EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Program: CTIT-ISTRICE: Integrated Security and Privacy in a Networked World
Home Policy Brochure Browse Search User Area Contact Help

2014

Kordy, B. and Mauw, S. and Pieters, W., ed. (2014) Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014. EPTCS 148. EPTCS.ORG. ISSN 2075-2180
Abbasi, A. and Wetzel, J. (2014) APTs way: Evading Your EBNIDS. In: Black Hat Europe, 16-19 Oct 2014, Amsterdam, The Netherlands. pp. 1-87. Black Hat. ISBN not assigned
Abbasi, A. and Wetzel, J. and Bokslag, W. and Zambon, Emmanuele and Etalle, S. (2014) On Emulation-Based Network Intrusion Detection Systems. In: Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 17-19 September 2014, Gothenburg, Sweden. pp. 384-404. Lecture Notes in Computer Science 8688. Springer. ISSN 0302-9743 ISBN 978-3-319-11379-1
Akbar, N. (2014) Analysing Persuasion Principles in Phishing Emails. Master's thesis, University of Twente.
Ali, T. (2014) Biometric Score Calibration for Forensic Face Recognition. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 14-336 ISBN 978-90-365-3689-9
Ali, T. and Spreeuwers, L.J. and Veldhuis, R.N.J. and Meuwly, D. (2014) Biometric evidence evaluation: an empirical assessment of the effect of different training data. IET Biometrics, online pre-publication. pp. 1-12. ISSN 2047-4938 *** ISI Impact 0,764 ***
Ambusaidi, Mohammed A. and He, Xiangjian and Tan, Zhiyuan and Nanda, Priyadarsi and Lu, Liang Fu and Nagar, Upasana T. (2014) A novel feature selection approach for intrusion detection data classification. In: Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 Sep 2014, Beijing, China. 246. IEEE Computer Society.
Ambusaidi, Mohammed A. and Tan, Zhiyuan and He, Xiangjian and Nanda, Priyadarsi and Lu, Liang Fu and Jamdagni, Aruna (2014) Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8 (2/3). pp. 77-86. ISSN 1743-8217
Amrin, N. (2014) The Impact of Cyber Security on SMEs. Master's thesis, Univ. of Twente.
Andreeva, E. and Bilgin, B. and Bogdanov, A. and Luykx, A. and Mennink, B. and Mouha, N. and Yasuda, K. (2014) APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. In: 21st International Workshop on Fast Software Encryption (FSE), 3-5 March 2014, London, UK. pp. 168-186. LNCS 8540. Springer Verlag. ISBN 978-3-662-46706-0
Armknecht, F. and Gagliardoni, T. and Katzenbeisser, S. and Peter, A. (2014) General Impossibility of Group Homomorphic Encryption in the Quantum World. In: 17th International Conference on Practice and Theory in Public-Key Cryptography. PKC 2014, 26-28 Mar 2014, Buenos Aires, Argentina. pp. 556-573. Lecture Notes in Computer Science 8383. Springer Verlag. ISBN 978-3-642-54630-3
Arnold, F. and Pieters, W. and Stoelinga, M.I.A. (2014) Quantitative Penetration Testing with Item Response Theory. Journal of Information Assurance and Security, 9 (3). pp. 118-127. ISSN 1554-1010
Baartmans, C. and Meuwly, D. and Kosta, E. (2014) Privacy of fingermarks data in forensic science: forensic evaluation and individual data protection. In: Proceedings of the 9th International Conference on Forensic Inference and Statistics, ICFIS 2014, 19-22 Aug 2014, Leiden. pp. 1-1. Netherlands Forensic Institute. ISBN not assigned
Badarinath Hampiholi, B. (2014) Secure and privacy-preserving national eID systems with Attribute-based credential technologies. Master's thesis, Univ. of Twente.
Barbosa, R.R.R. (2014) Anomaly Detection in SCADA Systems - A Network Based Approach. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 14-300 ISBN 978-90-365-3645-5
Bösch, C.T. and Hartel, P.H. and Jonker, W. and Peter, A. (2014) A Survey of Provably Secure Searchable Encryption. ACM computing surveys, 47 (2). 18:1-18:51. ISSN 0360-0300 *** ISI Impact 5,243 ***
Bösch, C.T. and Peter, A. and Hartel, P.H. and Jonker, W. (2014) SOFIR: Securely Outsourced Forensic Image Recognition. In: 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, May 4-9, 2014, Florence, Italy. pp. 2694-2698. IEEE. ISBN 978-1-4799-2893-4
Bösch, C.T. and Peter, A. and Leenders, B. and Lim, Hoon Wei and Tang, Qiang and Wang, Huaxiong and Hartel, P.H. and Jonker, W. (2014) Distributed Searchable Symmetric Encryption. In: Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014, 23-24 July 2014, Toronto, Canada. pp. 330-337. IEEE. ISBN 978-1-4799-3502-4
Biedermann, S. and Karvelas, N. and Katzenbeisser, S. and Strufe, T. and Peter, A. (2014) ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. In: Proceedings of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014), 26-29 Jan 2014, Nový Smokovec, Slovakia. pp. 114-125. Lecture Notes in Computer Science 8327. Springer Verlag. ISBN 978-3-319-04297-8
Bilgin, B. and Gierlichs, B. and Nikova, S.I. and Nikov, V. and Rijmen, V. (2014) A More Efficient AES Threshold Implementation. In: Proceedings of 7th International Conference on Cryptology in Africa (AfricaCrypt), 28-30 May 2014, Marrakesh, Morocco. pp. 267-284. Lecture Notes in Computer Science 8469. Springer. ISBN 978-3-319-06733-9
Bortolameotti, R. (2014) C&C Botnet detection over SSL. Master's thesis, Univ. of Twente.
van den Broek, G. and van Rijswijk-Deij, R.M. and Sperotto, A. and Pras, A. (2014) DNSSEC meets real world: dealing with unreachability caused by fragmentation. IEEE communications magazine, 52 (4). pp. 154-160. ISSN 0163-6804 *** ISI Impact 5,125 ***
Broekhuis, D. (2014) Sousveillance on Intelligent Transportations Systems. Master's thesis, University of Twente.
Buchenscheit, A. and Könings, B. and Neubert, A. and Schaub, F. and Schneider, M. and Kargl, F. (2014) Privacy implications of presence sharing in mobile messaging applications. In: Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia (IEEE MUM 2014), 25-28 Sept 2014, Melbourne, Victoria, Australia. pp. 20-29. ACM. ISBN 978-1-4503-3304-7
Cardoso de Santanna, J.J. and Sperotto, A. (2014) Characterizing and Mitigating the DDoS-as-a-Service Phenomenon. In: Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, 30 Jun - 3 Jul 2014, Brno, Czech Republic. pp. 74-78. Lecture Notes in Computer Science 8508. Springer . ISSN 0302-9743 ISBN 978-3-662-43861-9
Caselli, M. and Kargl, F. (2014) A Security Assessment Methodology for Critical Infrastructures. In: Critical Information Infrastructures Security: Ninth International Conference, CRITIS 2014, 13-15 Oct 2014, Limassol, Cyprus. pp. 332-343. Critical Information Infrastructures Security. Springer Verlag. ISBN 978-3-319-31663-5
Chomsiri, Thawatchai and He, Xiangjian and Nanda, Priyadarsi and Tan, Zhiyuan (2014) A stateful mechanism for the tree-rule firewall. In: Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 Sep 2014, Beijing, China. 256. IEEE Computer Society.
Constante, E. and den Hartog, J.I. and Petkovic, M. and Etalle, S. and Pechenizkiy, M. (2014) Hunting the Unknown. In: 28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec), July 14-16, 2014, Vienna, Austria. pp. 243-259. Lecture Notes in Computer Science 8566. Springer. ISBN 978-3-662-43936-4
Corradin, M.C. (2014) Then and Now: On The Maturity of Cybercrime Markets. Master's thesis, University of Twente.
Dacer, M.C. and Kargl, F. and König, H. and Valdes, A. (2014) Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292). Dagstuhl Reports, 4 (7). pp. 62-79. ISSN 2192-5283
Dacier, M.C and Kargl, F. and van der Heijden, R. and König, H. and Valdes, A. (2014) Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures. Informatik Spektrum, 37 (6). pp. 605-607. ISSN 0170-6012
Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield. Master's thesis, University of Twente.
Dechesne, F. and Hadžiosmanović, D. and Pieters, W. (2014) Experimenting with Incentives: Security in Pilots for Future Grids. IEEE Security & Privacy, 12 (6). pp. 59-66. ISSN 1540-7993 *** ISI Impact 0,902 ***
Dietrich, S. and van der Ham, J. and Pras, A. and van Rijswijk-Deij, R.M. and Shou, D. and Sperotto, A. and van Wynsberghe, A.L. and Zuck, L. D. (2014) Ethics in data sharing: developing a model for best practice. In: Proceedings of the IEEE CS Security and Privacy Workshop on Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS), 17 May, 2014, San Jose, CA, USA. pp. 5-9. IEEE Computer Society. ISBN 978-1-4799-5103-1
Dietzel, S. and Gürtler, J.Y. and van der Heijden, R. and Kargl, F. (2014) Redundancy-based Statistical Analysis for Insider Attack Detection in VANET Aggregation Schemes. In: Proceedings of the IEEE Vehicular Networking Conference 2014 (VNC 2014), 3-5 Dec 2014, Paderborn, Germany. pp. 135-142. IEEE. ISBN 978-1-4799-7660-7
Dietzel, S. and van der Heijden, R. and Decke, H and Kargl, F. (2014) A flexible, subjective logic-based framework for misbehavior detection in V2V networks. In: IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2014, 16-19 Jun 2014, Sydney, Australia. pp. 513-516. IEEE. ISBN 978-1-4799-4785-0
Dietzel, S. and Petit, J.Y. and Kargl, F. and Scheuermann, B. (2014) In-Network Aggregation for Vehicular Ad Hoc Networks. IEEE communications surveys & tutorials, 16 (4). pp. 1909-1932. ISSN 1553-877X *** ISI Impact 9,220 ***
Dutta, A. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2014) Automatic Eye Detection Error as a Predictor of Face Recognition Performance. In: 35rd WIC Symposium on Information Theory in the Benelux, 12-13 May 2014, Eindhoven, Netherlands. pp. 89-96. Centre for Telematics and Information Technology, University of Twente. ISBN 978-90-365-3383-6
Dutta, A. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2014) A Bayesian model for predicting face recognition performance using image quality. In: 2014 IEEE International Joint Conference on Biometrics (IJCB), 29 Sep - 02 Oct 2014, Clearwater, FL, USA. pp. 1-8. IEEE. ISBN 978-1-4799-3584-0
Etalle, S. and Zannone, N. (2014) Understanding computer security. Frontiers in ICT, 1 (3). pp. 1-2. ISSN 2297-198X
Förster, D. and Kargl, F. and Löhr, H. (2014) PUCA: A Pseudonym Scheme with User-Controlled Anonymity for Vehicular Ad-Hoc Networks (VANET). In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2014), 3-5 Dec 2014, Paderborn, Germany. pp. 25-32. IEEE. ISBN 978-1-4799-7660-7
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2014) Real world privacy expectations in VANETs real world privacy expectations in VANETs. In: Proceedings of the 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014), 20-21 Feb 2014, Luxembourg City, Luxembourg. pp. 30-32. Vehicular Lab, University of Luxembourg. ISBN 978-2-87971-124-9
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2014) Formal Model of Certificate Omission Schemes in VANET. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2014), 3-5 Dec 2014, Paderborn, Germany. pp. 41-44. IEEE. ISBN 978-1-4799-7660-7
François, F. and Wang, Ning and Moessner, K. and Georgoulas, S. and de Oliveira Schmidt, R. (2014) Leveraging MPLS Backup Paths for Distributed Energy-Aware Traffic Engineering. Transactions on Network and Service Management, 11 (2). pp. 235-249. ISSN 1932-4537 *** ISI Impact 1,296 ***
van Galen, R. (2014) Design and feasibility of mobile peer-to-peer payment systems. Master's thesis, University of Twente.
Günther, F. and Manulis, M. and Peter, A. (2014) Privacy-enhanced participatory sensing with collusion resistance and data aggregation. In: 13th International Conference on Cryptology and Network Security (CANS 2014), 22-24 Oct 2014, Heraklion, Crete, Greece. pp. 321-336. Lecture Notes in Computer Science 8813. Springer Verlag. ISBN 978-3-319-12279-3
Gielen, M.W. (2014) Prioritizing Computer Forensics Using Triage Techniques. Master's thesis, University of Twente.
Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Tang, Shao-Hua and Zhu, Bo (2014) TuLP:A family of lightweight message authentication codes for body sensor networks. Journal of Computer Science and Technology, 29 (1). pp. 53-68. ISSN 1000-9000 *** ISI Impact 0,475 ***
Hadžiosmanović, D. (2014) The process matters: cyber security in industrial control systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 13-282 ISBN 978-90-365-3604-2
Hadžiosmanović, D. and Sommer, R. and Zambon, Emmanuele and Hartel, P.H. (2014) Through the eye of the PLC: semantic security monitoring for industrial processes. In: ACSAC'14 Proceedings of the 30th Annual Computer Security Applications Conference, 8-12 Dec 2014, New Orleans, LA, USA. pp. 126-135. ACM. ISBN 978-1-4503-3005-3
Haraksim, R. (2014) Validation of Likelihood Ratio Methods Used for Forensic Evidence Evaluation: Application in Forensic Fingerprints. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 13-302 ISBN 978-90-365-3648-6
He, Xiangjian and Chomsiri, Thawatchai and Nanda , Priyadarsi and Tan, Zhiyuan (2014) Improving cloud network security using tree-rule firewall. Future Generation Computer Systems, 30. pp. 116-126. ISSN 0167-739X *** ISI Impact 2,430 ***
van der Heijden, R.W. and Kargl, F. (2014) Open issues in differentiating misbehavior and anomalies for VANETs. In: Proceedings of 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014), 20-21 Feb 2014, Luxembourg City, Luxembourg. pp. 24-26. Vehicular Lab, University of Luxembourg. ISBN 978-2-87971-124-9
Hendrikse, A.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2014) Likelihood ratio based verification in high dimensional spaces. IEEE transactions on pattern analysis and machine intelligence, 36 (1). pp. 127-139. ISSN 0162-8828 *** ISI Impact 6,077 ***
Hillerström, F.H.J. and Kumar, A. and Veldhuis, R.N.J. (2014) Generating and analyzing synthetic finger vein images. In: Proceedings of the 13th International Conference of the Biometrics Special Interest Group, BIOSIG 2014, 10-12 Sep 2014, Darmstadt, Germany. pp. 121-132. Lecture Notes in Informatics (LNI) P-230. Gesellschaft für Informatik. ISSN 1617-5468 ISBN 978-3-88579-624-4
Hoogesteger, M. and de Oliveira Schmidt, R. and Sperotto, A. and Pras, A. (2014) ReFlow: Reports on Internet Traffic. In: TERENA Networking Conference, 19-22 May 2014, Dublin, Ireland. TERENA. ISBN not assigned
Ionita, D. (2014) Context-sensitive Information security Risk identification and evaluation techniques. In: 22nd IEEE International Requirements Engineering Conference (RE14), 25-29 Aug. 2014, Karlskrona, Sweden. pp. 485-488. IEEE Computer Society. ISBN 978-1-4799-3033-3
Ionita, D. and Bullee, J.H. and Wieringa, R.J. (2014) Argumentation-Based Security Requirements Elicitation: The Next Round. In: Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 25 August 2014, Karlskrona, Sweden. pp. 7-12. IEEE Computer Society. ISBN 978-1-4799-6340-9
Jan, Mian Ahmad and Nanda, Priyadarsi and He, Xiangjian and Tan, Zhiyuan and Liu, Ren Ping (2014) A robust authentication scheme for observing resources in the internet of things environment. In: Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 Sep 2014, Beijing, China. 370. IEEE Computer Society.
