G.J. and Oh, H.S. and Chung, J.-M. and Dressler, F. and Kargl, F. and Pau, G. and Schoch, E., ed. (2012) 2012 IEEE Vehicular Networking Conference (VNC): Demo Summaries. CTIT Workshop Proceedings Series (WP 12-03). University of Twente, Enschede. ISSN 0929-0672
Altintas, O. and Chen, W. and Heijenk, G.J. and Oh., H.S. and Chung, J.M. and Dressler, F. and Kargl, F. and Pau, G. and Schoch, E., ed. (2012) 2012 IEEE Vehicular Networking Conference (VNC). IEEE, USA. ISSN 2157-9865 ISBN 978-1-4673-4996-3
Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012) Shift-type homomorphic encryption and its application to fully homomorphic encryption. In: 5th International Conference on Cryptology in Africa, AFRICACRYPT 2012, 10-12 Jul 2012, Ifrane, Morocco. pp. 234-251. Lecture Notes in Computer Science 7374. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-31410-0
Bösch, C.T. and Brinkman, R. and Hartel, P.H. and Jonker, W. (2012) Method and System of Monitoring a Data Stream. Patent P31230NL00/HSE (Application).
Bösch, C.T. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2012) Selective Document Retrieval from Encrypted Database. In: 15th International Conference on Information Security (ISC), 19-21 Sep 2012, Passau, Germany. pp. 224-241. Lecture Notes in Computer Science 7483. Springer Verlag. ISBN 978-3-642-33383-5
Beye, M.R.T. and Jeckmans, A.J.P. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2012) Privacy in Online Social Networks. In: Computational Social Networks: Security and Privacy. Springer Verlag, London, pp. 87-113. ISBN 978-1-4471-4050-4
Bißmeyer, N. and Mauthofer, S. and Kpatcha, B. and Kargl, F. (2012) Assessment of Node Trustworthiness in VANETs Using Data Plausibility Checks with Particle Filters. In: Proceedings of the IEEE Vehicular Networking Conference 2012 (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 78-85. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Bilgin, B. and Nikova, S.I. and Rijmen, V. and Nikov, V. and Stütz, G. (2012) Threshold Implementations of all 3×3 and 4×4 S-boxes. In: Cryptographic Hardware and Embedded Systems, CHES 2012, 9-12 Sep 2012, Leuven, Belgium. pp. 76-91. Lecture Notes in Computer Science 7428. Springer Berlin Heidelberg. ISBN 978-3-642-33026-1
Brusó, M. and Chatzikokolakis, K. and Etalle, S. and den Hartog, J.I. (2012) Linking unlinkability. In: 7th International Symposium on Trustworthy Global Computing (TGC 2012), 07-08 Sep 2012, Newcastle upon Tyne, UK. pp. 129-144. Lecture Notes in Computer Science 8191. Springer Verlag. ISBN 978-3-642-41156-4
Bullee, J.H. and Veldhuis, R.N.J. (2012) Biometric features and privacy : condemned, based upon your finger print. In: Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux and the 2nd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelu, 24-25 May 2012, Boekelo, The Netherlands. pp. 44-51. Twente University Press. ISBN 978-90-365-3383-6
Casalicchio, E. and Caselli, M. and Coletta, A. and Di Blasi, S. and Nai Fovino, I.B. (2012) Measuring name system health. In: 6th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2012, 9-21 Mar 2012, Washington, DC, USA. pp. 155-169. IFIP Advances in Information and Communication Technology 390. Springer. ISBN 978-3-642-35763-3
Coecke, B. and Pavlovic, D. and Vicary, J. (2012) A new description of orthogonal bases. Mathematical Structures in Computer Science, 23 (3). pp. 555-567. ISSN 0960-1295 *** ISI Impact 0,72 ***
Dietzel, S. and Kost, M. and Schaub, F. and Kargl, F. (2012) CANE: A Controlled Application Environment for Privacy Protection in ITS. In: Proceedings of the 12th International Conference on Intelligent Transport Systems Telecommunications (ITST 2012), 5-8 Nov 2012, Taipeh, Taiwan. pp. 71-76. IEEE Communications Society. ISBN 978-1-4673-3070-1
Dietzel, S. and Petit, J.Y. and Kargl, F. and Heijenk, G.J. (2012) Analyzing Dissemination Redundancy to Achieve Data Consistency in VANETs. In: Proceedings of the Ninth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2012), 25 June 2012, Low Wood Bay, UK. pp. 131-134. ACM. ISBN 978-1-4503-1317-9
Dimkov, T. (2012) Alignment of Organizational Security Policies -- Theory and Practice. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 12-218 ISBN 978-90-365-3331-7
Dressler, F. and Kargl, F. (2012) Security in Nano Communication: Challenges and Open Research Issues. In: Proceedings of the IEEE International Workshop on Molecular and Nanoscale Communications (MoNaCom 2012) at IEEE International Conference on Communications (ICC 2012), 11 Jun 2012, Ottawa, Canada. pp. 6183-6187. IEEE Communications Society. ISBN 978-1-4577-2052-9
Dressler, F. and Kargl, F. (2012) Towards security in nano-communication: Challenges and opportunities. Nano Communication Networks, 3 (3). pp. 151-160. ISSN 1878-7789
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2012) Congestion-based Certificate Omission in VANETs. In: Ninth ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2012, June 25, 2012, Low Wood Bay, Lake District, United Kingdom. pp. 135-138. ACM. ISBN 978-1-4503-1317-9
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2012) Evaluation of Congestion-based Certificate Omission in VANETs. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 101-108. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Hadžiosmanović, D. and Bolzoni, D. and Etalle, S. and Hartel, P.H. (2012) Challenges and opportunities in securing industrial control systems. In: Proceedings of the IEEE Workshop on Complexity in Engineering, COMPENG 2012, 11-13 June 2012, Aachen, Germany. pp. 1-6. IEEE. ISBN 978-1-4673-1614-9
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2012) A Log Mining Approach for Process Monitoring in SCADA. International Journal of Information Security, 11 (4). pp. 231-251. ISSN 1615-5262 *** ISI Impact 0,48 ***
Hadžiosmanović, D. and Simionato, L. and Bolzoni, D. and Zambon, Emmanuele and Etalle, S. (2012) N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols. In: Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012), 12-14 Sep 2012, Amsterdam, The Netherlands. pp. 354-373. Lecture Notes in Computer Science 7462. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-33337-8
Hartel, P.H. and Junger, M. (2012) Teaching Engineering students to "Think thief". Technical Report TR-CTIT-12-19, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Muller, H.L. (2012) Simple algebraic data types for C. Software: Practice and Experience, 42 (2). pp. 191-210. ISSN 0038-0644 *** ISI Impact 1,01 ***
Hartel, P.H. and Suryana, N. (2012) Information Security. In: Cyber Safety: An Introduction. Eleven International Publishers, The Hague, pp. 281-291. ISBN 978-94-90947-75-0
van der Heijden, R. (2012) SeDyA: Secure Dynamic Aggregation in VANETs. Master's thesis, University of Twente.
Herrmann, A. and Morali, A. and Etalle, S. and Wieringa, R.J. (2012) Risk and Business Goal Based Security Requirement and Countermeasure Prioritization. In: Workshops on Business Informatics Research (BIR 2011), 6-8 Oct 2011, Riga, Latvia. pp. 64-76. Lecture Notes in Business Information Processing 106. Springer Verlag. ISSN 1865-1348 ISBN 978-3-642-29230-9
Huang, Liting (2012) Secure and Privacy-Preserving Broadcast Authentication for IVC. Master's thesis, University of Twente.
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2012) Privacy-Preserving Collaborative Filtering based on Horizontally Partitioned Dataset. In: International Conference on Collaboration Technologies and Systems (CTS 2012), 21-25 May 2012, Denver, CO, USA. pp. 439-446. IEEE Computer Society. ISBN 978-1-4673-1381-0
Junger, M. and Laycock, G. and Hartel, P.H. and Ratcliffe, J. (2012) Crime science: editorial statement. Crime science, 1 (1). 1:1-1:3. ISSN 2193-7680
Junger, M. and Ottenhof, R.H.J. and Hartel, P.H. (2012) New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students. In: KLM Van Dijk : Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Wolf Legal Publishers, Nijmegen, pp. 191-206. ISBN 978-90-5850-932-1
Kaggwa, F. (2012) Evaluation of Multiple Enrollment for Fingerprint Recognition. Master's thesis, University of Twente.
Kelkboom, E.J.C. and Breebaart, J. and Buhan, I.R. and Veldhuis, R.N.J. (2012) Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources. IEEE Transactions on information forensics and security, 7 (4). pp. 1225-1241. ISSN 1556-6013 *** ISI Impact 1,90 ***
Knapik, P. and Schoch, E. and Müller, M. and Kargl, F. (2012) Understanding Vehicle Related Crime to Elaborate on Countermeasures Based on ADAS and V2X Communication. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 86-93. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Kocabas, U. and Peter, A. and Katzenbeisser, S. and Sadeghi, A. (2012) Converse PUF-based authentication. In: 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, 13-15 Jun 2012, Vienna, Austria. pp. 142-158. Lecture Notes in Computer Science 7344. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-30920-5
Kulikova, O. and Heil, R. and van den Berg, Jan and Pieters, W. (2012) Cyber crisis management: a decision-support framework for disclosing security incident information. In: International Conference on Cyber Security, CyberSecurity 2012, 14-16 Dec 2012, Washington, USA. pp. 103-112. Cyber Security (CyberSecurity), 2012 International Conference . IEEE Computer Society. ISBN 978-1-4799-0219-4
Lagana, M. and Feiri, M.P. and Sall, M. and Lange, M. and Tomatis, A. and Papadimitratos, P. (2012) Secure Communication in Vehicular Networks - PRESERVE Demo. In: 2012 IEEE Vehicular Networking Conference (VNC): Demo Summaries, 14-16 Nov 2012, Seoul, Korea. pp. 11-12. IEEE Communications Society. ISSN 0929-0672
Meadows, C. and Pavlovic, D. (2012) Formalizing physical security procedures. In: 8th International Workshop on Security and Trust Management, STM 2012, 13-14 Sep 2012, Pisa, Italy. pp. 193-208. Lecture Notes in Computer Science 7783. Springer Verlag. ISBN 978-3-642-38004-4
Pavlovic, D. (2012) Quantitative Concept Analysis. In: 10th International Conference on Formal Concept Analysis (ICFCA), 7-10 May 2012, Leuven, Belgium. pp. 260-277. Lecture Notes in Computer Science 7278. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-29891-2
Pavlovic, D. (2012) Tracing the Man in the Middle in Monoidal Categories. In: 11th International Workshop on Coalgebraic Methods in Computer Science, CMCS 2012, 31 Mrt - 01 Apr 2012, Tallinn, Estonia. pp. 191-217. Lecture Notes in Computer Science 7399. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-32783-4
Pavlovic, D. and Meadows, C. (2012) Actor-Network Procedures. In: 8th International Conference on Distributed Computing and Internet Technology, ICDCIT 2012, 2-4 Feb 2012, Bhubaneswar, India. pp. 7-26. Lecture Notes in Computer Science 7154. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-28072-6
Peter, A. and Kronberg, M. and Trei, W. and Katzenbeisser, S. (2012) Additively homomorphic encryption with a double decryption mechanism, revisited. In: 15th International Conference on Information Security, ISC 2012, 19-21 Sep 2012, Passau, Gemany. pp. 242-257. Lecture Notes in Computer Science 7483. Springer Verlag. ISSN 1611-3349 ISBN 978-3-642-33383-5
Petit, J.Y. and Bösch, C.T. and Feiri, M.P. and Kargl, F. (2012) On the Potential of PUF for Pseudonym Generation in Vehicular Networks. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 94-100. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Pieters, W. and van der Ven, S. and Probst, C.W. (2012) A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability. In: Proceedings of the 2012 workshop on New security paradigms (NSPW 2012), 18-21 Sep 2012, Bertinoro, Italy. pp. 1-14. ACM. ISBN 978-1-4503-1794-8
Probst, C.W. and Sasse, A.M. and Pieters, W. and Dimkov, T. and Luysterborg, E. and Arnaud, M. (2012) Privacy penetration testing -- how to establish trust in your cloud provider. In: European Data Protection: In Good Health? International, Foreign and Comparative Law XVIII. Springer, London, pp. 251-266. ISBN 978-94-007-2902-5
Schaub, F. and Könings, B. and Weber, M. and Kargl, F. (2012) Towards context adaptive privacy decisions in ubiquitous computing. In: IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 19-23 Mar 2012, Lugano, Switzerland. pp. 407-410. IEEE Computer Society. ISBN 978-1-4673-0905-9
Schaub, F. and Koenings, B. and Dietzel, S. and Weber, M. and Kargl, F. (2012) Privacy context model for dynamic privacy adaptation in ubiquitous computing. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp 2012, CASEMANS 2012 Workshop, 8 Sep 2012, Pittsburgh, PA, USA. pp. 752-757. ACM. ISBN 978-1-4503-1224-0
Sedghi, S. (2012) Towards Provably Secure Efficiently Searchable Encryption. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 12-219 ISBN 978-90-365-3333-1
Stemmer, J. (2012) Detecting outliers in web-based network traffic. Master's thesis, University of Twente.
Tang, Qiang (2012) Cryptographic framework for analyzing the privacy of recommender algorithms. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 may. 2012, Denver, USA. pp. 455-462. IEEE Computer Society. ISBN 978-1-4673-1381-0
Tang, Qiang (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5 (12). pp. 1351-1362. ISSN 1939-0114 *** ISI Impact 0,31 ***
Tang, Qiang (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2 (4). pp. 304-321. ISSN 1753-0563
Verberkt, S.L.C. (2012) Claiming Security Properties in a Service Oriented Architecture. Master's thesis, University of Twente.
Vriezekolk, E. and Wieringa, R.J. and Etalle, S. (2012) Design and initial validation of the Raster method for telecom service availability risk assessment. In: Proceedings of the 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012), 22-25 April 2012, Vancouver, Canada. 117. Simon Fraser University. ISBN 978-0-86491-332-6
Wagenaar, P. (2012) Detecting botnets using file system indicators. Master's thesis, University of Twente.
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2012) A2thOS: availability analysis and optimisation in SLAs International Journal of Network Management, 22 (2). pp. 104-130. ISSN 1055-7148 *** ISI Impact 0,51 ***

2011

Altintas, O. and Chen, W. and Heijenk, G.J. and Dressler, F. and Ekici, E. and Kargl, F. and Shigeno, H. and Dietzel, S., ed. (2011) Vehicular Networking Conference (VNC). IEEE. ISBN 978-1-4673-0048-3
Altintas, O. and Chen, W. and Heijenk, G.J. and Dressler, F. and Ekici, E. and Kargl, F. and Shigeno, H. and Dietzel, S., ed. (2011) 2011 IEEE Vehicular Networking Conference (VNC): Demo Summaries. CTIT Workshop Proceedings Series (WP 11-04). University of Twente, Enschede. ISSN 0929-0672 ISBN 978-94-6191-079-0
Barthe, G. and Datta, A. and Etalle, S., ed. (2011) Formal aspects of security and trust : 8th international workshop, FAST 2011 Leuven, Belgium, September 12-14, 2011: revised selected papers. Lecture Notes in Computer Science 7140. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-29419-8
Johnson, M. and Pavlovic, D., ed. (2011) Algebraic methodology and software technology : 13th international conference, AMAST 2010. Lecture Notes in Computer Science 6486. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-17795-8
Alberts, G. and Boersma, K. and Broekhans, B. and Dijkstra, Anne and Pieters, W. and Popkema, M. and Vanheste, T. (2011) Inleiding: Kennisklimaat. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 7-11. ISSN 1871-0034 ISBN 978-90-8964-401-5
Bösch, C.T. and Brinkman, R. and Hartel, P.H. and Jonker, W. (2011) Conjunctive Wildcard Search over Encrypted Data. In: 8th VLDB Workshop on Secure Data Management, SDM 2011, 02 Sep 2011, Seattle, WA, USA. pp. 114-127. Lecture Notes in Computer Science 6933. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-23555-9
Bolzoni, D. and Schade, C. L. and Etalle, S. (2011) A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. In: Proceedings of the 25th Large Installation System Administration Conference (LISA 2011), 4-9 Dec 2011, Boston, USA. pp. 201-216. The USENIX Association. ISBN 978-931971-881-3
Chevalking, S.K.L. (2011) Reviewing and Optimizing the Security of FIGO. Master's thesis, University of Twente.
van Cleeff, A. and Dimkov, T. and Pieters, W. and Wieringa, R.J. (2011) Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting. In: Proceedings of the International Conference on IT Convergence and Security (ICITCS 2011), 14-16 Dec, 2011, Suwon, South Korea. pp. 51-67. Lecture Notes in Electrical Engineering 120. Springer Verlag. ISSN 1876-1100 ISBN 978-94-007-2910-0
van Cleeff, A. and Pieters, W. and Wieringa, R.J. and van Tiel, F. (2011) Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization. Information Security Technical Report, 16 (3-4). pp. 142-149. ISSN 1363-4127
Dietzel, S. (2011) Privacy Implications of In-Network Aggregation Mechanisms for VANETs. (Invited) In: Proceedings of the 8th International Conference on Wireless On-demand Network Systems and Services, 26-28 Jan 2011, Bardonecchia, Italy. pp. 91-95. IEEE Communications Society. ISBN 978-1-61284-189-2
Dietzel, S. and Kargl, F. and Heijenk, G.J. and Schaub, F. (2011) Modeling In-Network Aggregation in VANETs. IEEE communications magazine, 49 (11). pp. 142-148. ISSN 0163-6804 *** ISI Impact 3,66 ***
Dimkov, T. and Pieters, W. (2011) Physical Penetration Testing: A Whole New Story in Penetration Testing. PenTest Magazine, 2011 (2). pp. 20-23. ISSN not assigned
Dimkov, T. and Pieters, W. and Hartel, P.H. (2011) Training Students to Steal: A Practical Assignment in Computer Security Education. In: Proceedings of the 42nd ACM Technical Symposium on Computer Science Education (SIGCSE 2011), 9-12 Mar 2011, Dallas, Texas, USA. pp. 21-26. ACM. ISBN 978-1-4503-0500-6
Dressler, F. and Kargl, F. and Ott, J. and Tonguz, O.K. and Wischof, L. (2011) Research Challenges in Intervehicular Communication: Lessons of the 2010 Dagstuhl Seminar. IEEE communications magazine, 49 (5). pp. 158-164. ISSN 0163-6804 *** ISI Impact 3,66 ***
Franz, M. and Williams, P. and Carbunar, B. and Katzenbeisser, S. and Peter, A. and Sion, R. and Sotakova, M. (2011) Oblivious outsourced storage with delegation. In: 15th International Conference on Financial Cryptography and Data Security, FC 2011, 28 Feb - 04 Mar 2011, Gros Islet, St. Lucia. pp. 127-140. Lecture Notes in Computer Science 7035. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-27575-3
Fritz, J. (2011) Hybrid Intrusion detection network monitoring with honeypots. Master's thesis, University of Twente.
Gong, Zheng and Nikova, S.I. and Law, Yee Wei (2011) KLEIN: A New Family of Lightweight Block Ciphers. In: 7th International Workshop on RFID, Security and Privacy (RFIDSec 2011), June 26-28, 2011, Amherst, MA, USA. pp. 1-18. Lecture Notes in Computer Science 7055. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-25285-3
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. and Etalle, S. (2011) MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. In: Proceedings of the European Conference on Computer Network Defense, EC2ND 2011, 6-8 Sept 2011, Gothenburg, Sweden. pp. 41-48. IEEE Computer Society. ISBN 978-0-7695-4762-6
Herrmann, A. and Morali, A. and Etalle, S. and Wieringa, R.J. (2011) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization. In: Perspectives in Business Informatics Research, 6-8 Oct 2011, Riga, Latvia. pp. 155-162. Riga Technical University. ISBN 978-9984-30-197-6
Ibraimi, L. (2011) Cryptographically Enforced Distributed Data Access Control. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 11-208 ISBN 978-90-365-3228-0
Ibraimi, L. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2011) Public-Key Encryption with Delegated Search. In: Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS), 7-10 Jun 2011, Nerja, Spain. pp. 532-549. Lecture Notes in Computer Science 6715. Springer Verlag. ISBN 978-3-642-21553-7
Jafarian, J.H. and Abbasi, A. and Safaei Sheikhabadi, S. (2011) A gray-box DPDA-based intrusion detection technique using system-call monitoring. In: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, 01-02 Sep 2011, Perth, Australia. pp. 1-12. ACM. ISBN 978-1-4503-0788-8
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) Privacy-Preserving Profile Matching Using the Social Graph. Technical Report TR-CTIT-11-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) Privacy-Preserving Profile Matching Using the Social Graph. In: International Conference on Computational Aspects of Social Networks, CASoN 2011, 19-21 Oct 2011 , Salamanca, Spain. pp. 42-47. IEEE Computer Society. ISBN 978-1-4577-1132-9
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks. In: Proceedings of the 18th ACM conference on Computer and communications security (CCS), 17-21 Oct 2011 , Chicago, IL, USA. pp. 793-795. ACM. ISBN 978-1-4503-0948-6
Kargl, F. and Papadimitratos, P. (2011) ACM WiSec 2011 poster and demo session. ACM SIGMOBILE Mobile Computing and Communications Review, 15 (3). pp. 34-34. ISSN 1559-1662
Kolesnichenko, A.V. and de Boer, P.T. and Remke, A.K.I. and Zambon, Emmanuele and Haverkort, B.R.H.M. (2011) Is Quantitative Analysis of Stuxnet Possible? In: QEST 2011: Fast Abstracts, 5-8 Sep 2011, Aachen, Germany. pp. 9-10. CTIT Workshop Proceedings WP11-03. Centre for Telematics and Information Technology University of Twente. ISSN 0929-0672
Kost, M. and Freytag, J.-C. and Kargl, F. and Kung, A. (2011) Privacy Verification Using Ontologies. In: Proceedings of the Sixth International Conference on Availability, Reliability and Security, ARES 2011, 22-26 Aug 2011, Vienna, Austria. pp. 627-632. IEEE Computer Society. ISBN 978-1-4577-0979-1
Kung, A. and Freytag, J.-C. and Kargl, F. (2011) Privacy-by-Design in ITS Applications : The Way Forward. In: Second International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN), 20 Jun 2011, Lucca, Italy. pp. 1-6. IEEE Computer Society. ISBN 978-1-4577-0351-5
Labraoui, N. and Gueroui, M. and Aliouat, M. and Petit, J.Y. (2011) RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks. Journal of Universal Computer Science, 17 (11). pp. 1550-1571. ISSN 0948-695X *** ISI Impact 0,76 ***
Lastdrager, E.E.H. (2011) Securing Patient Information in Medical Databases. Master's thesis, University of Twente.
Law, Yee Wei and Moniava, G. and Gong, Zheng and Hartel, P.H. and Palaniswami, M. (2011) KALwEN: a new practical and interoperable key management scheme for body sensor networks. Security and Communication Networks, 4 (11). pp. 1309-1329. ISSN 1939-0114 *** ISI Impact 0,31 ***
Makri, E. and Konstantinou, E. (2011) Constant round group key agreement protocols: A comparative study. Computers & Security, 30 (8). pp. 643-678. ISSN 0167-4048 *** ISI Impact 1,16 ***
Morali, A. (2011) IT Architecture-Based Confidentiality Risk Assessment in Networks of Organizations. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 11-197 ISBN 978-90-365-3165-8
Nikova, S.I. and Rijmen, V. and Schläffer, M. (2011) Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. Journal of Cryptology, 24 (2). pp. 292-321. ISSN 0933-2790 *** ISI Impact 0,84 ***
Pavlovic, D. (2011) Relating Toy Models of Quantum Computation: Comprehension, Complementarity and Dagger Mix Autonomous Categories. In: 6th International Workshop on Quantum Physics and Logic (QPL 2009), 8-9 April 2009, Oxford, UK. pp. 121-139. Electronic Notes in Theoretical Computer Science 270 (2). Elsevier. ISSN 1571-0661
Pavlovic, D. (2011) Gaming security by obscurity. In: New Security Paradigms Workshop, September 12-15, 2011, Marin County, California. pp. 125-140. ACM. ISBN 978-1-4503-1078-9
Petit, J.Y. and Feiri, M.P. and Kargl, F. (2011) Spoofed Data Detection in VANETs using Dynamic Thresholds. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2011), 14-16 Nov 2011, Amsterdam, Netherlands. pp. 25-32. IEEE Communications Society. ISBN 978-1-4673-0049-0
Petit, J.Y. and Mammeri, Z. (2011) Dynamic Consensus for Secured Vehicular Ad Hoc Networks. In: Proceedings of the 7th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, IEEE WiMob 2011, 10-12 Oct 2011, Shanghai, China. pp. 1-8. IEEE Computer Society. ISSN 2160-4886 ISBN 978-1-4577-2013-0
Pieters, W. (2011) Explanation and trust: what to tell the user in security and AI? Ethics and information technology, 13 (1). pp. 53-64. ISSN 1388-1957 *** ISI Impact 0,85 ***
Pieters, W. (2011) Cloud security in vogelvlucht. Informatiebeveiliging, 2011 (1). pp. 16-17. ISSN 1569-1063
Pieters, W. (2011) High security, human significance: Informatiebeveiliging in Twente. Informatiebeveiliging, 2011 (2). pp. 14-17. ISSN 1569-1063
Pieters, W. (2011) Representing humans in system security models: An actor-network approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2 (1). pp. 75-92. ISSN 2093-5374
Pieters, W. (2011) The (social) construction of information security. The Information Society, 27 (5). pp. 326-335. ISSN 0197-2243 *** ISI Impact 1,11 ***
Pieters, W. (2011) Risicopersonalisatie en haar falen in collectieve vraagstukken. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 197-207. ISSN 1871-0034 ISBN 978-90-8964-401-5
Pieters, W. (2011) Security and privacy in the clouds: a bird's eye view. In: Computers, Privacy and Data Protection: an Element of Choice. Springer, Dordrecht, pp. 445-457. ISBN 978-94-007-0640-8
Pieters, W. (2011) How devices transform voting. In: Innovating Government. Normative, policy and technological dimensions of modern government. Information Technology and Law Series 20. T.M.C. Asser Press, The Hague, pp. 439-452. ISSN 1570-2782 ISBN 978-90-6704-730-2
Pieters, W. and Coles-Kemp, L. (2011) Reducing normative conflicts in information security. In: Proceedings of the 2011 New security paradigms workshop, NSPW '11, 12-15 Sep 2011, Marin County, CA. pp. 11-24. ACM. ISBN 978-1-4503-1078-9
Popkema, M. and Pieters, W. and Boersma, K. and Broekhans, B. (2011) Epiloog: Het klimaat voor kennis in de kennissamenleving. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 225-231. ISSN 1871-0034 ISBN 978-90-8964-401-5
Schmidt, R.K. and Brakemeier, A. and Leinmüller, T. and Kargl, F. and Schäfer, G. (2011) Advanced carrier sensing to resolve local channel congestion. In: Proceedings of the Eighth ACM international workshop on Vehicular inter-networking, VANET 2011, 23 Sep 2011, Las Vegas, Nevada, USA. pp. 11-20. ACM. ISBN 978-1-4503-0869-4
Sedghi, S. and Hartel, P.H. and Jonker, W. and Nikova, S.I. (2011) Privacy Enhanced Access Control by Means of Policy Blinding. In: Proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, 30 May - 1 Jun 2011, Guangzhou, China. pp. 108-122. Lecture Notes in Computer Science 6672. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-21030-3
Tang, Qiang (2011) Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. In: Proceedings of the 16th Australian conference on information security and privacy, 11-13 Jul 2011, Melbourne, Australia. pp. 389-406. Lecture Notes in Computer Science 6812. Springer Verlag. ISBN 978-3-642-22497-3
Tang, Qiang (2011) Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization. Technical Report TR-CTIT-11-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang and Chen, Liqun (2011) Extended KCI attack against two-party key establishment protocols. Information processing letters, 111 (15). pp. 744-747. ISSN 0020-0190 *** ISI Impact 0,49 ***
Tang, Qiang and Jeckmans, A.J.P. (2011) Towards a security model for computational puzzle schemes. International Journal of Computer Mathematics, 88 (11). pp. 2246-2257. ISSN 0020-7160 *** ISI Impact 0,54 ***
Trivellato, D. and Zannone, N. and Etalle, S. (2011) A Security Framework for Systems of Systems. In: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY , 6-8 Jun 2011, Pisa, Italy. pp. 182-183. IEEE Computer Society. ISBN 978-1-4244-9879-6
Trivellato, D. and Zannone, N. and Etalle, S. (2011) Protecting Information in Systems of Systems. In: 18th ACM Conference on Computer and Communications Security (CCS), 17-21 Oct 2011, Chicago, USA . pp. 865-867. ACM. ISBN 978-1-4503-0948-6
Vriezekolk, E. and Wieringa, R.J. and Etalle, S. (2011) A New Method to Assess Telecom Service Availability Risks. In: Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2011, 8-11 May 2011, Lisbon, Portugal. 196. LNEC. ISBN 978-972-49-2247-8
Vriezekolk, E. and Wieringa, R.J. and Etalle, S. (2011) How to assess telecom service availability risks for crisis organisations? In: Advances in Safety, Reliability and Risk Management, 18-22 Sep 2011, Troyes, France. pp. 2653-2661. Taylor & Francis. ISBN 978-0-415-68379-1
Warmer, M. (2011) Detection of Web Based Command & Control Channels. Master's thesis, University of Twente.
Zambon, Emmanuele (2011) Towards Optimal IT Availability Planning: Methods and Tools. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 10-188 ISBN 978-90-365-3102-3
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. and Hartel, P.H. (2011) Model-based Qualitative Risk Assessment for Availability of IT Infrastructures. Software and Systems Modeling, 10 (4). pp. 553-580. ISSN 1619-1366 *** ISI Impact 1,25 ***