Jeckmans, A.J.P. (2014) Cryptographically-Enhanced Privacy for Recommender Systems. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 13-290 ISBN 978-90-365-3593-9
Kargl, F. and van der Heijden, R. and König, H. and Valdes, A. and Dacier, M.C. (2014) Insights on the Security and Dependability of Industrial Control Systems. IEEE Security and Privacy Magazine, 12 (6). pp. 75-78. ISSN 1540-7993 *** ISI Impact 0,902 ***
Karvelas, N. and Peter, A. and Katzenbeisser, S. and Tews, E. and Hamacher, K. (2014) Privacy preserving whole genome sequence processing through proxy-aided ORAM. In: 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014), 3-7 Nov 2014, Scottsdale, AZ, USA. pp. 1-10. ACM. ISBN 978-1-4503-3148-7
Kegel, R.H.P. (2014) Development and Validation of a Personal Information Security Assistant Architecture. Master's thesis, University of Twente.
Kegel, R.H.P. and Wieringa, R.J. (2014) Persuasive technologies: a systematic literature review and application to PISA. Technical Report TR-CTIT-14-07, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Kerkers, M. and Cardoso de Santanna, J.J. and Sperotto, A. (2014) Characterisation of the Kelihos.B Botnet. In: Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, 30 Jun - 03 Jul 2014, Brno, Czech Republic. pp. 79-91. Lecture Notes in Computer Science 8508. Springer. ISSN 0302-9743 ISBN 978-3-662-43861-9
Knapik, P. and Petit, J.Y. and Kargl, F. and Schoch, E. (2014) Cooperative home light: assessment of a security function for the automotive field. International Journal on Advances in Security, 7 (1&2). pp. 1-14. ISSN 1942-2636
Lastdrager, E.E.H. (2014) Achieving a Consensual Definition of Phishing Based on a Systematic Review of the Literature. Crime Science, 3. 9:1-9:16. ISSN 2193-7680
van Lenthe, J.M. (2014) Combining Multiple Malware Detection; Approaches for Achieving Higher Accuracy. Master's thesis, Univ. of Twente.
Li, Wenjuan and Meng, Weizhi and Tan, Zhiyuan and Xiang, Yang (2014) Towards designing an email classification system using multi-view based semi-supervised learning. In: Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 24-26 Sep 2014, Beijing, China. 266. IEEE Computer Society.
Mahmood, Z. and Ali, T. and Khattak, S. and Hasan, L. and Khan, S.U. (2014) Automatic player detection and identification for sports entertainment applications. Pattern Analysis and Applications, 18 (4). pp. 971-982. ISSN 1433-7541 *** ISI Impact 1,104 ***
Makri, E. and Everts, M.H. and de Hoogh, S. and Peter, A. and op den Akker, H. and Hartel, P.H. and Jonker, W. (2014) Privacy-Preserving Verification of Clinical Research. In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19-21 Mar 2014, Wien, Österreich. pp. 481-500. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V.. ISBN 978-3-88579-622-0
Mehmood, Z. and Ali, T. and Khattak, S. and Khan, S. (2014) A comparative study of baseline algorithms of face recognition. In: 12th International Conference on Frontiers of Information Technology, FIT 2014, 17-19 Dec 2014, Islamabad, Pakistan. pp. 263-268. IEEE Computer Society. ISBN 978-1-4799-7505-1
Meuwly, D. (2014) Forensic use of fingermarks and fingerprints. In: Encyclopedia of Biometrics. Springer Verlag, London, pp. 1-15. ISBN 978-3-642-27733-7
Meuwly, D. and Veldhuis, R.N.J. (2014) Biometrics — Developments and Potential. In: Wiley Encyclopedia of Forensic Science. John Wiley & Sons Ltd, Chichester, UK, pp. 1-8. ISBN 978-0-47006-158-9
Moreira Moura, G.C. and Sadre, R. and Pras, A. (2014) Bad neighborhoods on the internet. Communications Magazine, 52 (7). pp. 132-139. ISSN 0163-6804 *** ISI Impact 5,125 ***
Moreira Moura, G.C. and Sadre, R. and Pras, A. (2014) Internet Bad Neighborhoods temporal behavior. In: Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2014), 5-9 May 2014, Krakow, Poland. IEEE Communications Society. ISBN 978-1-4799-0913-1
Moreira Moura, G.C. and Sadre, R. and Pras, A. (2014) Taking on Internet Bad Neighborhoods. In: Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2014), 5-9 May 2014, Krakow, Poland. pp. 1-7. IEEE Communications Society. ISBN 978-1-4799-0913-1
Mu, Meiru and Spreeuwers, L.J. and Veldhuis, R.N.J. (2014) Face identification in videos from mobile cameras. In: Proceedings of Netherlands Conference on Computer Vision, NCCV 2014, 24-25 April 2014, Ermelo, The Netherlands. pp. 1-4. ASCI. ISBN not assigned
de Oliveira Schmidt, R. (2014) Measurement-Based Link Dimensioning for the Future Internet. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 14-334 ISBN 978-90-365-3798-8
de Oliveira Schmidt, R. and Hendriks, L. and Pras, A. and van der Pol, R. (2014) OpenFlow-based Link Dimensioning. In: Proceedings of the Innovating the Network for Data Intensive Science Workshop, INDIS 2014, 16-21 Nov 2014, New Orleans, LA, USA. SCinet. ISBN not assigned
de Oliveira Schmidt, R. and Sadre, R. and Melnikov, N. and Schönwälder, J. and Pras, A. (2014) Linking network usage patterns to traffic Gaussianity fit. In: Proceedings of the 13th IFIP Networking Conference 2014, 2-4 June 2014, Trondheim, Norway. pp. 1-9. IEEE Computer Society. ISBN 978-3-901882-58-6
de Oliveira Schmidt, R. and Sadre, R. and Sperotto, A. and van den Berg, J.L. and Pras, A. (2014) A hybrid procedure for efficient link dimensioning. Computer networks, 67. pp. 252-269. ISSN 1389-1286 *** ISI Impact 1,446 ***
Petit, J.Y. and Feiri, M.P. and Kargl, F. (2014) Revisiting attacker model for smart vehicles. In: IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014), 14-15 Sept 2014, Vancouver, Canada. pp. 1-5. IEEE. ISBN 978-1-4799-4452-1
Pieters, W. and Hadžiosmanović, D. and Dechesne, F. (2014) Cyber Security as Social Experiment. In: NSPW '14 Proceedings of the 2014 workshop on New Security Paradigms, NSPW 2014, 15-18 Sep. 2014, Victoria, BC, Canada. pp. 15-24. ACM. ISBN 978-1-4503-3062-6
Pieters, W. and Hadžiosmanović, D. and Lenin, A. and Montoya Morales, A.L. and Willemson, J. (2014) TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (Poster). In: 35th IEEE Symposium on Security and Privacy, May 17-18, 2014, San Jose, California. IEEE Computer Society. ISBN not assigned
Pieters, W. and Lukszo, Z. and Hadžiosmanović, D. and van den Berg, Jan (2014) Reconciling Malicious and Accidental Risk in Cyber Security. Journal of Internet Services and Information Security, 4 (2). pp. 4-26. ISSN 2182-2069
Pieters, W. and Probst, C.W. and Lukszo, S. and Montoya Morales, A.L. (2014) Cost-effectiveness of Security Measures: A model-based Framework. In: Approaches and Processes for Managing the Economics of Information Systems. IGI Global, Hershey, PA, pp. 139-156. ISBN 978-1-4666-4983-5
Pras, A. (2014) Alle dagen Internet - beheersen door beheren. Twente University Press, Enschede.
Pras, A. and Pavlou, G. (2014) Network and Service Management - Series Editorial. IEEE communications magazine, 52 (1). pp. 130-131. ISSN 0163-6804 *** ISI Impact 5,125 ***
van Rijswijk-Deij, R.M. and Sperotto, A. and Pras, A. (2014) DNSSEC and Its Potential for DDoS Attacks - A Comprehensive Measurement Study. In: Proceedings of the Fourteenth ACM Internet Measurement Conference, ACM IMC 2014, 5-7 Nov 2014, Vancouver, Canada. pp. 449-460. ACM. ISBN 978-1-4503-3213-2
Sadre, R. and Sperotto, A. and Hofstede, R.J. and Brownlee, N. (2014) Flow-based approaches in network management: recent advances and future trends - Editorial. International Journal of Network Management, 24 (4). pp. 219-220. ISSN 1055-7148 *** ISI Impact 0,681 ***
Spreeuwers, L.J. (2014) Derivation of LDA log likelihood ratio one-to-one classifier. University of Twente Students Journal of Biometrics and Computer Vision, 2014 (1). 5. ISSN 2451-9642
Spreeuwers, L.J. and Veldhuis, R.N.J. and Sultanali, S. and Diephuis, J. (2014) Fixed FAR Vote Fusion of regional Facial Classifiers. In: BIOSIG 2014: Proceedings of the 13th International Conference of the Biometrics Special Interest Group, 11-13 September 2014, Darmstadt, Germany. pp. 1-4. IEEE. ISBN 978-3-88579-624-4
Stottelaar, B. and Senden, J. and Montoya Morales, A.L. (2014) Online social sports networks as crime facilitators. Crime Science, 3 (8). pp. 1-20. ISSN 2193-7680
Tan, Zhiyuan and Nagar, Upasana T. and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping and Wang, Song and Hu, Jiankun (2014) Enhancing big data security with collaborative intrusion detection. IEEE Cloud Computing, 1 (3). pp. 27-33. ISSN 2325-6095
Tistarelli, M. and Grosso , E. and Meuwly, D. (2014) Biometrics in Forensic Science: Challenges, Lessons and New Technologies. In: Biometric Authentication. Lecture Notes in Computer Science 8897. Springer Verlag, Switzerland, pp. 153-164. ISBN 978-3-319-13386-7
Trivellato, D. and Zannone, N. and Etalle, S. (2014) GEM: A distributed goal evaluation algorithm for trust management. Theory and Practice of Logic Programming, 14 (3). pp. 293-337. ISSN 1471-0684 *** ISI Impact 0,952 ***
Verbij, R.P. (2014) Dutch e-voting opportunities. Risk assessment framework based on attacker resources. Master's thesis, Univ. of Twente.
de Vries, W. (2014) How Asymmetric is the Internet? A Study to Support DDoS Mitigation Approaches. Master's thesis, Univ. of Twente.
Wang, Ruifang and Ramos, D. and Veldhuis, R.N.J. and Fierrez, J. and Spreeuwers, L.J. and Xu, Haiyun (2014) Regional fusion for high-resolution palmprint recognition using spectral minutiae representation. IET Biometrics, 3 (2). pp. 94-100. ISSN 2047-4938 *** ISI Impact 0,764 ***
Zeinstra, C.G. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2014) Towards the automation of forensic facial individualisation: Comparing forensic to non forensic eyebrow features. In: Proceedings of the 35th WIC Symposium on Information Theory in the Benelux, 12-13 May 2014, Eindhoven, Netherlands. pp. 73-80. Centre for Telematics and Information Technology, University of Twente. ISBN 978-90-365-3383-6

2013

Gozalvez, J. and Kargl, F. and Mittag, J. and Kravets, R. and Tsai, M., ed. (2013) VANET '13: Proceeding of the Tenth ACM International Workshop on Vehicular Inter-networking, Systems, and Applications. ACM, New York. ISBN 978-1-4503-2073-3
Ali, T. and Spreeuwers, L.J. and Veldhuis, R.N.J. and Meuwly, D. (2013) Effect of calibration data on forensic likelihood ratio from a face recognition system. In: IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems, BTAS 2013, 29 Sep - 02 Oct 2013, Washington, DC, U.S.A.. pp. 1-8. IEEE explore digital library. IEEE . ISBN 978-1-4799-0527-0
Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013) Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, Codes and Cryptography, 67 (2). pp. 209-232. ISSN 0925-1022 *** ISI Impact 0,781 ***
Arnold, F. and Pieters, W. and Stoelinga, M.I.A. (2013) Quantitative penetration testing with item response theory. In: 9th International Conference on Information Assurance and Security, IAS 2013, 4-6 Dec 2013, Gammarth, Tunisia. pp. 49-54. IEEE. ISBN 978-1-4799-2989-4
Bilgin, B. and Bogdanov, A. and Knezevic, M. and Mendel, F. and Wang, Qingju (2013) Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. In: Cryptographic Hardware and Embedded Systems, CHES 2013, 20-23 Aug 2013, Santa Barbara, CA, USA. pp. 142-158. Lecture Notes in Computer Science 8086. Springer Berlin Heidelberg. ISBN 978-3-642-40348-4
Bilgin, B. and Daemen, J. and Nikov, V. and Nikova, S.I. and Rijmen, V. and Van Assche, G. (2013) Efficient and First-Order DPA Resistant Implementations of Keccak. In: 12th Smart Card Research and Advanced Application Conference (CARDIS), 27-29 Nov 2013, Berlin, Germany. pp. 187-199. Lecture Notes in Computer Science (8419). Springer International Publishing. ISBN 978-3-319-08302-5
Blakey, E. and Coecke, B. and Mislove, M. and Pavlovic, D. (2013) Information security as a resource. Information and computation, 226. pp. 1-2. ISSN 0890-5401 *** ISI Impact 0,873 ***
Bleikertz, S. and Mastelic, T. and Pape, S. and Pieters, W. and Dimkov, T. (2013) Defining the cloud battlefield - supporting security assessments by cloud customers. In: International Conference on Cloud Engineering (IC2E 2013), 25-27 Mar 2013 , Redwood City, CA . pp. 78-87. IEEE Computer Society. ISBN 978-1-4673-6473-7
Bullee, J.H. (2013) Detection of leadership in informal (small)groups based on CCTV information. Master's thesis, University of Twente.