2010

Degano, P. and Etalle, S. and Guttman, J., ed. (2010) Formal aspects of security and trust : 7th international workshop, FAST 2010 Pisa, Italy, September 16-17, 2010: revised selected papers. Lecture Notes in Computer Science 6561. Springer Verlag, Berlin. ISBN 978-3-642-19751-2
Alemneh, E. (2010) Sharing Nonlinear Gates in the Presence of Glitches. Master's thesis, University of Twente.
Barreto, P.S. and Nikov, V. and Nikova, S.I. and Rijmen, V. and Tischhouser, E. (2010) Wirlwind: a New Cryptographic Hash Function. Designs, Codes and Cryptography, 56 (2-3). pp. 141-162. ISSN 0925-1022 *** ISI Impact 0,78 ***
Bauer, L. and Etalle, S. and den Hartog, J.I. and Viganò, L. (2010) Preface of Special Issue on “Computer Security: Foundations and Automated Reasoning”. Journal of Automated Reasoning, 46 (3-4). pp. 223-224. ISSN 0168-7433 *** ISI Impact 0,57 ***
Böhm, K. and Etalle, S. and den Hartog, J.I. and Hütter, C. and Trabelsi, S. and Trivellato, D. and Zannone, N. (2010) A flexible architecture for privacy-aware trust management. Journal of Theoretical and Applied Electronic Commerce Research, 5 (2). pp. 77-96. ISSN 0718-1876
de Beule, J. and Edel, Y. and Käsper, E. and Klein, Andreas and Nikova, S.I. and Preneel, B. and Schillewaert, J. and Storme, L. (2010) Galois geometries and applications. Designs, Codes and Cryptography, 56 (2-3). pp. 85-86. ISSN 0925-1022 *** ISI Impact 0,78 ***
Beye, M. and Jeckmans, A.J.P. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2010) Literature Overview - Privacy in Online Social Networks. Technical Report TR-CTIT-10-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brzuska, C. and Busch, H. and Dagdelen, O. and Fischlin, M. and Franz, M. and Katzenbeisser, S. and Manulis, M. and Onete, C. and Peter, A. and Poetering, B. and Schröder, D. (2010) Redactable signatures for tree-structured data: definitions and constructions. In: 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, 22-25 Jun 2010, Beijing, China. pp. 87-104. Lecture Notes in Computer Science 6123. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-13707-5
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Tang, Qiang and Veldhuis, R.N.J. (2010) Embedding Renewable Cryptographic Keys into Noisy Data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262 *** ISI Impact 0,48 ***
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) ANWB-enquête niet democratisch. NRC handelsblad, 40 (25-01-2010). 6. ISSN 0002-5259
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Zorg liever voor een overzichtelijk stembiljet. NRC handelsblad, 40 (07-06-2010). pp. 6-6. ISSN 0002-5259
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Benefits of Location-Based Access Control:A Literature Study. In: Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010), 18-20 Dec, 2010, Hangzhou, China. pp. 739-746. IEEE Computer Society. ISBN 978-1-4244-9779-9
Costa, A. (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection. Master's thesis, University of Twente.
Dietzel, S. and Kargl, F. and Heijenk, G.J. and Schaub, F. (2010) On the Potential of Generic Modeling for VANET Data Aggregation Protocols. In: Proceedings of the 2nd IEEE Vehicular Networking Conference, 13-15 Dec 2010, Jersey City, New Jersey, USA. pp. 78-85. IEEE Communications Society. ISBN 978-1-4244-9524-5
Dietzel, S. and Schoch, E. and Kargl, F. and Könings, B. and Weber, M. (2010) Resilient Secure Aggregation for Vehicular Networks. IEEE Network, 24 (1). pp. 26-31. ISSN 0890-8044 *** ISI Impact 2,85 ***
Dimkov, T. and van Cleeff, A. and Pieters, W. and Hartel, P.H. (2010) Two methodologies for physical penetration testing using social engineering. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), 06-10 Dec 2010, Austin, Texas, USA. pp. 399-408. ACM. ISBN 978-1-4503-0133-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: representing attack scenarios spanning through the physical, digital and social domain. In: Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers, 27-28 March 2010, Paphos, Cyprus. pp. 112-129. Lecture Notes in Computer Science 6186. Springer Verlag. ISBN 978-3-642-16074-5
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. Technical Report TR-CTIT-10-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: analyzing multi-domain insider threats. Technical Report TR-CTIT-10-39, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), 4-8 Oct 2010, Chicago, Illinois, US. pp. 666-668. ACM. ISBN 978-1-4503-0245-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations. In: Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010), 18-20 Dec 2010, Hangzhou, China. pp. 727-732. IEEE Computer Society. ISBN 978-1-4244-9779-9
Gong, Zheng (2010) Review of "Robust defenses for cross-site request forgery" by A. Barth, C. Jackson, J. Mitchell. Computing reviews. CR137694. ISSN 1530-6585
Gong, Zheng and Long, Yu and Hong, Xuan and Chen, Kefei (2010) Practical Certificateless Aggregate Signatures From Bilinear Maps. Journal of Information Science and Engineering, 26 (6). pp. 2093-2106. ISSN 1016-2364 *** ISI Impact 0,30 ***
Gong, Zheng and Nikova, S.I. and Law, Yee Wei (2010) KLEIN: A New Family of Lightweight Block Ciphers. Technical Report TR-CTIT-10-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Gong, Zheng and Tang, Qiang and Law, Yee Wei and Chen, Hongyang (2010) KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. In: Proceedings of the International Conference on Information Security and Cryptology, INSCRYPT 2010, 20-24 Oct 2010, Shanghai, China. pp. 268-283. Lecture Notes in Computer Science 6584. Springer Verlag. ISBN 978-3-642-21517-9
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2010) A Log Mining Approach for Process Monitoring in SCADA. Technical Report TR-CTIT-10-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2010) MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. In: Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), 15-17 Sep 2010, Ottawa, Canada. pp. 500-501. Lecture Notes in Computer Science 6307. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-15511-6
Hartel, P.H. and Junger, M. and Wieringa, R.J. (2010) Cyber-crime Science = Crime Science + Information Security. Technical Report TR-CTIT-10-34, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Muller, H.L. (2010) Simple algebraic data types for C. Technical Report TR-CTIT-10-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Herrmann, A. and Morali, A. (2010) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization (extended version). Technical Report TR-CTIT-10-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hipp, M. and Schaub, F. and Kargl, F. and Weber, M. (2010) Interaction Weaknesses of Personal Navigation Devices. In: Proceedings of the Second International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI 2010, 11-12 Nov 2010, Pittsburgh, USA. pp. 129-136. ACM. ISBN 978-1-4503-0437-5
Ibraimi, L. and Nikova, S.I. and Jonker, W. and Hartel, P.H. (2010) An Identity-Based Group Signature with Membership Revocation in the Standard Model. Technical Report TR-CTIT-10-26, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2010) Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. International Journal of Computational Models and Algorithms in Medicine (IJCMAM), 1 (2). pp. 1-21. ISSN 1947-3133
Jonker, H.L. and Pieters, W. (2010) Anonymity in voting revisited. In: Towards Trustworthy Elections: New Directions in Electronic Voting. Lecture Notes in Computer Science 6000. Springer Verlag, Berlin, pp. 216-230. ISSN 0302-9743 ISBN 978-3-642-12979-7
Kargl, F. and Schaub, F. and Dietzel, S. (2010) Mandatory Enforcement of Privacy Policies using Trusted Computing Principles. In: Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA. pp. 104-109. AAAI. ISBN 978-1-57735-459-8
Könings, B. and Schaub, F. and Kargl, F. and Weber, M. (2010) Towards Territorial Privacy in Smart Environments. In: Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA. pp. 113-118. AAAI. ISBN 978-1-57735-459-8
Khatib, M.G. and Hartel, P.H. (2010) Optimizing MEMS-Based Storage Devices for Mobile Battery-Powered Systems. ACM Transactions on Storage, 6 (1). pp. 1-37. ISSN 1553-3077 *** ISI Impact 1,12 ***
Khatib, M.G. and Hartel, P.H. and van Dijk, H.W. (2010) Energy-Efficient Streaming Using Non-volatile Memory. Journal of Signal Processing Systems, 60 (2). pp. 149-168. ISSN 1939-8018 *** ISI Impact 0,55 ***
Kok, G. (2010) Cloud Computing & Confidentiality. Master's thesis, University of Twente.
Langer, L. and Jonker, H.L. and Pieters, W. (2010) Anonymity and Verifiability in Voting: Understanding (Un)Linkability. In: 12th International Conference Information and Communications Security, ICICS 2010, 15-17 Dec 2010, Barcelona, Spain. pp. 296-310. Lecture Notes in Computer Science 6476. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-17649-4
Leinmüller, T. and Schoch, E. and Kargl, F. and Maihöfer, C. (2010) Decentralized position verification in geographic ad hoc routing. Security and Communication Networks, 3 (4). pp. 289-302. ISSN 1939-0114 *** ISI Impact 0,31 ***
van Liesdonk, P. and Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2010) Computationally Efficient Searchable Symmetric Encryption. In: Proceedings of the Seventh International Workshop on Secure Data Management, SDM 2010, 17 Sep 2010, Singapore. pp. 87-100. Lecture Notes in Computer Science (6358). Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-15545-1
Luo, Y. and Lai, X. and Gong, Zheng (2010) Pseudorandomness analysis of the (extended) Lai–Massey scheme. Information processing letters, 111 (2). pp. 90-96. ISSN 0020-0190 *** ISI Impact 0,49 ***
Ma, Zhendong and Kargl, F. and Weber, M. (2010) Measuring long-term location privacy in vehicular communication systems. Computer communications, 33 (12). pp. 1414-1427. ISSN 0140-3664 *** ISI Impact 1,08 ***
Morali, A. and Wieringa, R.J. (2010) Risk-Based Confidentiality Requirements Specification for Outsourced IT Systems (Extended Version). Technical Report TR-CTIT-10-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Wieringa, R.J. (2010) Risk-Based Confidentiality Requirements Specification for Outsourced IT Systems. In: Proceedings of the 18th IEEE International Requirements Engineering Conference (RE 2010), 27 Sept - 1 Oct 2010, Sydney, Australia. pp. 199-208. IEEE Computer Society. ISBN 978-0-7695-4162-4
Morali, A. and Wieringa, R.J. (2010) Towards Validating Risk Indicators Based on Measurement Theory (Extended version). Technical Report TR-CTIT-10-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Wieringa, R.J. (2010) Towards Validating Risk Indicators Based on Measurement Theory. In: ISSRE 2010 Supplemental Proceedings: 1st International Workshop on Risk and Trust in Extended Enterprises, 01 Nov 2010, USA. pp. 443-447. IEEE Computer Society. ISBN 978-0-7695-4255-3
Morali, A. and Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2010) CRAC: Confidentiality Risk Assessment and IT-Architecture Comparison. In: Proceedings of the 6th International Conference on Network and Service Management (CNSM 2010), 25-29 Oct 2010, Niagara Falls, Canada. pp. 322-325. IEEE Computer Society. ISBN 978-1-4244-8910-7
Nasution, S. and Hartel, P.H. and Suryana, N. and Azman, N. and Shahib, S. (2010) Trust Level and Routing Selection for Mobile Agents in a Smart Home. In: Second International Conference on Computer Modeling and Simulation (ICCMS), 22-24 Jan. 2010, Sanya, China. pp. 445-450. IEEE Computer Society. ISBN 978-0-7695-3941-6
Ottenhof, R.H.J. (2010) Towards automated truancy detection. Master's thesis, University of Twente.
Pavlovic, D. (2010) Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks. In: 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, 16-17 September 2010, Pisa, Italy. pp. 1-17. Lecture Notes in Computer Science 6561. Springer. ISBN 978-3-642-19751-2
Pavlovic, D. (2010) The Unreasonable Ineffectiveness of Security Engineering: An Overview. In: 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010, 13-18 Sep 2010, Pisa, Italy. pp. 12-18. Software Engineering and Formal Methods. IEEE Computer Society. ISBN 978-1-4244-8289-4
Pavlovic, D. and Meadows, C. (2010) Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol. In: Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics (MFPS 2010), 6-10 May 2010, Ottawa, Ontario, Canada . pp. 97-122. Electronic Notes in Theoretical Computer Science 265. Elsevier. ISSN 1571-0661
Pavlovic, D. and Pepper, P. and Smith, D.R. (2010) Formal Derivation of Concurrent Garbage Collectors. In: 10th International Conference on Mathematics of Program Construction, MPC 2010, June 21-23, 2010, Québec City, Canada. pp. 353-376. Springer. ISBN 978-3-642-13321-3
Pieters, W. (2010) ANKH: Information Threat Analysis with Actor-NetworK Hypergraphs. Technical Report TR-CTIT-10-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Explanation and trust: what to tell the user in security and AI? Technical Report TR-CTIT-10-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Security and privacy in the clouds: a bird's eye view. Technical Report TR-CTIT-10-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Reve{a,i}ling the risks: a phenomenology of information security Techné: Research in Philosophy and Technology, 14 (3). pp. 176-188. ISSN 1091-8264
Pieters, W. (2010) Verifiability of electronic voting: between confidence and trust. In: Data Protection in a Profiled World. Springer, Dordrecht, pp. 157-175. ISBN 978-90-481-8864-2
Pieters, W. (2010) Informational precaution. In: 8th Conference on Computing and Philosophy (ECAP10), 4-6 Oct 2010, Munich, Germany. pp. 320-325. Verlag Dr. Hut. ISBN 978-3-86853-546-4
Pieters, W. and Boersma, K. and Alberts, G. and Timmer, J. and Dijkstra, Anne and Popkema, M. (2010) Inzicht en toezicht: controle in de kennissamenleving. In: Inzicht en toezicht: controle in de kennissamenleving. Jaarboek Kennissamenleving (6). Aksant, Amsterdam, pp. 7-17. ISSN 1871-0034 ISBN 978-90-5260-384-1
Pontes Soares Rocha, B. and Bandhakavi, S. and den Hartog, J.I. and Winsborough, W.H. and Etalle, S. (2010) Towards static flow-based declassification for legacy and untrusted programs. In: IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, California. pp. 93-108. IEEE Computer Society. ISBN 978-0-7695-4035-1
Qiu, Weidong and Gong, Zheng and Liu, Bozhong and Long, Yu and Chen, Kefei (2010) Restrictive partially blind signature for resource-constrained information systems. Knowledge and Information Systems, 26 (1). pp. 87-103. ISSN 0219-1377
Schaub, F. and Kargl, F. and Ma, Zhendong and Weber, M. (2010) V-Tokens for Conditional Pseudonymity in VANETs. In: IEEE Wireless Communications and Networking Conference (WCNC 2010), Sydney, Australia. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-6396-1
Schmidt, R.K. and Leinmüller, T. and Schoch, E. and Kargl, F. and Schäfer, G. (2010) Exploration of Adaptive Beaconing for Efficient Intervehicle Safety Communication. IEEE Network, 24 (1). pp. 14-19. ISSN 0890-8044 *** ISI Impact 2,85 ***
Schoch, E. and Bako, B. and Dietzel, S. and Kargl, F. (2010) Dependable and Secure Geocast in Vehicular Networks. In: Proceedings of the Seventh ACM international workshop on VehiculAr InterNETworking, VANET 2010, 24 Sep 2010, Chicago, US. pp. 61-68. ACM. ISBN 978-1-4503-0145-9
Schoch, E. and Kargl, F. (2010) On the Efficiency of Secure Beaconing in VANETs. In: Proceedings of the third ACM conference on Wireless network security (ACM WiSec 2010), Hoboken, New Jersey, USA. pp. 111-116. ACM. ISBN 978-1-60558-923-7
Schwartzenberg, J. (2010) Using Machine Learning Techniques for Advanced Passive Operating System Fingerprinting. Master's thesis, University of Twente.
Sedghi, S. and van Liesdonk, P. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2010) Searching Keywords with Wildcards on Encrypted Data. Technical Report TR-CTIT-10-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and van Liesdonk, P. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2010) Searching Keywords with Wildcards on Encrypted Data. In: Proceedings of the Seventh international Conference on Security and Cryptography for Networks (SCN), 13-15 September 2010, Amalfi, Italy. pp. 138-153. Lecture Notes in Computer Science 6280. Springer Verlag. ISBN 978-3-642-15316-7
Tang, Qiang (2010) From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. Technical Report TR-CTIT-10-01, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2010) User-friendly matching protocol for online social networks. In: ACM Conference on Computer and Communications Security, 4-8 Oct 2010, Chicago, IL, USA. pp. 732-734. ACM. ISBN 978-1-4503-0245-6
Tang, Qiang (2010) Privacy Preserving Mapping Schemes Supporting Comparison. In: ACM Cloud Computing Security Workshop (CCSW), 9 Oct 2010, Chicago, Illinois. pp. 53-58. ACM. ISBN 978-1-4503-0089-6
Tang, Qiang and Jeckmans, A.J.P. (2010) On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. Technical Report TR-CTIT-10-02, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang and Jeckmans, A.J.P. (2010) Efficient Client Puzzle Schemes to Mitigate DoS Attacks. In: International Conference on Computational Intelligence and Security (CIS 2010), 11-14 dec 2010, Nanning, China. pp. 293-297. IEEE Computational Intelligence Society. ISBN 978-1-4244-9114-8
van Vliet, F. (2010) Threat Detection Systems. Master's thesis, University of Twente.
Wiedersheim, B. and Kargl, F. and Ma, Zhendong and Papadimitratos, P. (2010) Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough. In: The Seventh International Conference on Wireless On-demand Network Systems and Services (WONS 2010), Kranska Gora, Slovenia. pp. 176-183. IEEE Computer Society. ISBN 978-1-4244-6059-5
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2010) A2THOS: Availability Analysis and Optimisation in SLAs Technical Report TR-CTIT-10-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zannone, N. and Petkovic, M. and Etalle, S. (2010) Towards Data Protection Compliance. In: Proceedings of the 5th International Conference on Security and Cryptography (SECRYPT 2010), 26-28 July 2010, Athens, Greece. pp. 213-216. SciTePress. ISBN 978-989-8425-18-8

2009

Preneel, B. and Dodunekov, S. and Rijmen, V. and Nikova, S.I., ed. (2009) Enhancing cryptographic primitives with techniques from error correcting codes. NATO Science for Peace and Security Series D - Information and Communication Security 23. IOS Press, Amsterdam. ISSN 1874-6268 ISBN 978-1-60750-002-5
Bolzoni, D. (2009) Revisiting Anomaly-based Network Intrusion Detection Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-147 ISBN 978-90-365-2853-5
Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. Technical Report TR-CTIT-09-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. In: Recent Advances in Intrusion Detection (RAID). pp. 1-20. Lecture Notes in Computer Science 5758. Springer Verlag. ISBN 978-3-642-04341-3
Buhan, I.R. and Boom, B.J. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2009) Secure pairing with biometrics. International Journal of Security and Networks, 4 (1/2). pp. 27-42. ISSN 1747-8405
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Security Implications of Virtualization: A Literature Study. Technical Report TR-CTIT-09-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Security Implications of Virtualization: A Literature Study. In: 2009 IEEE International Conference on Computational Science and Engineering (CSE09), volume 3, 29 Aug - 31 Aug, Vancouver, BC, Canada. pp. 353-358. IEEE Computer Society. ISBN 978-0-7695-3823-5
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Gooi eigen servers en pc's niet weg. TIEM, Tijdschrift voor Informatie en Management, 34. pp. 8-9. ISSN 1572-5472
Czenko, M.R. (2009) TuLiP : reshaping trust management. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-148 ISBN 978-90-365-2854-2
Czenko, M.R. and Etalle, S. (2009) LP with Flexible Grouping and Aggregates Using Modes. In: 19th International Symposium, LOPSTR, Revised Selected Papers, 9-11 Sep 2009, Coimbra, Portugal. pp. 67-81. LNCS 6037. Springer. ISBN 978-3-642-12591-1
Dekker, M.A.C. (2009) Flexible Access Control for Dynamic Collaborative Environments. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-159 ISBN 978-90-365-2950-1
Dimkov, T. (2009) The key-free society. In: Living the ICT future. Centre for Telematics and Information Technology University of Twente, Enschede, pp. 28-29. ISBN 978-90-365-2963-1
Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain. Technical Report TR-CTIT-09-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Two methodologies for physical penetration testing using social engineering. Technical Report TR-CTIT-09-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Winsborough, W.H. (2009) Maintaining control while delegating trust: Integrity constraints in trust management. ACM Transactions on Information and System Security, 13 (1). 5:1-5:27. ISSN 1094-9224 *** ISI Impact 0,69 ***
Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) TuLP: A Family of Secure and Practical Message Authentication Codes for Body Sensor Networks. Technical Report TR-CTIT-09-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) Towards Secure and Practical MACs for Body Sensor Networks. In: 10th International Conference on Cryptology in India (INDOCRYPT), 13-16 Dec 2009, New Delhi, India. pp. 182-198. Lecture Notes in Computer Science 5922. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-10627-9
Hartel, P.H. (2009) On the Cost and Benefits of Building a High-Quality Institutional Repository. Technical Report TR-CTIT-09-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Haverkort, B.R.H.M. and Remke, A.K.I. and Hartel, P.H. (2009) Betere beveiliging Scada-systemen vitaal voor Nederlandse infrastructuren. Bits en chips, 11 (16). pp. 23-23. ISSN 1879-6443
Ibraimi, L. and Petkovic, M. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and its Application (extended version). Technical Report TR-CTIT-09-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Petkovic, M. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In: Information Security Applications, 25-27 August 2009, Busan, Korea. pp. 309-323. Lecture Notes in Computer Science 5932/2009. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-10837-2
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. In: 5th Information Security Practice and Experience Conference (ISPEC), 12-15 April 2009, Xi'an, China. pp. 1-12. Lecture Notes in Computer Science 5451. Springer. ISSN 0302-9743 ISBN 978-3-642-00842-9
Jacobs, B.P.F. and Pieters, W. (2009) Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. In: Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures. Lecture Notes in Computer Science 5705. Springer Verlag, Berlin, pp. 121-144. ISSN 0302-9743 ISBN 978-3-642-03828-0
Jeckmans, A.J.P. (2009) Practical Client Puzzle from Repeated Squaring. Master's thesis, University of Twente.
Jonker, W. and Brinkman, R. and Maubach, S. (2009) Secure storage system and method for secure storing. Patent WO2007125454 (Assigned).
Khatib, M.G. (2009) MEMS-Based Storage Devices - Integration in Energy-Constrained Mobile Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-145 ISBN 978-90-365-2847-4
Khatib, M.G. and Hartel, P.H. (2009) Policies for Probe-Wear Leveling in MEMS-Based Storage Devices. In: Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 21-23 Sep 2009, London, UK. pp. 152-161. IEEE Computer Society. ISSN 1526-7539 ISBN 978-1-4244-4928-6
Law, Yee Wei and Palaniswami, M. and van Hoesel, L.F.W. and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2009) Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks, 5 (1). 6:1-6:38. ISSN 1550-4859 *** ISI Impact 1,44 ***
Marincic, J. and Mader, A.H. and Wieringa, R.J. (2009) A Handbook Supporting Model-Driven Software Development - a Case Study. Technical Report TR-CTIT-09-11, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2009) CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks (extended version). Technical Report TR-CTIT-09-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Houmb, S.H. and Sallhammar, K. and Etalle, S. (2009) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. In: 31st International Conference on Software Engineering - Companion Volume, 16-24 May 2009, Vancouver, Canada. pp. 130-140. IEEE Computer Society. ISBN 978-1-4244-3494-7
Nasution, S. and Hartel, P.H. and Suryana, N. and Azman, N. and Shahib, S. (2009) Trust Level and Routing Selection for Mobile Agents in a Smart Home (Extended version). Technical Report TR-CTIT-09-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nasution, S. and Suryana, N. and Shahib, S. and Abu, N.A. and Hartel, P.H. (2009) The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home. In: International Technology, Education and Development Conference (INTED), 9-11 March 2009, Valencia, Spain. 702. International Association of Technology, Education and Development (IATED). ISBN 978-84-612-7578-6
Pieters, W. (2009) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2009 (3). pp. 23-25. ISSN 1569-1063
Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. Technical Report TR-CTIT-09-21, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2009) Converging technologies and de-perimeterisation: towards risky active insulation. In: Proceedings of SPT 2009: Converging technologies, changing societies, 7-10 Jul 2009, Enschede, The Netherlands. pp. 58-60. CEPTES, University of Twente. ISBN not assigned
Pieters, W. (2009) Reve{a,i}ling the risks: a phenomenology of information security Technical Report TR-CTIT-09-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. In: E-Voting and Identity: Second International Conference, VOTE-ID 2009, 7-8 Sep 2009, Luxembourg city, Luxembourg. pp. 172-190. Lecture Notes in Computer Science 5767. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-04134-1
Pieters, W. and van Cleeff, A. (2009) The Precautionary Principle in a World of Digital Dependencies. IEEE Computer, 42 (6). pp. 50-56. ISSN 0018-9162 *** ISI Impact 1,68 ***
Pieters, W. and van Cleeff, A. (2009) The precautionary principle in a world of digital dependencies. Technical Report TR-CTIT-09-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and van Cleeff, A. and Wieringa, R.J. (2009) Voor goede keuzes heb je tijd nodig. Trouw, 67 (19855, 5 Aug 2009). 25. ISSN not assigned
Pieters, W. and Consoli, L. (2009) Vulnerabilities and responsibilities: dealing with monsters in computer security. Journal of information, communication and ethics in society, 7 (4). pp. 243-257. ISSN 1477-996X
Pieters, W. and Popkema, M. and Broekhans, B. and Dijkstra, Anne and Boersma, K. and Alberts, G. (2009) Gevoel voor kennis: emoties in de kennissamenleving. In: Gevoel voor kennis. Jaarboek Kennissamenleving 5. Aksant, Amsterdam, pp. 7-20. ISSN 1871-0034 ISBN 978-90-5260-351-3
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. Technical Report TR-CTIT-09-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada. pp. 240-251. Lecture Notes in Computer Science 5645. Springer Verlag. ISBN 978-3-642-03006-2
Saffarian, M. and Tang, Qiang and Jonker, W. and Hartel, P.H. (2009) Dynamic User Role Assignment in Remote Access Control. Technical Report TR-CTIT-09-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and van Liesdonk, P. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2009) Adaptively Secure Computationally Efficient Searchable Symmetric Encryption. Technical Report TR-CTIT-09-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Sinderen, M.J. and Pras, A. and Haverkort, B.R.H.M. and Apers, P.M.G. and Hartel, P.H. and van de Pol, J.C. and Nijholt, A. and Wieringa, R.J. and Havinga, P.J.M. and Akşit, M. (2009) Research Self-Evaluation 2003-2008, Computer Science Department, University of Twente. Technical Report Number UNSPECIFIED, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Spiessens, F. and den Hartog, J.I. and Etalle, S. (2009) Know what you trust. In: Formal Aspects in Security and Trust, 5th International Workshop, Malaga, Spain. pp. 129-142. Lecture Notes in Computer Science 5491. Springer Verlag. ISBN 978-3-642-01464-2
Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2009) A Taxonomy of Service Discovery Systems. In: Context-Aware Computing and Self-Managing Systems. CRC Studies in Informatics. Chapman and Hall, Boca Raton, pp. 43-77. ISBN 1-420-07771-6
Tang, Qiang (2009) Timed-Ephemerizer: Make Assured Data Appear and Disappear. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. pp. 195-208. Lecture Notes in Computer Science 6391. Springer Verlag. ISBN 978-3-642-16440-8
Tang, Qiang and Chen, Liqun (2009) Public-key Encryption with Registered Keyword Search. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. pp. 163-178. Lecture Notes in Computer Science 6391. Springer Verlag. ISBN 3-642-16440-4
Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Inter-domain Identity-Based Proxy Re-encryption. In: Information Security and Cryptology, 4th International Conference (Inscrypt), December 14-17, 2008, Beijing China. pp. 332-347. Lecture Notes in Computer Science 5487. Springer Verlag. ISBN 978-3-642-01439-0
Trivellato, D. and Spiessens, A.O.D. and Zannone, N. and Etalle, S. (2009) Reputation-based ontology alignment for autonomy and interoperability in distributed access control. In: Proceedings 12th IEEE International conference on Computational Science and Engineering, 29-31 Aug. 2009, Vancouver BC, Canada. pp. 252-258. IEEE. ISBN 978-0-7695-3823-5
Trivellato, D. and Spiessens, A.O.D. and Zonnone, N. and Etalle, S. (2009) POLIPO: Policies & ontologies for interoperability, portability, and autonomy. In: IEEE International Symposium on Policies for Distributed Systems and Networks, 20-22 July 2009, London, UK. pp. 110-113. IEEE. ISBN 978-0-7695-3742-9
Weng, J. and Yang, Yanjiang and Tang, Qiang and Deng, R. and Bao, F. (2009) Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. In: Information Security - 12th International Conference, ISC, Pisa, Italy, September 7-9, 2009, Pisa, Italy. pp. 151-166. Lecture Notes in Computer Science 5735. Springer Verlag. ISBN 978-3-642-04473-1
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. and Hartel, P.H. (2009) Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures. Technical Report TR-CTIT-09-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2008