Caselli, M. and Hadžiosmanović, D. and Zambon, Emmanuele and Kargl, F. (2013) On the feasibility of device fingerprinting in industrial control systems. In: Critical Information Infrastructures Security, 16-18 Sept 2013, Amsterdam. pp. 155-166. Lecture Notes in Computer Science (8328). Springer. ISSN 0302-9743 ISBN 978-3-319-03963-3
Dacier, M. and Kargl, F. and Valdes, A. (2013) Securing critical infrastructures from targeted attacks (Dagstuhl Seminar 12502). Dagstuhl Reports, 2 (12). pp. 49-63. ISSN 2192-5283
van Dam, C. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2013) Model-free 3D face shape reconstruction from video sequences. In: Proceedings of the 34rd Symposium on Information Theory in the Benelux and the 3rd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 30-31 May 2013, Leuven, Belgium. pp. 228-235. University of Twente. ISBN 978-90-365-0000-5
van Dam, C. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2013) Landmark-based model-free 3D face shape reconstruction from video sequences. In: Proceedings of the 2013 International Conference of the Biometrics Special Interest Group (BIOSIG), , 4-6 Sep 2013, Darmstadt, Germany. pp. 265-272. Lecture Notes in Informatics (LNI) - Proceedings P-212. Gesellschaft fuer Informatik. ISSN 1617-5468 ISBN 978-3-88579-606-0
De Meyer, L. and Bilgin, B. and Preneel, B. (2013) Extended Analysis of DES S-boxes. In: Proceedings of the 34rd Symposium on Information Theory in the Benelux, 30-31 May 2013, Leuven, Belgium. pp. 140-146. Twente University Press. ISBN 978-90-365-0000-5
Dietzel, S. and Balanici, M. and Kargl, F. (2013) Short Paper: Towards Data-similarity-based Clustering for Inter-vehicle Communication. In: Proceedings of the IEEE Vehicular Networking Conference 2013 (VNC 2013), 16-18 Dec 2013, Boston, MA, USA. pp. 238-241. IEEE Communications Society. ISBN 978-1-4799-2687-9
Dietzel, S. and Petit, J.Y. and Heijenk, G.J. and Kargl, F. (2013) Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols. IEEE Transactions on Vehicular Technology, 62 (4). pp. 1505-1518. ISSN 0018-9545 *** ISI Impact 2,243 ***
Drago, I. and de Oliveira Schmidt, R. and Hofstede, R.J. and Sperotto, A. and Karimzadeh Motallebi Azar, M. and Haverkort, B.R.H.M. and Pras, A. (2013) Networking for the Cloud: Challenges and Trends. PIK - Praxis der Informationsverarbeitung und Kommunikation, 36 (4). pp. 207-214. ISSN 0930-5157
Dutta, A. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2013) Can facial uniqueness be inferred from impostor scores? In: Biometric Technologies in Forensic Science, BTFS 2013, 14-15 Oct 2013, Nijmegen, Netherlands. Centre for Language and Speech Technology, Radboud University. ISBN not assigned
Ellens, W. and Zuraniewski, P. and Sperotto, A. and Schotanus, H. and Mandjes, M.R.H. and Meeuwissen, E. (2013) Flow-based detection of DNS tunnels. In: Proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, June 25-28, 2013, Barcelona, Spain. pp. 124-135. Lecture Notes in Computer Science 7943. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-38997-9
Etalle, S. (2013) Innovatie en R&D -- een Inleiding. Magazine nationale veiligheid en crisisbeheersing, 11 (1). pp. 3-5. ISSN 1875-7561
Etalle, S. and Hinrichs, T. and Lee, A. and Trivellato, D. and Zannone, N. (2013) Policy administration in tag-based authorization. In: 5th International Symposium on Foundations and Practice of Security, FPS 2012, 25-26 Oct 2012, Montreal, QC, Canada. pp. 162-179. Lecture Notes in Computer Science 7743. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-37119-6
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2013) Efficient and secure storage of private keys for pseudonymous vehicular communication. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), 04 Nov 2013, Berlin, Germany. pp. 9-18. ACM. ISBN 978-1-4503-2487-8
Haraksim, R. and Meuwly, D. (2013) Influence of the datasets size on the stability of the LR in the lower region of the within source distribution. In: Proceedings of Biometric Technologies in Forensic Science, BTFS 2013, 14-15 Oct 2013, Nijmegen. pp. 34-38. Biometric Technologies in Forensic Science. Radboud University Nijmegen. ISSN 2351-9738
Hartel, P.H. (2013) Situative Prävention von Cybercrime: ein chancenreicher Bekämpfungsansatz. In: Cybercrime - Bedrohung, Intervention, Abwehr, 12-13 Nov 2013, Wiesbaden, Germany. pp. 96-108. Bundeskriminalamt. ISBN not assigned
Hartel, P.H. and van den Berg, Jan and Junger, M. (2013) Wat gaan we doen tegen de cyberaanvallen? Informatiebeveiliging, 4 (4). pp. 10-11. ISSN 1569-1063
Hartel, P.H. and Luiijf, E. (2013) Critical information infrastructures security - preface. In: 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, 16-18 Sep 2013, Amsterdam. v-vi. Lecture Notes in Computer Science 8328. Springer. ISBN 978-3-319-03963-3
Höfer, C.N. (2013) POPCORN: Privacy-preserving charging for eMobility. Master's thesis, University of Twente.
van der Heijden, R. and Dietzel, S. and Kargl, F. (2013) SeDyA: secure dynamic aggregation in VANETs. In: WiSec '13 Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 17-19 April 2013, Budapest, Hungary. pp. 131-142. ACM. ISBN 978-1-4503-1998-0
van der Heijden, R. and Dietzel, S. and Kargl, F. (2013) Misbehavior detection in vehicular ad-hoc networks. In: Proceedings of 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2013), 21-22 Feb 2013, Innsbruck, Austria. University of Innsbruck. ISBN not assigned
Hendrikse, A.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2013) Smooth eigenvalue correction. EURASIP Journal on Advances in Signal Processing, 2013 (117). pp. 1-16. ISSN 1687-6180 *** ISI Impact 0,928 ***
Hoefer, C. and Petit, J.Y. and Schmidt, R. and Kargl, F. (2013) POPCORN: privacy-preserving charging for eMobility. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), 04 Nov 2013, Berlin, Germany. pp. 37-48. ACM. ISBN 978-1-4503-2487-8
Hoefer, C. and Petit, J.Y. and Schmidt, R. and Kargl, F. (2013) POPCORN: Privacy-preserving Charging for e-Mobility. In: 29. VDI/VW-Gemeinschaftstagung Automotive Security, 25-26 Sep 2013, Kassel, Germany. pp. 33-46. VDI. ISBN not assigned
Hoogesteger, M. and de Oliveira Schmidt, R. and Sperotto, A. and Pras, A. (2013) Reports on internet traffic statistics. In: TERENA Networking Conference, TNC 2013, 3-6 Jun 2013, Maastricht, The Netherlands. 19. Trans-European Research and Education Networking Association. ISBN not assigned
Huijgen, A.W. (2013) Efficiently Protecting Virtualized Desktop Infrastructures Against Malware. Master's thesis, University of Twente.
Jamdagni, Aruna and Tan, Zhiyuan and Nanda, Priyadarsi and He, Xiangjian and Liu, Ren Ping (2013) RePIDS: a multi tier real-time payload-based intrusion detection system. Computer networks, 57 (3). pp. 811-824. ISSN 1389-1286 *** ISI Impact 1,446 ***
Jansen, J. and Junger, M. and Montoya Morales, A.L. and Hartel, P.H. (2013) Offenders in a digitized society. In: Cybercrime and the police. Safety & Security Studies. Eleven International Publishing, The Hague, The Netherlands, pp. 45-59. ISBN 978-94-6236-069-3
Jeckmans, A.J.P. and Beye, M.R.T. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2013) Privacy in Recommender Systems. In: Social Media Retrieval. Computer Communications and Networks. Springer Verlag, London, pp. 263-281. ISSN 1617-7975 ISBN 978-1-4471-4554-7
Jeckmans, A.J.P. and Peter, A. and Hartel, P.H. (2013) Efficient privacy-enhanced familiarity-based recommender system. In: Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013, 9-13 Sep 2013, Egham, UK. pp. 400-417. Lecture Notes in Computer Science 8134. Springer. ISBN 978-3-642-40203-6
Junger, M. and Montoya Morales, A.L. and Hartel, P.H. and Karemaker, M. (2013) Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit. Technical Report TR-CTIT-13-07, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Kargl, F. (2013) Softwarepech op de weg. Computer Idee, 2013 (6). pp. 18-21. ISSN 1388-2376
Kargl, F. and Friedman, A. and Boreli, R. (2013) Differential privacy in intelligent transportation systems. In: WiSec '13 Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 17-19 April 2013, Budapest, Hungary. pp. 107-112. ACM. ISBN 978-1-4503-1998-0
Keuper, D. (2013) XNU: a security evaluation. Master's thesis, University of Twente.
Knapik, P. and Schoch, E. and Kargl, F. (2013) Electronic decal: a security function based on V2X communication. In: 77th IEEE Vehicular Technology Conference (VTC 2013-Spring), 02-05 Jun 2013, Dresden, Germany. pp. 1-5. IEEE Vehicular Technology Society. ISSN 1550-2252
Knapik, P. and Schoch, E. and Kargl, F. (2013) Simulation of a Security Function Based on Vehicle-to-X Communication and Automotive Lighting. In: The Second International Conference on Advances in Vehicular Systems, Technologies and Applications (Vehicular 2013), 21-26 Jul 2013, Nice, France. pp. 8-11. IARIA. ISSN 2327-2058 ISBN 978-1-61208-288-2
Knapik, P. and Schoch, E. and Kargl, F. (2013) Security-Funktionen zur Bekämpfung fahrzeugbezogener Kriminalität. In: 29. VDI/VW-Gemeinschaftstagung Automotive Security, 24-25 Sep 2013, Kassel, Germany. pp. 47-62. VDI. ISBN not assigned
Krish, R.P. and Fierrez, J. and Ramos, D. and Veldhuis, R.N.J. and Wang, Ruifang (2013) Evaluation of AFIS-Ranked latent fingerprint matched templates. In: Proceedings of the sixth Pacific-Rim Symposium on Image and Video Technology (PSIVT 2013), 28 Oct - 01 Nov 2013, Guanajuato, México. pp. 230-241. Lecture Notes in Computer Science 8333. Springer Verlag. ISBN 978-3-642-53841-4
van Merendonk, N. and van Alebeek, V. and Spreeuwers, L.J. and Spreeuwers, D. and Kroon, P.J. and Roorda, L. and Dekker, J. and Hoeksma, A.F. (2013) Hand assessment with the E-Cone in rheumatoid arthritis and hand osteoarthritis. Annals of the rheumatic diseases, 72 (Suppl 3). A349. ISSN 0003-4967 *** ISI Impact 12,384 ***
Meuwly, D. (2013) Friction ridge skin - Automated Fingerprint Identification System (AFIS). In: Wiley Encyclopedia of Forensic Science. John Wiley & Sons Ltd, Chichester, UK, pp. 1-8. ISBN 978-0-47006-158-9
Meuwly, D. (2013) Forensic speaker recognition. In: Wiley Encyclopedia of Forensic Science. John Wiley & Sons, Chichester, UK, pp. 1-5. ISBN 978-0-47006-158-9
Meuwly, D. (2013) Editorial introduction. Special Issue for the European Academy of Forensic Science. Forensic Science International, 230 (1-3). 1. ISSN 0379-0738 *** ISI Impact 1,950 ***
Misra, G. (2013) Permeance of ICT in Crime in India. Master's thesis, University of Twente.
Montoya Morales, A.L. (2013) The TREsPASS project. In: ICTOpen2013, 27-28 November 2013, Eindhoven. pp. 1-1. ICTopen. ISBN not assigned
Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2013) How 'Digital' is Traditional Crime? In: European Intelligence and Security Informatics Conference, EISIC 2013, 12-14 Aug 2013, Uppsala, Sweden. pp. 31-37. IEEE Computer Society. ISBN 978-0-7695-5062-6
Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2013) Modus operandi study of information and communication technology (ICT) facilitated crime. In: NVC Congres, 13-14 June 2013, Leiden, The Netherlands. 93. Nederlandse Vereniging voor Criminologie. ISBN not assigned
Mu, Meiru (2013) Texture representation for low-resolution palmprint rrecognition. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 13-255 ISBN 978-90-365-0007-4
Mu, Meiru and Shao, Xiaoying and Ruan, QiuQi and Spreeuwers, L.J. and Veldhuis, R.N.J. (2013) Bits extraction for palmprint template protection with Gabor magnitude and multi-bit quantization. In: Proceedings of the 2013 International Conference on Biometrics (ICB), 4-7 Jun 2013, Madrid, Spain. pp. 1-7. The Institute of Electrical and Electronic Engineers, Inc. . ISBN 978-1-4799-0310-8
Ngo, Minh Tri and Stoelinga, M.I.A. and Huisman, M. (2013) Confidentiality for Probabilistic Multi-Threaded Programs and Its Verification. In: Proceedings of the 5th International Conference on Engineering Secure Software and Systems, ESSoS 2013, 27 Feb - 01 Mar 2013, Paris, France. pp. 107-122. Lecture Notes in Computer Science (7781). Springer Verlag. ISBN 978-3-642-36562-1
Nunes Leal Franqueira, V. and van Cleeff, A. and van Eck, P.A.T. and Wieringa, R.J. (2013) Engineering security agreements against external insider threat. Information Resources Management Journal, 26 (4). pp. 66-91. ISSN 1040-1628
de Oliveira Schmidt, R. and Sadre, R. and Pras, A. (2013) Gaussian traffic revisited. In: Proceedings of the 12th IFIP Networking Conference, 22-24 May 2013, Brooklyn, NY, USA. article 21. International Federation for Information Processing. ISBN 978-3-901882-55-5
de Oliveira Schmidt, R. and Sadre, R. and Sperotto, A. and Pras, A. (2013) Lightweight link dimensioning using sFlow sampling. In: Proceedings of the 9th International Conference on Network and Services Management (CNSM 2013), 14-18 Oct 2013, Zurich, Switzerland. pp. 152-155. IEEE Computer Society. ISBN 978-3-901882-53-1
Pavlovic, D. (2013) Monoidal computer I: Basic computability by string diagrams. Information and computation, 226. pp. 94-116. ISSN 0890-5401 ISBN 978-3-642-29891-2 *** ISI Impact 0,873 ***
Pavlovic, D. (2013) Bicompletions of distance matrices. In: Computation, Logic, games, and Quantum Foundations. Lecture Notes in Computer Science 7860. Springer Verlag, Berlin, pp. 291-310. ISSN 0302-9743 ISBN 978-3-642-38163-8
Peter, A. and Hartman, T. and Muller, S. and Katzenbeisser, S. (2013) Privacy-preserving architecture for forensic image recognition. In: IEEE International Workshop on Information Forensics and Security, WIFS 2012, 2-5 Dec 2012, Tenerife, Spain. pp. 79-84. Information Forensics and Security (WIFS), 2012 IEEE International Workshop (13249609). IEEE Computer Society. ISBN 978-1-4673-2285-0
Peter, A. and Tews, E. and Katzenbeisser, S. (2013) Efficiently outsourcing multiparty computation under multiple keys. IEEE transactions on information forensics and security, 8 (12). pp. 2046-2058. ISSN 1556-6013 *** ISI Impact 2,441 ***
Pieters, W. (2013) On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology, 15 (3). pp. 195-208. ISSN 1388-1957 *** ISI Impact 0,739 ***
Pieters, W. (2013) Defining "The Weakest Link" Comparative Security in Complex Systems of Systems. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, CloudCom, 2-5 Dec 2013, Bristol, United Kingdom. pp. 39-44. IEEE Computer Society. ISBN 978-0-7695-5095-4
Pieters, W. and Dimkov, T. and Pavlovic, D. (2013) Security Policy Alignment: A Formal Approach. IEEE Systems Journal, 7 (2). pp. 275-287. ISSN 1932-8184 *** ISI Impact 2,114 ***
Pieters, W. and Padget, J. and Dechesne, F. and Dignum, V. and Aldewereld, H. (2013) Obligations to enforce prohibitions: on the adequacy of security policies. In: SIN '13 - Proceedings of the 6th International Conference on Security of Information and Networks, 26-28 Nov 2013, Aksaray, Turkey. pp. 54-61. Proceeding. ACM. ISBN 978-1-4503-2498-4
Prakken, H. and Ionita, D. and Wieringa, R.J. (2013) Risk assessment as an argumentation game. In: 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV, 16-18 Sep 2013, Corunna, Spain. pp. 357-373. Lecture Notes in Computer Science 8143. Springer Verlag. ISBN 978-3-642-40623-2
Rocha, B.P.S. and Conti, M. and Etalle, S. and Crispo, B. (2013) Hybrid static-runtime information flow and declassification enforcement. IEEE transactions on information forensics and security, 8 (8). pp. 1294-1305. ISSN 1556-6013 *** ISI Impact 2,441 ***
Santemiz, P. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2013) Automatic landmark detection and face recognition for side-view face images. In: Proceedings of the 2013 International Conference of the Biometrics Special Interest Group (BIOSIG), , 4-6 Sep 2013, Darmstadt, Germany. pp. 337-344. Lecture Notes in Informatics (LNI) - Proceedings P-212. Gesellschaft für Informatik. ISSN 1617-5468 ISBN 978-3-88579-606-0
Schaub, F. and Hipp, M. and Kargl, F. and Weber, M. (2013) On Credibility Improvements for Automotive Navigation Systems. Journal of Personal and Ubiquitous Computing, 17 (5). pp. 803-813. ISSN 1617-4909 *** ISI Impact 1,498 ***
Shao, Xiaoying and Veldhuis, R.N.J. (2013) A real helper data scheme. In: Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition (ACPR), 2013, 5-8 Nov 2013, Okinawa, Japan. pp. 84-89. IEEE Computer Society. ISBN 978-1-4799-2190-4
Smulders, E. (2013) User Space Memory Analysis. Master's thesis, University of Twente.
Stoelinga, M.I.A. and Pieters, W. (2013) Attack navigator vindt en verhelpt zwakke plekken. Bits en chips, 4. ISSN 1879-6443
Tao, Qian and Veldhuis, R.N.J. (2013) Robust Biometric Score Fusion by Naive Likelihood Ratio via Receiver Operating Characteristics. IEEE Transactions on Information Forensics and Security, 8 (2). pp. 305-313. ISSN 1556-6013 *** ISI Impact 2,441 ***
Ton, B.T. and Veldhuis, R.N.J. (2013) A high quality finger vascular pattern dataset collected using a custom designed capturing device. In: Proceedings of the 2013 International Conference on Biometrics (ICB), 4-7 Jun 2013, Madrid, Spain. pp. 1-5. Institute of Electrical and Electronic Engineers, Inc.. ISBN 978-1-4799-0310-8
Trivellato, D. and Etalle, S. and Luit, E. and Zannone, N. (2013) The POLIPO Security Framework. In: Situation Awareness with Systems of Systems. Springer Verlag, New York, pp. 189-208. ISBN 978-1-4614-6229-3
Trivellato, D. and Zannone, N. and Glaundrup, M. and Skowronek, J. and Etalle, S. (2013) A semantic security framework for systems of systems. International journal of cooperative information systems, 22 (1). pp. 1-35. ISSN 0218-8430 *** ISI Impact 0,526 ***
Wang, Ruifang and Veldhuis, R.N.J. and Ramos, D. and Spreeuwers, L.J. and Fierrez, J. and Xu, Haiyun (2013) On the use of spectral minutiae in high-resolution palmprint recognition. In: Proceedings of the International Workshop on Biometrics and Forensics (IWBF), 2013, 4-5 April 2013, Lisbon, Portugal. pp. 1-4. IEEE Computer Society. ISBN 978-1-4673-4987-1
de Wit, J. (2013) Continuous Forensic Readiness. Master's thesis, University of Twente.

2012

Altintas, O. and Chen, W. and Heijenk, G.J. and Oh, H.S. and Chung, J.-M. and Dressler, F. and Kargl, F. and Pau, G. and Schoch, E., ed. (2012) 2012 IEEE Vehicular Networking Conference (VNC): Demo Summaries. CTIT Workshop Proceedings Series (WP 12-03). University of Twente, Enschede. ISSN 0929-0672
Altintas, O. and Chen, W. and Heijenk, G.J. and Oh., H.S. and Chung, J.M. and Dressler, F. and Kargl, F. and Pau, G. and Schoch, E., ed. (2012) 2012 IEEE Vehicular Networking Conference (VNC). IEEE, USA. ISSN 2157-9865 ISBN 978-1-4673-4996-3
Jonker, W. and Petkovic, M., ed. (2012) Secure Data Management, 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012 : proceedings. Lecture Notes in Computer Science 7482. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-32872-5
van Alebeek, V. and Hoeksma, A. and van Merendonk, N. and Spreeuwers, D. and Spreeuwers, L.J. (2012) E-cone: nieuw instrument bij behandeling van de reumatische hand. Nederlands tijdschrift voor handtherapie, 21 (1). pp. 27-30. ISSN not assigned
Ali, T. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2012) A review of calibration methods for biometric systems in forensic applications. In: 33rd WIC Symposium on Information Theory in the Benelux, 24-25 May 2012, Boekelo, Netherlands. pp. 126-133. WIC. ISBN 978-90-365-3383-6
Ali, T. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2012) Forensic Face Recognition: A Survey. In: Face Recognition: Methods, Applications and Technology. Computer Science, Technology and Applications. Nova Publishers, 9. ISBN 978-1-61942-663-4
Ali, T. and Tom, P. and Fierrez, J. and Vera-Rodriguez, R. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2012) A study of identification performance of facial regions from CCTV images. In: 5th International Workshop on Computational Forensics, IWCF 2012, 12-15 Nov 2012, Tsukuba, Japan. pp. 1-9. Autonomas University of Madrid, Spain. ISBN not assigned
Ali, T. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2012) Computation of likelihood ratio from small sample set of within-source variability. In: 6th European Academy of Forensic Science Conference (EAFS 2012), 20-24 Aug 2012, The Hague, The Netherlands. European Academy of Forensic Science. ISBN not assigned
Alyüz, N. and Gökberk, B. and Spreeuwers, L.J. and Veldhuis, R.N.J. and Akarun, L. (2012) Robust 3D Face Recognition in the Presence of Realistic Occlusions. In: 5th IAPR International Conference on Biometrics, ICB 2012, 29 March - 01 April 2012, New Delhi, India. pp. 111-118. IEEE Computer Society. ISBN 978-1-4673-0396-5
Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012) Shift-type homomorphic encryption and its application to fully homomorphic encryption. In: 5th International Conference on Cryptology in Africa, AFRICACRYPT 2012, 10-12 Jul 2012, Ifrane, Morocco. pp. 234-251. Lecture Notes in Computer Science 7374. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-31410-0
Bösch, C.T. and Brinkman, R. and Hartel, P.H. and Jonker, W. (2012) Method and System of Monitoring a Data Stream. Patent P31230NL00/HSE (Application).
Bösch, C.T. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2012) Selective Document Retrieval from Encrypted Database. In: 15th International Conference on Information Security (ISC), 19-21 Sep 2012, Passau, Germany. pp. 224-241. Lecture Notes in Computer Science 7483. Springer Verlag. ISBN 978-3-642-33383-5
Beye, M.R.T. and Jeckmans, A.J.P. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2012) Privacy in Online Social Networks. In: Computational Social Networks: Security and Privacy. Springer Verlag, London, pp. 87-113. ISBN 978-1-4471-4050-4
Bißmeyer, N. and Mauthofer, S. and Bayarou, K.M. and Kargl, F. (2012) Assessment of Node Trustworthiness in VANETs Using Data Plausibility Checks with Particle Filters. In: Proceedings of the IEEE Vehicular Networking Conference 2012 (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 78-85. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Bilgin, B. and Nikova, S.I. and Rijmen, V. and Nikov, V. and Stütz, G. (2012) Threshold Implementations of all 3×3 and 4×4 S-boxes. In: Cryptographic Hardware and Embedded Systems, CHES 2012, 9-12 Sep 2012, Leuven, Belgium. pp. 76-91. Lecture Notes in Computer Science 7428. Springer Berlin Heidelberg. ISBN 978-3-642-33026-1
van den Brande, J. and Pras, A. (2012) The Costs of Web Advertisements while Mobile Browsing. In: 18th EUNICE / IFIP International Conference on Information and Communication Technologies, 29-31 August, 2012, Budapest, Hungary. pp. 412-422. Lecture Notes in Computer Science 7479. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-32807-7
van den Broek, G. and van Rijswijk-Deij, R.M. and Pras, A. and Sperotto, A. (2012) Improving Response Deliverability in DNS(SEC). In: TERENA Networking Conference 2012, 21-24 May 2012, Reykjavík, Iceland. Trans-European Research and Education Networking Association. ISBN not assigned
Brusó, M. and Chatzikokolakis, K. and Etalle, S. and den Hartog, J.I. (2012) Linking unlinkability. In: 7th International Symposium on Trustworthy Global Computing (TGC 2012), 07-08 Sep 2012, Newcastle upon Tyne, UK. pp. 129-144. Lecture Notes in Computer Science 8191. Springer Verlag. ISBN 978-3-642-41156-4
Bullee, J.H. and Veldhuis, R.N.J. (2012) Biometric features and privacy : condemned, based upon your finger print. In: Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux and the 2nd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelu, 24-25 May 2012, Boekelo, The Netherlands. pp. 44-51. Twente University Press. ISBN 978-90-365-3383-6
Busch, C. and Brauckman, M. and Veldhuis, R.N.J. and Deravi, F. and Kevenaar, T.A.M. and Nouak, A. and Seibert, H. and Weber, F. and Suchier, J.-M. (2012) Towards a more secure border control with 3D face recognition. In: Proceedings of the 5th Norsk Informasjons Sikkerhets Konferanse (NISK), 19-22 Nov 2012, Bodø, Norway. pp. 49-60. Tapir Akademisk Forlag. ISBN 978-82-321-0012-5
Coecke, B. and Pavlovic, D. and Vicary, J. (2012) A new description of orthogonal bases. Mathematical Structures in Computer Science, 23 (3). pp. 555-567. ISSN 0960-1295 *** ISI Impact 0,758 ***
Condori-Fernández, N. and Nunes Leal Franqueira, V. and Wieringa, R.J. (2012) Report on the Survey of Role-Based Access Control (RBAC) in Practice. Technical Report TR-CTIT-12-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Dam, C. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2012) Towards 3D Facial Reconstruction from Uncalibrated CCTV Footage. In: 33rd WIC Symposium on Information Theory in the Benelux, 24-25 May 2012, Boekelo. pp. 228-234. University of Twent. ISBN 978-90-365-3383-6
Damjanović, S. (2012) Dense stereo matching: in the pursuit of an ideal similarity measure. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 12-234 ISBN 978-90-365-3456-7
Damjanović, S. and van der Heijden, F. and Spreeuwers, L.J. (2012) Local Stereo Matching Using Adaptive Local Segmentation. ISRN Machine Vision, 2012. 163285. ISSN 2090-7796
Dietzel, S. and Kost, M. and Schaub, F. and Kargl, F. (2012) CANE: A Controlled Application Environment for Privacy Protection in ITS. In: Proceedings of the 12th International Conference on Intelligent Transport Systems Telecommunications (ITST 2012), 5-8 Nov 2012, Taipeh, Taiwan. pp. 71-76. IEEE Communications Society. ISBN 978-1-4673-3070-1
Dietzel, S. and Petit, J.Y. and Kargl, F. and Heijenk, G.J. (2012) Analyzing Dissemination Redundancy to Achieve Data Consistency in VANETs. In: Proceedings of the Ninth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2012), 25 June 2012, Low Wood Bay, UK. pp. 131-134. ACM. ISBN 978-1-4503-1317-9
Dimkov, T. (2012) Alignment of Organizational Security Policies -- Theory and Practice. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 12-218 ISBN 978-90-365-3331-7
Dressler, F. and Kargl, F. (2012) Security in Nano Communication: Challenges and Open Research Issues. In: Proceedings of the IEEE International Workshop on Molecular and Nanoscale Communications (MoNaCom 2012) at IEEE International Conference on Communications (ICC 2012), 11 Jun 2012, Ottawa, Canada. pp. 6183-6187. IEEE Communications Society. ISBN 978-1-4577-2052-9
Dressler, F. and Kargl, F. (2012) Towards security in nano-communication: Challenges and opportunities. Nano Communication Networks, 3 (3). pp. 151-160. ISSN 1878-7789
Dutta, A. and van Rootseler, R.T.A. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2012) View based approach to forensic face recognition. Technical Report TR-CTIT-12-21, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Dutta, A. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2012) The Impact of Image Quality on the Performance of Face Recognition. In: 33rd WIC Symposium on Information Theory in the Benelux, 24-25 May 2012, Boekelo, The Netherlands. pp. 141-148. Centre for Telematics and Information Technology, University of Twente. ISBN 978-90-365-3383-6
Dutta, A. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2012) Non-frontal Model Based Approach to Forensic Face Recognition. In: ICT: The Innovation Highway, CTIT Symposium 2012, 18 June 2012, Enschede, Netherlands. Centre for Telematics and Information Technology, University of Twente. ISBN not assigned
Dutta, A. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2012) Database Cross Matching: A Novel Source of Fictitious Forensic Cases. Technical Report TR-CTIT-12-23, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Dutta, A. and Veldhuis, R.N.J. and Spreeuwers, L.J. and Meuwly, D. (2012) A framework for forensic face recognition based on recognition performance calibrated for the quality of image pairs. Technical Report TR-CTIT-12-20, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Fatemi, H. (2012) Risk-Aware Design of Value and Coordination Networks. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 12-232 ISBN 978-90-365-3437-6
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2012) Congestion-based Certificate Omission in VANETs. In: Ninth ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2012, June 25, 2012, Low Wood Bay, Lake District, United Kingdom. pp. 135-138. ACM. ISBN 978-1-4503-1317-9
Feiri, M.P. and Petit, J.Y. and Kargl, F. (2012) Evaluation of Congestion-based Certificate Omission in VANETs. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 101-108. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Hadžiosmanović, D. and Bolzoni, D. and Etalle, S. and Hartel, P.H. (2012) Challenges and opportunities in securing industrial control systems. In: Proceedings of the IEEE Workshop on Complexity in Engineering, COMPENG 2012, 11-13 June 2012, Aachen, Germany. pp. 1-6. IEEE. ISBN 978-1-4673-1614-9
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2012) A Log Mining Approach for Process Monitoring in SCADA. International Journal of Information Security, 11 (4). pp. 231-251. ISSN 1615-5262 *** ISI Impact 1,279 ***
Hadžiosmanović, D. and Simionato, L. and Bolzoni, D. and Zambon, Emmanuele and Etalle, S. (2012) N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols. In: Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012), 12-14 Sep 2012, Amsterdam, The Netherlands. pp. 354-373. Lecture Notes in Computer Science 7462. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-33337-8
Hartel, P.H. and Junger, M. (2012) Teaching Engineering students to "Think thief". Technical Report TR-CTIT-12-19, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Suryana, N. (2012) Information Security. In: Cyber Safety: An Introduction. Eleven International Publishers, The Hague, pp. 281-291. ISBN 978-94-90947-75-0
van der Heijden, R. (2012) SeDyA: Secure Dynamic Aggregation in VANETs. Master's thesis, University of Twente.