Barosso, D. and Bartle, R. and Chazeran, C. and de Zwart, M. and Doumen, J.M. and Gorniak, S. and Kaźmierczak, M. and Kaskenmaa, M. and Benavente López, D. and Martin, A. and Naumann, I. and Reynolds, R. and Richardson, J. and Rossow, C. and Rywczyoska, A. and Thumann, M. (2008) Security and privacy in massively-multiplayer online games and social and corporate virtual worlds. ENISA Position Paper 1 ENISA (European Network and Information Security Agency), Crete. ISSN not assigned
Bijlsma, T. and Bekooij, M.J.G. and Jansen, P.G. and Smit, G.J.M. (2008) Communication between Nested Loop Programs via Circular Buffers in an Embedded Multiprocessor System. In: Proceedings of the 11th international workshop on Software & compilers for embedded systems (SCOPES), 14 March 2008, Munich, Germany. pp. 33-42. ACM International Conference Proceeding Series 296. ACM Press. ISBN not assigned
Bolzoni, D. and Crispo, B. and Etalle, S. (2008) ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems. Technical Report TR-CTIT-08-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. (2008) Approaches in Anomaly-based Network Intrusion Detection Systems. In: Intrusion Detection Systems. Advances in Information Security 38. Springer Verlag, London, pp. 1-16. ISBN 978-0-387-77265-3
Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. Technical Report TR-CTIT-08-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. In: Confederated International Conferences On the Move to Meaningful Internet Systems (OTM), November 9-14, 2008, Monterrey, Mexico. pp. 938-955. Lecture Notes in Computer Science 5332. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-88872-7
Buhan, I.R. (2008) Cryptographic keys from noisy data, theory and applications. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 08-129 ISBN 978-9-03652-738-5
Buhan, I.R. (2008) A New Secure Pairing Protocol using Biometrics. Technical Report TR-CTIT-08-63, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. (2008) Controlling Leakage of Biometric Information using Dithering. In: 16th European Signal Processing Conference, 25-29 Aug 2008, Lausanne, Switzerland. 1569105382. EUSIPCO. EURASIP, European Association for Signal, Speech and Image Processing. ISBN 978-2-8399-0450-6
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Tang, Qiang and Veldhuis, R.N.J. (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, 20 - 22 October, 2008, Birmingham, UK. pp. 294-310. Lecture Notes in Computer Science 5308. Springer. ISBN 978-3-540-88624-2
Chmielewski, L. and Brinkman, R. and Hoepman, J.H. and Bos, B. (2008) Using JASON to secure SOA. In: 1st International Workshop on Middleware Security (MIDSEC), 2 Dec 2008, Leuven, Belgium. pp. 13-18. ACM. ISBN 978-1-60558-363-1
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2008) Trust Management in P2P systems using Standard TuLiP. Technical Report TR-CTIT-08-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2008) Trust Management in P2P Systems Using Standard TuLiP. In: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway. pp. 1-16. IFIP International Federation for Information Processing 263/2008. Springer. ISSN 1571-5736 ISBN 978-0-387-09427-4
Czenko, M.R. and Etalle, S. (2008) LP with Flexible Grouping and Aggregates Using Modes. Technical Report TR-CTIT-08-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Davarynejad, M. and Sedghi, S. and Bahrepour, M. and Ahn, C.W. and Akbarzadeh, M. and Coello Coello, C. A. (2008) Detecting Hidden Information from Watermarked Signal using Granulation Based Fitness Approximation. In: Applications of soft Computing: From Theory to Praxis, 10-28 Nov 2008. pp. 463-472. Advances in Itelligent and Soft Computing 58. Springer Verlag. ISSN 1867-5662 ISBN 978-3-540-89618-0
Dekker, M.A.C. and Crampton, J. and Etalle, S. (2008) RBAC administration in distributed systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, 11-13 June 2008, Estes Park, Colorado, USA. pp. 93-102. ACM. ISBN 978-1-60558-129-3
Dimkov, T. and Tang, Qiang and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. In: Proceedings of the Workshop on Modeling Security (MODSEC08), 28 Sep 2008, Toulouse. 18. CEUR Workshop Proceedings. ISSN 1613-0073
Dimkov, T. and Tang, Qiang and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. Technical Report TR-CTIT-08-57, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Durmaz Incel, O. and Jansen, P.G. (2008) Characterization of multi-channel interference. In: 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, 2008. WiOPT 2008., 1-3 April 2008, Berlin, Germany. pp. 429-435. IEEE Computer Society. ISBN 978-963-9799-18-9
Durmaz Incel, O. and Jansen, P.G. and Mullender, S.J. (2008) MC-LMAC: A Multi-Channel MAC Protocol for Wireless Sensor Networks. Technical Report TR-CTIT-08-61, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Engelen, J.B.C. and Khatib, M.G. (2008) A ''Millipede'' scanner model - Energy consumption and performance. Technical Report TR-CTIT-08-51, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. (2008) Nice to know. Technical University of Eindhoven, Eindhoven. ISBN 978-90-386-1427-4
Gong, Zheng and Lai, X.J. and Chen, Kefei (2008) On the Design of Secure and Fast Double Block Length Hash Functions. Technical Report TR-CTIT-08-71, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Gong, Zheng and Long, Yu and Hong, Xuan and Chen, Kefei (2008) Practical Certificateless Aggregate Signatures From Bilinear Maps. Technical Report TR-CTIT-08-74, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Abelmann, L. and Khatib, M.G. (2008) Towards Tamper-Evident Storage on Patterned Media. In: 6th USENIX Conf. on File and Storage Technologies (FAST), Feb. 26-29, 2008, San Jose, California. pp. 283-296. USENIX Association. ISBN 978-1-931971-56-0
Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow (with appendix). Technical Report TR-CTIT-08-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow. In: 8th Int. Conf. on Formal Methods in Computer Aided Design (FMCAD), 17-20 Nov. 2008, Portland, Oregon. pp. 161-170. IEEE Computer Society. ISBN 978-1-4244-2735-2
Horsman, M. and Marin-Perianu, M. and Jansen, P.G. and Havinga, P.J.M. (2008) A Simulation Framework for Evaluating Complete Reprogramming Solutions in Wireless Sensor Networks. In: 3rd International Symposium on Wireless Pervasive Computing, 7-9 May 2008, Greece. pp. 6-10. IEEE Computer Society. ISBN 978-1-4244-1653-0
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. Technical Report TR-CTIT-08-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: Proceedings of the 5th VLDB Workshop, SDM 2008, August 24, 2008, Auckland, New Zealand. pp. 185-198. Lecture Notes in Computer Science 5159. Springer Verlag. ISBN 978-3-540-85258-2
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. Technical Report TR-CTIT-08-75, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Khatib, M.G. and Engelen, J.B.C. and Hartel, P.H. (2008) Shutdown Policies for MEMS-Based Storage Devices -- Analytical Models. Technical Report TR-CTIT-08-03, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Khatib, M.G. and Hartel, P.H. (2008) Power Management of MEMS-Based Storage Devices for Mobile Systems. In: Proceedings of the 8th ACM & IEEE International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES '08), 19-24 Oct 2008, Atlanta, USA. pp. 245-254. ACM. ISBN 978-1-60558-469-0
Khatib, M.G. and Miller, E.L. and Hartel, P.H. (2008) Workload-Based Configuration of MEMS-Based Storage Devices for Mobile Systems. In: Proceedings of the 8th ACM & IEEE International Conference on Embedded Software (EMSOFT '08), 19-24 Oct 2008, Atlanta, USA. pp. 41-50. ACM. ISBN 978-1-60558-468-3
Law, Yee Wei and Moniava, G. and Gong, Zheng and Hartel, P.H. and Palaniswami, M. (2008) KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks. Technical Report TR-CTIT-08-67, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Mader, A.H. and Marincic, J. and Wupper, H. (2008) Modelling Embedded Systems by Non-Monotonic Refinement. Technical Report TR-CTIT-08-38, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Mader, A.H. and Wupper, H. and Boon, M. and Marincic, J. (2008) A Taxonomy of Modelling Decisions for Embedded Systems Veri?cation. Technical Report TR-CTIT-08-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. (2008) Wireless Sensor Networks in Motion - Clustering Algorithms for Service Discovery and Provisioning. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 08-130 ISBN 978-90-365-2745-3
Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A generalized clustering algorithm for dynamic wireless sensor networks. Technical Report TR-CTIT-08-56, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks. In: Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA-08), 10-12 Dec 2008, Sydney, Australia. pp. 863-870. IEEE Computer Society. ISBN 978-0-7695-3471-8
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2008) Cluster-based service discovery for heterogeneous wireless sensor networks. International Journal of Parallel, Emergent and Distributed Systems, 23 (4). pp. 325-346. ISSN 1744-5760
Marincic, J. and Mader, A.H. and Wieringa, R.J. (2008) Classifying Assumptions Made During Requirements Verification of Embedded Systems. In: Requirements Engineering: Foundation for Software Quality, 14th International Working Conference, REFSQ 2008, 16-17 Jun 2008, Montpellier, France. pp. 141-146. Springer Verlag. ISBN 978-3-540-69060-3
Marincic, J. and Mader, A.H. and Wupper, H. and Wieringa, R.J. (2008) Non-monotonic modelling from initial requirements: a proposal and comparison with monotonic modelling methods. In: IWAAPF '08: Proceedings of the 3rd international workshop on Applications and advances of problem frames, 10 May 2008, Leipzig, Germany. pp. 67-73. ACM. ISBN 978-1-60558-020-3
Morali, A. and Zambon, Emmanuele and Etalle, S. and Overbeek, P. (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. Technical Report TR-CTIT-08-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Etalle, S. and Overbeek, P. (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. In: Third IEEE International Workshop on Business-Driven IT Management, 07 Apr 2008, Salvador, Brazil. pp. 31-40. IEEE Computer Society. ISBN 978-1-4244-2191-6
Morali, A. and Zambon, Emmanuele and Houmb, S.H. and Sallhammar, K. and Etalle, S. (2008) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. Technical Report TR-CTIT-08-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nikova, S.I. and Rijmen, V. and Schlaffer, M. (2008) Using normal bases for compact hardware implementations of the AES S-box. In: 6th International Conference Security in Communication Networks (SCN), 10-12 Sep 2008, Amalfi, Italy. pp. 236-245. Lecture Notes in Computer Science 5229. Springer Verlag. ISBN 978-3-540-85854-6
Pieters, W. (2008) Vertrouwen en werkelijkheid in de stemcomputercontroverse. In: Burger in Uitvoering. Jaarboek Kennissamenleving 4. Aksant, Amsterdam, pp. 17-25. ISBN 978-90-5260-307-0
Pieters, W. (2008) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2008 (3). pp. 18-20. ISSN 1569-1063
Pieters, W. (2008) Betrouwbaarheid of vertrouwbaarheid : Vertrouwen in technologie en bestuur. Openbaar bestuur, 18 (10). pp. 27-30. ISSN 0925-7322
Pieters, W. (2008) La volonté machinale: understanding the electronic voting controversy. PhD thesis, Radboud University Nijmegen. ISBN 978-90-9022554-8
Pieters, W. and Becker, M.J. (2008) Ethics of e-voting: an essay on requirements and values in Internet elections. In: E-Democracy: Concepts and Practices. Icfai University Press, pp. 134-157. ISBN 978-81-314-1914-4
Scholten, J. and van Dijk, H.W. (2008) Home Network Security. In: ICN2008, The Seventh International Conference on Networking, 13-18 Apr 2008, Cancun, Mexico. pp. 249-255. IEEE Computer Society. ISBN 978-0-7695-3106-9
Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version). Technical Report TR-CTIT-08-50, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption. In: 10th international conference on information and communication security, 20-22 Oct 2008, Birmingham, UK. pp. 345-360. Lecture Notes in Computer Science 5308. Springer. ISSN 0302-9743 ISBN 978-3-540-88624-2
Tang, Qiang (2008) Type-based Proxy Re-encryption and its Construction. Technical Report TR-CTIT-08-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) Revisit the Concept of PEKS: Problems and a Possible Solution. Technical Report TR-CTIT-08-54, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) On Using Encryption Techniques to Enhance Sticky Policies Enforcement. Technical Report TR-CTIT-08-64, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) Type-Based Proxy Re-encryption and Its Construction. In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, December 14-17, 2008, Kharagpur, India. pp. 130-144. Lecture Notes in Computer Science 5365. Springer Verlag. ISBN 978-3-540-89753-8
Tang, Qiang and Bringer, J. and Chabanne, H. and Pointcheval, D. (2008) A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, April 21-23, 2008, Sydney, Australia. pp. 56-70. Lecture Notes in Computer Science 4991. Springer Verlag. ISBN 978-3-540-79103-4
Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Inter-domain Identity-based Proxy Re-encryption. Technical Report TR-CTIT-08-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zych, A.K. and Doumen, J.M. and Jonker, W. and Hartel, P.H. and Petkovic, M. (2008) Method of Key Management. Patent WO2008026184 (Assigned).

2007

Etalle, S. and Marsh, S., ed. (2007) Trust Management, Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada. IFIP International Federation for Information Processing 238. Springer Verlag, Berlin. ISBN 978-0-387-73654-9
Alvisi, L. and Doumen, J.M. and Guerraoui, R. and Koldehofe, B. and Li, H. and van Renesse, R. and Tredan, G. (2007) How robust are gossip-based communication protocols? Operating Systems Review, 41 (5). pp. 14-18. ISSN 0163-5980
Baarsma, H.E. and Hurink, J.L. and Jansen, P.G. (2007) Statistical quality analysis of schedulers under soft-real-time constraints. Technical Report TR-CTIT-07-26, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bhargavan, K. and Corin, R.J. and Fournet, C. (2007) Crypto-Verifying Protocol Implementations in ML. In: 3rd Workshop on Formal and Computational Cryptography, FCC 2007, 4-5 Jul 2007, Venice, Italy. INRIA. ISBN not assigned
Bhargavan, K. and Corin, R.J. and Fournet, C. and Gordon, A.D. (2007) Secure Sessions for Web Services. ACM Transactions on Information and System Security (TISSEC), 10 (2). 8:1-8:46. ISSN 1094-9224 *** ISI Impact 0,69 ***
Bijlsma, T. and Bekooij, M.J.G. and Smit, G.J.M. and Jansen, P.G. (2007) Efficient Inter-Task Communication for Nested Loop Programs on a Multiprocessor System. In: 18th Annual Workshop on Circuits Systems and Signal Processing (ProRISC), 29-30 Nov 2007, Veldhoven, The Netherlands. pp. 122-127. Technology Foundation STW. ISBN 978-90-73461-49-9
Bijlsma, T. and Bekooij, M.J.G. and Smit, G.J.M. and Jansen, P.G. (2007) Omphale: Streamlining the Communication for Jobs in a Multi Processor System on Chip. Technical Report TR-CTIT-07-44, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Crispo, B. and Etalle, S. (2007) ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. In: Proceedings of the 21st Large Installation System Administration Conference (LISA '07), 11-16 November 2007, Dallas, Texas. pp. 141-152. Usenix Association. ISBN 978-1-931971-55-3
Bosch, H.G.P. and Farag, E.N. and Mullender, S.J. and Nathues, A. and Samuel, L.G. (2007) Method of synchronizing with an uplink channel and a method of determining a propagation delay in a wireless communications system. Patent US20070147337 (Application).
Bosch, H.G.P. and Kraml, M. and Mullender, S.J. and Polakos, P. and Samuel, L.G. (2007) Authenticating a tamper-resistant module in a base station router. Patent US20070271458 (Application).
Bosch, H.G.P. and McLellan, H.R. and Mullender, S.J. (2007) Storage and Retrieval of Encrypted Data Blocks with In-Line Message Authentication Codes. Patent US20070966101 (Application).
Bosch, H.G.P. and McLellan, H.R. and Mullender, S.J. (2007) Method and apparatus for delegation of secure operating mode access privilege from processor to peripheral. Patent US20070944916 (Application).
Bosch, H.G.P. and Mullender, S.J. and Polakos, P.A. and Rajkumar, A. and Sundaram, G.S. (2007) Method of sharing mobile unit state information between base station routers. Patent US20070741909 (Application).
Bosch, H.G.P. and Mullender, S.J. and Rana, A. and Samuel, L.G. (2007) Method of hard handover in a wireless communication system. Patent US20070010250 (Application).
Bosch, H.G.P. and Samuel, L.G. and Mullender, S.J. and Polakos, P. and Rittenhouse, G. (2007) Flat Cellular (UMTS) Networks. In: Wireless Communications and Networking Conference (WCNC), 11-15 March 2007, Kowloon, China. pp. 3864-3869. IEEE Communications Society. ISBN 1-4244-0659-5
Brinkman, R. (2007) Searching in encrypted data. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 07-98 ISBN 978-90-365-2488-9
Brinkman, R. (2007) Different search strategies on encrypted data compared. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 183-196. ISBN 978-3-540-69860-9
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. Technical Report TR-CTIT-07-69, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Constructing practical Fuzzy Extractors using QIM. Technical Report TR-CTIT-07-52, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. In: First International Workshop on Security for Spontaneous Interaction, 16. September 2007, Innsbruck, Austria. pp. 450-456. Ubicomp 2007 Workshop Proceedings. ISBN 978-3-00-022599-4
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) From Watermarks to Fuzzy Extractors: a Practical Construction. Technical Report TR-CTIT-07-75, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Fuzzy extractors for continuous distributions. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), 20-22 March 2007, Singapore. pp. 353-355. ACM. ISBN 1-59593-574-6
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Feeling Is Believing: A Secure Template Exchange Protocol. In: Advances in Biometrics, International Conference (ICB), 27-29 Aug 2007, Seoul, Korea. pp. 897-906. Lecture Notes in Computer Science 4642. Springer Verlag. ISBN 978-3-540-74548-8
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) A unifying view on template protection schemes. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 35-42. Werkgemeenschap voor Informatie- en Communicatietechniek. ISBN 978-90-365-2509-1
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2007) Audit-based compliance control. International Journal of Information Security, 6 (2-3). pp. 133-151. ISSN 1615-5262 *** ISI Impact 0,48 ***
Corin, R.J. (2007) Computational Soundness of Formal Encryption in Coq. In: 3rd Workshop on Formal and Computational Cryptography, FCC 2007, 4-5 Jul 2007, Venice, Italy. INRIA. ISBN not assigned
Corin, R.J. and Deniélou, P.-M. and Fournet, C. and Bhargavan, K. and Leifer, J. (2007) Secure Implementations for Typed Session Abstractions. In: 20th IEEE Computer Security Foundations Symposium (CSF), 6-8 July, Venice, Italy. pp. 170-186. IEEE Computer Society. ISBN 0-7695-2819-8
Corin, R.J. and Denielou, P-M. (2007) A Protocol Compiler for Secure Sessions in ML. In: 3rd Symposium on Trustworthy Global Computing (TGC) Revised Selected Papers, 5-6 Nov 2007, Sophia Antipolis, France. pp. 276-293. Lecture Notes in Computer Science 4912. Springer Verlag. ISBN 978-3-540-78662-7
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2007) Timed Analysis of Security Protocols. Journal of Computer Security, 15 (6). pp. 619-645. ISSN 0926-227X
Czenko, M.R. and Etalle, S. (2007) Core TuLiP. Technical Report TR-CTIT-07-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Etalle, S. (2007) Core TuLiP - Logic Programming for Trust Management. In: Proceedings of the 23rd International Conference on Logic Programming, ICLP 2007, 8-13 Sep 2007, Porto, Portugal. pp. 380-394. Lecture Notes in Computer Science 4670. Springer Verlag. ISBN 978-3-540-74608-9
Czenko, M.R. and Etalle, S. and Li, Dongyi and Winsborough, W.H. (2007) An Introduction to the Role Based Trust Management Framework RT. Technical Report TR-CTIT-07-34, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Etalle, S. and Li, Dongyi and Winsborough, W.H. (2007) An Introduction to the Role Based Trust Management Framework RT. In: Foundations of Security Analysis and Design IV -- FOSAD 2006/2007 Tutorial Lectures. Lecture Notes in Computer Science 4677. Springer Verlag, Berlin, pp. 246-281. ISBN 978-3-540-74809-0
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2007) Extended Privilege Inheritance in RBAC. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security, ASIACCS 2007, March 20-22, Singapore. pp. 383-385. Conference on Computer and Communications Security. ACM Press. ISBN 1-59593-574-6
Dekker, M.A.C. and Crampton, J. and Etalle, S. (2007) RBAC Administration in Distributed Systems. Technical Report TR-CTIT-07-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. Technical Report TR-CTIT-07-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. In: Proceedings of the fourth VLDB Workshop, SDM 2007, 23, 24 Sept 2007, Vienna, Austria. pp. 33-46. Lecture Notes in Computer Science 4721. Springer. ISBN 978-3-540-75247-9
Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2007) Privacy Policies. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 383-397. ISBN 978-3-540-69860-9
Dekker, M.A.C. and den Hartog, J.I. and Etalle, S. (2007) Audit-based Compliance Control (AC2) for EHR Systems. Technical Report TR-CTIT-07-46, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Dijk, H.W. and Scholten, J. and Tobalina, A. and García Muñoz, V. and Milanini, S. and Kung, A. (2007) Open Home Networks: the TEAHA Approach. In: Sixth International Conference on Networks (ICN2007), 22-28 Apr 2007, Sainte-Luce, France. 053. IEEE Computer Society. ISBN 0-7695-2805-8
Doumen, J.M. (2007) Non-interactive fuzzy private matching. Technical Report TR-CTIT-07-45, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Durmaz Incel, O. and Jansen, P.G. and Dulman, S.O. and Mullender, S.J. (2007) Capacity analysis of interfering channels. In: Proceedings of the 2nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, 26 October 2007, Crete, Greece. pp. 11-18. ACM. ISBN 978-1-59593-805-3
Durmaz Incel, O. and Mullender, S.J. and Jansen, P.G. and Dulman, S.O. (2007) Measurements on the Efficiency of Overlapping Channels. In: Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks SECON 2007, 18-21 June 2007, San Diego, USA. pp. 689-690. IEEE Computer Society. ISBN 1-4244-1268-4
Etalle, S. and den Hartog, J.I. and Marsh, S. (2007) Trust and Punishment. (Invited) In: Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics, Rome, Italy. 5:1-5:6. nstitute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST). ISBN 978-963-9799-09-7
Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. In: Fourth Int. Conf. on Trust, Privacy and Security in Digital Business, TRUSTBUS 2007, 4-6 September 2007, Germany. pp. 145-154. Lecture Notes in Computer Science 4657. Springer Verlag. ISBN 978-3-540-74408-5
Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. Technical Report TR-CTIT-07-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Samarati, P. (2007) Preface of special issue of the proceedings of theSecond International Workshop on Security and Trust Management (STM 2006). In: Proceedings of the Second International Workshop on Security and Trust Management, 20 Sep 2006, Hamburg, Germany. pp. 1-2. Electronic Notes in Theoretical Computer Science 179. Elsevier. ISSN 1571-0661
Etalle, S. and Winsborough, W.H. (2007) A Posteriori Compliance Control. In: 12th ACM Symposium on Access Control Models and Technologies (SACMAT), 20-22 June 2007, Nice, France. pp. 11-20. ACM Press. ISBN 978-1-59593-745-2
Evers, L. and Havinga, P.J.M. and Kuper, J. and Lijding, M.E.M. and Meratnia, N. (2007) SensorScheme: Supply Chain Management Automation using Wireless Sensor Networks. In: Proceedings of the 12th IEEE Conference on Emerging Technologies and Factory Automation, ETFA 2007, 25-28 sept 2007, Patras, Greece. pp. 448-455. IEEE Computer Society. ISBN 978-1-4244-0826-9
Fehnker, A. and van Hoesel, L.F.W. and Mader, A.H. (2007) Modelling and Verification of the LMAC Protocol for Wireless Sensor Networks. Technical Report TR-CTIT-07-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Fehnker, A. and van Hoesel, L.F.W. and Mader, A.H. (2007) Modelling and Verification of the LMAC Protocol for Wireless Sensor Networks. In: Proceedings of the 6th International Conference on Integrated Formal Methods, IFM 2007, 2-5 Jul 2007, Oxford, Britain. pp. 253-272. Lecture Notes in Computer Science 4591. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-73209-9
Hartel, P.H. and Abelmann, L. (2007) Towards compliant data retention with probe storage on patterned media. Technical Report TR-CTIT-07-49, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Vree, W.G. (2007) Lambda Calculus for Engineers. In: Reflections on Type Theory, Lambda Calculus, and the Mind: Essays Dedicated to Henk Barendregt on the Occasion of his 60th Birthday. Radboud University, Nijmegen, pp. 125-138. ISBN 978-90-9022446-6
den Hartog, J.I. (2007) Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic. Technical Report TR-CTIT-07-53, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
de Jong, E.K. and Hartel, P.H. (2007) Method and apparatus for deployment of high integrity software using static procedure return addresses. Patent US 7,181,737 (Assigned).
Jonker, W. and Brinkman, R. and Maubach, S. (2007) Secure storage system and method for secure storing. Patent WO2007125454 (Application).
Kavaldjiev, N.K. (2007) A run-time reconfigurable Network-on-Chip for streaming DSP applications. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 06-91 ISBN 90-365-2410-5
Khatib, M.G. and van der Zwaag, B.J. and Hartel, P.H. and Smit, G.J.M. (2007) Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. Technical Report TR-CTIT-07-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Khatib, M.G. and van der Zwaag, B.J. and Hartel, P.H. and Smit, G.J.M. (2007) Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. In: Proceedings of the 2007 IEE/ACM/IFIP Workshop on Embedded Systems for Real-Time Multimedia (ESTImedia), 4-5 Oct 2007, Salzburg, Austria. pp. 7-12. IEEE. ISBN 978-1-4244-1654-7
Koopman, P. and Hubbers, E.M.G.M. and Pieters, W. and Poll, E. and de Vries, R. (2007) Testing the eSTV program for the Scottish Local Government Elections. LaQuSo report not assigned, Radboud University Nijmegen, Nijmegen. ISSN not assigned
Law, Yee Wei and Doumen, J.M. and Palaniswami, M. (2007) Key Management Building Blocks for Wireless Sensor Networks. Technical Report TR-CTIT-07-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Lijding, M.E.M. and Meratnia, N. and Benz, H.P. and Matysiak Szóstek, A. (2007) Smart Signs Show You the Way. I/O Vivat, 22 (4). pp. 35-38. ISSN 1389-0468
Lombriser, C. and Marin-Perianu, M. and Marin-Perianu, R.S. and Roggen, D. and Havinga, P.J.M. and Tröster, G. (2007) Organizing Context Information Processing in Dynamic Wireless Sensor Networks. In: Proceedings of the 2007 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 3-6 Dec 2007, Melbourne, Australia. pp. 67-72. IEEE Computer Society. ISBN 1-4244-1502-0
Mader, A.H. and Wupper, H. and Boon, M. (2007) The Construction of Verification Models for Embedded Systems. Technical Report TR-CTIT-07-02, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, M. and Marin-Perianu, R.S. and Havinga, P.J.M. and Scholten, J. (2007) Online Movement Correlation of Wireless Sensor Nodes. In: Advances in Pervasive Computing - Adjunct Proceedings of Pervasive 2007, 13-16 May 2007, Toronto, Canada. pp. 79-82. Austrian Computer Society. ISBN 978-3-85403-219-9
Marin-Perianu, R.S. and Lombriser, C. and Havinga, P.J.M. and Scholten, J. and Tröster, G. (2007) Tandem: A Context-Aware Method for Spontaneous Clustering of Dynamic Wireless Sensor Nodes. Technical Report TR-CTIT-07-66, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Marin-Perianu, M. and Havinga, P.J.M. and Scholten, J. (2007) Movement-based Group Awareness with Wireless Sensor Networks. In: 5th International Conference on Pervasive Computing (Pervasive), 13-16 May 2007, Toronto, Canada. pp. 298-315. Lecture Notes in Computer Science 4480. Springer Verlag. ISBN 978-3-540-72036-2
Marin-Perianu, R.S. and Marin-Perianu, M. and Havinga, P.J.M. and Scholten, J. (2007) Movement-based Group Awareness with Wireless Sensor Networks. Technical Report TR-CTIT-07-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. (2007) Demo Abstract: Service Oriented Wireless Sensor Networks - A Cluster-based Approach. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON '07, 18-21 June 2007, San Diego, California. pp. 698-699. IEEE Computer Society. ISBN 1-4244-1268-4
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. (2007) Prototyping Service Discovery and Usage in Wireless Sensor Networks. In: 32nd IEEE Conference on Local Computer Networks (LCN 2007), 15-18 Oct 2007, Dublin, Ireland. pp. 841-850. IEEE Computer Society. ISBN 0-7695-3000-1
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2007) Cluster-based service discovery for heterogeneous wireless sensor networks. Technical Report TR-CTIT-07-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marincic, J. and Mader, A.H. and Wieringa, R.J. (2007) Capturing Assumptions while Designing a Verification Model for Embedded Systems. Technical Report TR-CTIT-07-03, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marincic, J. and Wupper, H. and Mader, A.H. and Wieringa, R.J. (2007) Obtaining Formal Models through Non-Monotonic Refinement. Technical Report TR-CTIT-07-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Mouthaan, A.J. and Hartel, P.H. (2007) Interim research assessment 2003-2005 - Computer Science. Scientific Report 2007, Faculty of Electrical Engineering, Mathematics and Computer science, University of Twente, Enschede.
Muthukrishnan, K. and Lijding, M.E.M. and Meratnia, N. and Havinga, P.J.M. (2007) Sensing motion using spectral and spatial analysis of WLAN RSSI. In: Proceedings of the 2nd European Conference on Smart Sensing and Context (EuroSSC 2007), 23-25 October 2007, Lake District, UK. pp. 62-76. Lecture Notes in Computer Science 4793. Springer Verlag. ISBN 978-3-540-75695-8
Pieters, W. and van Haren, R. (2007) Temptations of turnout and modernisation: e-voting discourses in the UK and the Netherlands. Journal of Information, Communication and Ethics in Society, 5 (4). pp. 276-292. ISSN 1477-996X
Pieters, W. and van Haren, R. (2007) E-voting discourses in the UK and the Netherlands. Technical Report ICIS-R07020, Radboud University Nijmegen, Nijmegen. ISSN 1571-5221
Pieters, W. and Jonker, H.L. (2007) Vote buying revisited: implications for receipt-freeness. In: Proceedings of the 2nd Benelux Workshop on Information and System Security (WISSec 2007), 20-21 Sep 2007, Luxembourg city, Luxembourg. University of Luxembourg. ISSN not assigned
Schoute, A.L. and van Keulen, M. (2007) Operating Systems. In: ICT-Zakboek. PBNA Polyzakboekjes (Chapter VI.1.7). Reed Business Information, Den Haag, pp. 761-770. ISBN 978-90-6228-671-3
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2007) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. In: Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE '07), October 14-20, 2007, Valencia, Spain. pp. 107-114. IEEE Computer Society. ISBN 0-7695-2989-5
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2007) Specifying Information Security Needs for the Delivery of High Quality Security Services. In: 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, BDIM '07, 21-23 May 2007, Munich, Germany. pp. 112-113. IEEE Computer Society. ISBN 1-4244-1295-1
Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2007) A Taxonomy of Self-configuring Service Discovery Systems. Technical Report TR-CTIT-07-88, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Wiggers, M.H. and Bekooij, M.J.G. and Jansen, P.G. and Smit, G.J.M. (2007) Efficient Computation of Buffer Capacities for Cyclo-Static Real-Time Systems with Back-Pressure. In: Proceedings of the 13th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS'07, 3-6 April, Seattle, WA, United States. pp. 281-292. IEEE Computer Society. ISSN 1080-1812 ISBN 0-7695-2800-7
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. In: Second International Conference on Internet Monitoring and Protection (ICIMP), 1-5 Jul 2007, San Jose, CA, USA. pp. 33-33. IEEE Computer Society. ISBN 0-7695-2911-9
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) Model-Based Mitigation of Availability Risks. Technical Report TR-CTIT-07-04, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. Technical Report TR-CTIT-07-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) Model-Based Mitigation of Availability Risks. In: Second IEEE/IFIP International Workshop on Business-Driven IT Management, 21 May 2007, Munich, Germany. pp. 75-83. IEEE Computer Society. ISBN 1-4244-1295-1
van der Zwaag, B.J. and Khatib, M.G. and Hartel, P.H. (2007) How migrating 0.0001% of address space saves 12% of energy in hybrid storage. Technical Report A4TR-2007.1, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zych, A.K. and Petkovic, M. and Jonker, W. (2007) The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. In: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 8-11, 2007, Redondo Beach, CA, USA. pp. 95-97. Springer. ISBN 978-3-540-73533-5

2006

Etalle, S. and Truszczynski, M., ed. (2006) Logic Programming, 22nd International Conference, ICLP 2006, Seattle, WA, USA, August 17-20, 2006. Proceedings. Lecture Notes in Computer Science 4079. Springer-Verlag, New York. ISBN 3-540-36635-0
Havinga, P.J.M. and Lijding, M.E.M. and Meratnia, N. and Wegdam, M., ed. (2006) Smart Sensing and Contex, First European Conference, EuroSSC 2006. Lecture Notes in Computer Science 4272. Springer Verlag, Heidelberg. ISBN 978-3-540-47842-3
Abadi, M. and Corin, R.J. and Fournet, C. (2006) Computational Secrecy by Typing for the Pi Calculus. In: The Fourth ASIAN Symposium on Programming Languages and Systems (APLAS 2006), 8 Nov - 10 Nov 2006, Sydney, Australia. pp. 253-269. Lecture Notes in Computer Science 4279. Springer Verlag. ISBN 3-540-48937-1
Bijlsma, T. and Jansen, P.G. (2006) Energy Conservation with EDFI scheduling. In: First European Conference, EuroSSC 2006, 25-27 Oct 2006, Enschede. pp. 259-261. Lecture Notes in Computer Science 4274. Springer Verlag. ISBN 3-540-47842-6
Bolzoni, D. and Etalle, S. (2006) APHRODITE: an Anomaly-based Architecture for False Positive Reduction. Technical Report TR-CTIT-06-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Zambon, Emmanuele and Etalle, S. and Hartel, P.H. (2006) Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System. In: 4th IEEE Int. Information Assurance Workshop (IWIA2006), 13-14 Apr 2006, London, UK. pp. 144-156. IEEE Computer Society. ISBN 0 7695 2564 4
Bosch, H.G.P. and Galonska, J. and Mullender, S.J. (2006) Method of providing data broadcast/multicast. Patent US20060645603 (Application).
Bosch, H.G.P. and Mullender, S.J. (2006) Band switching for coherent beam forming in full-duplex wireless communication. Patent US20050243748 (Application).
Bosch, H.G.P. and Mullender, S.J. and Narlikar, G.J. (2006) Method of performing a layer operation in a communications network. Patent EP1864474 (Application).
Bosch, H.G.P. and Mullender, S.J. and Narlikar, G.J. (2006) Method of transferring data packets in a communications network. Patent EP1864421 (Application).
Bosch, H.G.P. and Mullender, S.J. and Narlikar, G.J. and Samuel, L.G. and Yagati, L.N. (2006) Integrated base stations and a method of transmitting data units in a communications system for mobile devices. Patent US20060171364 (Application).
Buhan, I.R. and Bazen, A.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems (Poster Paper). In: 2nd Int. Conf. on Biometrics (ICB), Hong Kong, China. pp. 728-736. Lecture Notes in Computer Science 3832. Springer-Verlag. ISBN 3-540-31111-4
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis. Technical Report TR-CTIT-06-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) Fuzzy extractors for continuous distributions. Technical Report TR-CTIT-06-72, University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2006) The Audit Logic: Policy Compliance in Distributed Systems. Technical Report TR-CTIT-06-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Torabi Dashti, M. (2006) An intruder model for verifying liveness in security protocols. In: FMSE '06: Proceedings of the fourth ACM workshop on Formal methods in security, Alexandria, Virginia, USA. pp. 23-32. ACM. ISBN 1-59593-550-9
Chong, Chuen Ngen and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Yee Wei and Tokmakoff, A. (2006) LicenseScript: A Logical Language for Digital Rights Management. Annals of telecommunications special issue on Network and Information systems security, 61 (3-4). pp. 284-331. ISSN 0003-4347 *** ISI Impact 0,57 ***
Corin, R.J. (2006) Analysis Models for Security Protocols. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 05-76 ISBN 90-365-2279-X
Corin, R.J. and Galindo, D. and Hoepman, J.H. (2006) Securing data accountability in decentralized systems. In: Proceedings of 1st International Workshop on Information Security, IS'06, 30 Oct - 3 Nov 2006, Montpellier, France. pp. 626-635. Lecture Notes in Computer Science 4277. Springer. ISBN 978-3-540-48269-7
Corin, R.J. and den Hartog, J.I. (2006) A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs. In: ICALP 2006 track C, 9-13 Jul 2006, Venice, Italy. pp. 252-263. Lecture Notes in Computer Science 4052. Springer-Verlag. ISBN 3-540-35907-9
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2006) A Logic for Constraint-based Security Protocol Analysis. In: IEEE Symposium on Security and Privacy, 21-25 May 2006, Oakland, US. pp. 155-168. IEEE Computer Society. ISBN 0-7695-2574-1
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-06-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-07-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. Technical Report TR-CTIT-06-49, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. In: Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA), 16-17 Sept 2006, Bertinoro, Italy. pp. 221-236. Elsevier Electronic Notes in Theoretical Computer Science 168. Elsevier. ISSN 1571-0661
Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2006) Privacy in an Ambient World. Technical Report TR-CTIT-06-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Veugen, P.J.M. and Etalle, S. (2006) Audit-based Access Control in de Zorg. Informatiebeveiliging, 8. pp. 19-23. ISSN 1569-1063
Delzanno, G. and Etalle, S. and Gabbrielli, M. (2006) Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. Theory and Practice of Logic Programming, 6 (3). pp. 225-226. ISSN 1471-0684 *** ISI Impact 0,29 ***
van Dijk, H.W. and Scholten, J. and Tobalina, A. and García Muñoz, V. and Milanini, S. and Kung, A. (2006) Open home networks: the TEAHA approach. Technical Report TR-CTIT-06-67, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Durmaz Incel, O. and Dulman, S.O. and Jansen, P.G. (2006) Multi-channel Support for Dense Wireless Sensor Networking. In: Proceedings of the First European Conference on Smart Sensing and Context, EuroSSC 2006, 25-27 Oct 2006, Enschede, the Netherlands. pp. 1-14. Lecture Notes in Computer Science 4272. Springer. ISBN 978-3-540-47842-3
Durmaz Incel, O. and Dulman, S.O. and Jansen, P.G. and Mullender, S.J. (2006) Multi-Channel Interference Measurements for Wireless Sensor Networks. Technical Report TR-CTIT-06-53, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Durmaz Incel, O. and Dulman, S.O. and Jansen, P.G. and Mullender, S.J. (2006) Multi-Channel Interference Measurements for Wireless Sensor Networks. In: The 31st IEEE Conference on Local Computer Networks, Workshop on Network Measurements, 14-16 Nov 2006, USA. pp. 694-701. IEEE. ISSN 0742-1303 ISBN 1-4244-0418-5
Hafkamp, W.H.M. (2006) IT Security Vulnerability and Incident Response Management. In: Int. Conf. on Securing Electronic Business Processes -- ISSE 2006, 10-12 Oct. 2006, Rome, Italy. pp. 387-395. Vieweg. ISBN 978-3-8348-0213-2
Hanssen, F.T.Y. and Mader, A.H. and Jansen, P.G. (2006) Verifying the distributed real-time network protocol RTnet using Uppaal. Technical Report TR-CTIT-06-19, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hanssen, F.T.Y. and Mader, A.H. and Jansen, P.G. (2006) Verifying the distributed real-time network protocol RTnet using Uppaal. In: Proceedings of the 14th IEEE/ACN International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 11-13 Sept 2006, Monterey, USA. pp. 239-246. IEEE Computer Society. ISSN 1526-7539 ISBN 0 7695 2573 3
van Hoesel, L.F.W. and Law, Yee Wei and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2006) Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. Technical Report TR-CTIT-06-18, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jonker, H.L. and Pieters, W. (2006) Receipt-freeness as a special case of anonymity in epistemic logic. In: Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 29-30 Jun 2006, Cambridge, UK. Robinson College. ISBN not assigned
Kavaldjiev, N.K. and Smit, G.J.M. and Jansen, P.G. and Wolkotte, P.T. (2006) A Virtual Channel Network-on-Chip for GT and BE traffic. In: IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures (ISVLSI'06), 2-3 March 2006, Karlsruhe, Germany. pp. 211-216. IEEE Computer Society. ISBN 0769525334
Kavaldjiev, N.K. and Smit, G.J.M. and Wolkotte, P.T. and Jansen, P.G. (2006) Providing QoS Guarantees in a NoC by Virtual Channel Reservation. In: International Workshop on Applied Reconfigurable Computing (ARC 2006), 1-3 March 2006, Delft, the Netherlands. pp. 299-310. Lecture Notes in Computer Science 3985. Springer-Verlag. ISBN 354036708X
Khatib, M.G. and van der Zwaag, B.J. and van Viegen, F.C. and Smit, G.J.M. (2006) Striping Policy as a Design Parameter for MEMS-based Storage Systems. In: The 2nd International Workshop on Software Support for Portable Storage, 26 Oct 2006, Seoul, Korea. Informal proceedings. ISBN not assigned
Law, Yee Wei and Doumen, J.M. and Hartel, P.H. (2006) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks, 2 (1). pp. 65-93. ISSN 1550-4859 *** ISI Impact 1,44 ***
Law, Yee Wei and Havinga, P.J.M. (2006) How to Secure a Wireless Sensor Network. Technical Report TR-CTIT-06-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Lijding, M.E.M. and Benz, H.P. and Meratnia, N. and Havinga, P.J.M. (2006) Smart Signs: Showing the way in Smart Surroundings. Technical Report TR-CTIT-06-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Mader, A.H. and Bohnenkamp, H.C. and Usenko, Y.S. and Jansen, D.N. and Hurink, J.L. and Hermanns, H. (2006) Synthesis and Stochastic Assessment of Cost-Optimal Schedules. Technical Report TR-CTIT-06-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. (2006) Distributed Service Discovery for Heterogeneous Wireless Sensor Networks. Technical Report TR-CTIT-06-42, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. Technical Report TR-CTIT-06-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks. Technical Report TR-CTIT-06-61, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2006) Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. In: Sixth International Workshop on Wireless Local Networks, 14-16 Nov 2006, Tampa, Florida. pp. 931-938. IEEE Computer Society. ISBN 1-4244-0418-5
Morali, A. (2006) "AcTrust: A Security Model for Trust Based Computing. Master's thesis, Darmstadt University of Technology.
Mullender, S.J. and McKie, J. (2006) Real Time in Plan 9. In: Proceedings of the 1st International Workshop on Plan 9 (IWP9), 4-5 Dec. 2006, Madrid, Spain. pp. 3-11. Imprime, Copy Red, S.A.. ISBN 84-690-2787-5
Muthukrishnan, K. and Koprinkov, G.T. and Meratnia, N. and Lijding, M.E.M. (2006) Using time-of-flight for WLAN localization: feasibility study. Technical Report TR-CTIT-06-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Muthukrishnan, K. and Lijding, M.E.M. and Meratnia, N. and Havinga, P.J.M. (2006) Motion sensing using WLAN signal fluctuations. Technical Report TR-CTIT-06-76, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Muthukrishnan, K. and Meratnia, N. and Lijding, M.E.M. and Koprinkov, G.T. and Havinga, P.J.M. (2006) WLAN location sharing through a privacy observant architecture. In: 1st Int. Conf. on Communication System Software and Middleware (COMSWARE), Jan 8-12, 2006, New Delhi, India. pp. 1-10. IEEE Computer Society. ISBN 0-7803-9575-1
Pieters, W. (2006) Acceptance of voting technology: between confidence and trust. In: K. Stølen et al.(eds) iTrust 2006. pp. 283-297. Lecture Notes in Computer Science 3986. Springer. ISBN 978-3-540-34295-3
Pieters, W. (2006) What proof do we prefer? Variants of verifiability in voting. In: Workshop on Electronic Voting and e-Government in the UK, 27-28 Feb 2006, Edinburgh, UK. pp. 33-39. e-Science Institute. ISSN not assigned
Pieters, W. (2006) Internet voting: a monstrous alliance between democracy and technology? In: Fifth international conference on Cultural Attitudes towards Technology and Communication 2006, 28 Jun - 1 Jul 2006, Tartu, Estonia. pp. 115-129. School of Information Technology, Murdoch University. ISBN 0-86905-968-8
Pieters, W. (2006) Internet voting: a conceptual challenge to democracy. In: Social Inclusion: Societal and Organizational Implications for Information Systems: IFIP TC8 WG8.2 International Working Conference, 12-15 Jul 2006, Limerick, Ireland. pp. 89-103. IFIP International Federation for Information Processing 208/2006. Springer. ISSN 1571-5736 ISBN 978-0-387-34587-1
Pieters, W. and Consoli, L. (2006) Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract). In: Proceedings of the European Computing and Philosophy Conference (E-CAP 2006), 22-24 Jun 2006, Trondheim, Norway. NTNU. ISBN not assigned
Scholten, J. and van Dijk, H.W. and de Cock, D. and Preneel, B. and Kung, A. and d'Hooge, M. (2006) Secure Service Discovery in Home Networks. In: 2006 IEEE Int. Conf. on Consumer Electronics, 8-12 Jan 2006, Las Vegas, Nevada, USA. pp. 115-116. IEEE Computer Society. ISBN 0-7803-9459-3
Scholten, J. and Nijdam, M. (2006) Access Point Security Service for wireless ad-hoc communication. Technical Report TR-CTIT-06-66, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Schoute, A.L. (2006) Collision detection and prediction using a mutual configuration state approach. In: FIRA RoboWorld Congress 2006, Robots in Education, Entertainment and Service, 30 Jun - 1 Jul 2006, Dortmund, Germany. pp. 19-24. Chair Computer Science 1, University of Dortmund. ISBN 3-00-019061-9
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. Technical Report TR-CTIT-06-08, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. Technical Report TR-CTIT-06-73, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. In: 11th International Workshop on Exploring Modeling Methods in Systems Analysis and Design (EMMSAD2006), 5-9 Jun 2006, Luxembourg. pp. 465-472. Presses Universitaries de Namur. ISBN 2-87037-525-5
Sundramoorthy, V. (2006) FRODO High-level and Detailed Design Specifications. Technical Report TR-CTIT-06-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sundramoorthy, V. (2006) At Home in Service Discovery. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 06-93 ISBN 90-365-2392-3
Sundramoorthy, V. and van de Glind, G.J. and Hartel, P.H. and Scholten, J. (2006) The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss. In: 1st Int. Conf. on Communication System Software and Middleware (COMSWARE), 08-12 Jan. 2006, New Delhi, India. CDROM. IEEE Computer Society. ISBN 0-7803-9574-3
Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2006) On Consistency Maintenance In Service Discovery. In: 20th IEEE Int. Parallel & Distributed Processing Symp. (IPDPS), 25-29 April 2006, Rhodos Island, Greece. Artcile 17. IEEE Computer Society. ISBN 1-4244-0054-6
Sundramoorthy, V. and Tan, C. and Hartel, P.H. and Scholten, J. (2006) FRODO Dt-Spin Models. Technical Report TR-CTIT-06-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tolido, R. and Borsoi, P. and Bronk, H. and Elsinga, B. and Greuter, R. and Hafkamp, W.H.M. and Jochem, A. and van der Heide, M. and Rorive, K. and Schiltmans, T. and Schuurman, J. and Reijers, R. (2006) CERT in the organisation. Expertbrieven Genootschap van Informatiebeveiligers, 4. pp. 1-18. ISSN not assigned
Vervoort, W.A. (2006) Informatica aan de THT. University of Twente, Enschede. ISBN 90-365-2354-0
Wiggers, M.H. and Bekooij, M.J.G. and Jansen, P.G. and Smit, G.J.M. (2006) Efficient Computation of Buffer Capacities for Multi-Rate Real-Time Systems with Back-Pressure. Technical Report TR-CTIT-06-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Wiggers, M.H. and Bekooij, M.J.G. and Jansen, P.G. and Smit, G.J.M. (2006) Efcient Computation of Buffer Capacities for Cyclo-Static Real-Time Systems with Back-Pressure. Technical Report TR-CTIT-06-64, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Wiggers, M.H. and Bekooij, M.J.G. and Jansen, P.G. and Smit, G.J.M. (2006) Efficient Computation of Buffer Capacities for Multi-Rate Real-Time Systems with Back-Pressure. In: Proceedings of the International Conference on Hardware/Software Codesign an System Synthesis (CODES+ISSS), 22-25 Oct 2006, Seoul, Korea. pp. 10-15. ACM. ISBN 1-59593-370-0
Zych, A.K. and Doumen, J.M. and Jonker, W. and Hartel, P.H. and Petkovic, M. (2006) Method of Key Management. Patent PH006387, WO-IB2007/053498, EP-06119878.4 (Application).

2005

Alexiou, A. and Avidor, D. and Bosch, H.G.P. and Das, S. and Gupta, P. and Hochwald, B. and Klein, T.E. and Ling, J. and Lozano, A. and Marzetta, T. and Mukherjee, S. and Mullender, S.J. and Papadias, C. and Valenzuela, R. and Viswanathan, H. (2005) Duplexing, Resource Allocation and Inter-Cell Coordination Design Recommendations for Next-Generation Wireless Systems. Wireless Communications and Mobile Computing (WCMC), 5 (1). pp. 77-93. ISSN 1530-8669 *** ISI Impact 0,86 ***
Baydere, S. and Safkan, Y. and Durmaz Incel, O. (2005) Lifetime Analysis of Reliable Wireless Sensor Networks. IEICE Transactions on Communications, E88-B (6). pp. 2465-2472. ISSN 0916-8516 *** ISI Impact 0,31 ***
Behrmann, G. and Brinksma, H. and Hendriks, M. and Mader, A.H. (2005) Production Scheduling by Reachability Analysis - A Case Study. In: Workshop on Parallel and Distributed Real-Time Systems (WPDRTS), 4-5 Apr 2005, Denver, Colorado. 140a-140a. IEEE Computer Society. ISBN 0-7695-2312-9
Behrmann, G. and Brinksma, H. and Hendriks, M. and Mader, A.H. (2005) Scheduling Lacquer Production by Reachability Analysis -- A Case Study. Technical Report TR-CTIT-05-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Behrmann, G. and Brinksma, H. and Hendriks, M. and Mader, A.H. (2005) Scheduling lacquer production by reachability analysis - A case study. In: 16th IFAC World Congress, Prague, Czech Republic. MoA17TO3. International Federation of Automatic Control (IFAC). ISBN not assigned
Bistarelli, S. and Cervesato, I. and Lenzini, G. and Martinelli, F. (2005) Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis. Technical Report TR-CTIT-05-61, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bistarelli, S. and Cervesato, I. and Lenzini, G. and Martinelli, F. (2005) Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis. Journal of Computer Security, 13 (1). pp. 3-47. ISSN 0926-227x
Bolzoni, D. and Zambon, Emmanuele and Etalle, S. and Hartel, P.H. (2005) Poseidon: A 2-tier Anomaly-based Intrusion Detection System. Technical Report TR-CTIT-05-53, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Schoenmakers, B. and Doumen, J.M. and Jonker, W. (2005) Experiments With Queries Over Encrypted Data Using Secret Sharing. Technical Report TR-CTIT-05-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Schoenmakers, B. and Doumen, J.M. and Jonker, W. (2005) Experiments With Queries Over Encrypted Data Using Secret Sharing. In: VLDB Workshop on Secure Data Management (SDM), September 2-3, 2005, Trondheim, Norway. pp. 33-46. Lecture Notes in Computer Science 3674. Springer-Verlag. ISBN 3-540-28798-1
Brinksma, H. and Mader, A.H. and Marincic, J. and Wieringa, R.J. (2005) A Modelling Method for Embedded Systems. In: 2nd Workshop on Model Design and Validation (MoDeVa 05) as part of the ACM/IEEE 8th International Conference on Model Driven Engineering Languages and Systems, Oct 2005, Montego Bay, Jamaica. IEEE Computer Society. ISBN not assigned
Brinksma, H. and Mader, A.H. and Marincic, J. and Wieringa, R.J. (2005) A Modelling Method for Embedded Systems. Technical Report TR-CTIT-05-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Bazen, A.M. and Hartel, P.H. and Veldhuis, R.N.J. (2005) A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems. Technical Report TR-CTIT-05-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Hartel, P.H. (2005) The state of the art in abuse of biometrics. Technical Report TR-CTIT-05-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2005) An Audit Logic for Accountability. Technical Report TR-CTIT-05-11, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2005) An Audit Logic for Accountability. In: 6th International Workshop on Policies for Distributed Systems & Networks (POLICY 2005), 6-8 Jun 2005, Stockholm, Sweden. pp. 34-43. IEEE Computer Society. ISBN 0-7695-2265-3
Cederquist, J.G. and Corin, R.J. and Torabi Dashti, M. (2005) On the quest for impartiality: Design and Analysis of a fair non-repudiation protocol. Technical Report TR-CTIT-05-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Corin, R.J. and Torabi Dashti, M. (2005) On the quest for impartiality: Design and analysis of a Fair Non-repudiation protocol. In: 7th International Conference on Information and Communications Security, ICICS 2005, 10-13 Dec 2005, Beijing, China. pp. 27-39. Lecture Notes in Computer Science 3783. Springer-Verlag. ISBN 3-540-30934-9
Cederquist, J.G. and Torabi Dashti, M. (2005) An Intruder Model for Verifying Termination in Security Protocols. Technical Report TR-CTIT-05-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cheng, Jieyin and Chong, Chuen Ngen and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Nikolaus, S. (2005) STREAMTO: Streaming Content using a Tamper-Resistant Token (Workshop paper). In: 20th IFIP TC11 Int. Conf. on Security and Privacy in the Age of Ubiquitous Computing (SEC), Makuhari-Messe, Chiba, Japan. pp. 601-612. Springer-Verlag. ISBN 0-387-25658-X
Chong, Chuen Ngen (2005) Experiments in rights control: Expression and Enforcement. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 05-68 ISBN 90-75176-40-6
Chong, Chuen Ngen and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Yee Wei and Tokmakoff, A. (2005) LicenseScript: A Logical Language for Digital Rights Management. Technical Report TR-CTIT-05-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Joosten, R. and Kleinhuis, G. (2005) Service Brokerage with Prolog (Poster paper). In: 7th Int. Conf. on Enterprise Information Systems (ICEIS), Miami, Florida, USA. pp. 409-412. INSTICC Press. ISBN 972-8865-19-8
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A Formal Security Analysis of an OSA/Parlay Authentication Interface. Technical Report TR-CTIT-05-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A Formal Security Analysis of an OSA/Parlay Authentication Interface. In: 7th IFIP WG 6.1 Int. Conf. on Formal Methods for Open Object-Based Distributed Systems (FMOODS), Athens, Greece. pp. 131-146. Springer-Verlag. ISBN 3-540-26181-8
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2005) Timed Analysis of Security Protocols. Technical Report TR-CTIT-05-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2005) PS-LTL for Constraint-Based Security Protocol Analysis. In: Logic Programming, 21st International Conference, ICLP 2005, October 2-5, 2005, Sitges, Spain. pp. 439-440. Electronic Notes in Theoretical Computer Science 3668. Springer Verlag. ISBN 3-540-29208-X
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2005) Trust in Virtual Communities. ERCIM News -- Special: Security and Trust Management, 63. pp. 29-30. ISSN 0926-4981
Czenko, M.R. and Tran, H.M. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and den Hartog, J.I. (2005) Nonmonotonic Trust Management for P2P Applications. Technical Report TR-CTIT-05-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Tran, H.M. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and den Hartog, J.I. (2005) Nonmonotonic Trust Management for P2P Applications. In: 1st Int. Workshop on Security and Trust Management (STM), Milan, Italy. pp. 113-130. Electronic Notes in Theoretical Computer Science 157. Elsevier Science. ISSN 1571-0661
van Dijk, H.W. and Graaf, B. and Boerman, R. (2005) On the Systematic Conformance Check of Software Artefacts. In: 2nd European Workshop on Software Architecture (EWSA), Pisa, Italy. pp. 203-221. Springer-Verlag. ISBN 3-540-26275-X
Doumen, J.M. and Hulsebosch, B. and Iacob, S.M. and Koster, P. and Kragt, E. and Montaner, J. and Muijen, R. and Petkovic, M. and Vrielink, K. (2005) Security Aspects of the MESEC Architecture. Technical Report TI/RS/2005/018, Telematica Instituut, Enschede.
Doumen, J.M. and Hulsebosch, B. and Iacob, S.M. and Koster, P. and Petkovic, M. (2005) User Controlled Sharing of Commercial and Personal Content. Technical Report TI/RS/2005/017, Telematica Instituut, Enschede.
Durmaz Incel, O. and van Hoesel, L.F.W. and Jansen, P.G. and Havinga, P.J.M. (2005) Impact of Network Density on Bandwidth Resource Management in WSN. Technical Report TR-CTIT-05-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Winsborough, W.H. (2005) Integrity Constraints in Trust Management. Technical Report TR-CTIT-05-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Winsborough, W.H. (2005) Integrity Constraints in Trust Management (Extended Abstract). In: 10th ACM Symp. on Access Control Models and Technologies (SACMAT), June 01 - 03, 2005, Stockholm, Sweden. pp. 1-10. ACM Press. ISBN 1-59593-045-0
Evers, L. and Bijl, M.J.J. and Marin-Perianu, M. and Marin-Perianu, R.S. and Havinga, P.J.M. (2005) Wireless Sensor Networks and Beyond: A Case Study on Transport and Logistics. Technical Report TR-CTIT-05-26, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Foschini, G.J. and Huang, Howard C. and Mullender, S.J. and Venkatesan, S. and Viswanathan, H. (2005) Physical-Layer Design for Next-Generation Cellular Wireless Systems. Bell Labs Technical Journal Special Issue: Future Wireless Communications, 10 (2). pp. 157-172. ISSN 1089-7089 *** ISI Impact 0,69 ***
Garcia, F.D. and Hasuo, I. and Pieters, W. and van Rossum, P.J.B. (2005) Provable anonymity. In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, Fairfax, VA, USA. pp. 63-72. ACM. ISBN 1-59593-231-3
Graaf, B. and van Dijk, H.W. and van Deursen, A. (2005) Evaluating an Embedded Software Reference Architecture -- Industrial Experience Report. In: 9th European Conf. on Software Maintenance and Reengineering (CSMR), Manchester, UK. pp. 354-363. IEEE Computer Society. ISBN 0-7695-2304-8
Hafkamp, W.H.M. (2005) Phishing: hengelen naar uw identiteitsgegevens. Bank- en effectenbedrijf. pp. 34-35. ISSN 0005-5018
Hanssen, F.T.Y. and Jansen, P.G. and Scholten, J. and Mullender, S.J. (2005) RTnet: a distributed real-time protocol for broadcast-capable networks. Technical Report TR-CTIT-05-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hanssen, F.T.Y. and Jansen, P.G. and Scholten, J. and Mullender, S.J. (2005) RTnet: a distributed real-time protocol for broadcast-capable networks. In: Joint Int. Conf. on Autonomic and Autonomous Systems and Int. Conf. on Networking and Services (ICAS/ICNS), 23-28 Oct. 2005, Papeete, French Polynesia. Article 18. IEEE Computer Society. ISBN 0-7695-2450-8
Hartel, P.H. (2005) A trace semantics for Positive Core XPath. Technical Report TR-CTIT-05-03, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. (2005) A Trace Semantics for Positive Core XPath. In: 12th Int. Symp. on Temporal Representation and Reasoning (TIME), Burlington, Vermont. pp. 103-112. IEEE Computer Society. ISBN 0-7695-2370-6
Hofmeijer, T.J. and Dulman, S.O. and Jansen, P.G. and Havinga, P.J.M. (2005) AmbientRT - real time system software support for data centric sensor networks. Technical Report TR-CTIT-05-02, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hubbers, E.M.G.M. and Jacobs, B.P.F. and Pieters, W. (2005) RIES: Internet voting in action. In: 29th Annual International Computer Software and Applications Conference (COMPSAC 2005), 26-28 Jul 2005. pp. 417-424. IEEE Computer Society. ISSN 0730-3157 ISBN 0-7695-2413-3
Jacobs, B.P.F. and Pieters, W. and Warnier, M. (2005) Statically checking confidentiality via dynamic labels. In: WITS '05: Proceedings of the 2005 workshop on Issues in the theory of security, 10-11 Jan 2005, Long Beach, CA. pp. 50-56. ACM. ISBN 1-58113-980-2
de Jong, E.K. and Hartel, P.H. and Peyret, P. and Cattaneo, P. (2005) Java Card: An analysis of the most successful smart card operating system. Technical Report TR-CTIT-05-50, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jonker, W. and Brinkman, R. and Doumen, J.M. and Schoenmakers, B. (2005) Method of and device for querying of protected structured data. Patent WO2005116792 (Assigned).
Kavaldjiev, N.K. and Smit, G.J.M. and Jansen, P.G. (2005) Stream-processing pipelines: processing of streams on multiprocessor architecture. Technical Report TR-CTIT-05-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kavaldjiev, N.K. and Smit, G.J.M. and Jansen, P.G. (2005) Throughput of Streaming Applications Running on a Multiprocessor Architecture. In: EUROMICRO Symposium on Digital System Design, Porto, Portugal. pp. 350-355. IEEE Computer Society. ISBN 0-7695-2433-8
Kavaldjiev, N.K. and Smit, G.J.M. and Jansen, P.G. and Wolkotte, P.T. (2005) A Virtual Channel Network-on-Chip for GT and BE traffic. Technical Report TR-CTIT-05-55, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kavaldjiev, N.K. and Smit, G.J.M. and Wolkotte, P.T. and Jansen, P.G. (2005) Routing of guaranteed throughput traffic in a network-on-chip. Technical Report TR-CTIT-05-42, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kaya, O.S. (2005) A Glance at Peer to Peer Systems. Technical Report TR-CTIT-05-21, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kaya, O.S. and Durmaz Incel, O. and Dulman, S.O. and Gemesi, R. and Jansen, P.G. and Havinga, P.J.M. (2005) Using TinyOS Components for the Design of an Adaptive Ubiquitous System. In: International Workshop on Wireless Ad-hoc Networks (IWWAN), May 23-26, 2005, London, UK. 99. Kings College London. ISBN not assigned
Kaya, O.S. and Durmaz Incel, O. and Dulman, S.O. and Gemesi, R. and Jansen, P.G. and Havinga, P.J.M. (2005) Using TinyOS Components for the Design of an Adaptive Ubiquitous System. Technical Report TR-CTIT-05-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kobben, B. and Muthukrishnan, K. and Meratnia, N. and Koprinkov, G.T. (2005) WIRELESS CAMPUS LBS: A test bed for cartographically aware database objects. In: Proceedings of the 3rd Symposium on Location-Based Services and TeleCartography, 28-29 November 2005, Vienna, Austria. pp. 47-51. TU Wien. ISBN not assigned
Law, Yee Wei (2005) Key management and link-layer security of wireless sensor networks : Energy-efficient attack and defense. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 05-75 ISBN 90-365-2282-X
Law, Yee Wei and Doumen, J.M. and Hartel, P.H. (2005) Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract). Technical Report TR-CTIT-05-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Hartel, P.H. and Etalle, S. and Havinga, P.J.M. and Di Pietro, R. and Mancini, L.V. (2005) Overview of Security Research in EYES. Technical Report TR-CTIT-05-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Hartel, P.H. and den Hartog, J.I. and Havinga, P.J.M. (2005) Link-layer jamming attacks on S-MAC. In: 2nd European Workshop on Wireless Sensor Networks (EWSN), Istanbul, Turkey. pp. 217-225. IEEE Computer Society. ISBN 0-7803-8801-1
Law, Yee Wei and Havinga, P.J.M. (2005) How to secure a wireless sensor network. (Invited) In: 2nd Int. Conf. on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Melbourne, Australia. pp. 89-95. IEEE Computer Society. ISBN 0-7803-9399-6
Law, Yee Wei and van Hoesel, L.F.W. and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2005) Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. In: 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Alexandria, Virginia. pp. 76-88. ACM Press. ISBN 1-59593-227-5
Lenzini, G. (2005) Integration of Analysis Techniques in Security and Fault-Tolerance. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 05-70 ISBN 90-365-2200-5
Marin-Perianu, R.S. and Hartel, P.H. and Scholten, J. (2005) A Classification of Service Discovery Protocols. Technical Report TR-CTIT-05-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. (2005) CODE: Description Language for Wireless Collaborating Objects. In: 2nd Intelligent Sensors, Sensor Networks & Information Processing Conf. (ISSNIP), 5-8 Dec. 2005, Melbourne, Australia. pp. 169-174. IEEE Computer Society. ISBN 0-7803-9399-6
Morali, A. and Varela, L. and Varela, C.A. (2005) An Electronic Marketplace: Agent-based Coordination Models for Online Auctions. In: Obras Completas CLEI2005, Volumen: XXXI Conferencia Latinoamericana de Informatica, 10-14 Oct 2005, Cali, Colombia. pp. 573-586. Pontificia Universidad Javeriana. ISBN 958-670-423-8
Muthukrishnan, K. and Lijding, M.E.M. and Havinga, P.J.M. (2005) Towards Smart Surroundings: Enabling Techniques and Technologies for Localization. Technical Report TR-CTIT-05-01, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Muthukrishnan, K. and Lijding, M.E.M. and Havinga, P.J.M. (2005) Towards Smart Surroundings: Enabling Techniques and Technologies for Localization. In: 1st Int. Workshop on Location- and Context-Awareness (LoCA), Oberpfaffenhofen, Germany. pp. 350-362. Springer-Verlag. ISSN 0302-9743 ISBN 3-540-25896-5
Muthukrishnan, K. and Meratnia, N. and Koprinkov, G.T. and Lijding, M.E.M. and Havinga, P.J.M. (2005) SVGOpen Conference Guide: An overview. In: Proceedings of the 4th Annual Conference on Scalable Vector Graphics (SVG'05), 15-18 August 2005, Enschede, The Netherlands. ISBN not assigned
Muthukrishnan, K. and Meratnia, N. and Koprinkov, G.T. and Lijding, M.E.M. and Havinga, P.J.M. (2005) Demonstrating FLAVOUR: Friendly Location-aware conference Assistant with priVacy Observant architectURe. In: Demonstration Session Proceedings of the 3rd International Conference on Service Oriented Computing (ICSOC'05), 12-15 December 2005, Amsterdam, The Netherlands. pp. 13-16. Vita Lab. ISBN 3-540-25896-5
Muthukrishnan, K. and Meratnia, N. and Lijding, M.E.M. (2005) FLAVOUR: Friendly Location-aware conference Assistant with priVacy Observant architectURe. Technical Report TR-CTIT-05-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2005) Veilig online stemmen vanuit San Francisco? Idee, tijdschrift van het kenniscentrum van D66, 26 (1). pp. 8-10. ISSN 0927-2518
Pieters, W. and Becker, M.J. (2005) Ethics of e-voting: an essay on requirements and values in Internet elections. In: Ethics of New Information Technology: Proceedings of the Sixth International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005), 17-19 Jul 2005, Enschede. pp. 307-318. Centre for Telematics and Information Technology University of Twente. ISSN 1574-0846
Schoute, A.L. (2005) Time-optimal collision avoidance of automatically guided vehicles (Extended Abstract). In: 10th Int. Workshop on Computer Aided Systems Theory (EUROCAST) -- Cast and Tools for Robotics, Vehicular and Communication Systems, Las Palmas de Gran Canaria, Spain. pp. 286-289. IUCTC. ISBN 84-689-0432-5
Schoute, A.L. and Seesink, R.A. and Dierssen, W. and Kooij, N. (2005) Fast data sharing within a distributed, multithreaded control framework for robot teams. In: Communicating Process Architectures 2005 (WoTUG-28), 18-21 Sep 2005, Eindhoven, The Netherlands. pp. 147-154. IOS Press Concurrent Systems Engineering Series 63. IOS Press. ISBN 1-58603-561-4
Sundramoorthy, V. and van de Glind, G.J. and Hartel, P.H. and Scholten, J. (2005) The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss. Technical Report TR-CTIT-05-39, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2005) On Consistency Maintenance In Service Discovery. Technical Report TR-CTIT-05-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sundramoorthy, V. and Tan, C. and Hartel, P.H. and den Hartog, J.I. and Scholten, J. (2005) Functional Principles of Registry-based Service Discovery. Technical Report TR-CTIT-05-18, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sundramoorthy, V. and Tan, C. and Hartel, P.H. and den Hartog, J.I. and Scholten, J. (2005) Functional Principles of Registry-based Service Discovery. In: 30th Annual IEEE Conf. on Local Computer Networks (LCN), Sydney, Australia. pp. 209-217. IEEE Computer Society. ISBN 0-7695-2421-4
Wiggers, M.H. and Kavaldjiev, N.K. and Smit, G.J.M. and Jansen, P.G. (2005) Architecture Design Space Exploration for Streaming Applications Through Timing Analysis. Technical Report TR-CTIT-05-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Wiggers, M.H. and Kavaldjiev, N.K. and Smit, G.J.M. and Jansen, P.G. (2005) Architecture Design Space Exploration for Streaming Applications Through Timing Analysis. In: Communicating Process Architectures 2005 (WoTUG-28), Eindhoven, The Netherlands. pp. 219-233. IOS Press. ISBN 1-58603-561-4
Wolkotte, P.T. and Smit, G.J.M. and Kavaldjiev, N.K. and Becker, J.E. and Becker, J. (2005) Energy Model of Networks-on-Chip and a Bus. Technical Report TR-CTIT-05-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Wolkotte, P.T. and Smit, G.J.M. and Kavaldjiev, N.K. and Becker, J.E. and Becker, J. (2005) Energy Model of Networks-on-Chip and a Bus. In: Proceedings of the International Symposium on System-on-Chip (SoC 2005), 14-17 Nov 2005, Tampere, Finland. pp. 82-85. IEEE Computer Society. ISBN 0-7803-9294-9
Zych, A.K. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2005) A Diffie-Hellman based Key Management Scheme for Hierarchical Access Control. Technical Report TR-CTIT-05-57, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2004