Hendrikse, A.J. (2012) SOS, lost in a high dimensional space. PhD thesis, University of Twente. CTIT Ph.D.-thesis series no. 11-223 ISBN 978-90-365-3367-6
Herrmann, A. and Morali, A. and Etalle, S. and Wieringa, R.J. (2012) Risk and Business Goal Based Security Requirement and Countermeasure Prioritization. In: Workshops on Business Informatics Research (BIR 2011), 6-8 Oct 2011, Riga, Latvia. pp. 64-76. Lecture Notes in Business Information Processing 106. Springer Verlag. ISSN 1865-1348 ISBN 978-3-642-29230-9
Huang, Liting (2012) Secure and Privacy-Preserving Broadcast Authentication for IVC. Master's thesis, University of Twente.
Huisman, M. and Ngo, Minh Tri (2012) Scheduler-Specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification. In: 2nd International Conference on Formal Verification of Object-Oriented Software (FoVeOOS 2011), Revised Selected Papers, October 5-7, 2011, Turin, Italy. pp. 178-195. Lecture Notes in Computer Science 7421. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-31761-3
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2012) Privacy-Preserving Collaborative Filtering based on Horizontally Partitioned Dataset. In: International Conference on Collaboration Technologies and Systems (CTS 2012), 21-25 May 2012, Denver, CO, USA. pp. 439-446. IEEE Computer Society. ISBN 978-1-4673-1381-0
Jonker, W. and Petkovic, M. (2012) Preface. In: Secure Data Management, 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012: proceedings. Lecture Notes in Computer Science 7482. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-32872-5
Junger, M. and Laycock, G. and Hartel, P.H. and Ratcliffe, J. (2012) Crime science: editorial statement. Crime science, 1 (1). 1:1-1:3. ISSN 2193-7680
Kaggwa, F. (2012) Evaluation of Multiple Enrollment for Fingerprint Recognition. Master's thesis, University of Twente.
Kelkboom, E.J.C. and Breebaart, J. and Buhan, I.R. and Veldhuis, R.N.J. (2012) Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources. IEEE Transactions on information forensics and security, 7 (4). pp. 1225-1241. ISSN 1556-6013 *** ISI Impact 2,441 ***
Knapik, P. and Schoch, E. and Müller, M. and Kargl, F. (2012) Understanding Vehicle Related Crime to Elaborate on Countermeasures Based on ADAS and V2X Communication. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 86-93. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Kocabas, U. and Peter, A. and Katzenbeisser, S. and Sadeghi, A. (2012) Converse PUF-based authentication. In: 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, 13-15 Jun 2012, Vienna, Austria. pp. 142-158. Lecture Notes in Computer Science 7344. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-30920-5
Lagana, M. and Feiri, M.P. and Sall, M. and Lange, M. and Tomatis, A. and Papadimitratos, P. (2012) Secure Communication in Vehicular Networks - PRESERVE Demo. In: 2012 IEEE Vehicular Networking Conference (VNC): Demo Summaries, 14-16 Nov 2012, Seoul, Korea. pp. 11-12. IEEE Communications Society. ISSN 0929-0672
Meadows, C. and Pavlovic, D. (2012) Formalizing physical security procedures. In: 8th International Workshop on Security and Trust Management, STM 2012, 13-14 Sep 2012, Pisa, Italy. pp. 193-208. Lecture Notes in Computer Science 7783. Springer Verlag. ISBN 978-3-642-38004-4
Meuwly, D. and Veldhuis, R.N.J. (2012) Forensic biometrics: From two communities to one discipline. In: Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG) 2012, 6-7 Sep 2012, Darmstadt, Germany. pp. 1-12. IEEE Conference publications. ISSN 1617-5468 ISBN 978-1-4673-1010-9
Mu, Meiru and Ruan, Qiuqi and Shao, Xiaoying and Spreeuwers, L.J. and Veldhuis, R.N.J. (2012) Binary palmprint representation for feature template protection. In: 33rd WIC Symposium on Information Theory in the Benelux, 24-25 May 2012, Boekelo, the Netherlands. pp. 118-125. University of Twente. ISBN 978-90-365-3383-6
Mu, Meiru and Ruan, Qiuqi and Shao, Xiaoying and Spreeuwers, L.J. and Veldhuis, R.N.J. (2012) Binary gabor statistical features for palmprint template protection. In: Joint IAPR International Workshop on Structural and Syntactic Pattern Recognition (SSPR 2012) and Statistical Techniques in Pattern Recognition (SPR 2012), 7-9 Nov 2012, Hiroshima, Japan. pp. 593-601. Lecture Notes in Computer Science 7626. Springer Verlag. ISBN 978-3-642-34165-6
Ngo, Minh Tri and Stoelinga, M.I.A. and Huisman, M. (2012) Confidentiality for Probabilistic Multi-Threaded Programs and Its Verification. Technical Report TR-CTIT-13-01, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Nunes Leal Franqueira, V. and van Cleeff, A. and van Eck, P.A.T. and Wieringa, R.J. (2012) Securing the Extended Enterprise: A Method for Analyzing External Insider Threat. In: Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions. IGI Global, Hershey, USA, pp. 195-222. ISBN 978-1-46660-197-0
Nunes Leal Franqueira, V. and Wieringa, R.J. (2012) Role-Based Access Control in Retrospect. Computer, 45 (6). pp. 81-88. ISSN 0018-9162 *** ISI Impact 1,115 ***
de Oliveira Schmidt, R. and Sperotto, A. and Sadre, R. and Pras, A. (2012) Estimating Bandwidth Requirements using Flow-level Measurements. In: TERENA Networking Conference 2012, 21-24 May 2012, Reykjavík, Iceland. Trans-European Research and Education Networking Association . ISBN not assigned
de Oliveira Schmidt, R. and Sperotto, A. and Sadre, R. and Pras, A. (2012) Towards Bandwidth Estimation Using Flow-Level Measurements. In: 6th International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, 4-8 Jun 2012, Luxembourg, Luxembourg. pp. 127-138. Lecture Notes in Computer Science 7279/2012. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-30632-7
Ottow, C. (2012) Hacking the NextWeb: Penetration Testing over IPv6. Master's thesis, University of Twente.
Ottow, C. and van Vliet, F and de Boer, P.T. and Pras, A. (2012) The Impact of IPv6 on Penetration Testing. In: 18th EUNICE / IFIP International Conference on Information and Communication Technologies, 29-31 August, 2012, Budapest, Hungary. pp. 88-99. Lecture Notes in Computer Science 7479. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-32807-7
Pavlou, G. and Pras, A. (2012) Series editorial: Topics in Network and Service Management. IEEE Communications Magazine, 50 (7). pp. 68-69. ISSN 0163-6804 *** ISI Impact 5,125 ***
Pavlou, G. and Pras, A. (2012) Series editorial: Topics in network and service management. IEEE Communications Magazine, 50 (12). pp. 132-133. ISSN 0163-6804 *** ISI Impact 5,125 ***
Pavlovic, D. (2012) Quantitative Concept Analysis. In: 10th International Conference on Formal Concept Analysis (ICFCA), 7-10 May 2012, Leuven, Belgium. pp. 260-277. Lecture Notes in Computer Science 7278. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-29891-2
Pavlovic, D. (2012) Tracing the Man in the Middle in Monoidal Categories. In: 11th International Workshop on Coalgebraic Methods in Computer Science, CMCS 2012, 31 Mrt - 01 Apr 2012, Tallinn, Estonia. pp. 191-217. Lecture Notes in Computer Science 7399. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-32783-4
Pavlovic, D. and Meadows, C. (2012) Actor-Network Procedures. In: 8th International Conference on Distributed Computing and Internet Technology, ICDCIT 2012, 2-4 Feb 2012, Bhubaneswar, India. pp. 7-26. Lecture Notes in Computer Science 7154. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-28072-6
Peter, A. and Kronberg, M. and Trei, W. and Katzenbeisser, S. (2012) Additively homomorphic encryption with a double decryption mechanism, revisited. In: 15th International Conference on Information Security, ISC 2012, 19-21 Sep 2012, Passau, Gemany. pp. 242-257. Lecture Notes in Computer Science 7483. Springer Verlag. ISSN 1611-3349 ISBN 978-3-642-33383-5
Petit, J.Y. and Bösch, C.T. and Feiri, M.P. and Kargl, F. (2012) On the Potential of PUF for Pseudonym Generation in Vehicular Networks. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 94-100. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6
Pieters, W. and van der Ven, S. and Probst, C.W. (2012) A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability. In: Proceedings of the 2012 workshop on New security paradigms (NSPW 2012), 18-21 Sep 2012, Bertinoro, Italy. pp. 1-14. ACM. ISBN 978-1-4503-1794-8
Probst, C.W. and Sasse, A.M. and Pieters, W. and Dimkov, T. and Luysterborg, E. and Arnaud, M. (2012) Privacy penetration testing -- how to establish trust in your cloud provider. In: European Data Protection: In Good Health? International, Foreign and Comparative Law XVIII. Springer, London, pp. 251-266. ISBN 978-94-007-2902-5
van Rootseler, R.T.A. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2012) Using 3D Morphable Models for face recognition in video. In: Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux, 24-25 May 2012, Boekelo, The Netherlands. pp. 235-242. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 978-90-365-3383-6
Santemiz, P. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2012) Video-based Side-view Face Recognition for Home Safety. In: 33rd WIC Symposium on Information Theory in the Benelux, 24-25 May 2012, Boekelo, The Netherlands. pp. 220-227. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 978-90-365-3383-6
Schaub, F. and Könings, B. and Weber, M. and Kargl, F. (2012) Towards context adaptive privacy decisions in ubiquitous computing. In: IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 19-23 Mar 2012, Lugano, Switzerland. pp. 407-410. IEEE Computer Society. ISBN 978-1-4673-0905-9
Schaub, F. and Koenings, B. and Dietzel, S. and Weber, M. and Kargl, F. (2012) Privacy context model for dynamic privacy adaptation in ubiquitous computing. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp 2012, CASEMANS 2012 Workshop, 8 Sep 2012, Pittsburgh, PA, USA. pp. 752-757. ACM. ISBN 978-1-4503-1224-0
Sedghi, S. (2012) Towards Provably Secure Efficiently Searchable Encryption. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 12-219 ISBN 978-90-365-3333-1
Shao, Xiaoying and Xu, Haiyun and Veldhuis, R.N.J. and Slump, C.H. (2012) A concatenated coding scheme for biometric template protection. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), , 25-30 Mar 2012, Kyoto, Japan. pp. 1865-1868. IEEE Signal Processing Society. ISSN 1520-6149 ISBN 978-1-4673-0045-2
Sperotto, A. and Mandjes, M.R.H. and Sadre, R. and de Boer, P.T. and Pras, A. (2012) Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study. IEEE Transactions on Network and Service Management, 9 (2). pp. 128-141. ISSN 1932-4537 *** ISI Impact 1,296 ***
Spreeuwers, L.J. and Hendrikse, A.J. and Gerritsen, K.J. (2012) Evaluation of automatic face recognition for automatic border control on actual data recorded of travellers at Schiphol Airport. In: 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group, 6-7 Sept. 2012, Darmstadt, Germany. pp. 1-6. Proceedings of the International Conference of Biometrics Special Interest Group. Gesellschaft für Informatik e.V.. ISSN 1617-5468 ISBN 978-1-4673-1010-9
Stemmer, J. (2012) Detecting outliers in web-based network traffic. Master's thesis, University of Twente.
Tang, Qiang (2012) Cryptographic framework for analyzing the privacy of recommender algorithms. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 may. 2012, Denver, USA. pp. 455-462. IEEE Computer Society. ISBN 978-1-4673-1381-0
Tang, Qiang (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5 (12). pp. 1351-1362. ISSN 1939-0114 *** ISI Impact 0,806 ***
Tang, Qiang (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2 (4). pp. 304-321. ISSN 1753-0563
Verberkt, S.L.C. (2012) Claiming Security Properties in a Service Oriented Architecture. Master's thesis, University of Twente.
Wagenaar, P. (2012) Detecting botnets using file system indicators. Master's thesis, University of Twente.
Yang, Bian and Busch, C. and Groot, K. de and Xu, Haiyun and Veldhuis, R.N.J. (2012) Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level. Sensors, 12 (5). pp. 5246-5272. ISSN 1424-8220 *** ISI Impact 2,033 ***
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2012) A2thOS: availability analysis and optimisation in SLAs International Journal of Network Management, 22 (2). pp. 104-130. ISSN 1055-7148 *** ISI Impact 0,681 ***

2011

Altintas, O. and Chen, W. and Heijenk, G.J. and Dressler, F. and Ekici, E. and Kargl, F. and Shigeno, H. and Dietzel, S., ed. (2011) Vehicular Networking Conference (VNC). IEEE. ISBN 978-1-4673-0048-3
Altintas, O. and Chen, W. and Heijenk, G.J. and Dressler, F. and Ekici, E. and Kargl, F. and Shigeno, H. and Dietzel, S., ed. (2011) 2011 IEEE Vehicular Networking Conference (VNC): Demo Summaries. CTIT Workshop Proceedings Series (WP 11-04). University of Twente, Enschede. ISSN 0929-0672 ISBN 978-94-6191-079-0
Barthe, G. and Datta, A. and Etalle, S., ed. (2011) Formal aspects of security and trust : 8th international workshop, FAST 2011 Leuven, Belgium, September 12-14, 2011: revised selected papers. Lecture Notes in Computer Science 7140. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-29419-8
Erlingsson, Ú. and Wieringa, R.J. and Zannone, N., ed. (2011) Engineering secure software and systems. Lecture Notes in Computer Science 6542. Springer Verlag, London. ISBN 978-3-642-19124-4
Johnson, M. and Pavlovic, D., ed. (2011) Algebraic methodology and software technology : 13th international conference, AMAST 2010. Lecture Notes in Computer Science 6486. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-17795-8
Alberts, G. and Boersma, K. and Broekhans, B. and Dijkstra, Anne and Pieters, W. and Popkema, M. and Vanheste, T. (2011) Inleiding: Kennisklimaat. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 7-11. ISSN 1871-0034 ISBN 978-90-8964-401-5
Ali, T. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2011) Towards automatic forensic face recognition. In: International Conference on Informatics Engineering and Information Science (ICIEIS 2011), 14-16 Nov 2011, Kuala Lumpur, Malaysia. pp. 47-55. Communications in Computer and Information Science 252. Springer Verlag. ISSN 1865-0929
Alyuz, N. and Gökberk, B. and Spreeuwers, L.J. and Veldhuis, R.N.J. and Akarun, L. (2011) Occlusion-robust 3D face recognition using restoration and local classifiers. In: Proceedings of the 2011 IEEE 19th Conference on Signal Processing and Communications Applications (SIU 2011), 20-22 Apr 2011, Antalya, Turkey. pp. 750-753. IEEE Signal Processing Society. ISBN 978-1-4577-0462-8
Asim, M. and Ibraimi, L. and Petkovic, M. (2011) Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme. In: Proceedings of the 12th IFIP TC 6 / TC 11 International Conference on Communications and Multimedia Security (CMS 2011), 19-21 Oct 2011, Ghent, Belgium. pp. 244-246. Lecture Notes in Computer Science 7025. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-24711-8
Bösch, C.T. and Brinkman, R. and Hartel, P.H. and Jonker, W. (2011) Conjunctive Wildcard Search over Encrypted Data. In: 8th VLDB Workshop on Secure Data Management, SDM 2011, 02 Sep 2011, Seattle, WA, USA. pp. 114-127. Lecture Notes in Computer Science 6933. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-23555-9
Bolzoni, D. and Schade, C. L. and Etalle, S. (2011) A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. In: Proceedings of the 25th Large Installation System Administration Conference (LISA 2011), 4-9 Dec 2011, Boston, USA. pp. 201-216. The USENIX Association. ISBN 978-931971-881-3
Boom, B.J. (2011) Gezichtsherkenning in video surveillance. Security Management, 5. pp. 31-33. ISSN 1386-0941
Boom, B.J. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2011) Virtual illumination grid for correction of uncontrolled illumination in facial images. Pattern Recognition, 44 (9). pp. 1980-1989. ISSN 0031-3203 *** ISI Impact 3,399 ***
Chen, Chun (2011) On binary representations for biometric template protection. PhD thesis, University of Twente. ISBN 978-90-365-3339-3
Chen, Chun and Veldhuis, R.N.J. (2011) Binary Biometric Representation through Pairwise Adaptive Phase Quantization. EURASIP Journal on Information Security, 2011. 543106. ISSN 1687-4161
Chen, Chun and Veldhuis, R.N.J. (2011) Extracting biometric binary strings with minimal area under the FRR curve for the hamming distance classifier. Signal processing, 91 (4). pp. 906-918. ISSN 0165-1684 *** ISI Impact 2,063 ***
Chevalking, S.K.L. (2011) Reviewing and Optimizing the Security of FIGO. Master's thesis, University of Twente.