Etalle, S., ed. (2004) Logic Based Program Synthesis and Transformation 14th International Symposium, LOPSTR 2004, Verona, Italy, August 26-28, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3573. Springer-Verlag, Berlin. ISBN 3-540-26655-0
Barthe, G. and Cederquist, J.G. and Tarento, S. (2004) A Machine-Checked Formalization of the Generic Model and the Random Oracle Model. In: 2nd International Joint Conference on Automated Reasoning, IJCAR , 4-8 Jul 2004, Cork, Ireland. pp. 385-399. Lecture Notes in Computer Science 3097. Springer-Verlag. ISBN 3-540-22345-2
ter Beek, M. and Lenzini, G. and Petrocchi, M. (2004) Team Automata for Security Analysis. Technical Report TR-CTIT-04-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
ter Beek, M. and Lenzini, G. and Petrocchi, M. (2004) Team Automata for Security (A Survey). In: Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems (SecCo 2004), Aug.30-Sept.4, 2004, London, United Kingdom. pp. 105-119. Electronic Notes in Theoretical Computer Science 128 (5). Elsevier. ISSN 1571-0661
Bhargavan, K. and Corin, R.J. and Fournet, C. and Gordon, A.D. (2004) Secure Sessions for Web Services. In: ACM Workshop on Secure Web Services (SWS), October 29 - 29, 200, Fairfax, Virginia. pp. 56-66. ACM Press. ISBN 1-58113-973-X
Bohnenkamp, H.C. and Hermanns, H. and Klaren, R. and Mader, A.H. and Usenko, Y.S. (2004) Synthesis and stochastic assessment of schedules for lacquer production. Technical Report TR-CTIT-04-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bohnenkamp, H.C. and Hermanns, H. and Klaren, R. and Mader, A.H. and Usenko, Y.S. (2004) Synthesis and stochastic assessment of schedules for lacquer production. In: First International Conference on Quantitative Evaluation of Systems (QEST 2004), Enschede, The Netherlands. pp. 28-37. IEEE Computer Society. ISBN 0-7695-2185-1
Bossi, A. and Cocco, N. and Etalle, S. and Rossi, S. (2004) Declarative Semantics of Input Consuming Logic Programs. Technical Report TR-CTIT-04-08, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bossi, A. and Cocco, N. and Etalle, S. and Rossi, S. (2004) Declarative Semantics of Input Consuming Logic Programs. In: Program Development in Computational Logic. Springer-Verlag, Berlin, pp. 90-114. ISBN 3-540-22152-2
Bossi, A. and Etalle, S. and Smaus, J.G. and Rossi, S. (2004) Termination of Simply Moded Logic Programs with Dynamic Scheduling. ACM Transactions on Computational Logic, 15 (3). pp. 470-507. ISSN 1529-3785 *** ISI Impact 0,79 ***
Brinkman, R. and Doumen, J.M. and Jonker, W. (2004) Using secret sharing for searching in encrypted data. Technical Report TR-CTIT-04-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Doumen, J.M. and Jonker, W. (2004) Using secret sharing for searching in encrypted data. In: Workshop on Secure Data Management in a Connected World (SDM), 30 Aug 2004, Toronto, Canada. pp. 18-27. Lecture Notes in Computer Science 3178. Springer-Verlag. ISSN 0302-9743 ISBN 3-540-22983-3
Brinkman, R. and Doumen, J.M. and Jonker, W. and Schoenmakers, B. (2004) Method of and device for querying of protected structured data. Patent PHNL040611 US (Application).
Brinkman, R. and Feng, Ling and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Technical Report TR-CTIT-04-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Feng, Ling and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Information Systems Security Journal, 13 (3). pp. 14-21. ISSN 1065-898X
Brinkman, R. and Feng, Ling and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. In: Proceedings of the 2nd International Workshop on Security In Information Systems (WOSIS), 13-14 Apr 2004, Porto, Portugal. pp. 126-135. INSTICC Press. ISBN 972-8865-07-4
Brinksma, H. and Mader, A.H. (2004) On Verification Modelling of Embedded Systems. Technical Report TR-CTIT-04-03, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Torabi Dashti, M. (2004) Formal Analysis of a Fair Payment Protocol. In: 2nd International Workshop on Formal Aspect of Security and Trust (FAST), 22-27 Aug 2004, Toulouse, France. pp. 41-54. IFIP International Federation for Information Processing 173. Kluwer Academic Publishers. ISBN 9780387240503
Cheng, Jieyin and Chong, Chuen Ngen and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Nikolaus, S. (2004) STREAMTO: Streaming Content using a Tamper-Resistant Token. Technical Report TR-CTIT-04-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Joosten, R. and Kleinhuis, G. (2004) Inter-library Service Brokerage in LicenseScript. Technical Report TR-CTIT-04-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Joosten, R. and Kleinhuis, G. (2004) Service Brokerage with Prolog. Technical Report TR-CTIT-04-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Ren, B. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Corin, R.J. (2004) License Protection with a Tamper-Resistant Token. Technical Report TR-CTIT-04-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Ren, B. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Corin, R.J. (2004) License protection with a tamper-resistant token. In: 5th Workshop on Information Security Applications (WISA), Jeju Island, Korea. pp. 223-237. Springer-Verlag. ISBN 3-540-24015-2
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security Analysis of Parlay/OSA Framework. Technical Report TR-CTIT-04-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security Analysis of Parlay/OSA Framework. In: 9th Int. Conf. on Intelligence in service delivery Networks ICIN, Bordeaux, France. pp. 54-59. IOS Press.
Corin, R.J. and Doumen, J.M. and Etalle, S. (2004) Analysing Password Protocol Security Against Off-line Dictionary Attacks. In: Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004), 26 June 2004, Bologna, Italy. pp. 47-63. Electronic Notes in Theoretical Computer Science 121. Elsevier. ISSN 1571-0661
Corin, R.J. and Etalle, S. (2004) A simple procedure for finding guessing attacks (Extended Abstract). Technical Report TR-CTIT-04-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2004) Timed Model Checking of Security Protocols. Technical Report TR-CTIT-04-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2004) Timed Model Checking of Security Protocols. In: 2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE), Fairfax, Virginia. pp. 23-32. ACM Press. ISBN 1-58113-971-3
Corin, R.J. and Etalle, S. and den Hartog, J.I. and Lenzini, G. and Staicu, I.S. (2004) A Logic for Auditing Accountability in Decentralized Systems. Technical Report TR-CTIT-04-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. and den Hartog, J.I. and Lenzini, G. and Staicu, I.S. (2004) A Logic for Auditing Accountability in Decentralized Systems. In: 2nd Int. Workshop on Formal Aspect of Security and Trust (FAST), Toulouse, France. pp. 187-201. Springer-Verlag. ISBN 0-387-24050-0
van Dijk, H.W. (2004) Democratic Processing; mastering the complexity of communicating systems. PhD thesis, Delft University of Technology. ISBN 90-6464-660-0
Doumen, J.M. and Brinkman, R. and Jonker, W. (2004) Searching in Encrypted Data. In: Finite Fields: Theory and Applications, 5-11 Dec 2004, Oberwolfach, Germany. pp. 2951-2951. Oberwolfach Reports 54/2004. European Mathematical Society. ISSN 1660-8933
Gnesi, S. and Lenzini, G. and Martinelli, F. (2004) Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability. Technical Report TR-CTIT-04-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hanssen, F.T.Y. and Jansen, P.G. and Scholten, J. and Hattink, T. (2004) RTnet: a real-time protocol for broadcast-capable networks. Technical Report TR-CTIT-04-02, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hanssen, F.T.Y. and Krikke, R. and Baron, B. and Jansen, P.G. and Scholten, J. (2004) Experimental implementation of a real-time token-based network protocol on a microcontroller. Technical Report TR-CTIT-04-39, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hanssen, F.T.Y. and Krikke, R. and Baron, B. and Jansen, P.G. and Scholten, J. (2004) Experimental implementation of a real-time token-based network protocol on a microcontroller. In: 5th PROGRESS Symposium on Embedded Systems, Nieuwegein, The Netherlands. pp. 49-57. Technology Foundation STW. ISBN 90-73461-41-3
Hartel, P.H. and van Eck, P.A.T. and Etalle, S. and Wieringa, R.J. (2004) Modelling mobility aspects of security policies. Technical Report TR-CTIT-04-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and van Eck, P.A.T. and Etalle, S. and Wieringa, R.J. (2004) Modelling mobility aspects of security policies. (Invited) In: Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS), March 10-14, 2004, Marseille, France. pp. 172-191. Lecture Notes in Computer Science 3362. Springer-Verlag. ISBN 3-540-24287-2
Hartel, P.H. and Muller, H.L. and Glaser, H. (2004) The Functional C Experience. Journal of Functional Programming, 14 (2). pp. 129-135. ISSN 0956-7968 *** ISI Impact 0,94 ***
den Hartog, J.I. and de Vink, E.P. (2004) Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. Technical Report TR-CTIT-04-34, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
den Hartog, J.I. and de Vink, E.P. (2004) Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. In: 2nd Int. Workshop on Formal Aspect of Security and Trust (FAST), Toulouse, France. pp. 85-98. Kluwer Academic Publishers. ISBN 0-387-24050-0
Havinga, P.J.M. and Jansen, P.G. and Lijding, M.E.M. and Scholten, J. (2004) Smart Surroundings. In: 5th PROGRESS Symposium on Embedded Systems, Nieuwegein, The Netherlands. pp. 58-63. Technology Foundation STW. ISBN 90-73461-41-3
Hofmeijer, T.J. and Dulman, S.O. and Jansen, P.G. and Havinga, P.J.M. (2004) DCOS, a real-time light-weight Data Centric Operating System. Technical Report TR-CTIT-04-42, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hofmeijer, T.J. and Dulman, S.O. and Jansen, P.G. and Havinga, P.J.M. (2004) AmbientRT - real time system software support for data centric sensor networks. In: 2nd Int. Conf. on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Melbourne, Australia. pp. 61-66. IEEE Computer Society. ISBN 0-7803-8894-1
Hofmeijer, T.J. and Dulman, S.O. and Jansen, P.G. and Havinga, P.J.M. (2004) DCOS, a Real-Time Light-weight Data Centric Operating System. In: IASTED Int. Conf. on Advances in Computer Science and Technology (ACST), St. Thomas, Virgin Islands, USA. pp. 259-264. ACTA Press. ISBN 0-88986-437-3
Hollestelle, G. and Burgers, W. and den Hartog, J.I. (2004) Power analysis on smartcard algorithms using simulation. Technical report CSR 04-22, Eindhoven University of Technology, Eindhoven.
Hubbers, E.M.G.M. and Jacobs, B.P.F. and Pieters, W. (2004) RIES: Internet voting in action. Technical Report NIII-R0449, Radboud University Nijmegen, Nijmegen. ISSN 1571-5221
Kalker, T. and Epema, D.H.J. and Hartel, P.H. and Lagendijk, R.L. and van Steen, M. (2004) Music2Share - Copyright-Compliant Music Sharing in P2P Systems. Proceedings of the IEEE Special Issue on Digital Rights Management, 92 (6). pp. 961-970. ISSN 0018-9219 *** ISI Impact 6,91 ***
Kavaldjiev, N.K. and Smit, G.J.M. (2004) An energy-efficient Network-on-Chip for a heterogeneous tiled reconfigurable Systems-on-Chip. Technical Report TR-CTIT-04-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kavaldjiev, N.K. and Smit, G.J.M. (2004) An energy-efficient Network-on-Chip for a heterogeneous tiled reconfigurable System-on-Chip. In: EUROMICRO Symp. on Digital System Design (DSD), Rennes, France. pp. 492-498. IEEE Computer Society. ISBN 0-7695-2203-3
Kavaldjiev, N.K. and Smit, G.J.M. and Jansen, P.G. (2004) A Virtual Channel Router for On-chip Networks. Technical Report TR-CTIT-04-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kavaldjiev, N.K. and Smit, G.J.M. and Jansen, P.G. (2004) A Virtual Channel Router for On-chip Networks. In: IEEE Int. SOC Conf., Santa Clara, California. pp. 289-293. IEEE Computer Society. ISBN 0-7803-8445-8
Kavaldjiev, N.K. and Smit, G.J.M. and Jansen, P.G. (2004) Two Architectures for On-chip Virtual Channel Router. In: 5th PROGRESS Symposium on Embedded Systems, Nieuwegein, The Netherlands. pp. 90-95. Technology Foundation STW. ISBN 90-73461-41-3
Law, Yee Wei and Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Corin, R.J. (2004) Licensing Structured Data with Ease. In: 2nd IFIP TC6 WG6.11 Int. Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmenau, Germany. Technical Univ. Ilmenau. ISBN not assigned
Law, Yee Wei and Doumen, J.M. and Hartel, P.H. (2004) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. Technical Report TR-CTIT-04-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Doumen, J.M. and Hartel, P.H. (2004) Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract). In: 1st IEEE Int. Conf. on Mobile Ad-hoc and Sensor Systems (MASS), 25-27 Oct. 2004, Fort Lauderdale, Florida. pp. 447-456. IEEE Computer Society. ISBN 0-7803-8815-1
Law, Yee Wei and Hartel, P.H. and den Hartog, J.I. and Havinga, P.J.M. (2004) Link-layer Jamming Attacks on S-MAC. Technical Report TR-CTIT-04-52, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Lijding, M.E.M. and Jansen, P.G. and Mullender, S.J. (2004) Promote-IT: An efficient Real-Time Tertiary-Storage Scheduler. In: 21st IEEE Conf. on Mass Storage Systems and Technologies (MSST), College Park, Maryland. pp. 245-260. NASA.
Lormans, M. and van Dijk, H.W. and van Deursen, A. and Nöcker, E. and de Zeeuw, A. (2004) Managing Evolving Requirements in an Outsourcing Context: An Industrial Experience Report. In: 7th Int. Workshop on Principles of Software Evolution (IWPSE), Kyoto, Japan. pp. 149-158. IEEE Computer Society. ISBN 0-7695-2211-4
Mader, A.H. (2004) Deriving Schedules for a Smart Card Personalisation System. Technical Report TR-CTIT-04-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Mullender, S.J. and Jansen, P.G. (2004) Real Time in a Real Operating System. In: Computer Systems: Theory, Technology, and Applications - A Tribute to Roger Needham. Springer-Verlag, New York, pp. 213-222. ISBN 0-387-20170-X
Poel, M. and Seesink, R.A. and Schoute, A.L. and Dierssen, W. and Kooij, N. (2004) Design of a Multi Agent Architecture for Robot Soccer. A Case Study. In: The European Symposium on Intelligent Technologies, Hybrid Systems and their implementation on Smart Adaptive Systems (EUNITE) 2004, 10-12 June 2004, Aachen, Germany. pp. 364-370. ISBN 3-86130-368-X
Scholten, J. and Jansen, P.G. (2004) Real-Time Communication in Wireless Home Networks. Technical Report TR-CTIT-04-19, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Scholten, J. and Jansen, P.G. (2004) Real-Time Communication in Wireless Home Networks. In: Next Generation Teletraffic and Wired/Wireless Advanced Networking (NEW2AN), St. Petersburg, Russia. pp. 161-167. Tampere university of Technology. ISBN 952-15-1132-X
Scholten, J. and Jansen, P.G. and Hop, L. (2004) Routing in Wireless Multimedia Home Networks. Technical Report TR-CTIT-04-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Scholten, J. and Jansen, P.G. and Hop, L. (2004) Communicating Personal Gadgets. In: 1st IEEE Consumer Communications and Networking Conf. (CCNC), Las Vegas, Nevada. pp. 630-632. IEEE Computer Society. ISBN 0-7803-8146-7
Scholten, J. and Jansen, P.G. and Hop, L. (2004) Routing in Wireless Multimedia Home Networks. In: Int. Conf. On Multimedia And Expo (ICME), Taipei, Taiwan. pp. 1799-1802. IEEE Computer Society. ISBN 0-7803-8604-3
Sundramoorthy, V. and Speelziek, M.D. and van de Glind, G.J. and Scholten, J. (2004) Service Discovery with FRODO. In: 12th IEEE Int. Conf. on Network Protocols (ICNP), Student Poster Session, Berlin, Germany. pp. 24-27. Computer Science Reports. ISSN 1437-7969
Veldhuis, R.N.J. and Bazen, A.M. and Kauffman, J.A. and Hartel, P.H. (2004) Biometric verification based on grip-pattern recognition. Technical Report TR-CTIT-04-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Veldhuis, R.N.J. and Bazen, A.M. and Kauffman, J.A. and Hartel, P.H. (2004) Biometric verification based on grip-pattern recognition. (Invited) In: IS&T/SPIE 16th Annual Symp. on Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California. pp. 634-641. SPIE -- The Int. Society for Optical Engineering. ISBN 0-8194-5209-2