van Cleeff, A. and Dimkov, T. and Pieters, W. and Wieringa, R.J. (2011) Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting. In: Proceedings of the International Conference on IT Convergence and Security (ICITCS 2011), 14-16 Dec, 2011, Suwon, South Korea. pp. 51-67. Lecture Notes in Electrical Engineering 120. Springer Verlag. ISSN 1876-1100 ISBN 978-94-007-2910-0
van Cleeff, A. and Pieters, W. and Wieringa, R.J. and van Tiel, F. (2011) Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization. Information Security Technical Report, 16 (3-4). pp. 142-149. ISSN 1363-4127
De Capitani di Vimercati, S. and Pieters, W. and Probst, C.W. (2011) Secure Architectures in the Cloud. Technical Report 11492 Dagstuhl, Germany. ISSN 2192-5283
Dietzel, S. (2011) Privacy Implications of In-Network Aggregation Mechanisms for VANETs. (Invited) In: Proceedings of the 8th International Conference on Wireless On-demand Network Systems and Services, 26-28 Jan 2011, Bardonecchia, Italy. pp. 91-95. IEEE Communications Society. ISBN 978-1-61284-189-2
Dietzel, S. and Kargl, F. and Heijenk, G.J. and Schaub, F. (2011) Modeling In-Network Aggregation in VANETs. IEEE communications magazine, 49 (11). pp. 142-148. ISSN 0163-6804 *** ISI Impact 5,125 ***
Dimkov, T. and Pieters, W. (2011) Physical Penetration Testing: A Whole New Story in Penetration Testing. PenTest Magazine, 2011 (2). pp. 20-23. ISSN not assigned
Dimkov, T. and Pieters, W. and Hartel, P.H. (2011) Training Students to Steal: A Practical Assignment in Computer Security Education. In: Proceedings of the 42nd ACM Technical Symposium on Computer Science Education (SIGCSE 2011), 9-12 Mar 2011, Dallas, Texas, USA. pp. 21-26. ACM. ISBN 978-1-4503-0500-6
Dreo Rodosek, G. and Pras, A. and Schulzrinne, H. and Stiller, B. (2011) Learning from the Past: Implications for the Future Internet and its Management? (Dagstuhl Seminar 11042). Dagstuhl Reports, 1 (1). pp. 102-107. ISSN 2192-5283
Dressler, F. and Kargl, F. and Ott, J. and Tonguz, O.K. and Wischof, L. (2011) Research Challenges in Intervehicular Communication: Lessons of the 2010 Dagstuhl Seminar. IEEE communications magazine, 49 (5). pp. 158-164. ISSN 0163-6804 *** ISI Impact 5,125 ***
Gomes, R. and de Oliveira Schmidt, R. (2011) Evaluating Automatic Pools Distribution Techniques for Self‐Configured Networks. In: 16th IEEE Symposium on Computers and Communications, ISCC 2011, 28 Jun - 01 Jul 2011, Kerkyra (Corfu), Greece. pp. 658-663. IEEE Communications Society. ISBN 978-1-4577-0681-3
Gong, Zheng and Nikova, S.I. and Law, Yee Wei (2011) KLEIN: A New Family of Lightweight Block Ciphers. In: 7th International Workshop on RFID, Security and Privacy (RFIDSec 2011), June 26-28, 2011, Amherst, MA, USA. pp. 1-18. Lecture Notes in Computer Science 7055. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-25285-3
Haack, C. and Huisman, M. and Hurlin, C. (2011) Permission-Based Separation Logic for Multithreaded Java Programs. Nieuwsbrief van de Nederlandse Vereniging voor Theoretische Informatica, 15. pp. 13-23. ISSN not assigned
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. and Etalle, S. (2011) MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. In: Proceedings of the European Conference on Computer Network Defense, EC2ND 2011, 6-8 Sept 2011, Gothenburg, Sweden. pp. 41-48. IEEE Computer Society. ISBN 978-0-7695-4762-6
Höfer, C.N. and Karagiannis, G. (2011) Cloud computing services: taxonomy and comparison. Journal of Internet Services and Applications, 2 (2). pp. 81-94. ISSN 1867-4828
Herrmann, A. and Morali, A. and Etalle, S. and Wieringa, R.J. (2011) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization. In: Perspectives in Business Informatics Research, 6-8 Oct 2011, Riga, Latvia. pp. 155-162. Riga Technical University. ISBN 978-9984-30-197-6
Huisman, M. and Blondeel, H.-C. (2011) Model-checking Secure Information Flow for Multi-Threaded Programs. In: Proceedings of the Joint Workshop on Theory of Security and Applications, TOSCA 2011, 31 March - 1 April 2011, Saarbruecken, Germany. pp. 148-165. Lecture Notes in Computer Science 6993. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-27374-2
Ibraimi, L. (2011) Cryptographically Enforced Distributed Data Access Control. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 11-208 ISBN 978-90-365-3228-0
Ibraimi, L. and Asim, M. and Petkovic, M. (2011) Attribute-Based Digital Signature System. Patent WO2011145011 (Application).
Ibraimi, L. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2011) Public-Key Encryption with Delegated Search. In: Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS), 7-10 Jun 2011, Nerja, Spain. pp. 532-549. Lecture Notes in Computer Science 6715. Springer Verlag. ISBN 978-3-642-21553-7
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) Privacy-Preserving Profile Matching Using the Social Graph. Technical Report TR-CTIT-11-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) Privacy-Preserving Profile Matching Using the Social Graph. In: International Conference on Computational Aspects of Social Networks, CASoN 2011, 19-21 Oct 2011 , Salamanca, Spain. pp. 42-47. IEEE Computer Society. ISBN 978-1-4577-1132-9
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks. In: Proceedings of the 18th ACM conference on Computer and communications security (CCS), 17-21 Oct 2011 , Chicago, IL, USA. pp. 793-795. ACM. ISBN 978-1-4503-0948-6
Kargl, F. and Papadimitratos, P. (2011) ACM WiSec 2011 poster and demo session. ACM SIGMOBILE Mobile Computing and Communications Review, 15 (3). pp. 34-34. ISSN 1559-1662
Kelkboom, E.J.C. and Breebaart, J. and Kevenaar, T.A.M. and Buhan, I.R. and Veldhuis, R.N.J. (2011) Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme. IEEE Transactions on Information Forensics and Security, 6 (1). pp. 107-121. ISSN 1556-6013 *** ISI Impact 2,441 ***
Kolesnichenko, A.V. and de Boer, P.T. and Remke, A.K.I. and Zambon, Emmanuele and Haverkort, B.R.H.M. (2011) Is Quantitative Analysis of Stuxnet Possible? In: QEST 2011: Fast Abstracts, 5-8 Sep 2011, Aachen, Germany. pp. 9-10. CTIT Workshop Proceedings WP11-03. Centre for Telematics and Information Technology University of Twente. ISSN 0929-0672
Kost, M. and Freytag, J.-C. and Kargl, F. and Kung, A. (2011) Privacy Verification Using Ontologies. In: Proceedings of the Sixth International Conference on Availability, Reliability and Security, ARES 2011, 22-26 Aug 2011, Vienna, Austria. pp. 627-632. IEEE Computer Society. ISBN 978-1-4577-0979-1
Kung, A. and Freytag, J.-C. and Kargl, F. (2011) Privacy-by-Design in ITS Applications : The Way Forward. In: Second International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN), 20 Jun 2011, Lucca, Italy. pp. 1-6. IEEE Computer Society. ISBN 978-1-4577-0351-5
Lastdrager, E.E.H. (2011) Securing Patient Information in Medical Databases. Master's thesis, University of Twente.
Law, Yee Wei and Moniava, G. and Gong, Zheng and Hartel, P.H. and Palaniswami, M. (2011) KALwEN: a new practical and interoperable key management scheme for body sensor networks. Security and Communication Networks, 4 (11). pp. 1309-1329. ISSN 1939-0114 *** ISI Impact 0,806 ***
Makri, E. and Konstantinou, E. (2011) Constant round group key agreement protocols: A comparative study. Computers & Security, 30 (8). pp. 643-678. ISSN 0167-4048 *** ISI Impact 1,640 ***
Morali, A. (2011) IT Architecture-Based Confidentiality Risk Assessment in Networks of Organizations. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 11-197 ISBN 978-90-365-3165-8
Nikova, S.I. and Rijmen, V. and Schläffer, M. (2011) Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. Journal of Cryptology, 24 (2). pp. 292-321. ISSN 0933-2790 *** ISI Impact 1,617 ***
Nunes Leal Franqueira, V. and Condori-Fernández, N. (2011) RBAC in Practice. In: Proceedings of the 17th International Working Conference on Requirements Engineering (REFSQ'2011), 28-30 March 2011, Essen, Germany. pp. 152-153. ICB-Research Report (44). Institute for Computer Science and Business Information Systems (ICB) . ISSN 1860-2770
Nunes Leal Franqueira, V. and Racheva, Z. and Tun, T. T. and Daneva, M. (2011) Towards Agile Security Risk Management in RE and Beyond. In: Proceedings of the International Workshop on Empirical Requirements Engineering (EmpiRE workshop co-located with RE'2011), 29 Aug - 02 Sep 2011, Trento, Italy. pp. 33-36. IEEE Computer Society. ISBN 978-1-4577-1075-9
Nunes Leal Franqueira, V. and Tun, T.T. and Yu, Yijun and Wieringa, R.J. and Nuseibeh, B. (2011) Risk and Argument: A Risk-based Argumentation Method for Practical Security. In: Proceedings of the 19th IEEE International Requirements Engineering Conference, 29 Aug - 02 Sep 2011, Trento, Italy. pp. 239-248. IEEE Computer Society. ISBN 978-1-4577-0924-1
de Oliveira Schmidt, R. and Pras, A. (2011) Estimating Bandwidth Requirements Using Flow-Level Measurements. In: 5th International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2011, 13-17 Jun 2011, Nancy, France. pp. 169-172. Lecture Notes in Computer Science 6734. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-21483-7
de Oliveira Schmidt, R. and Pras, A. and Gomes, R. (2011) On the Evaluation of Self-Addressing Strategies for Ad-Hoc Networks. In: 17th International Workshop on Energy Aware Communications, EUNICE 2011, 05-07 Sep 2011, Dresden, Germany. pp. 31-42. Lecture Nodes in Computer Science 6955. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-23540-5
de Oliveira Schmidt, R. and Pras, A. and Gomes, R. (2011) Evaluating Self-Addressing Protocols for Ad-Hoc Networks. In: ICT.OPEN 2011, 14-15 Nov 2011, Veldhoven, Netherlands. NWO. ISBN 978-90-73461-99-4
Pavlou, G. and Pras, A. (2011) Series editorial: Topics in Network and Service Management. IEEE Communications Magazine, 49 (12). pp. 64-65. ISSN 0163-6804 *** ISI Impact 5,125 ***
Pavlou, G. and Pras, A. (2011) Series editorial: Network and Service Management Series. IEEE Communications Magazine, 49 (7). pp. 78-79. ISSN 0163-6804 *** ISI Impact 5,125 ***
Pavlovic, D. (2011) Relating Toy Models of Quantum Computation: Comprehension, Complementarity and Dagger Mix Autonomous Categories. In: 6th International Workshop on Quantum Physics and Logic (QPL 2009), 8-9 April 2009, Oxford, UK. pp. 121-139. Electronic Notes in Theoretical Computer Science 270 (2). Elsevier. ISSN 1571-0661
Pavlovic, D. (2011) Gaming security by obscurity. In: New Security Paradigms Workshop, September 12-15, 2011, Marin County, California. pp. 125-140. ACM. ISBN 978-1-4503-1078-9
Peng, Yuxi (2011) Face Recognition at a Distance: a study of super resolution. Master's thesis, University of Twente.