2003

Gras, F. and Le Dantec, B. and Trébucq, O. and Cucinelli, B. and Leduc, M. and Simplot, D. and Bueker, U. and Barthe, G. and Michaud, B. and Hartel, P.H. and Thevenot, B. and Moedl, A. and Quisquater, J.-J. and Thomasson, J.-P. and Canto, E., ed. (2003) RESET Roadmap for European research on Smartcard rElated Technologies. Report Type UNSPECIFIED Number UNSPECIFIED
ter Beek, M. and Lenzini, G. and Petrocchi, M. (2003) Team Automata for Security Analysis of Multicast/Broadcast Communication. In: ATPN Workshop on Issues in Security and Petri Nets (WISP), 23 June 2003, Eindhoven, The Netherlands. pp. 57-62. Beta Research School for Operations Management and Logistics. ISBN not assigned
Benz, H.P. (2003) Casual Multimedia Process Annotations -- CoMPAs. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 03-49 ISBN 90-365-1892-X
Bistarelli, S. and Cervesato, I. and Lenzini, G. and Martinelli, F. (2003) Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. In: 2nd Int. Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS), St. Petersburg, Russia. pp. 86-99. Springer-Verlag. ISBN 3-540-40797-9
Bossi, A. and Etalle, S. and Rossi, S. and Smaus, J.G. (2003) Termination of Simply Model Logic Programs with Dynamic Scheduling. Technical Report TR-CTIT-03-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Feng, Ling and Etalle, S. and Hartel, P.H. and Jonker, W. (2003) Experimenting with linear search in encrypted data. Technical Report TR-CTIT-03-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinksma, H. and Mader, A.H. (2003) Prozessalgebra, Teil 1. Automatisierungstechnik, 51 (8). pp. 13-16. ISSN 0178-2312 *** ISI Impact 0,28 ***
Brinksma, H. and Mader, A.H. (2003) Prozessalgebra, Teil 2. Automatisierungstechnik, 51 (9). pp. 17-20. ISSN 0178-2312 *** ISI Impact 0,28 ***
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Jonker, W. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. Technical Report TR-CTIT-03-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Jonker, W. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. In: 3rd Int. Conf. on Web Delivering of Music (WEDELMUSIC), Leeds, UK. pp. 122-129. IEEE Computer Society. ISBN 0-7695-1935-0
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language. Technical Report TR-CTIT-03-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language. In: IFIP TC6 WG6.11 Int. Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmenau, Germany. pp. 104-115. Technical Univ. Ilmenau.
Chong, Chuen Ngen and Corin, R.J. and Law, Yee Wei and Etalle, S. (2003) License Interpreter, Manager and Interface for LicenseScript. Report Type UNSPECIFIED Number UNSPECIFIED,
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. (2003) Comparing Logic-based and XML-based Rights Expression Languages. Technical Report TR-CTIT-03-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. (2003) Comparing Logic-based and XML-based Rights Expression Languages. In: Confederated Int. Workshops: On The Move to Meaningful Internet Systems (OTM), Catania, Sicily, Italy. pp. 779-792. Springer-Verlag. ISBN 3-540-20494-6
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Law, Yee Wei (2003) Approximating Fair Use in LicenseScript. In: 6th Int. Conf. of Asian Digital Libraries (ICADL), Kuala Lumpur, Malaysia. pp. 432-443. Springer-Verlag. ISBN 3-540-20608-6
Chong, Chuen Ngen and Law, Yee Wei and Etalle, S. and Hartel, P.H. (2003) Approximating Fair Use in LicenseScript. Technical Report TR-CTIT-03-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Peng, Z. and Hartel, P.H. (2003) Secure Audit Logging with Tamper-Resistant Hardware. In: 18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC), Athens, Greece. pp. 73-84. Kluwer Academic Publishers. ISBN 1-4020-7449-2
Corin, R.J. and Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. (2003) How to pay in LicenseScript. Technical Report TR-CTIT-03-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Doumen, J.M. and Etalle, S. (2003) Analysing Password Protocol Security Against Off-line Dictionary Attacks. Technical Report TR-CTIT-03-52, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2003) A Trace Logic for Local Security Properties. Technical Report TR-CTIT-03-21, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2003) A Trace Logic for Local Security Properties. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003), December 14 2003, Mumbai, India. pp. 129-143. Electronic Notes in Theoretical Computer Science 118. Elsevier. ISSN 1571-0661
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2003) On Modelling Real-time and Security properties of Distributed Systems (Extended Abstract). Technical Report TR-CTIT-03-46, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Malladi, S. and Alves-Foss, J. and Etalle, S. (2003) Guess what? Here is a new tool that finds some new guessing attacks. Technical Report TR-CTIT-03-02, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Malladi, S. and Alves-Foss, J. and Etalle, S. (2003) Guess what? Here is a new tool that finds some new guessing attacks (Extended Abstract). In: IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security (WITS), Warsaw, Poland. pp. 62-71. Dipartamento di Scienze dell'Informazione Universita di Bologna.
Di Pietro, R. and Mancini, L.V. and Law, Yee Wei and Etalle, S. and Havinga, P.J.M. (2003) LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. Technical Report TR-CTIT-03-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Di Pietro, R. and Mancini, L.V. and Law, Yee Wei and Etalle, S. and Havinga, P.J.M. (2003) LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In: 32nd Int. Conf. on Parallel Processing Workshops (ICPP), Kaohsiung, Taiwan. pp. 397-406. IEEE Computer Society. ISBN 0-7695-2018-9
van Dijk, H.W. and Sips, H.J. and Deprettere, E.F. (2003) Context-Aware Process Networks. In: 14th IEEE Int. Conf. on Application-Specific Systems, Architectures, and Processors (ASAP), The Hague, The Netherlands. pp. 6-16. IEEE Computer Society. ISBN 0-7695-1992-X
Dillema, F.W. and Stabell-Kulø, T. (2003) Pesto Flavoured Security. Technical Report TR-CTIT-03-51, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dillema, F.W. and Stabell-Kulø, T. (2003) Pesto flavoured security. In: 22nd Symp. on Reliable Distributed Systems (SRDS), Florence, Italy. pp. 241-249. IEEE Computer Society. ISBN 0-7695-1955-5
Doumen, J.M. (2003) Some Applications of Coding Theory in Cryptography. PhD thesis, Eindhoven University of Technology. ISBN 90-386-0702-4
Etalle, S. and Mukhopadhyay, S. and Roychoudhury, A. (2003) Preface. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003), December 14 2003, Mumbai, India. 1. Electronic Notes in Theoretical Computer Science 118. Elsevier. ISSN 1571-0661
Gebska, M. and Montoya Morales, A.L. and Paresi, C. (2003) Manage data – manage hazards – development of urban hazard information infrastructure for Windhoek (Namibia). In: First International ICSC Symposium on Information Technologies in Environmental Engineering ITEE'2003, 24-27 June 2003, Gdansk, Poland. -70. ICSC-NAISO Academic Press. ISBN 3-906454-33-9
Gnesi, S. and Lenzini, G. and Martinelli, F. (2003) Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability. In: Proceedings of the MEFISTO Project 2003, Formal Methods for Security and Time, Pisa, Italy. pp. 111-126. Electronic Notes in Theoretical Computer Science 99. Elsevier. ISSN 1571-0661
Gnesi, S. and Lenzini, G. and Martinelli, F. (2003) Logical Specification and Analysis of Fault Tolerant Systems through Partial Model Checking. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003), December 14 2003, Mumbai, India. pp. 57-70. Electronic Notes in Theoretical Computer Science 118. Elsevier. ISSN 1571-0661
Hafkamp, W.H.M. (2003) Thema Cybercrime: gewaarschuwde organisatie telt voor twee. Tijdschrift controlling, 18 (6). pp. 19-24. ISSN 1389-7713
Hanssen, F.T.Y. (2003) Installing fonts in LaTeX a user's experience. MAPS, 29. pp. 61-64. ISSN 1574-4620
Hanssen, F.T.Y. and van den Boom, J. and Jansen, P.G. and Scholten, J. (2003) Time synchronization for an Ethernet-based real-time token network. Technical Report TR-CTIT-03-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hanssen, F.T.Y. and van den Boom, J. and Jansen, P.G. and Scholten, J. (2003) Time synchronization for an Ethernet-based real-time token network. In: 2nd Int. Workshop on Real-Time LANs in the Internet Age, Porto, Portugal. pp. 71-74. Polytechnic Institute of Porto. ISBN 972-8688-12-1
Hanssen, F.T.Y. and Jansen, P.G. (2003) Real-time communication protocols: an overview. Technical Report TR-CTIT-03-49, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
den Hartog, J.I. and Verschuren, J. and de Vink, E.P. and Vos, J. and Wiersma, W. (2003) PINPAS: A Tool for Power Analysis of Smartcards. In: 18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC), Athens, Greece. pp. 453-457. Kluwer Academic Publishers. ISBN 1-4020-7449-2
Havinga, P.J.M. and Etalle, S. and Karl, H. and Petrioli, C. and Zorzi, M. and Kip, H.J. and Lentsch, T. (2003) EYES -- Energy Efficient Sensor Networks. In: 4th IFIP TC6/WG6.8 Int. Conf on Personal Wireless Communications (PWC), Venice, Italy. pp. 198-201. Springer-Verlag. ISBN 3-540-20123-8
Jansen, P.G. and Hanssen, F.T.Y. and Lijding, M.E.M. (2003) Scheduling of Early Quantum Tasks. In: 15th Euromicro Conf. on Real-Time Systems (ECRTS), Porto, Portugal. pp. 203-210. IEEE Computer Society. ISBN 0-7695-1936-9
Jansen, P.G. and Mullender, S.J. (2003) Real-Time in Plan 9: a short Overview. Technical Report TR-CTIT-03-19, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jansen, P.G. and Mullender, S.J. and Havinga, P.J.M. and Scholten, J. (2003) Lightweight EDF Scheduling with Deadline Inheritance. Technical Report TR-CTIT-03-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
de Jong, E.K. and Hartel, P.H. (2003) Method and apparatus for deployment of high integrity software using static procedure return addresses. Patent US20030177474 (Application).
Kavaldjiev, N.K. and Smit, G.J.M. (2003) A Survey of Efficient On-Chip Communications for SoC. Technical Report TR-CTIT-03-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kavaldjiev, N.K. and Smit, G.J.M. (2003) A Survey of Efficient On-Chip Communications for SoC. In: 4th PROGRESS Symposium on Embedded Systems, Nieuwegein, The Netherlands. pp. 129-140. Technology Foundation STW. ISBN 90-73461-37-5
Laud, P. and Corin, R.J. (2003) Sound Computational Interpretation of Formal Encryption with Composed Keys. Technical Report TR-CTIT-03-42, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Laud, P. and Corin, R.J. (2003) Sound Computational Interpretation of Formal Encryption with Composed Keys. In: 6th Annual Int. Conf. on Information Security and Cryptology (ICISC), Seoul, Korea. pp. 55-66. Springer-Verlag. ISBN 3-540-21376-7
Law, Yee Wei and Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Corin, R.J. (2003) Licensing Structured Data with Ease. Technical Report TR-CTIT-03-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Corin, R.J. and Etalle, S. and Hartel, P.H. (2003) A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. Technical Report TR-CTIT-03-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Corin, R.J. and Etalle, S. and Hartel, P.H. (2003) A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. In: 4th IFIP TC6/WG6.8 Int. Conf on Personal Wireless Communications (PWC), Venice, Italy. pp. 27-39. Springer-Verlag. ISBN 3-540-20123-8
Law, Yee Wei and Etalle, S. and Hartel, P.H. (2003) Assessing Security in Energy-Efficient Sensor Networks. In: 18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC), May 26-28, 2003, Athens, Greece. pp. 459-463. Kluwer Academic Publishers. ISBN 1-4020-7449-2
Lenzini, G. and Gnesi, S. and Latella, D. (2003) Spider: a Security Model Checker. In: 1st Int. Workshop on Formal Aspect of Security and Trust (FAST), Pisa, Italy. pp. 163-180. Istituto di Informatica e Telematica (IIT-CNR).
Lijding, M.E.M. (2003) Real-Time Scheduling of Tertiary Storage. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 03-48 ISBN 90-365-1890-3
Lijding, M.E.M. and Jansen, P.G. and Mullender, S.J. (2003) A Flexible Real-Time Hierarchical Multimedia Archive. Technical Report TR-CTIT-03-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Lijding, M.E.M. and Jansen, P.G. and Mullender, S.J. (2003) Implementing and Evaluating Jukebox Schedulers Using JukeTools. In: 20th IEEE Symp. on Mass Storage Systems (MSS), San Diego, California. pp. 92-96. IEEE Computer Society. ISBN 0-7695-1914-8
Martinelli, F. and Bistarelli, S. and Cervesato, I. and Lenzini, G. and Marangoni, R. (2003) Representing Biological Systems with Multiset Rewriting. In: 9th Int. Conf. on Computer Aided Systems Theory (EUROCAST), Las Palmas de Gran Canaria, Spain. pp. 415-426. Springer-Verlag. ISBN 3-540-20221-8
Mullender, S.J. and Jansen, P.G. (2003) Real Time in a Real Operating System. Technical Report TR-CTIT-03-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2003) A pragmatic phenomenological approach in environmental planning. Master's thesis, University of Twente.
Scholten, J. and Jansen, P.G. and Hanssen, F.T.Y. and Mank, W. and Zwikker, A. (2003) A Real-Time Multimedia Streaming Protocol for Wireless Networks. Technical Report TR-CTIT-03-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Scholten, J. and Jansen, P.G. and Hanssen, F.T.Y. and Mank, W. and Zwikker, A. (2003) Benchmarking for RTN, a Real-Time Variation on IEEE802.11. Technical Report TR-CTIT-03-39, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Scholten, J. and Jansen, P.G. and Hop, L. (2003) Communicating Personal Gadgets. Technical Report TR-CTIT-03-38, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Seesink, R.A. and Dierssen, W. and Kooij, N. and Schoute, A.L. and Poel, M. and Schepers, E. and Verschoor, T. (2003) Fast data sharing within a distributed, multithreaded control framework for robot teams. Technical Report TR-CTIT-03-54, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sundramoorthy, V. and Scholten, J. and Jansen, P.G. and Hartel, P.H. (2003) Service Discovery At Home. Technical Report TR-CTIT-03-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sundramoorthy, V. and Scholten, J. and Jansen, P.G. and Hartel, P.H. (2003) Service discovery at home. In: 4th Int. Conf. on Information, Communications & Signal Processing and 4th IEEE Pacific-Rim Conf. On Multimedia (ICICS/PCM), Singapore. pp. 1929-1933. IEEE Computer Society. ISBN 0-7803-8185-8
Xu, Sheng-bo and Doumen, J.M. and van Tilborg, H.C.A. (2003) On the Security of Digital Signature Schemes Based on Error-Correcting Codes. Designs, Codes and Cryptography, 28 (2). pp. 187-199. ISSN 0925-1022 *** ISI Impact 0,78 ***

2002

Delzanno, G. and Etalle, S. and Gabbrielli, M., ed. (2002) 2nd Workshop on Specification, Analysis and Validation for Emerging Technologies in Computational Logic (SAVE). Report Type UNSPECIFIED 94, ISSN 0109-9779
Abelmann, L. and Chong, Chuen Ngen and Hartel, P.H. and Lodder, J.C. (2002) Design Rationale for Secure Probe Storage based on Patterned Magnetic Media. Technical Report TR-CTIT-02-42, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bach, W. and Dam, D. and Evers, L. and Jonker, Misha and Scholten, J. and Havinga, P.J.M. (2002) An Iterative Quality-based Localization Algorithm for Ad Hoc Networks. Technical Report TR-CTIT-02-51, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Beelen, P. and Doumen, J.M. (2002) Pseudorandom sequences from elliptic curves. In: 6th Int. Conf. Finite Fields with Applications to Coding Theory, Cryptography and Related Areas, Oaxaca, Mexico. pp. 37-52. Springer-Verlag. ISBN 3540439617
Bossi, A. and Cocco, N. and Etalle, S. (2002) Transformation Systems and Nondeclarative Properties. In: Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I. Springer-Verlag, Berlin, pp. 162-186. ISBN 3-540-43959-5
Bossi, A. and Cocco, N. and Etalle, S. and Rossi, S. (2002) On Modular Termination Proofs of General Logic Programs. Theory and Practice of Logic Programming, 2 (3). pp. 263-291. ISSN 1471-0684 *** ISI Impact 0,29 ***
Bossi, A. and Etalle, S. and Rossi, S. (2002) Properties of Input-Consuming Derivations. Theory and Practice of Logic Programming, 2 (2). pp. 125-154. ISSN 1471-0684 *** ISI Impact 0,29 ***
Brinkman, R. and Hoepman, J.H. (2002) Secure Method Invocation in JASON. In: 5th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), Nov. 20-22, 2002, San Jose, California. pp. 29-40. USENIX Association. ISBN 1-931971-04-8
Brinksma, H. and Mader, A.H. (2002) Model checking embedded system designs. (Invited) In: 6th Int. Workshop on Discrete Event Systems (WODES), Zaragoza, Spain. pp. 151-158. IEEE Computer Society. ISBN 0-7695-1683-1
Brinksma, H. and Mader, A.H. and Fehnker, A. (2002) Verification and Optimization of a PLC Control Schedule. International Journal on Software Tools for Technology Transfer (STTT), 4 (1). pp. 21-33. ISSN 1433-2779
Chong, Chuen Ngen and van Buuren, R. and Hartel, P.H. and Kleinhuis, G. (2002) Security Attributes Based Digital Rights Management. Technical Report TR-CTIT-02-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and van Buuren, R. and Hartel, P.H. and Kleinhuis, G. (2002) Security Attributes Based Digital Rights Management. In: Joint Int. Workshop on Interactive Distributed Multimedia Systems / Protocols for Multimedia Systems (IDMS/PROMS), Coimbra, Portugal. pp. 339-352. Springer-Verlag. ISBN 3-540-00169-7
Chong, Chuen Ngen and Law, Yee Wei and Etalle, S. and Hartel, P.H. (2002) LicenseScript - A Language and Framework for Calculating Licenses on Information over Constrained Domains. Technical Report TR-CTIT-02-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Peng, Z. and Hartel, P.H. (2002) Secure Audit Logging with Tamper-Resistant Hardware. Technical Report TR-CTIT-02-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2002) Using Trace Formulae for Security Protocol Design. Technical Report TR-CTIT-02-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. (2002) An Improved Constraint-Based System for the Verification of Security Protocols. Technical Report TR-CTIT-02-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. (2002) An Improved Constraint-based system for the verification of security protocols. In: 9th Int. Static Analysis Symp. (SAS), Madrid, Spain. pp. 239-265. Springer-Verlag. ISBN 3-540-44235-9
Dulman, S.O. and Nieberg, T. and Havinga, P.J.M. and Hartel, P.H. (2002) Multipath Routing for Data Dissemination in Energy Efficient Sensor Networks. Technical Report TR-CTIT-02-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Evers, L. and Bach, W. and Dam, D. and Jonker, Misha and Scholten, J. and Havinga, P.J.M. (2002) An Iterative Quality-Based Localization Algorithm for Ad Hoc Networks. In: 1st Int. Conf. on Pervasive Computing (Pervasive), Zurich, Switzerland. pp. 55-61. ETH.
Gnesi, S. and Latella, D. and Lenzini, G. (2002) Towards Model Checking a Spi-Calculus Dialect. Technical Report 2002-TR-10, Istituto di Scienza e Tecnologia Informatica (ISTI-CNR), Pisa, Italy.
Hanssen, F.T.Y. and Hartel, P.H. and Hattink, T. and Jansen, P.G. and Scholten, J. and Wijnberg, J. (2002) A Real-Time Ethernet Network at Home. Technical Report TR-CTIT-02-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hanssen, F.T.Y. and Hartel, P.H. and Hattink, T. and Jansen, P.G. and Scholten, J. and Wijnberg, J. (2002) A Real-Time Ethernet Network at Home. In: Research report 36/2002, Vienna, Austria. pp. 5-8. Real-Time Systems Group.
Hartel, P.H. and Muller, H.L. and Glaser, H. (2002) The Functional "C" experience. Technical Report TR-CTIT-02-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
den Hartog, J.I. (2002) Probabilistic Extensions of Semantical Models. PhD thesis, Vrije Univ., Amsterdam.
den Hartog, J.I. and de Vink, E.P. (2002) Verifying Probabilistic Programs Using a Hoare like Logic. International Journal of Foundations of Computer Science, 13 (3). pp. 315-340. ISSN 0129-0541 *** ISI Impact 0,42 ***
Havinga, P.J.M. and Scholten, J. (2002) Towards Ubiquitous Computing. I/O Vivat, 2 (18). pp. 8-10. ISSN 1389-0468
Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2002) Polymer Thick-Film Sensors: Possibilities for Smartcard Biometrics. Technical Report TR-CTIT-02-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2002) Low-Cost Planar PTF Sensors for the Identity Verification of Smartcard Holders. (Invited) In: 1st IEEE Int. Conf. on Sensors, Orlando, Florida. pp. 1614-1619. IEEE Computer Society. ISBN 0-7803-7455-X
Henderson, N.J. and White, N.M. and Veldhuis, R.N.J. and Hartel, P.H. and Slump, C.H. (2002) Sensing pressure for authentication. Technical Report TR-CTIT-02-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Henderson, N.J. and White, N.M. and Veldhuis, R.N.J. and Hartel, P.H. and Slump, C.H. (2002) Sensing pressure for authentication. In: 3rd IEEE Benelux Signal Processing Symp. (SPS), Leuven, Belgium. pp. 241-244. ISBN not assigned
Jacobs, J.W.M. (2002) Developing a Raster detector system with the J array processing language. Computing & Control Engineering Journal, 13 (6). pp. 299-304. ISSN 0956-3385
Jansen, P.G. and Hanssen, F.T.Y. and Lijding, M.E.M. (2002) Early Quantum Task Scheduling. Technical Report TR-CTIT-02-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jansen, P.G. and Hanssen, F.T.Y. and Mullender, S.J. (2002) ClockWork: a Real-Time Feasibility Analysis Tool. Technical Report TR-CTIT-02-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Chan, K.Y. (2002) NECTAR: Simulation and Visualization in a 3D Collaborative Environment. In: EUROMEDIA 2002, Modena, Italy. pp. 15-17. SCS Publishing House. ISBN 90-77039-05-8
Law, Yee Wei and Dulman, S.O. and Etalle, S. and Havinga, P.J.M. (2002) Assessing Security-Critical Energy-Efficient Sensor Networks. Technical Report TR-CTIT-02-18, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Etalle, S. and Hartel, P.H. (2002) Key Management with Group-Wise Pre-Deployed Keying and Secret Sharing Pre-Deployed Keying. Technical Report TR-CTIT-02-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Lijding, M.E.M. and Hanssen, F.T.Y. and Jansen, P.G. (2002) A Case Against Periodic Jukebox Scheduling. Technical Report TR-CTIT-02-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Lijding, M.E.M. and Jansen, P.G. and Mullender, S.J. (2002) A Flexible Real-time Hierarchical Multimedia Archive. In: Joint Int. Workshop on Interactive Distributed Multimedia Systems / Protocols for Multimedia Systems (IDMS/PROMS), Coimbra, Portugal. pp. 229-240. Springer-Verlag. ISBN 3-540-00169-7
Lijding, M.E.M. and Mullender, S.J. and Jansen, P.G. (2002) JukeTools: A Toolbox for Implementing and Evaluating Jukebox Schedulers. Technical Report TR-CTIT-02-49, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Lijding, M.E.M. and Mullender, S.J. and Jansen, P.G. (2002) A Comprehensive Model of Tertiary-storage Jukeboxes. Technical Report TR-CTIT-02-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2002) Case-based techniques for conversational agents in virtual environments. Master's thesis, University of Twente.
Poll, E. and Hartel, P.H. and de Jong, E.K. (2002) A Java Reference Model of Transacted Memory for Smart Cards. Technical Report TR-CTIT-02-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Poll, E. and Hartel, P.H. and de Jong, E.K. (2002) A Java Reference Model of Transacted Memory for Smart Cards. In: 5th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), San Jose, California. pp. 75-86. USENIX Association. ISBN 1-931971-04-8
Rosien, M.A.J. and Smit, G.J.M. and Krol, T. (2002) Generating a CDFG from C/C++ code. In: 3rd PROGRESS workshop on Embedded Systems, Veldhoven, The Netherlands. pp. 200-202. Technology Foundation STW. ISBN 90-73461-34-0
Scholten, J. and Jansen, P.G. and Hanssen, F.T.Y. and Hartel, P.H. and Hattink, T. and Sundramoorthy, V. (2002) Multimedia QoS in low-cost Home Networks. Technical Report TR-CTIT-02-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Scholten, J. and Jansen, P.G. and Hanssen, F.T.Y. and Hartel, P.H. and Hattink, T. and Sundramoorthy, V. (2002) Multimedia QoS in low-cost home networks. In: 27th Annual IEEE Conf. on Local Computer Networks (LCN), Tampa, Florida. pp. 327-328. IEEE Computer Society. ISBN 0-7695-1591-6
Scholten, J. and Jansen, P.G. and Hanssen, F.T.Y. and Hattink, T. (2002) An In-Home Digital Network Architecture for Real-Time and Non-Real-Time Communication. Technical Report TR-CTIT-02-50, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Scholten, J. and Jansen, P.G. and Hanssen, F.T.Y. and Hattink, T. (2002) RTnet, a new approach to in-home real-time multimedia communication. In: 12th IEEE Workshop on Local and Metropolitan Area Networks, Stockholm, Sweden. pp. 15-19. ISBN not assigned
Scholten, J. and Jansen, P.G. and Hanssen, F.T.Y. and Hattink, T. (2002) An In-Home Digital Network Architecture for Real-Time and Non-Real-Time Communication. In: IEEE Region 10 Int. Conf. on Computers, Communications, Control and Power Engineering (TENCON), Beijing, China. pp. 728-731. IEEE Computer Society. ISBN 0-7803-7491-6
Schoute, A.L. (2002) RoadPlan Manual version 3.1. Technical Report TR-CTIT-02-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Smit, G.J.M. and Havinga, P.J.M. and Smit, L.T. and Heysters, P.M. and Rosien, M.A.J. (2002) Dynamic Reconfiguration in Mobile Systems. In: 12th Int. Conf. on Field Programmable Logic and Applications: Reconfigurable Computing Is Going Mainstream (FPL), Montpellier, France. pp. 171-181. Springer-Verlag. ISBN 3-540-44108-5
Stabell-Kulø, T. (2002) Private Computing: The Trusted Digital Assistant. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 03-45 ISBN 90-365-1762-1
Sundramoorthy, V. and Scholten, J. (2002) Challenges In the At Home Anywhere (@HA) Service Discovery Protcol. Technical Report TR-CTIT-02-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Taal, J. and Langendoen, K.G. and van der Schaaf, A. and van Dijk, H.W. and Lagendijk, R.L. (2002) Adaptive end-to-end optimization of mobile video streaming using QoS negotiation. In: Int. Symp. on Circuits and Systems (ISCAS) -- special session on Multimedia over Wireless Networks, Scottsdale, Arizona. pp. 53-56. IEEE Computer Society.
Verheul, E. and Doumen, J.M. and van Tilborg, H.C.A. (2002) Sloppy Alice Attacks! Adaptive Chosen Ciphertext Attacks on the McEliece cryptosystem. In: Information, Coding and Mathematics. Kluwer Academic Publishers, Boston, Massachusetts, pp. 99-119. ISBN 1-4020-7079-9
Zivkovic, Z. and Schoute, A.L. and van der Heijden, F. (2002) Combining A Priori Knowledge and Sensor Information for Updating the Global Position of an Autonomous Vehicle. In: 8th Mechatronics Forum Int. Conf., Enschede, The Netherlands. pp. 643-651. University of Twente. ISBN 90-365-1767-2

2001

Cucinelli, B., ed. (2001) Research for the Smart Card of 2010. external_report Number UNSPECIFIED European Commission - Information Society Directorate-General, Brussels.
Etalle, S. and Gabbrielli, M., ed. (2001) ICLP01 workshop on Specification, Verification and Analysis of Emerging Technologies (SAVE). Report Type UNSPECIFIED Number UNSPECIFIED,
Bolks, M. and Hanssen, F.T.Y. and Abelmann, L. and Havinga, P.J.M. and Hartel, P.H. and Jansen, P.G. and Lodder, J.C. and Smit, G.J.M. (2001) Micro Scanning Probe Array Memory. Technical Report TR-CTIT-01-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolks, M. and Hanssen, F.T.Y. and Abelmann, L. and Havinga, P.J.M. and Hartel, P.H. and Jansen, P.G. and Lodder, J.C. and Smit, G.J.M. (2001) Micro Scanning Probe Array memory µSPAM. In: 2nd PROGRESS workshop on Embedded Systems, Veldhoven, The Netherlands. pp. 17-26. Technology Foundation STW. ISBN 90-73461-26-X
Bossi, A. and Etalle, S. and Rossi, S. (2001) Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling. In: 10th European Symp. on programming (ESOP), Genova, Italy. pp. 402-416. Springer-Verlag. ISBN 3-540-41862-8
Delzanno, G. and Etalle, S. (2001) Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. In: 11th Int. Logic Based Program Synthesis and Transformation (LOPSTR), Paphos, Greece. pp. 76-90. Springer-Verlag. ISSN 0302-9743 ISBN 3-540-43915-3
Domingo-Ferrer, J. and Hartel, P.H. (2001) Current directions in smart cards. Computer Networks, 36 (4). pp. 377-379. ISSN 1389-1286 *** ISI Impact 1,23 ***
Etalle, S. and Gabbrielli, M. and Meo, M.C. (2001) Transformations of CCP programs. ACM Transactions on Programming Languages and Systems (TOPLAS), 23 (3). pp. 304-395. ISSN 0164-0925 *** ISI Impact 1,03 ***
Field, A.N. and Hartel, P.H. (2001) On the evaluation of Web Radio. Technical Report TR-CTIT-01-39, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Field, A.N. and Hartel, P.H. and Mooij, W.G.P. (2001) Personal DJ, an Architecture for Personalized Content Delivery. Technical Report TR-CTIT-01-26, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Field, A.N. and Hartel, P.H. and Mooij, W.G.P. (2001) Personal DJ, an Architecture for personalised content delivery. In: 10th Int. World Wide Web Conf. (WWW), Hongkong. pp. 1-7. ACM Press. ISBN 1-58113-348-0
Glaser, H. and Hartel, P.H. and Leuschel, M. and Martin, A. (2001) Declarative Languages in Education. In: Encyclopaedia of Microcomputers. Marcel Dekker Inc, New York, pp. 79-102. ISBN 0-8247-2726-6
Hanssen, F.T.Y. and Hartel, P.H. and Jansen, P.G. and Scholten, J. and Vervoort, W.A. (2001) A Real-time Network at Home. Technical Report TR-CTIT-01-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hanssen, F.T.Y. and Hartel, P.H. and Jansen, P.G. and Scholten, J. and Vervoort, W.A. (2001) A Real time network at home. In: 2nd PROGRESS workshop on Embedded Systems, Veldhoven, The Netherlands. pp. 67-72. Technology Foundation STW. ISBN 90-73461-26-X
Hartel, P.H. (2001) Veiligheid in Gedistribueerde Systemen. University of Twente. ISBN not assigned
Hartel, P.H. and Butler, M.J. and de Jong, E.K. and Longley, M. (2001) Transacted Memory for Smart Cards. In: 10th Formal Methods for Increasing Software Productivity (FME), Berlin, Germany. pp. 478-499. Springer-Verlag. ISBN 3-540-41791-5
Hartel, P.H. and Jacobs, B.P.F. (2001) De Smartcard van 2010. Smart Cards in Business, 6 (7). pp. 14-16. ISSN 1569-1179
Hartel, P.H. and Moreau, L.A.V. (2001) Formalising the safety of Java, the Java Virtual Machine and Java Card. Technical Report TR-CTIT-01-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Moreau, L.A.V. (2001) Formalizing the Safety of Java, the Java Virtual Machine and Java Card. ACM Computing Surveys, 33 (4). pp. 517-558. ISSN 0360-0300 *** ISI Impact 3,54 ***
den Hartog, J.I. and de Vink, E.P. and de Bakker, J.W. (2001) Metric Semantics and Full Abstractness for Action Refinement and Probabilistic Choice. In: MFCSIT2000, The First Irish Conference on the Mathematical Foundations of Computer Science and Information, Cork, Ireland. pp. 72-99. Electronic Notes in Theoretical Computer Science 40. Elsevier. ISSN 1571-0661
Havinga, P.J.M. and Smit, L.T. and Smit, G.J.M. and Bos, M. and Heysters, P.M. (2001) Energy management for dynamically reconfigurable heterogeneous mobile systems. (Invited) In: 15th International Parallel and Distributed Processing Symposium, IPDPS 2001, 23-27 Apr 2001, San Francisco, CA, USA. pp. 840-852. IEEE Computer Society. ISBN 0-7695-0990-8
Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2001) Polymer thick-film sensors: Possibilities for smartcard biometrics. In: 11th Conf. on Sensors and Their Applications, London, UK. pp. 83-88. IOP Publishing. ISBN 0750308214
Henderson, N.J. and White, N.M. and Hartel, P.H. (2001) iButton enrolment and verification times for the pressure sequence smartcard biometric. In: 2nd Conf. Smart card Programming and Security (E-smart), Cannes, France. pp. 124-134. Lecture Notes in Computer Science 2140. Springer-Verlag. ISBN 3-540-42610-8
Lijding, M.E.M. and Jansen, P.G. and Mullender, S.J. (2001) Real-time scheduling of a tertiary-storage juke-box. In: 2nd PROGRESS workshop on Embedded Systems, Veldhoven, The Netherlands. pp. 135-140. Technology Foundation STW. ISBN 90-73461-26-X
Mader, A.H. and Brinksma, H. and Wupper, H. and Bauer, N. (2001) Design of a PLC Control Program for a Batch Plant - VHS Case Study 1. European Journal of Control, 7 (4). pp. 416-439. ISSN 0947-3580 *** ISI Impact 1,25 ***
Mansour, O. and Etalle, S. and Krol, T. (2001) Scheduling and Allocation of Non-Manifest Loops on Hardware Graph-Models. In: 2nd PROGRESS workshop on Embedded Systems, 18 Oct 2001, Veldhoven, The Netherlands. pp. 153-160. Technology Foundation STW. ISBN 90-73461-26-X
Mullender, S.J. and Presotto, D. (2001) Programming Distributed Applications using Plan 9 from Bell Labs. In: 4th European Research Seminar on Advances in Distributed Systems (ERSADS), Bertinoro, Italy. pp. 115-132. Univ. di Bologna.
Pieters, W. (2001) Free will and intelligent machines: Why case-based reasoning systems do what they do. Project Report not assigned, Artificial intelligence & learning group, Norwegian University of Science and Technology, Trondheim. ISSN not assigned
Schoute, A.L. (2001) Behaviour-based Control Framework for an Autonomous Mobile Robot. In: 3rd Workshop on European Scientific and Industrial Collaboration, Enschede, The Netherlands. pp. 237-245. Drebbel Institute for Mechatronics. ISBN 90 365 1610 2
Smit, G.J.M. and Havinga, P.J.M. and Scholten, J. (2001) Architectures for Ubiquitous Computing. PT embedded systems, 3 (2002). pp. 8-11. ISSN 1389-1405
Young, C. and Yn, L. and Szymanski, T. and Reppy, J. and Presotto, D. and Pike, R. and Narlikar, G.J. and Mullender, S.J. and Grosse, E. (2001) Protium, an infrastructure for partitioned applications. In: 8th Workshop on Hot Topics in Operating Systems (HOTOS), Schloß Elmau, Germany. pp. 47-52. IEEE Computer Society. ISBN 0-7695-1040-X