Petit, J.Y. and Feiri, M.P. and Kargl, F. (2011) Spoofed Data Detection in VANETs using Dynamic Thresholds. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2011), 14-16 Nov 2011, Amsterdam, Netherlands. pp. 25-32. IEEE Communications Society. ISBN 978-1-4673-0049-0
Petit, J.Y. and Mammeri, Z. (2011) Dynamic Consensus for Secured Vehicular Ad Hoc Networks. In: Proceedings of the 7th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, IEEE WiMob 2011, 10-12 Oct 2011, Shanghai, China. pp. 1-8. IEEE Computer Society. ISSN 2160-4886 ISBN 978-1-4577-2013-0
Pieters, W. (2011) Explanation and trust: what to tell the user in security and AI? Ethics and information technology, 13 (1). pp. 53-64. ISSN 1388-1957 *** ISI Impact 0,739 ***
Pieters, W. (2011) Cloud security in vogelvlucht. Informatiebeveiliging, 2011 (1). pp. 16-17. ISSN 1569-1063
Pieters, W. (2011) High security, human significance: Informatiebeveiliging in Twente. Informatiebeveiliging, 2011 (2). pp. 14-17. ISSN 1569-1063
Pieters, W. (2011) Representing humans in system security models: An actor-network approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2 (1). pp. 75-92. ISSN 2093-5374
Pieters, W. (2011) The (social) construction of information security. The Information Society, 27 (5). pp. 326-335. ISSN 0197-2243 *** ISI Impact 1,333 ***
Pieters, W. (2011) Risicopersonalisatie en haar falen in collectieve vraagstukken. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 197-207. ISSN 1871-0034 ISBN 978-90-8964-401-5
Pieters, W. (2011) Security and privacy in the clouds: a bird's eye view. In: Computers, Privacy and Data Protection: an Element of Choice. Springer, Dordrecht, pp. 445-457. ISBN 978-94-007-0640-8
Pieters, W. (2011) How devices transform voting. In: Innovating Government. Normative, policy and technological dimensions of modern government. Information Technology and Law Series 20. T.M.C. Asser Press, The Hague, pp. 439-452. ISSN 1570-2782 ISBN 978-90-6704-730-2
Pieters, W. and Coles-Kemp, L. (2011) Reducing normative conflicts in information security. In: Proceedings of the 2011 New security paradigms workshop, NSPW '11, 12-15 Sep 2011, Marin County, CA. pp. 11-24. ACM. ISBN 978-1-4503-1078-9
Popkema, M. and Pieters, W. and Boersma, K. and Broekhans, B. (2011) Epiloog: Het klimaat voor kennis in de kennissamenleving. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 225-231. ISSN 1871-0034 ISBN 978-90-8964-401-5
van Rijswijk-Deij, R.M. and van Dijk, J. (2011) Tiqr: a novel take on two-factor authentication. In: Proceedings of the 25th Large Installation System Administration Conference, USENIX LISA 2011, 4-9 Dec 2011, Boston, MA, USA. pp. 81-97. USENIX Association. ISBN 978-931971-88-1
van Rootseler, R.T.A. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2011) Application of 3D Morphable Models to faces in video images. In: 32nd WIC Symposium on Information Theory in the Benelux, 10-11 May 2011, Brussels, Belgium. pp. 34-41. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 978-9-08172-190-5
Santemiz, P. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2011) Side-View Face Recognition. In: 32nd WIC Symposium on Information Theory in the Benelux, 10-11 May 2011, Brussels, Belgium. pp. 305-312. WIC. ISBN 9789081721905
Schmidt, R.K. and Brakemeier, A. and Leinmüller, T. and Kargl, F. and Schäfer, G. (2011) Advanced carrier sensing to resolve local channel congestion. In: Proceedings of the Eighth ACM international workshop on Vehicular inter-networking, VANET 2011, 23 Sep 2011, Las Vegas, Nevada, USA. pp. 11-20. ACM. ISBN 978-1-4503-0869-4
Sedghi, S. and Hartel, P.H. and Jonker, W. and Nikova, S.I. (2011) Privacy Enhanced Access Control by Means of Policy Blinding. In: Proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, 30 May - 1 Jun 2011, Guangzhou, China. pp. 108-122. Lecture Notes in Computer Science 6672. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-21030-3
Soleimanifard, S. and Gurov, D. and Huisman, M. (2011) ProMoVer: Modular Verification of Temporal Safety Properties. In: Proceedings of the 9th International Conference on Software Engineering and Formal Methods (SEFM 2011), 14-18 Nov 2011, Montevideo, Uruguay. pp. 366-381. Lecture Notes in Computer Science 7041. Springer Verlag. ISBN 978-3-642-24690-6
Sperotto, A. and Pras, A. (2011) Flow-Based Intrusion Detection. In: Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2011 , 23-27 May 2011, Dublin, Ireland. pp. 958-963. IEEE Communications Society. ISBN 978-1-4244-9219-0
Spreeuwers, L.J. (2011) Fast and Accurate 3D Face Recognition Using Registration to an Intrinsic Coordinate System and Fusion of Multiple Region classifiers. International Journal of Computer Vision, 93 (3). pp. 389-414. ISSN 0920-5691 *** ISI Impact 4,270 ***
Tan, Zhiyuan and Jamdagni, Aruna and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping (2011) Denial-of-service attack detection based on multivariate correlation analysis. In: Neural Information Processing. Lecture Notes in Computer Science 7064. Springer Verlag, Berlin, pp. 756-765. ISSN 0302-9743
Tan, Zhiyuan and Jamdagni, Aruna and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping (2011) Multivariate correlation analysis technique based on euclidean distance map for network traffic characterization. In: Information and Communications Security. Lecture Notes in Computer Science 7043. Springer Verlag, Berlin, pp. 388-398. ISSN 0302-9743
Tang, Qiang (2011) Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. In: Proceedings of the 16th Australian conference on information security and privacy, 11-13 Jul 2011, Melbourne, Australia. pp. 389-406. Lecture Notes in Computer Science 6812. Springer Verlag. ISBN 978-3-642-22497-3
Tang, Qiang (2011) Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization. Technical Report TR-CTIT-11-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang and Chen, Liqun (2011) Extended KCI attack against two-party key establishment protocols. Information processing letters, 111 (15). pp. 744-747. ISSN 0020-0190 *** ISI Impact 0,605 ***
Tang, Qiang and Jeckmans, A.J.P. (2011) Towards a security model for computational puzzle schemes. International Journal of Computer Mathematics, 88 (11). pp. 2246-2257. ISSN 0020-7160 *** ISI Impact 0,577 ***
Trivellato, D. and Zannone, N. and Etalle, S. (2011) A Security Framework for Systems of Systems. In: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY , 6-8 Jun 2011, Pisa, Italy. pp. 182-183. IEEE Computer Society. ISBN 978-1-4244-9879-6
Trivellato, D. and Zannone, N. and Etalle, S. (2011) Protecting Information in Systems of Systems. In: 18th ACM Conference on Computer and Communications Security (CCS), 17-21 Oct 2011, Chicago, USA . pp. 865-867. ACM. ISBN 978-1-4503-0948-6
Warmer, M. (2011) Detection of Web Based Command & Control Channels. Master's thesis, University of Twente.
Yang, Bian and Busch, C. and Groot, K. de and Xu, Haiyun and Veldhuis, R.N.J. (2011) Decision Level Fusion of Fingerprint Minutiae Based Pseudonymous Identifiers. In: International Conference on Hand-Based Biometrics, ICHB 2011 , 17-18 Nov 2011, Hong Kong, China. pp. 1-6. IEEE eXpress Conference Publishing. ISBN 978-1-4577-0491-8
Yu, Yijun and Tun, T.T. and Tedeschi, A. and Nunes Leal Franqueira, V. and Nuseibeh, B. (2011) OpenArgue: Supporting Argumentation to Evolve Secure Software Systems. In: 19th IEEE International Requirements Engineering Conference, RE 2011, 29 Aug- 2 Sep 2011, Trento, Italy. pp. 351-352. IEEE Computer Society. ISBN 978-1-4577-0924-1
Zambon, Emmanuele (2011) Towards Optimal IT Availability Planning: Methods and Tools. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 10-188 ISBN 978-90-365-3102-3
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. and Hartel, P.H. (2011) Model-based Qualitative Risk Assessment for Availability of IT Infrastructures. Software and Systems Modeling, 10 (4). pp. 553-580. ISSN 1619-1366 *** ISI Impact 0,990 ***
Zhou, Xuebing and Kuijper, A. and Veldhuis, R.N.J. and Busch, C. (2011) Quantifying privacy and security of biometric fuzzy commitment. In: Proceedings of the 2011 International Joint Conference on Biometrics (IJCB), 11-13 Oct 2011, Washington, DC. pp. 1-8. IEEE Computer Society. ISBN 978-1-4577-1359-0

2010

Degano, P. and Etalle, S. and Guttman, J., ed. (2010) Formal aspects of security and trust : 7th international workshop, FAST 2010 Pisa, Italy, September 16-17, 2010: revised selected papers. Lecture Notes in Computer Science 6561. Springer Verlag, Berlin. ISBN 978-3-642-19751-2
Alemneh, E. (2010) Sharing Nonlinear Gates in the Presence of Glitches. Master's thesis, University of Twente.
Asim, M. and Ibraimi, L. and Petkovic, M. (2010) Ciphertext-Policy Attribute-Based Encryption and Re-Encryption. Patent WO2010IB54581 (Application).
Barbosa, R.R.R. and Sadre, R. and Pras, A. and van de Meent, R. (2010) Simpleweb/University of Twente Traffic Traces Data Repository. Technical Report TR-CTIT-10-19, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Barreto, P.S. and Nikov, V. and Nikova, S.I. and Rijmen, V. and Tischhouser, E. (2010) Wirlwind: a New Cryptographic Hash Function. Designs, Codes and Cryptography, 56 (2-3). pp. 141-162. ISSN 0925-1022 *** ISI Impact 0,781 ***
Bauer, L. and Etalle, S. and den Hartog, J.I. and Viganò, L. (2010) Preface of Special Issue on “Computer Security: Foundations and Automated Reasoning”. Journal of Automated Reasoning, 46 (3-4). pp. 223-224. ISSN 0168-7433 *** ISI Impact 2,113 ***
Böhm, K. and Etalle, S. and den Hartog, J.I. and Hütter, C. and Trabelsi, S. and Trivellato, D. and Zannone, N. (2010) A flexible architecture for privacy-aware trust management. Journal of Theoretical and Applied Electronic Commerce Research, 5 (2). pp. 77-96. ISSN 0718-1876
de Beule, J. and Edel, Y. and Käsper, E. and Klein, Andreas and Nikova, S.I. and Preneel, B. and Schillewaert, J. and Storme, L. (2010) Galois geometries and applications. Designs, Codes and Cryptography, 56 (2-3). pp. 85-86. ISSN 0925-1022 *** ISI Impact 0,781 ***
Beumer, G.M. and Veldhuis, R.N.J. (2010) A practical subspace approach to landmarking. Journal of Multimedia, 5 (3). pp. 276-289. ISSN 1796-2048
Beye, M. and Jeckmans, A.J.P. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2010) Literature Overview - Privacy in Online Social Networks. Technical Report TR-CTIT-10-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Boom, B.J. (2010) Face recognition's grand challenge: uncontrolled conditions under control. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 10-185 ISBN 978-90-365-2987-7
Boom, B.J. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2010) Subspace-Based Holistic Registration for Low-Resolution Facial Images. EURASIP Journal on Advances in Signal Processing, 2010. pp. 1-14. ISSN 1687-6172
Brzuska, C. and Busch, H. and Dagdelen, O. and Fischlin, M. and Franz, M. and Katzenbeisser, S. and Manulis, M. and Onete, C. and Peter, A. and Poetering, B. and Schröder, D. (2010) Redactable signatures for tree-structured data: definitions and constructions. In: 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, 22-25 Jun 2010, Beijing, China. pp. 87-104. Lecture Notes in Computer Science 6123. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-13707-5
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Tang, Qiang and Veldhuis, R.N.J. (2010) Embedding Renewable Cryptographic Keys into Noisy Data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262 *** ISI Impact 1,279 ***
van Cleeff, A. (2010) A Risk Management Process for Consumers. Technical Report TR-CTIT-10-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Cleeff, A. (2010) A Risk Management Process for Consumers: The Next Step in Information Security. In: Proceedings of the 2010 Workshop on New Security Paradigms, NSPW 2010, 21-23 Sep 2010, Concord, MA, USA. pp. 107-114. ACM. ISBN 978-1-4503-0415-3
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) ANWB-enquête niet democratisch. NRC handelsblad, 40 (25-01-2010). 6. ISSN 0002-5259
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Gooi eigen servers en pc’s niet weg. Best Practice Magazine, 4 (1). pp. 8-10. ISSN 0891-060X
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Zorg liever voor een overzichtelijk stembiljet. NRC handelsblad, 40 (07-06-2010). pp. 6-6. ISSN 0002-5259
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Benefits of Location-Based Access Control:A Literature Study. In: Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010), 18-20 Dec, 2010, Hangzhou, China. pp. 739-746. IEEE Computer Society. ISBN 978-1-4244-9779-9
Costa, A. (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection. Master's thesis, University of Twente.