2000

Diehl, S. and Hartel, P.H. and Sestoft, P., ed. (2000) Special issue: Principles of Abstract Machines. Future Generation Computer Systems, 16 (7). v-vi. ISSN 0167-739X *** ISI Impact 1,86 ***
Scholten, J. and van Sinderen, M.J., ed. (2000) Interactive Distributed Multimedia Systems and Telecommunication Services. Lecture Notes in Computer Science 1905. Springer, Berlin, Germany. ISBN 3-540-41130-5
Bertolino, M. and Etalle, S. and Palamidessi, C. (2000) The Replacement Operation for CCP Programs. In: 9th Int. Workshop on Logic Program Synthesis and Transformation (LOPSTR), Venezia, Italy. pp. 216-233. Springer-Verlag. ISBN 3-540-67628-7
Bos, M. and Havinga, P.J.M. and Smit, G.J.M. (2000) Channel Communication and Reconfigurable Hardware. In: 1st PROGRESS workshop on Embedded Systems, 13 Oct. 2001. Technology Foundation STW. ISBN 90-73461-25-1
Bosch, H.G.P. and Mullender, S.J. (2000) Real-time disk scheduling in a mixed-media file system. In: 6th Real-Time Technology and Application Symp. (RTAS), Washington, DC. pp. 23-32. IEEE Computer Society. ISBN 0769507131
Bossi, A. and Cocco, N. and Etalle, S. (2000) Transformation of Left Terminating Programs. In: 9th Int. Workshop on Logic Program Synthesis and Transformation (LOPSTR), Venezia, Italy. pp. 156-175. Springer-Verlag. ISBN 3-540-67628-7
Bossi, A. and Etalle, S. and Rossi, S. (2000) Semantics of Well-Moded Input-Consuming Programs. Computer Languages, 26 (1). pp. 1-25. ISSN 0096-0551
Bossi, A. and Etalle, S. and Rossi, S. (2000) Semantics of Input-Consuming Logic Programs. In: Computational Logic (CL), London, UK. pp. 194-208. Springer-Verlag.
Brinksma, H. and Mader, A.H. (2000) Verification and Optimization of a PLC Control Schedule. In: 7th Int. SPIN Workshop on Model Checking of Software, Stanford Univ., California. pp. 73-92. Springer-Verlag. ISBN 3-540-41030-9
Cederquist, J.G. and Coquand, T. (2000) Entailment relations and distributive lattices. In: Logic Colloquium 1998, 09-15 Aug 1998, Prague, Czech Republic. pp. 110-123. Lecture Notes in Logic 13. Association for Symbolic Logic in cooperation with A K Peters. ISBN 1-56881-113-6
Diehl, S. and Hartel, P.H. and Sestoft, P. (2000) Abstract Machines for Programming Language Implementation. Future Generation Computer Systems, 16 (7). pp. 739-751. ISSN 0167-739X *** ISI Impact 1,86 ***
van Dijk, H.W. and Langendoen, K.G. and Sips, H.J. (2000) ARC: A Bottom-Up Approach to Negotiated QoS. In: 3rd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Monterey, California. pp. 128-137. IEEE Computer Society. ISBN 0-7695-0816-2
Etalle, S. and Mountjoy, J. (2000) The lazy functional side of logic programming. In: Extended Abstracts 10th Int. Workshop on Logic-based Program Synthesis and Transformation (LOPSTR), Jul. 2000, Imperial College, London. Department of Computer Science. ISSN 1361-6161
Glaser, H. and Hartel, P.H. and Garratt, P.W. (2000) Programming by Numbers -- A Programming Method for Complete Novices. The Computer Journal, 43 (4). pp. 252-265. ISSN 0010-4620 *** ISI Impact 0,76 ***
Gnesi, S. and Latella, D. and Lenzini, G. (2000) A BRUTUS Logic for a Spi-Calculus Dialect. Report Type UNSPECIFIED TR-B4-27,
Gnesi, S. and Latella, D. and Lenzini, G. and Amendola, A. and Abbaneo, C. and Marmo, P. (2000) An Automatic SPIN Validation of a Safety Critical Railway Control System. In: Int. Conf. on Dependable Systems and Networks (DSN), New York. pp. 119-124. IEEE Computer Society. ISBN 0-7695-0707-7
Gnesi, S. and Latella, D. and Lenzini, G. and Amendola, A. and Abbaneo, C. and Marmo, P. (2000) A Formal Specification and Validation of a Safety Critical Railway Control System. In: Fifth International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2000, 3-4 Apr 2000, Berlin, Germany. pp. 305-329. GMD-Report 91. GMD - Forschungszentrum Informationstechnik GmbH. ISSN 1435-2702
Gnesi, S. and Latella, D. and Lenzini, G. and Amendola, A. and Abbaneo, C. and Marmo, P. (2000) A Formal Specification and Validation of a Control System in Presence of Byzantine Errors. In: 6th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2000, 27-31 Mar 2000, Berlin, Germany. pp. 535-549. Lecture Notes in Computer Science 1785. Springer-Verlag. ISBN 3-540-67282-6
Hartel, P.H. (2000) Formalising Java safety -- An overview. In: 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), Bristol, UK. pp. 115-134. Kluwer Academic Publishers. ISBN 0-7923-7953-5
Hartel, P.H. and de Jong, E.K. (2000) A programming and a modelling perspective on the evaluation of Java Card implementations. In: 1st Java on Smart Cards: Programming and Security (Java Card Workshop), Cannes, France. pp. 52-72. Springer-Verlag. ISBN 3-540-42167-X
Havinga, P.J.M. (2000) Mobile Multimedia Systems. PhD thesis, University of Twente. ISBN 90-365-1406-1
Havinga, P.J.M. and Smit, G.J.M. and Bos, M. (2000) Energy efficient wireless ATM design. Mobile Networks and Applications (MONET), Special issue on Wireless Mobile ATM technologies, 5 (2). pp. 147-155. ISSN 1383-469X *** ISI Impact 1,11 ***
Henderson, N.J. and Hartel, P.H. (2000) Pressure Sequence - A Novel Method of Protecting Smart Cards. In: 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), Bristol, UK. pp. 241-256. Kluwer Academic Publishers. ISBN 0-7923-7953-5
Mader, A.H. (2000) A Classification of PLC Models and Applications. In: 5th Int. Workshop on Discrete Event Systems (WODES) -- Discrete Event Systems, Analysis and Control, Ghent, Belgium. pp. 239-247. Kluwer Academic Publishers. ISBN 0-7923-7897-0
Mader, A.H. (2000) What is the method in applying formal methods to PLC applications? In: 4th Int. Conf. Automation of Mixed Processes: Hybrid Dynamic Systems (ADPM), Dortmund, Germany. pp. 165-171. Shaker Verlag. ISBN 3-8265-7836-8
van Rein, H. and Brinkman, R. (2000) Home-grown CASE tools with XML and XSLT. In: Int. Workshop on Model Engineering (IWME), June 13, 2000, Sophia Antipolis, France. pp. 105-112.
Scholten, J. and Jansen, P.G. (2000) Home Telematics, or the Information Super Highway at Home. In: IRMA 2000 Challenges of Information Technology Management in the 21st Century, Anchorage, Alaska. pp. 746-747. IDEA Group Publishing. ISBN 1-878-28984-5
Schoute, A.L. (2000) RoadPlan -- AGV Traffic Control Development Tool -- Version 2.1 (Software). Report Type UNSPECIFIED Number UNSPECIFIED,
Smit, G.J.M. and Havinga, P.J.M. and Bos, M. (2000) Energy-efficient adaptive wireless network design. In: 5th Int. Conf. Computers and Communications (ISCC), Antibes, France. pp. 502-507. IEEE Computer Society. ISBN 0-7695-0722-0
Smit, G.J.M. and Havinga, P.J.M. and Bos, M. and Smit, L.T. and Heysters, P.M. (2000) Reconfiguration in Mobile Multimedia Systems. In: 1st PROGRESS workshop on Embedded Systems, 13 Oct. 2001. pp. 95-105. Technology Foundation STW. ISBN 90-73461-25-1
Volkerink, H.J. and Hilderink, G.H. and Broenink, J.F. and Vervoort, W.A. and Bakkers, A.W.P. (2000) CSP Design Model and Tool Support. In: Communicating Process Architectures, Canterbury, UK. pp. 33-48. IOS Press. ISSN 1383-7575

1999

Etalle, S., ed. (1999) Benelog99 Eleventh Benelux Workshop on Logic Programming. Report Type UNSPECIFIED CS 99-09,
Bosch, H.G.P. (1999) Mixed-Media File Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 03-53 ISBN 90-365-1277-8
Bosch, H.G.P. and Mullender, S.J. and Jansen, P.G. (1999) Clockwise: A Mixed-Media File System. In: IEEE Int. Conf. on Multimedia Computing and Systems (ICMCS), Firenze, Italy. pp. 277-281. IEEE Computer Society. ISBN 0769502539
Bossi, A. and Etalle, S. and Rossi, S. (1999) Properties of Input-Consuming Derivations. In: ICLP'99 International Conference on Logic Programming: Workshop on Verification of Logic Programs, December 1, 1999, Las Cruces, New Mexico. pp. 1-23. Electronic Notes in Theoretical Computer Science 30. Elsevier. ISSN 1571-0661
Butler, M.J. and Hartel, P.H. (1999) Reasoning about Grover's Quantum Search Algorithm using Probabilistic wp. ACM Transactions on Programming Languages and Systems (TOPLAS), 21 (3). pp. 417-429. ISSN 0164-0925 *** ISI Impact 1,03 ***
du Croo de Jongh, M.S.L. and Doumen, J.M. and van Leeuwen, J.M.J. (1999) Density matrix technique for groundstate calculations. Computer physics communications, 121-122. pp. 483-488. ISSN 0010-4655 *** ISI Impact 3,08 ***
Etalle, S. and Bossi, A. and Cocco, N. (1999) Termination of well-moded programs. Journal of Logic Programming (JLP), 38 (2). pp. 243-257. ISSN 0743-1066
Etalle, S. and Gabbrielli, M. (1999) Layered modes. Journal of Logic Programming (JLP), 39 (1-3). pp. 225-244. ISSN 0743-1066
Etalle, S. and Hartel, P.H. and Vree, W.G. (1999) Declarative Solutions to Partitioned-grid Problems. Software: Practice and Experience, 29 (13). pp. 1173-1200. ISSN 0038-0644 *** ISI Impact 1,01 ***
Etalle, S. and van Raamsdonk, F. (1999) Logic Programming with Requests. In: 16th Int. Conf. Logic Programming (ICLP), Las Cruces, New Mexico. pp. 558-572. MIT Press. ISBN 0-262-54104-1
Etalle, S. and Smaus, J.G. (1999) Preface. In: Workshop on Verification of Logic Programs, December 1, 1999, Las Cruces, New Mexico. 1. Electronic Notes in Theoretical Computer Science 30. Elsevier. ISSN 1571-0661
Hartel, P.H. (1999) LETOS -- A Lightweight Execution Tool for Operational Semantics. Software: Practice and Experience, 29 (15). pp. 1379-1416. ISSN 0038-0644 *** ISI Impact 1,01 ***
Hartel, P.H. (1999) Review of "C. Okasaki, Purely Functional Data structures". Science of Computer Programming, 34. pp. 75-77. ISSN 0167-6423
Hartel, P.H. (1999) Review of "G. Cousineau and M. Mauny, The functional approach to programming". Journal of Functional Programming, 9 (4). pp. 479-481. ISSN 0956-7968
Hartel, P.H. (1999) LETOS -- A Lightweight Execution Tool for Operational Semantics. Technical Report DSSE-TR-97-1, Declarative Systems and Software Engineering Group, Univ. of Southampton. ISSN not assigned
Hartel, P.H. and Butler, M.J. and Currie, A. and Henderson, P. and Leuschel, M. and Martin, A. and Smith, A. and Ultes-Nitsche, U. and Walters, B. (1999) Questions and Answers About Ten Formal Methods. In: 4th Int. Workshop on Formal Methods for Industrial Critical Systems, Trento, Italy. pp. 179-203. ERCIM/CNR. ISBN 88-7958-009-4
Hartel, P.H. and Butler, M.J. and Levy, M. (1999) The Operational Semantics of a Java Secure Processor. In: Formal Syntax and Semantics of Java. Springer-Verlag, Berlin, pp. 313-352. ISBN 3-540-66158-1
den Hartog, J.I. (1999) Verifying Probabilistic Programs Using a Hoare like Logic. In: 5th Asian Conference on Advances in Computing Science (ASIAN '99), December 10-12, 1999, Phuket, Thailand. pp. 113-125. Lecture notes in computer science 1742. Springer-Verlag. ISSN 0302-9743 ISBN 9783540668565
den Hartog, J.I. and de Vink, E.P. (1999) Taking chances on MERGE and FAIL: Extending strong and probabilistic bisimulation. Technical Report IR-454, Vrije Universiteit, Amsterdam.
den Hartog, J.I. and de Vink, E.P. and de Bakker, J.W. (1999) Full Abstractness of a Metric Semantics for Action Refinement. Fundamenta Informaticae, 40. pp. 335-382. ISSN 0169-2968 *** ISI Impact 0,40 ***
Helme, A. and Stabell-Kulø, T. (1999) Offline delegation. In: 8th USENIX Security Symposium 1999, 23-26 Aug 1999, Washington, DC. pp. 25-33. USENIX Association. ISBN 1880446286
Jansen, P.G. and Laan, R. (1999) The Stack Resource Protocol based on Real-Time Transactions. IEE Proceedings - Software, 146 (2). pp. 112-119. ISSN 1462-5970
Jansen, P.G. and Scholten, J. and Laan, R. (1999) Flexible Scheduling in Multimedia Kernels: An Overview. In: Multimedia Information Systems in Practice, Hong Kong, China. pp. 31-41. Springer-Verlag. ISBN 981-4021-53-9
Mader, A.H. and Wupper, H. (1999) Timed Automaton Models for Simple Programmable Logic Controllers. In: 11th Euromicro Conf. on Real-Time Systems, 9-11 June 1999, York, UK. pp. 114-122. IEEE Computer Society. ISBN 0-7695-0240-7
Revill, J.D. and Hartel, P.H. (1999) Modelling a Java Ring based implementation of an N-Count payment system. In: 2nd Workshop on Security in Communication Networks, Amalfi, Italy. pp. 139-150. Univ. of Salerno.
Scholten, J. (1999) Voice over TV Network Systems. In: 5th Int. Conf. on Information Systems, Orlando, Florida. pp. 244-248. Int. Institute of Informatics and Systemics. ISBN 980-07-5915-8
Scholten, J. and Jansen, P.G. (1999) Multimedia Services over the TV Cable Net Infrastructure. In: Multimedia Information Systems in Practice, Hong Kong, China. pp. 313-320. Springer-Verlag. ISBN 981-4021-53-9
Smit, G.J.M. and Bos, M. and Havinga, P.J.M. and Mullender, S.J. and Smit, J. (1999) Chameleon-reconfigurability in hand-held multimedia computers. In: 1st Handheld and Ubiquitous Computing (HUC), Karlsruhe, Germany. pp. 340-342. Springer-Verlag. ISBN 3540665501
Smit, G.J.M. and Havinga, P.J.M. and van Opzeeland, M. and Poortinga, R. (1999) Implementation of a wireless ATM transceiver using reconfigurable logic. In: 2nd IEEE Int. workshop on wireless mobile ATM implementations (wmATM), San Jose, California. pp. 241-251. Delson Group.
Wupper, H. and Mader, A.H. (1999) System Design as a Creative Mathematical Activity. Technical Report CSI-R9919, Institute for Computing and Information Science, University of Nijmegen, Nijmegen. ISSN 1571-5078

1998

Benz, H.P. and Lijding, M.E.M. (1998) Asynchronously Replicated Shared Workspaces for a Multi-Media Annotation Service over Internet. In: Interactive Distributed Multimedia Systems and Telecommunication Services - (IDMS), Oslo, Norway. pp. 260-271. Springer-Verlag. ISBN 3-540-64955-7
Bosch, H.G.P. and Mullender, S.J. (1998) Don't hide Power. In: 8th ACM SIGOPS European Workshop on Support for Composing Distributed Applications, Sintra, Portugal. pp. 152-157. ACM Press.
Carlà~Campa, M.C. and Lenzini, G. and Crovella, S. and Ardito, G. and Buiatti, M. and Luccio, F. and Galleni, L. (1998) Phylogeny Reconstruction in Primates under a New Mathematical model. In: Quaderni del Centro Interdisciplinare per lo Studio dei Sistemi Complessi (CISSC), Pisa, Italy. pp. 161-170. CISSC.
Cederquist, J.G. and Coquand, T. and Negri, S. (1998) The Hahn-Banach Theorem in Type Theory. In: Twenty-five years of Constructive Type Theory. Oxford Univ. Press, Oxford, UK, pp. 57-72. ISBN 0-19-850127-7
Dierks, H. and Fehnker, A. and Mader, A.H. and Vaandrager, F.W. (1998) Operational and logical semantics for polling real-time systems. In: 7th Int. Symp. on Formal Techniques in Real-Time and Fault Tolerant Systems (FTRTFT), Lyngby, Denmark. pp. 29-40. Springer-Verlag. ISBN 3-540-65003-2
Etalle, S. (1998) A Semantics for Modular General Logic Programs. Theoretical computer science, 206 (1-2). pp. 51-80.
Etalle, S. and Gabbrielli, M. (1998) Partial evaluation of concurrent constraint languages. ACM Computing Surveys, 30 (3). electronic supplement to the September 1998 issue. ISSN 0360-0300 *** ISI Impact 3,54 ***
Etalle, S. and Gabbrielli, M. and Meo, M.C. (1998) Unfold/Fold Transformations of CCP Programs. In: 9th Int. Conf. Concurrency Theory (CONCUR), Nice, France. pp. 348-365. Springer-Verlag. ISBN 3-540-64896-8
Etalle, S. and van Raamsdonk, F. (1998) Beyond Success and Failure. In: Joint Int. Conf. and Symp. on Logic Programming (JICSLP), Manchester, UK. pp. 190-205. MIT Press. ISBN 0-262-60031-5
Hartel, P.H. and Hill, J. and Sims, M. (1998) An Operational Model of QuickPay. In: 3rd Smart card research and advanced application (CARDIS), Louvain la Neuve, Belgium. pp. 19-28. Springer-Verlag. ISBN 3 540 67923 5
den Hartog, J.I. (1998) Comparative semantics for a process language with probabilistic choice and non-determinism. Technical Report IR-445, Vrije Universiteit, Amsterdam.
den Hartog, J.I. and de Vink, E.P. (1998) Mixing Up Nondeterminism and Probability: A Preliminary Report. In: PROBMIV'98, First International Workshop on Probabilistic Methods in Verification, June 19-20, 19, Indianapolis, Indiana. pp. 88-110. Electronic Notes in Theoretical Computer Science 22. Elsevier. ISSN 1571-0661
Havinga, P.J.M. and Helme, A. and Mullender, S.J. and Smit, G.J.M. and Smit, J. (1998) Battery-powered Distributed Systems (Extended Abstract). In: 8th ACM SIGOPS European Workshop on Support for Composing Distributed Applications, Sintra, Portugal. pp. 210-213. ACM Press.
Havinga, P.J.M. and Smit, G.J.M. (1998) The Pocket Companion's architecture. In: Euromicro summer school on mobile computing, Oulu, Finland. pp. 25-34. VTT Information Service. ISBN 951-38-4576-1
Jansen, P.G. and Laan, R. (1998) Scheduling Techniques and Quality of Service of Real-time Kernels. Technical Report TR-CTIT-98-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Mullender, S.J. and Smit, G.J.M. and Havinga, P.J.M. and Helme, A. and Hartvigsen, G. and Fallmyr, T. and Stabell-Kulø, T. and Bartoli, A. and Rizzo, L. and Avvenuti, M. (1998) The MobyDick architecture. Technical Report TR-CTIT-98-18, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Scholten, J. and Jansen, P.G. (1998) The CATV Network as Infrastructure for IP-based Telephone Services. In: Multimedia Technology and Applications Conf., Anaheim, California. pp. 178-183. Univ. of California at Irvine. ISBN 0-7803-9915-3
Schoute, A.L. (1998) Onderzoek naar knelpunten op de ECT-terminal. In: Eindrapport SMAGIC fase 1, CTT-publicatiereeks nr.34. Centrum Transport Technologie, Rotterdam, pp. 119-131. ISBN 90-76091-38-2
Smit, G.J.M. and Havinga, P.J.M. and Mullender, S.J. and Helme, A. and Hartvigsen, G. and Fallmyr, T. and Stabell-Kulø, T. and Bartoli, A. and Dini, G. and Rizzo, L. and Avvenuti, M. (1998) Overview of the Moby Dick project. In: Euromicro Summer School on Mobile Computing, Oulu, Finland. pp. 157-168. VTT Information Service. ISBN 951-38-4576-1
Smit, J. and Stekelenburg, M. and Klaassen, C.E. and Mullender, S.J. and Smit, G.J.M. and Havinga, P.J.M. (1998) Low cost & fast turnaround: reconfigurable graph-based execution units. In: 7th Behavioral Design Methodologies for Digital Systems workshop (BELSIGN), Enschede, The Netherlands. 29. Centre for Telematics and Information Technology University of Twente.
Stabell-Kulø, T. and Helme, A. and Dini, G. (1998) Detecting Key-Dependencies. In: 3rd Australasian Conf. on Information Security and Privacy (ACISP), Brisbane, Queensland, Australia. pp. 356-366. Springer-Verlag. ISBN 3-540-64732-5
Vervoort, W.A. (1998) Calibration and guidance of agents based on tubes. In: Enhanced and Synthetic Vision Conf, Orlando, Florida. pp. 263-272. SPIE -- The Int. Society for Optical Engineering. ISBN 0-8194-2813-2

1997

Glaser, H. and Hartel, P.H. and Kuchen, H., ed. (1997) 9th Programming Languages: Implementations, Logics and Programs (PLILP). Springer-Verlag, Berlin. ISBN 3-540-63398-7
Alberda, M.I. and Hartel, P.H. and de Jong, E.K. (1997) Using Formal Methods to Cultivate Trust in Smart Card Operating Systems. Future Generation Computer Systems, 13 (1). pp. 39-54. ISSN 0167-739X *** ISI Impact 1,86 ***
Burkow, T. and Mullender, S.J. (1997) Operating System Support. In: Multimedia Databases in Perspective. Springer-Verlag, Berlin, pp. 249-287. ISBN 3-540-76109-8
Butler, M.J. and Hartel, P.H. and de Jong, E.K. and Longley, M. (1997) Applying Formal Methods to the Design of Smart Card Software. Technical Report DSSE-TR-97-8, Department of Electronics and Computer Science, University of Southampton, University of Southampton. ISSN not assigned
Cederquist, J.G. (1997) A Pointfree Approach to Constructive Analysis in Type Theory. PhD thesis, Chalmers Univ. of Technology and Univ. of Göteborg, Sweden.
Etalle, S. and Gabbrielli, M. and Marchiori, E. (1997) A transformation system for CLP with dynamic scheduling and CCP. In: Partial evaluation and semantics-based program manipulation (PEPM), Amsterdam, The Netherlands. pp. 137-150. ACM Press. ISBN 0-89791-917-3
Hartel, P.H. (1997) Review of "G. Michaelson, Elementary Standard ML". The Knowledge Engineering Review, 12 (1). pp. 99-100. ISSN 0269-8889
Hartel, P.H. (1997) Special issue: Smart cards. Future Generation Computer Systems, 13 (1). pp. 1-2. ISSN 0167-739X *** ISI Impact 1,86 ***
Hartel, P.H. and Muller, H.L. (1997) Functional C. Addison Wesley Longman, Harlow, UK. ISBN 0-201-41950-5
Havinga, P.J.M. and Smit, G.J.M. (1997) Minimizing energy consumption for handheld computers in Moby Dick. (Invited) In: EUROMICRO 97: 'New Frontiers of Information Technology' : proceedings of the 23rd Euromicro Conference, 01-04 Sep 1997, Budapest, Hungary. pp. 196-201. IEEE Computer Society. ISBN 0-8186-8215-9
Havinga, P.J.M. and Smit, G.J.M. (1997) Minimizing energy consumption for wireless computers in Moby Dick. In: IEEE International Conference on Personal Wireless Communication, ICPWC 1997, 17-19 Dec 1997, Mumbai, India. pp. 306-311. IEEE Computer Society. ISBN 0-7803-4298-4
Helme, A. (1997) A system for secure user-controlled electronic transactions. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 97-17 ISBN 90-423-0011-6
Helme, A. and Stabell-Kulø, T. (1997) Security Functions for a File Repository. Operating Systems Review, 31 (2). pp. 3-8. ISSN 0163-5980
Hilderink, G.H. and Broenink, J.F. and Vervoort, W.A. and Bakkers, A.W.P. (1997) Communicating Java Threads. In: 20th World Occam and Transputer User Group Technical Meeting, Enschede, The Netherlands. pp. 48-76. IOS Press. ISBN 90 5199 336 6
Lenzini, G. (1997) Sequence Comparison: Close and Open problems. In: Workshop ``La matematizzazione della Biologia: storia e problematiche attuali'', Arcidosso, Italy. pp. 161-170. QuattroVenti. ISBN 88-392-0506-3
Lenzini, G. and Marianelli, S. (1997) Algorithms For Phylogeny Reconstruction In a New Mathematical Model. Calcolo - A Quarterly on Numerical Analysis and Theory of Computation, 1-4 (34). pp. 1-24. ISSN 0008-0624 *** ISI Impact 0,80 ***
Lijding, M.E.M. and Navarro Moldes, L. and Righetti, C. (1997) Object Distribution Networks for World-wide Document Circulation. In: 3rd CYTED-RITOS Int. Workshop on Groupware - (CRIWG), San Lorenzo de El Escorial, Madrid, Spain. pp. 101-110. Servicio de Publicaciones ETSI de Telecomunicacion.
Lijding, M.E.M. and Navarro Moldes, L. and Righetti, C. (1997) A New Large Scale Distributed System: Object Distribution. In: 113th International Conference on Computer Communications (ICCC 1997), 19-21 Nov 1997, Cannes, France. Institut National de Recherche en Informatique et en Automatique.
Linnenbank, G.R.J. (1997) A Simulator and Analysor for Wireless MAC Protocols. Technical Report TR-CTIT-97-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Linnenbank, G.R.J. and Havinga, P.J.M. (1997) A Flexible and Fast Event-Driven Wireless MAC Protocol Simulator. In: IEEE Int. Conf. on Personal Wireless Communications (ICPWC), Mumbai, India. pp. 110-114. IEEE Computer Society. ISBN 0-7803-4298-4
Mader, A.H. (1997) Verification of Modal Properties Using Boolean Equation Systems. Edition versal 8, Bertz Verlag, Berlin. ISBN 3-929470-58-6
Mader, A.H. (1997) Verification of Modal Properties Using Infinite Boolean Equation Systems. Technical Report CSI-R9727 Institute for Computing and Information Science, University of Nijmegen, Nijmegen. ISSN 1571-5078
Mountjoy, J. and Hartel, P.H. and Corporaal, H. (1997) Modular Operational Semantic Specification of Transport Triggered Architectures. In: 13th IFIP WG 10.5 Conf. on Computer Hardware Description Languages and Their Applications, Toledo, Spain. pp. 260-279. Chapman & Hall. ISBN 0412788101
Mullender, S.J. (1997) Overview of Distributed Operating Systems. In: The Computer Science and Engineering Handbook. CRC Press, Boca Raton, Florida, pp. 1825-1850. ISBN 0-8493-2909-4
Scholten, J. and Jansen, P.G. (1997) A distributed multimedia toolbox. In: 4th Int. Workshop on Real-Time Computing Systems and Applications (RTCSA), Taipei, Taiwan. pp. 170-173. IEEE Computer Society. ISBN 0-8186-8073-3
Scholten, J. and Jansen, P.G. and Koelewijn, A. and Rissewijck, M.T.M.J. and Zijlstra, J.D. (1997) Modeling Distributed Multimedia Applications. In: Multimedia Technology and Applications, Singapore. pp. 85-97. Springer-Verlag. ISBN 981-3083-16-6
Smit, G.J.M. and Havinga, P.J.M. and van Os, D. (1997) The Harpoon Security System for Helper Programs on a Pocket Companion. In: 23rd Euromicro Conf. -- New Frontiers of Information Technology, Budapest, Hungary. pp. 231-238. IEEE Computer Society. ISSN 1089-6503 ISBN 0-8186-8129-2
Todoran, E. and den Hartog, J.I. and de Vink, E.P. and Maluszynski, J. (1997) Comparative Metric Semantics for Commit in Or-Parallel Logic Programming. In: Int. Symp. on Logic Programming (ILPS), Long Island, New York. pp. 101-115. The MIT Press. ISBN 0-262-63180-6
Vervoort, W.A. (1997) TL-Tube Positioning for Mobile Robots. In: 30th Int. Symp. on Automotive Technology & Automation (ISATA), Florence, Italy. pp. 385-391. Automotive Automation Limited. ISBN 0 947719 97 0
Vervoort, W.A. (1997) A CIM Designed According to Ward and Mellor. In: Computer-Assisted Management and Control of Manufacturing Systems. Springer-Verlag, Berlin, pp. 255-277. ISBN 3-540-76110-1

1996

Hartel, P.H. and Paradinas, P. and Quisquater, J.-J., ed. (1996) 2nd Smart Card Research and Advanced Application (CARDIS). CWI (Centrum voor Wiskunde en Informatica), Amsterdam. ISBN 90 6196 465 2
Bosch, H.G.P. and Mullender, S.J. (1996) PFS: a distributed and customizable file system. In: 5th Int. Workshop Object-Orientation in Operating Systems (IWooos), Seattle, Washington. pp. 78-82. IEEE Computer Society. ISBN 0818676922
Bosch, H.G.P. and Mullender, S.J. (1996) Cut-and-Paste File-Systems: Integrating Simulators and File Systems. In: USENIX Annual Technical Conf., San Diego, California. pp. 307-318. USENIX Association. ISBN 1880446766
Bossi, A. and Cocco, N. and Etalle, S. (1996) Simultaneous Replacement in Normal Programs. Journal of logic and Computation, 6 (1). pp. 79-120. ISSN 0955-792X *** ISI Impact 0,65 ***
Bradfield, J. and Esparza, J. and Mader, A.H. (1996) An Effective Tableau System for the Linear Time µ-Calculus. In: 23rd Int. Conf. Automata, Languages and Programming (ICALP), Paderborn, Germany. pp. 98-109. Springer-Verlag. ISBN 3-540-61440-0
Cederquist, J.G. (1996) An Implementation of the Heine-Borel Covering Theorem in Type Theory. In: 4th Int. Workshop on Types for Proofs and Programs (TYPES), Aussois, France. pp. 46-65. Springer-Verlag. ISBN 3-540-65137-3
van Dijk, H.W. and Hekstra, G.J. and Deprettere, E.F. (1996) Jacobi-Specific Processor Arrays. In: International Conference on Application Specific Systems, Architectures and Processors (ASAP), 19-21 Aug 1996, Chicago, Illinois. pp. 323-341. IEEE Computer Society.
Etalle, S. (1996) Unification-Free Prolog Programs Revisited. Journal of Programming Languages, 4. pp. 187-210.
Etalle, S. and Gabbrielli, M. (1996) Transformations of CLP Modules. Theoretical computer science, 166 (1). pp. 101-146. ISSN 0304-3975 *** ISI Impact 0,49 ***
Etalle, S. and Gabbrielli, M. (1996) On the Correctness of the Replacement Operation for CLP Modules. Journal of Functional and Logic Programming, 1996. ISSN 1080-5230
Etalle, S. and Teusink, F. (1996) A Compositional Semantics for Normal Open Programs. In: Joint Int. Conf. and Symp. on Logic Programming (JICSLP), Bonn, Germany. pp. 468-482. The MIT press. ISBN 0-262-63173-3
Glaser, H. and Hartel, P.H. and de Jong Frz, E.K.J. (1996) Visualising the Structure of an IC-card Security Architecture. In: Smart Card Convention proceedings 1996 - Technology and markets, Feb 1996, Peterborough, UK. pp. 22-34. Quality Marketing Services Ltd. ISBN not assigned
Glaser, H. and Hartel, P.H. and de Jong, E.K. (1996) Structuring and Visualising an IC-card Security Standard. In: 2nd Smart card research and advanced application (CARDIS), Amsterdam, The Netherlands. pp. 89-110. CWI (Centrum voor Wiskunde en Informatica). ISBN 90 6196 465 2
Hartel, P.H. and Feeley, M. and Alt, M. and Augustsson, L. and Baumann, P. and Beemster, M. and Chailloux, E. and Flood, C.H. and Grieskamp, W. and van Groningen, J.H.G. and Hammond, K. and Hausman, B. and Ivory, M.Y. and Jones, R.E. and Kamperman, J.F.T. and Lee, Peter and Leroy, X. and Lins, R.D. and Loosemore, S. and Röjemo, N. and Serrano, M. and Talpin, J.-P. and Thackray, J. and Thomas, S. and Walters, P. and Weis, P. and Wentworth, P. (1996) Benchmarking Implementations of Functional Languages with "Pseudoknot", a float-intensive benchmark. Journal of Functional Programming, 6 (4). pp. 621-655. ISSN 0956-7968 *** ISI Impact 0,94 ***
Hartel, P.H. and Glaser, H. (1996) The Resource constrained shortest path problem implemented in a lazy functional language. Journal of Functional Programming, 6 (1). pp. 29-45. ISSN 0956-7968 *** ISI Impact 0,94 ***
Hartel, P.H. and de Jong, E.K. (1996) Smart Cards and Card Operating Systems. In: UNIFORUM, San-Francisco, California. pp. 725-730. Uniforum.
Hartvigsen, G. and Johansen, S. and Helme, A. and Widding, R.A. and Bellika, G. and Cao, W. (1996) The Virtual Secretary Architecture for Secure Software Agents. In: 1st Int. Conf. on the Practical Application of Intelligent Agents and Multi-Agent Technology (PAAM), London, UK. pp. 843-851. Practical Application Company. ISBN 0952555433
Havinga, P.J.M. and Smit, G.J.M. and Helme, A. (1996) Survey of electronic payment methods and systems. In: Web technology, new media, communications and telematics theory, methods, tools and applications (Euromedia), London, UK. pp. 180-187. Society for Computer Simulation. ISBN 1-56555-102-8
Jansen, P.G. and Scholten, J. and Wijgerink, E. (1996) Flexible Scheduling in Multimedia Kernels. In: IEEE Intercon, Trujillo, Peru. pp. 93-102. Univ. Privado Antenor Orrego.
Jansen, P.G. and Wijgerink, E. (1996) Flexible Real Time Scheduling of Continuous Media Streams. In: Multimedia96 Conf., Yokohama, Japan. pp. 323-330. Information Processing Society of Japan.
Linnenbank, G.R.J. and Venkataram, P. and Havinga, P.J.M. and Mullender, S.J. and Smit, G.J.M. (1996) R-TDMA: a dynamic multiple access protocol using bandwidth on demand and priorities. In: 3rd Mobile Multimedia Communications (MoMuc), Princeton, New Jersey. pp. 173-180. Plenum Publishing Corp. ISBN 0306457725
Mullender, S.J. (1996) Distributed operating systems. ACM Computing Surveys, 28 (1). pp. 225-227. ISSN 0360-0300 *** ISI Impact 3,54 ***
Mullender, S.J. (1996) Systems Support for the Information Age. IT+TI Informationstechnik und Technische Informatik, 38 (2). pp. 12-17. ISSN 0944-2774
Mullender, S.J. and Sijben, P.G.A. (1996) Quality of Service in Distributed Multimedia Systems. (Invited) In: Trends in Distributed Systems, CORBA and Beyond (TreDS), Oct 1-2, 1996, Aachen, Germany. pp. 1-13. Lecture Notes in Computer Science 1161. Springer-Verlag. ISBN 3-540-61842-2
Mullender, S.J. and van der Valk, M. (1996) Simulating wide-area replication. In: 7th Workshop on ACM SIGOPS European workshop: Systems support for worldwide applications, Connemara, Ireland. pp. 267-274. ACM Press.
Nauta, J.M. (1996) Vehicle Trajectory Planning with Interval Arithmetic. PhD thesis, University of Twente. ISBN 90-365-0820-7
Scholten, J. and Jansen, P.G. and Koelewijn, A. and Rissewijck, M.T.M.J. and Zijlstra, J.D. (1996) JAMES: An Experiment in Distributed Multimedia Specification. In: IEEE Intercon, Trujillo, Peru. pp. 83-92. Univ. Privado Antenor Orrego.
Smit, G.J.M. and Havinga, P.J.M. and Dillema, F.W. and Sijben, P.G.A. (1996) Audio source location for a digital TV-Director. In: Web technology, new media, communications and telematics theory, methods, tools and applications (Euromedia), London, UK. pp. 103-111. Society for Computer Simulation. ISBN 1-56555-102-8
Vervoort, W.A. and van Oosten, D.C. and Nijenhuis, L.F.J. and Bakkers, A.W.P. (1996) ADAM: ADaptive Autonomous Machine. In: 1st Euromicro Workshop on Advanced Mobile Robots, Kaiserslautern, Germany. pp. 143-150. IEEE Computer Society. ISBN 0-8186-7695-7

1995

Hartel, P.H. and Plasmeijer, M.J., ed. (1995) 1st Functional Programming languages in Education (FPLE). Springer-Verlag, Berlin. ISBN 3 540 60675 0
Bossi, A. and Cocco, N. and Etalle, S. (1995) Transformation of Left Terminating Programs: The reordering problem. In: 5th Int. Logic Program Synthesis and Transformation (LOPSTR), Utrecht, The Netherlands. pp. 33-45. Springer-Verlag. ISBN 3-540-60939-3
Cederquist, J.G. and Negri, S. (1995) A Constructive Proof of the Heine-Borel Covering Theorem for Formal Reals. In: 3rd Int. Workshop on Types for Proofs and Programs (TYPES), Torino, Italy. pp. 62-75. Springer-Verlag. ISBN 3-540-61780-9
Etalle, S. (1995) Transformation and analysis of (constraint) logic programs. PhD thesis, ILLC Dissertation series 1995-7, Univ. of Amsterdam.
Etalle, S. (1995) A Transformation System for Modular CLP Programs. In: 12th Int. Conf. on Logic Programming (ICLP), Tokyo, Japan. pp. 681-695. MIT Press. ISBN 0-262-69177-9
Etalle, S. and Gabbrielli, M. (1995) The replacement operation for CLP modules. In: Partial evaluation and semantics-based program manipulation (PEPM), La Jolla, California. pp. 168-177. ACM Press. ISBN 0-89791-720-0
Hartel, P.H. (1995) Benchmarking implementations of lazy functional languages II -- Two years later. In: 7th Implementation of Functional Languages, Marstrand, Sweden. pp. 63-68. Dept. of Comp. Sci.
Hartel, P.H. and van Es, B. and Tromp, T.J.M. (1995) Basic proof skills of computer science students. In: 1st Functional Programming languages in Education (FPLE), Nijmegen, The Netherlands. pp. 269-287. Springer-Verlag. ISBN 3-540-60675-0
Hartel, P.H. and Hertzberger, L.O. (1995) Paradigms and laboratories in the core computer science curriculum: An overview. ACM SIGCSE bulletin, 27 (4). pp. 13-20. ISSN 0097-8418
Hartel, P.H. and Hofman, R.F.H. and Langendoen, K.G. and Muller, H.L. and Vree, W.G. and Hertzberger, L.O. (1995) A toolkit for parallel functional programming. Concurrency: Practice and experience, 7 (8). pp. 765-793. ISSN 1040-3108
Hartel, P.H. and Plasmeijer, M.J. (1995) State-of-the-art applications of pure functional programming languages (editorial). Journal of Functional Programming, 5 (3). pp. 279-281. ISSN 0956-7968 *** ISI Impact 0,94 ***
Haydarlou, A.R. and Hartel, P.H. (1995) Thunk-lifting: Reducing heap usage in an implementation of a lazy functional language. Journal of Functional Programming, 1 (1). ISSN 0956-7968 *** ISI Impact 0,94 ***
Linnenbank, G.R.J. and Havinga, P.J.M. and Mullender, S.J. and Smit, G.J.M. (1995) Request-TDMA: A multiple-access protocol for wireless multimedia networks. In: 3rd Symp. on Communications and Vehicular Technology in the Benelux, Eindhoven, The Netherlands. pp. 20-27. IEEE Computer Society.
Mader, A.H. (1995) Modal µ-Calculus, Model Checking and Gauß Elimination. In: 1st Int. Workshop Tools and Algorithms for Construction and Analysis of Systems (TACAS), Aarhus, Denmark. pp. 72-88. Springer-Verlag. ISBN 3-540-60630-0
McEvoy, H.E. and Hartel, P.H. (1995) Local Linear Logic for Locality Consciousness in Multiset Transformation. In: 7th Programming Languages: Implementations, Logics and Programs (PLILP), Utrecht, The Netherlands. pp. 357-379. Springer-Verlag. ISBN 3-540-60359-X
Muller, H.L. and Hartel, P.H. and Hertzberger, L.O. (1995) Using a functional notation to specify abstract simulation models. In: Abstract machine models for highly parallel computers. Oxford Univ. Press, Oxford, UK, pp. 243-258. ISBN 0 19 853796 4
Scholten, J. and Heijmans, M. and Bloem, G.-J. (1995) Helicon - A Distributed Multimedia Framework (Abstract). In: Int. Conf. on Multimedia Networking (MmNet), Aizu, Japan. 74. IEEE Computer Society. ISBN 0-8186-7090-8
Sijben, P.G.A. and Mullender, S.J. (1995) An architecture for Scheduling and QoS management in multimedia. In: Proc. NGI/SION Symp., Utrecht, The Netherlands. pp. 229-240. Stichting Mathematisch centrum. ISBN 90-6196-460-1
Vree, W.G. and Hartel, P.H. (1995) Communication lifting: fixed point computation for parallelism. Journal of Functional Programming, 5 (4). pp. 549-581. ISSN 0956-7968 *** ISI Impact 0,94 ***

1994

Bossi, A. and Etalle, S. (1994) Transforming acyclic programs. ACM Transactions on Programming Languages and Systems (TOPLAS), 16 (4). pp. 1081-1096. ISSN 0164-0925 *** ISI Impact 1,03 ***
Bossi, A. and Etalle, S. (1994) More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting's Semantics. In: 4th Int. Workshop on Meta Programming in Logic (META), Pisa, Italy. pp. 311-331. Springer-Verlag. ISBN 3-540-58792-6
Hartel, P.H. and Glaser, H. and Wild, J.M. (1994) Compilation of functional languages using flow graph analysis. Software: Practice and Experience, 24 (2). pp. 127-173. ISSN 0038-0644 *** ISI Impact 1,01 ***
Hartel, P.H. and de Jong, E.K. (1994) Towards testability in smart card operating system design. In: 1st Smart card research and advanced application (CARDIS), Lille, France. pp. 73-88. Univ. de Lille.
Hartel, P.H. and Vree, W.G. (1994) Experiments with destructive updates in a lazy functional language. Computer Languages, 20 (3). pp. 177-192. ISSN 0096-0551
Mullender, S.J. and Leslie, I.M. and McAuley, D. (1994) Operating-System Support for Distributed Multimedia. In: Summer 1994 USENIX Conf., Boston, Massachusetts. pp. 209-219. USENIX Association.
Smit, G.J.M. (1994) The Design of Central Switch Communication Systems for Multimedia Applications. PhD thesis, University of Twente. ISBN 90-9006758-2
Smit, G.J.M. and Havinga, P.J.M. (1994) A Switch Architecture For Real-time Multimedia Communications. In: 2nd Euromicro Workshop on Parallel and Distributed Processing, Malaga, Spain. pp. 438-444. IEEE Computer Society.

1993

Mullender, S.J., ed. (1993) Distributed Systems. Second edition. Addison Wesley, Reading, Massachusetts. ISBN 0-201-62427-3
Apt, K.R. and Etalle, S. (1993) On the unification free Prolog programs. In: Mathematical Foundations of Computer Science (MFCS), Gdansk, Poland. pp. 1-19. Springer-Verlag.
Bartoli, A. and Mullender, S.J. and van der Valk, M. (1993) Wide-address spaces-exploring the design space. Operating Systems Review, 27 (1). pp. 11-17.
Beemster, M. and Hartel, P.H. and Hertzberger, L.O. and Hofman, R.F.H. and Langendoen, K.G. and Li, L.L. and Milikowski, R. and Vree, W.G. and Barendregt, H.P. and Mulder, J.C. (1993) Experience with a clustered parallel reduction machine. Future Generation Computer Systems, 9 (3). pp. 175-200. ISSN 0167-739X *** ISI Impact 1,86 ***
Hartel, P.H. and Glaser, H. and Wild, J.M. (1993) FAST compiler user's guide. In: FAST: Functional programming for arrays of transputers -- The collected papers. Department of Electronics and Computer Science, University of Southampton, Southampton, UK, pp. 247-264.
Hartel, P.H. and Langendoen, K.G. (1993) Benchmarking implementations of lazy functional languages. In: 6th Functional programming languages and computer architecture (FPCA), Copenhagen, Denmark. pp. 341-349. ACM Press. ISBN 0-89791-595-X
Leslie, I.M. and McAuley, D. and Mullender, S.J. (1993) Pegasus - Operating System Support for Distributed Multimedia Systems. Operating Systems Review, 27 (1). pp. 69-78. ISSN 0163-5980

1992

Bossi, A. and Cocco, N. and Etalle, S. (1992) On Safe Folding. In: 4th Programming Languages: Implementations, Logics and Programs (PLILP), Leuven, Belgique. pp. 172-186. Springer-Verlag. ISBN 3-540-55844-6
Bossi, A. and Cocco, N. and Etalle, S. (1992) Transforming Normal Programs by Replacement. In: 3rd Int. Workshop Meta Programming in Logic (META), Uppsala, Sweden. pp. 265-279. Springer-Verlag. ISBN 3-540-56282-6
Hartel, P.H. and Vree, W.G. (1992) Arrays in a lazy functional language -- a case study: the fast Fourier transform. In: 2nd Arrays, functional languages and parallel systems (ATABLE), Montreal, Canada. pp. 52-66. Publication 841. ISBN not assigned
Langendoen, K.G. and Hartel, P.H. (1992) FCG: a code generator for lazy functional languages. In: Compiler construction (CC), Paderborn, Germany. pp. 278-296. Springer-Verlag. ISBN 3 540 55984 1
Mader, A.H. (1992) Tableau Recycling. In: 4th Int. Workshop Computer Aided Verification (CAV), Montreal, Canada. pp. 330-342. Springer-Verlag. ISBN 3-540-56496-9
Mullender, S.J. (1992) Distributed Multimedia Systems. Future Generation Computer Systems, 8 (1). pp. 243-247. ISSN 0167-739X *** ISI Impact 1,86 ***
Mullender, S.J. (1992) Introduction to distributed systems. In: Proc. School of Computing (CERN 93-03), L'Aquila, Italy. pp. 29-46. CERN.
Mullender, S.J. (1992) Interprocess communication. In: Proc. School of Computing (CERN 93-03), L'Aquila, Italy. pp. 47-79. CERN.
Smit, G.J.M. and Havinga, P.J.M. and Jansen, P.G. (1992) A Programmable Communication Architecture Based on Kautz Networks. In: 12th World Computer Congress -- Algorithms, Software, Architecture, Madrid, Spain. pp. 578-584. IFIP Transactions A-12 North-Holland. ISBN 0-444-89747-X
Smit, G.J.M. and Havinga, P.J.M. and Smit, M.J.P. (1992) Rattlesnake: A Network for Real-Time Multimedia Communications. In: 4th Int. Workshop on Multimedia Communications (MULTIMEDIA), Monterey, California. pp. 89-100. IEEE Computer Society.

1991

Glaser, H. and Hartel, P.H., ed. (1991) 3rd Workshop Implementation of functional languages on parallel architectures. Technical Report CSTR 91-07, Department of Electronics and Computer Science, University of Southampton, Southampton.
Hartel, P.H. (1991) Performance of lazy combinator graph reduction. Software: Practice and Experience, 21 (3). pp. 299-329. ISSN 0038-0644 *** ISI Impact 1,01 ***
Hartel, P.H. and Glaser, H. and Wild, J.M. (1991) On the benefits of different analyses in the compilation of functional languages. In: 3rd Implementation of functional languages on parallel architectures, Southampton, UK. pp. 123-145.
Mullender, S.J. (1991) Experiences with Amoeba. In: Spring EurOpen Conf.: UNIX Distributed Open Systems in Perspective, Tromsø, Norway. pp. 1-11. EurOpen.
Mullender, S.J. (1991) Systems for the Nineties - Distributed Multimedia Systems. In: Int. Workshop Operating Systems of the 90s and Beyond, Schloß Dagstuhl, Germany. pp. 273-278. Lecture Notes in Computer Science 563. Springer-Verlag. ISBN 3-540-54987-0
Smit, G.J.M. and Havinga, P.J.M. and Jansen, P.G. (1991) An Algorithm for Generating Node Disjoint Routes in Kautz Digraphs. In: 5th Int. Parallel Processing Symp., Anaheim, California. pp. 102-107. IEEE Computer Society. ISBN 0-8186-9167-0
Tanenbaum, A.S. and van Renesse, R. and van Staveren, J.M. and Sharp, G.J. and Mullender, S.J. and Jansen, J. and van Rossum, Guido (1991) Experience with the Amoeba distributed operating system. Informatie, 33 (2). pp. 86-105. ISSN 0019-9907
Wild, J.M. and Glaser, H. and Hartel, P.H. (1991) Statistics on storage management in a lazy functional language implementation. In: 3rd Parallel and distributed processing (WP&DP), Sofia, Bulgaria. pp. 73-87. North Holland. ISBN 0 444 89157 9

1990

Glaser, H. and Hartel, P.H. and Wild, J.M. (1990) A pragmatic approach to the analysis and compilation of lazy functional languages. In: 2nd Parallel and distributed processing (WP&DP), Sofia, Bulgaria. pp. 169-184. North Holland. ISBN 0444888683
Hartel, P.H. (1990) A comparison of three garbage collection algorithms. Structured Programming, 11 (3). pp. 117-128. ISSN 0935-1183
Mullender, S.J. and van Rossum, Guido and Tanenbaum, A.S. and van Renesse, R. and van Staveren, J.M. (1990) Amoeba: a distributed operating system for the 1990s. IEEE Computer, 23 (5). pp. 44-53. ISSN 0018-9162 *** ISI Impact 1,68 ***
Tanenbaum, A.S. and van Renesse, R. and van Staveren, J.M. and Sharp, G.J. and Mullender, S.J. (1990) Experiences with the Amoeba distributed operating system. Communications of the ACM, 33 (12). pp. 46-63. ISSN 0001-0782 *** ISI Impact 2,51 ***

1989

Mullender, S.J., ed. (1989) Distributed Systems. ACM Press, New York. ISBN 0-201-41660-3
Hartel, P.H. (1989) Performance analysis of storage management in combinator graph reduction. PhD thesis, Dept. of Comp. Sys, Univ. of Amsterdam.
Hartel, P.H. and Smid, M.H.M. and Torenvliet, L. and Vree, W.G. (1989) A parallel functional implementation of range queries. In: Computing science in The Netherlands, Utrecht, The Netherlands. pp. 173-189. CWI (Centrum voor Wiskunde en Informatica). ISBN not assigned
Jansen, P.G. and Smit, G.J.M. (1989) Tumult-64: A Real-time multi-processor system. In: Workshop on distributed and Multiprocessor Systems, Ft. Lauderdale, Florida. pp. 193-203. USENIX Association.
Mullender, S.J. (1989) Amoeba-high performance distributed computing. In: UNIX: European Challenges, Brussels, Belgium. pp. 17-26. EUUG.
Mullender, S.J. (1989) An Advanced Course on Distributed Computing. Cornell Univ., Ithaca, New York. ISBN not assigned
van Renesse, R. and Tanenbaum, A.S. and Mullender, S.J. (1989) The Evolution of Amoeba. In: Progress in Distributed Operating Systems and Distributed Systems Management, Berlin, West Germany. pp. 1-12. Springer-Verlag.

1988

Bacon, J.M. and Horn, C. and Langsford, A. and Mullender, S.J. and Zimmer, W. (1988) MANDIS: Architectural Basis for Management. In: Research into Networks and Distributed Applications. European Teleinformatics Conf. - (EUTECO), Vienna, Austria. pp. 795-809. North-Holland Publishing Co.
Hartel, P.H. (1988) The average size of ordered binary subgraphs. In: Graph-theoretic concepts in computer science, WG 88, Amsterdam, The Netherlands. pp. 327-351. Springer-Verlag. ISBN 3 540 50728 0
Hartel, P.H. and Veen, A.H. (1988) Statistics on graph reduction of SASL programs. Software: Practice and Experience, 18 (3). pp. 239-253. ISSN 0038-0644 *** ISI Impact 1,01 ***
Hartel, P.H. and Vree, W.G. (1988) Parallel graph reduction for divide-and-conquer applications -- Part II: program performance. PRM project internal report D-20, Univ. of Amsterdam. ISSN not assigned
Mullender, S.J. (1988) Distributed Operating Systems: State-of-the-Art and Future Directions. In: Research into Networks and Distributed Applications. European Teleinformatics Conf. - (EUTECO), Vienna, Austria. pp. 57-66. North-Holland Publishing Co.
Mullender, S.J. and Vitányi, P.M.B. (1988) Distributed Match-Making. Algorithmica, 3 (3). pp. 367-391. ISSN 0178-4617 *** ISI Impact 0,49 ***
van Renesse, R. and van Staveren, J.M. and Hall, J. and Turnbull, M. and Janssen, B. and Jansen, J. and Mullender, S.J. and Holden, D. and Bastable, A. and Fallmyr, T. and Johansen, D. and Mullender, K.S. and Zimmer, W. (1988) MANDIS/Amoeba: A Widely Dispersed Object-Oriented Operating System. In: Research into Networks and Distributed Applications. European Teleinformatics Conf. - (EUTECO), Vienna, Austria. pp. 823-831. North-Holland Publishing Co.
Vree, W.G. and Hartel, P.H. (1988) Parallel graph reduction for divide-and-conquer applications -- Part I: program transformation. PRM project internal report D-15, Univ. of Amsterdam. ISSN not assigned

1987

Mullender, S.J., ed. (1987) The Amoeba Distributed Operating System: Selected papers 1984 - 1987. Report Type UNSPECIFIED Number UNSPECIFIED,
Barendregt, H.P. and van Eekelen, M.C.J.D. and Hartel, P.H. and Hertzberger, L.O. and Plasmeijer, M.J. and Vree, W.G. (1987) The Dutch parallel reduction machine project. Future Generation Computer Systems, 3 (4). pp. 261-270. ISSN 0167-739X *** ISI Impact 1,86 ***
Mullender, S.J. (1987) Report on the Second European SIGOPS Workshop "Making Distributed Systems Work". Operating Systems Review, 21 (1). pp. 49-84.
Mullender, S.J. (1987) Distributed Operating Systems. Computer Standards & Interfaces, 6 (1). pp. 37-44. ISSN 0920-5489 *** ISI Impact 0,98 ***
Mullender, S.J. (1987) Process Management in Distributed Operating Systems. In: Int. Workshop Experiences with Distributed Systems, Kaiserslautern, West Germany. pp. 38-51. Springer-Verlag.

1986

Mullender, S.J. (1986) The Amoeba Distributed Operating System, Part 1. CWI Quarterly, 11. ISSN 0922-5366
Mullender, S.J. (1986) The Amoeba Distributed Operating System, Part 2. CWI Quarterly, 12. ISSN 0922-5366
Mullender, S.J. and Tanenbaum, A.S. (1986) The Design of a Capability-Based Distributed Operating System. The Computer Journal, 29 (4). pp. 289-299. ISSN 0010-4620 *** ISI Impact 0,76 ***
Mullender, S.J. and Vitányi, P.M.B. (1986) Distributed match-making for processes in computer networks. Operating Systems Review, 20 (2). pp. 54-64. ISSN 0163-5980
Tanenbaum, A.S. and Mullender, S.J. and van Renesse, R. (1986) Using Sparse Capabilities in a Distributed Operating System. In: 6th Int. Conf. on Distributed Computing Systems, Cambridge, Massachusetts. pp. 558-563. IEEE Computer Society.

1985

van Eekelen, M.C.J.D. and Hartel, P.H. and Plasmeijer, M.J. (1985) Report of a trip to the United Kingdom. Technical Report 85, Department of Computer Science, University of Nijmegen.
Hartel, P.H. and Hertzberger, L.O. and Mooij, W.G.P. and Tuynman, F. (1985) Een multiprocessor testbed systeem. In: Derde NGI-SION Symp.: uitdaging aan de informatica, Utrecht, The Netherlands. pp. 222-230. Nederlands genootschap voor informatica. ISBN 90 70621 17 7
Hartel, P.H. and Starreveld, A.G. (1985) Modula-2 implementation overview. Journal Pascal, Ada and Modula-2, 4 (4). pp. 9-23. ISSN 0747-1351
Hertzberger, L.O. and Mullender, S.J. and Poletiek, G. and van Renesse, R. and Tanenbaum, A.S. and Tuynman, F. and Vermeulen, J.C. (1985) The design of a real-time distributed operating system. In: Computing in high energy physics, Amsterdam, The Netherlands. pp. 271-274. North Holland.
Mullender, S.J. (1985) Principles of Distributed Operating System Design. PhD thesis, Vrije Univ., Amsterdam.
Mullender, S.J. and Tanenbaum, A.S. (1985) A distributed file service based on optimistic concurrency control. In: 10th ACM Symp. on Operating systems principles (SOSP), Orcas Island, Washington. pp. 51-62. ACM Press.
Mullender, S.J. and Vitányi, P.M.B. (1985) Distributed Match-Making for Processes in Computer Networks (Preliminary Version). In: 4th Annual ACM Symp. on Principles of Distributed Computing (PODC), Minaki, Ontario, Canada. pp. 261-271. ACM Press. ISBN 0-89791-167-9

1984

Hartel, P.H. and van Harmelen, F.A. (1984) The analysis of modular structures with respect to their interconnect topology. Interfaces in computing, 1 (2). pp. 81-91. ISSN 0252-7308
Mullender, S.J. (1984) Distributed Systems Management in Wide-Area Networks. In: Proc. NGI/SION Symp., Amsterdam. pp. 415-424. Nederlands genootschap voor informatica. ISBN 90-70621-11-8
Mullender, S.J. and Tanenbaum, A.S. (1984) Immediate files. Software: Practice and Experience, 14 (4). pp. 365-368. ISSN 0038-0644 *** ISI Impact 1,01 ***
Mullender, S.J. and Tanenbaum, A.S. (1984) Protection and Resource Control in Distributed Operating Systems. Computer Networks, 8 (5). pp. 421-432. ISSN 0376-5075
Mullender, S.J. and Tanenbaum, A.S. (1984) The Design of a Capability-Based Distributed Operating System. Technical Report VUIR 88, Vrije Universiteit, Amsterdam.

1983

van den Bos, J. and Plasmeijer, M.J. and Hartel, P.H. (1983) Input-output tools: A language facility for interactive and real-time systems. IEEE Transactions on Software Engineering, SE-9 (3). pp. 247-259. ISSN 0098-5589 *** ISI Impact 2,59 ***
Hartel, P.H. (1983) Comparing Pascal and Modula-2 as systems programming languages. In: Programming languages and systems design, Dresden, East Germany. pp. 187-198. North Holland. ISBN 0 444 86794 5
Hartel, P.H. (1983) Le langage Modula-2, concepts et expérience. In: Forum sur la micro informatique en physique nucléaire et physique des particules, Paris, France. pp. 323-331. Collège de France.
Tanenbaum, A.S. and Mullender, S.J. (1983) On Distributed File Servers. In: Workshop on Distributed Systems, Mont St. Michel, France. pp. 53-59. INRIA.

1982

Hartel, P.H. (1982) Wtool -- An implementation of input tools in Modula-2 and Pascal. Technical Report 41, Computer Science Department, University of Nijmegen, Nijmegen. ISSN not assigned
Tanenbaum, A.S. and Mullender, S.J. (1982) Operating System Requirements for Distributed Data Base Systems. In: Distributed Data Bases. North-Holland Publishing Co, Amsterdam, pp. 105-114.

1981

Hartel, P.H. (1981) Pascal for systems programmes. In: 32nd Conf. European control data users (ECODU 32), Montreux, Switzerland. 2.54-2.61. Control Data corporation. ISBN not assigned
Tanenbaum, A.S. and Mullender, S.J. (1981) An Overview of the Amoeba Distributed Operating System. Operating Systems Review, 15 (3). pp. 51-64.

1980

Jansen, P.G. and Kessels, J.L.W. (1980) The DIMOND: A Component for the Modular Construction of Switching Networks. IEEE Transactions on Computers, 29 (10). pp. 884-889.

1977

Hartel, P.H. (1977) MUST -- Een macro vertaler. Technical Report 13, SARA, Amsterdam.

1976

Schoute, A.L. (1976) Comparison of Global Memory Management Strategies in Virtual Memory Systems with Two Classes of Processes. In: Int. Workshop on Modelling and Performance Evaluation of Computer Systems, 4-6 Oct. 1976, Ispra (Varese), Italy. pp. 389-414. North-Holland. ISBN 0-7204-0554-8