Dietzel, S. and Kargl, F. and Heijenk, G.J. and Schaub, F. (2010) On the Potential of Generic Modeling for VANET Data Aggregation Protocols. In: Proceedings of the 2nd IEEE Vehicular Networking Conference, 13-15 Dec 2010, Jersey City, New Jersey, USA. pp. 78-85. IEEE Communications Society. ISBN 978-1-4244-9524-5
Dietzel, S. and Schoch, E. and Kargl, F. and Könings, B. and Weber, M. (2010) Resilient Secure Aggregation for Vehicular Networks. IEEE Network, 24 (1). pp. 26-31. ISSN 0890-8044 *** ISI Impact 2,899 ***
Dimkov, T. and van Cleeff, A. and Pieters, W. and Hartel, P.H. (2010) Two methodologies for physical penetration testing using social engineering. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), 06-10 Dec 2010, Austin, Texas, USA. pp. 399-408. ACM. ISBN 978-1-4503-0133-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: representing attack scenarios spanning through the physical, digital and social domain. In: Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers, 27-28 March 2010, Paphos, Cyprus. pp. 112-129. Lecture Notes in Computer Science 6186. Springer Verlag. ISBN 978-3-642-16074-5
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. Technical Report TR-CTIT-10-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: analyzing multi-domain insider threats. Technical Report TR-CTIT-10-39, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), 4-8 Oct 2010, Chicago, Illinois, US. pp. 666-668. ACM. ISBN 978-1-4503-0245-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations. In: Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010), 18-20 Dec 2010, Hangzhou, China. pp. 727-732. IEEE Computer Society. ISBN 978-1-4244-9779-9
Gong, Zheng (2010) Review of "Robust defenses for cross-site request forgery" by A. Barth, C. Jackson, J. Mitchell. Computing reviews. CR137694. ISSN 1530-6585
Gong, Zheng and Long, Yu and Hong, Xuan and Chen, Kefei (2010) Practical Certificateless Aggregate Signatures From Bilinear Maps. Journal of Information Science and Engineering, 26 (6). pp. 2093-2106. ISSN 1016-2364 *** ISI Impact 0,392 ***
Gong, Zheng and Nikova, S.I. and Law, Yee Wei (2010) KLEIN: A New Family of Lightweight Block Ciphers. Technical Report TR-CTIT-10-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Gong, Zheng and Tang, Qiang and Law, Yee Wei and Chen, Hongyang (2010) KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. In: Proceedings of the International Conference on Information Security and Cryptology, INSCRYPT 2010, 20-24 Oct 2010, Shanghai, China. pp. 268-283. Lecture Notes in Computer Science 6584. Springer Verlag. ISBN 978-3-642-21517-9
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2010) A Log Mining Approach for Process Monitoring in SCADA. Technical Report TR-CTIT-10-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. (2010) MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. In: Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), 15-17 Sep 2010, Ottawa, Canada. pp. 500-501. Lecture Notes in Computer Science 6307. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-15511-6
Hartel, P.H. and Junger, M. and Wieringa, R.J. (2010) Cyber-crime Science = Crime Science + Information Security. Technical Report TR-CTIT-10-34, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Heerde, H.J.W. (2010) Privacy-aware data management by means of data degradation -making private data less sensitive over time. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 10-166 ISBN 978-90-365-3002-6
Hendrikse, A.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2010) The effect of position sources on estimated eigenvalues in intensity modeled data. In: Thirty-first Symposium, 11-12 May 2010, Rotterdam, the Netherlands. pp. 105-112. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 978-90-710-4823-4
Hendrikse, A.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2010) Verification Under Increasing Dimensionality. In: 20th International Conference on Pattern Recognition (ICPR 2010), 23-26 Aug 2010, Istanbul, Turky. pp. 589-592. IEEE Computer Society. ISSN 1051-4651 ISBN 978-0-7695-4109-9
Herrmann, A. and Morali, A. (2010) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization (extended version). Technical Report TR-CTIT-10-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hipp, M. and Schaub, F. and Kargl, F. and Weber, M. (2010) Interaction Weaknesses of Personal Navigation Devices. In: Proceedings of the Second International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI 2010, 11-12 Nov 2010, Pittsburgh, USA. pp. 129-136. ACM. ISBN 978-1-4503-0437-5
Houmb, S.H. and Nunes Leal Franqueira, V. and Engum, E. A. (2010) Quantifying Security Risk Level from CVSS Estimates of Frequency and Impact. Journal of systems and software, 83 (9). pp. 1622-1634. ISSN 0164-1212 *** ISI Impact 1,424 ***
Huisman, M. and Gurov, D. (2010) CVPP: A Tool Set for Compositonal Verification of Control-Flow Safety Properties. In: Formal Verification of Object-Oriented Software (FoVeOOS) 2010., 28 - 30 June 2010. pp. 107-121. Lecture Notes in Computer Science 6528. Springer Verlag. ISBN 978-3-642-18070-5
Ibraimi, L. and Asim, M. and Petkovic, M. (2010) An encryption scheme for a secure policy updating. In: SECRYPT 2010, International Conference on Security and Cryptography, 26-28 Jul 2010, Greece. pp. 399-408. SciTePress. ISBN 978-989-8425-18-8
Ibraimi, L. and Nikova, S.I. and Jonker, W. and Hartel, P.H. (2010) An Identity-Based Group Signature with Membership Revocation in the Standard Model. Technical Report TR-CTIT-10-26, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2010) Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. International Journal of Computational Models and Algorithms in Medicine (IJCMAM), 1 (2). pp. 1-21. ISSN 1947-3133
Jonker, H.L. and Pieters, W. (2010) Anonymity in voting revisited. In: Towards Trustworthy Elections: New Directions in Electronic Voting. Lecture Notes in Computer Science 6000. Springer Verlag, Berlin, pp. 216-230. ISSN 0302-9743 ISBN 978-3-642-12979-7
Kargl, F. and Schaub, F. and Dietzel, S. (2010) Mandatory Enforcement of Privacy Policies using Trusted Computing Principles. In: Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA. pp. 104-109. AAAI. ISBN 978-1-57735-459-8
Könings, B. and Schaub, F. and Kargl, F. and Weber, M. (2010) Towards Territorial Privacy in Smart Environments. In: Proceedings of the Intelligent Information Privacy Management Symposium, AAAI Spring Symposium, Stanford University, USA. pp. 113-118. AAAI. ISBN 978-1-57735-459-8
Keim, D.A. and Pras, A. and Schönwälder, J. and Wong, Pak Chung and Mansmann, F. (2010) Report on the Dagstuhl Seminar on Visualization and Monitoring of Network Traffic. Journal of network and systems management, 18 (2). pp. 232-236. ISSN 1064-7570 *** ISI Impact 1,078 ***
Kelkboom, E.J.C. (2010) On the performance of helper data template protection schemes. PhD thesis, University of Twente. ISBN 978-90-365-3074-3
Kelkboom, E.J.C. and Breebaart, J. and Buhan, I.R. and Veldhuis, R.N.J. (2010) Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source. In: Biometric Technology for Human Identification VII, 5-9 Apr 2010, Orlando, Florida. pp. 1-12. Proceedings of SPIE 7667. SPIE--The International Society for Optical Engineering. ISSN 0277-786X ISBN 978-0-81948-131-3
Kelkboom, E.J.C. and Garcia Molina, G. and Breebaart, J. and Veldhuis, R.N.J. and Kevenaar, T.A.M. and Jonker, W. (2010) Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 40 (3). pp. 555-571. ISSN 1083-4427
Kok, G. (2010) Cloud Computing & Confidentiality. Master's thesis, University of Twente.
Langer, L. and Jonker, H.L. and Pieters, W. (2010) Anonymity and Verifiability in Voting: Understanding (Un)Linkability. In: 12th International Conference Information and Communications Security, ICICS 2010, 15-17 Dec 2010, Barcelona, Spain. pp. 296-310. Lecture Notes in Computer Science 6476. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-17649-4
Leinmüller, T. and Schoch, E. and Kargl, F. and Maihöfer, C. (2010) Decentralized position verification in geographic ad hoc routing. Security and Communication Networks, 3 (4). pp. 289-302. ISSN 1939-0114 *** ISI Impact 0,806 ***
van Liesdonk, P. and Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2010) Computationally Efficient Searchable Symmetric Encryption. In: Proceedings of the Seventh International Workshop on Secure Data Management, SDM 2010, 17 Sep 2010, Singapore. pp. 87-100. Lecture Notes in Computer Science (6358). Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-15545-1
Luo, Y. and Lai, X. and Gong, Zheng (2010) Pseudorandomness analysis of the (extended) Lai–Massey scheme. Information processing letters, 111 (2). pp. 90-96. ISSN 0020-0190 *** ISI Impact 0,605 ***
Ma, Zhendong and Kargl, F. and Weber, M. (2010) Measuring long-term location privacy in vehicular communication systems. Computer communications, 33 (12). pp. 1414-1427. ISSN 0140-3664 *** ISI Impact 2,099 ***
Morali, A. and Wieringa, R.J. (2010) Risk-Based Confidentiality Requirements Specification for Outsourced IT Systems (Extended Version). Technical Report TR-CTIT-10-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Wieringa, R.J. (2010) Risk-Based Confidentiality Requirements Specification for Outsourced IT Systems. In: Proceedings of the 18th IEEE International Requirements Engineering Conference (RE 2010), 27 Sept - 1 Oct 2010, Sydney, Australia. pp. 199-208. IEEE Computer Society. ISBN 978-0-7695-4162-4
Morali, A. and Wieringa, R.J. (2010) Towards Validating Risk Indicators Based on Measurement Theory (Extended version). Technical Report TR-CTIT-10-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Wieringa, R.J. (2010) Towards Validating Risk Indicators Based on Measurement Theory. In: ISSRE 2010 Supplemental Proceedings: 1st International Workshop on Risk and Trust in Extended Enterprises, 01 Nov 2010, USA. pp. 443-447. IEEE Computer Society. ISBN 978-0-7695-4255-3
Morali, A. and Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2010) CRAC: Confidentiality Risk Assessment and IT-Architecture Comparison. In: Proceedings of the 6th International Conference on Network and Service Management (CNSM 2010), 25-29 Oct 2010, Niagara Falls, Canada. pp. 322-325. IEEE Computer Society. ISBN 978-1-4244-8910-7
Nasution, S. and Hartel, P.H. and Suryana, N. and Azman, N. and Shahib, S. (2010) Trust Level and Routing Selection for Mobile Agents in a Smart Home. In: Second International Conference on Computer Modeling and Simulation (ICCMS), 22-24 Jan. 2010, Sanya, China. pp. 445-450. IEEE Computer Society. ISBN 978-0-7695-3941-6
Nunes Leal Franqueira, V. and van Cleeff, A. and van Eck, P.A.T. and Wieringa, R.J. (2010) External Insider Threat: a Real Security Challenge in Enterprise Value Webs. In: Proceedings of the Fifth International Conference on Availability, Reliability and Security (ARES'2010), 15-18 February 2010, Krakow, Poland. pp. 446-453. IEEE Computer Society. ISBN 978-0-7695-3965-2
Nunes Leal Franqueira, V. and Houmb, S.H. and Daneva, M. (2010) Using Real Option Thinking to Improve Decision Making in Security Investment. In: To Appear in the Proceedings of the 5th International Symposium on Information Security (IS'2010 - On The Move Federated Conferences), 25-29 October 2010, Greece. pp. 619-638. Lecture Notes in Computer Science 6426. Springer Verlag. ISSN 0302-9743
Nunes Leal Franqueira, V. and Wieringa, R.J. (2010) Value-driven Security Agreements in Extended Enterprises. Technical Report TR-CTIT-10-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ottenhof, R.H.J. (2010) Towards automated truancy detection. Master's thesis, University of Twente.
Pavlou, G. and Pras, A. (2010) Series editorial: Network and Service Management Series. IEEE Communications Magazine, 48 (7). pp. 84-85. ISSN 0163-6804 *** ISI Impact 5,125 ***
Pavlovic, D. (2010) Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks. In: 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, 16-17 September 2010, Pisa, Italy. pp. 1-17. Lecture Notes in Computer Science 6561. Springer. ISBN 978-3-642-19751-2
Pavlovic, D. (2010) The Unreasonable Ineffectiveness of Security Engineering: An Overview. In: 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010, 13-18 Sep 2010, Pisa, Italy. pp. 12-18. Software Engineering and Formal Methods. IEEE Computer Society. ISBN 978-1-4244-8289-4
Pavlovic, D. and Meadows, C. (2010) Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol. In: Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics (MFPS 2010), 6-10 May 2010, Ottawa, Ontario, Canada . pp. 97-122. Electronic Notes in Theoretical Computer Science 265. Elsevier. ISSN 1571-0661
Pavlovic, D. and Pepper, P. and Smith, D.R. (2010) Formal Derivation of Concurrent Garbage Collectors. In: 10th International Conference on Mathematics of Program Construction, MPC 2010, June 21-23, 2010, Québec City, Canada. pp. 353-376. Springer. ISBN 978-3-642-13321-3
Pieters, W. (2010) ANKH: Information Threat Analysis with Actor-NetworK Hypergraphs. Technical Report TR-CTIT-10-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Explanation and trust: what to tell the user in security and AI? Technical Report TR-CTIT-10-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Security and privacy in the clouds: a bird's eye view. Technical Report TR-CTIT-10-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Reve{a,i}ling the risks: a phenomenology of information security Techné: Research in Philosophy and Technology, 14 (3). pp. 176-188. ISSN 1091-8264
Pieters, W. (2010) Verifiability of electronic voting: between confidence and trust. In: Data Protection in a Profiled World. Springer, Dordrecht, pp. 157-175. ISBN 978-90-481-8864-2
Pieters, W. (2010) Informational precaution. In: 8th Conference on Computing and Philosophy (ECAP10), 4-6 Oct 2010, Munich, Germany. pp. 320-325. Verlag Dr. Hut. ISBN 978-3-86853-546-4
Pieters, W. and Boersma, K. and Alberts, G. and Timmer, J. and Dijkstra, Anne and Popkema, M. (2010) Inzicht en toezicht: controle in de kennissamenleving. In: Inzicht en toezicht: controle in de kennissamenleving. Jaarboek Kennissamenleving (6). Aksant, Amsterdam, pp. 7-17. ISSN 1871-0034 ISBN 978-90-5260-384-1
Pontes Soares Rocha, B. and Bandhakavi, S. and den Hartog, J.I. and Winsborough, W.H. and Etalle, S. (2010) Towards static flow-based declassification for legacy and untrusted programs. In: IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, California. pp. 93-108. IEEE Computer Society. ISBN 978-0-7695-4035-1
Pras, A. and Sperotto, A. and Moreira Moura, G.C. and Drago, I. and Barbosa, R.R.R. and Sadre, R. and de Oliveira Schmidt, R. and Hofstede, R.J. (2010) Attacks by “Anonymous” WikiLeaks Proponents not Anonymous. Technical Report TR-CTIT-10-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Qiu, Weidong and Gong, Zheng and Liu, Bozhong and Long, Yu and Chen, Kefei (2010) Restrictive partially blind signature for resource-constrained information systems. Knowledge and Information Systems, 26 (1). pp. 87-103. ISSN 0219-1377 *** ISI Impact 1,702 ***
Roschke, S. and Ibraimi, L. and Cheng, Feng and Meinel, C. (2010) Secure Communication using Identity Based Encryption. In: Proceedings of the 11th Joint IFIP TC6 and TC 11 Conference on Communications and Multimedia Security (CMS), 31 May - 2 June 2010, Linz, Austria. pp. 256-267. Lecture Notes in Computer Science 6109. Springer Verlag. ISBN 3-642-13240-5
Saffarian, M. and Sadighi, B. (2010) Owner-Based Role-Based Access Control OB-RBAC. In: International Conference on Availability, Reliability, and Security (ARES), 15-18 Feb 2010, Krakow, Poland. pp. 236-241. IEEE Computer Society. ISBN 978-1-4244-5879-0
Schaub, F. and Kargl, F. and Ma, Zhendong and Weber, M. (2010) V-Tokens for Conditional Pseudonymity in VANETs. In: IEEE Wireless Communications and Networking Conference (WCNC 2010), Sydney, Australia. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-6396-1
Schmidt, R.K. and Leinmüller, T. and Schoch, E. and Kargl, F. and Schäfer, G. (2010) Exploration of Adaptive Beaconing for Efficient Intervehicle Safety Communication. IEEE Network, 24 (1). pp. 14-19. ISSN 0890-8044 *** ISI Impact 2,899 ***
Schoch, E. and Bako, B. and Dietzel, S. and Kargl, F. (2010) Dependable and Secure Geocast in Vehicular Networks. In: Proceedings of the Seventh ACM international workshop on VehiculAr InterNETworking, VANET 2010, 24 Sep 2010, Chicago, US. pp. 61-68. ACM. ISBN 978-1-4503-0145-9
Schoch, E. and Kargl, F. (2010) On the Efficiency of Secure Beaconing in VANETs. In: Proceedings of the third ACM conference on Wireless network security (ACM WiSec 2010), Hoboken, New Jersey, USA. pp. 111-116. ACM. ISBN 978-1-60558-923-7
Schwartzenberg, J. (2010) Using Machine Learning Techniques for Advanced Passive Operating System Fingerprinting. Master's thesis, University of Twente.
Sedghi, S. and van Liesdonk, P. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2010) Searching Keywords with Wildcards on Encrypted Data. Technical Report TR-CTIT-10-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and van Liesdonk, P. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2010) Searching Keywords with Wildcards on Encrypted Data. In: Proceedings of the Seventh international Conference on Security and Cryptography for Networks (SCN), 13-15 September 2010, Amalfi, Italy. pp. 138-153. Lecture Notes in Computer Science 6280. Springer Verlag. ISBN 978-3-642-15316-7
Soleimanifard, S. and Gurov, D. and Huisman, M. (2010) Procedure-Modular Verification of Control Flow Safety Properties. In: 12th Workshop on Formal Techniques for Java-like Programs, FTfJP 2010, June 22, 2010, Maribor, Slovenia. 5:1-5:7. ACM. ISBN 978-1-4503-0540-2
Sperotto, A. (2010) Flow-based intrusion detection. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 10-180 ISBN 978-90-365-3089-7
Sperotto, A. and Schaffrath, G. and Sadre, R. and Morariu, C. and Pras, A. and Stiller, B. (2010) An Overview of IP Flow-Based Intrusion Detection. IEEE Communications Surveys & Tutorials, 12 (3). pp. 343-356. ISSN 1553-877X *** ISI Impact 9,220 ***
Tan, Zhiyuan and Jamdagni, Aruna and Nanda, Priyadarsi and He, Xiangjian and Liu, Ren Ping and Jia, Wenjing and Yeh, Wei-chang (2010) A two-tier system for web attack detection using linear discriminant method. In: Information and Communications Security. Lecture Notes in Computer Science 6476. Springer Verlag, Berlin, pp. 459-471. ISSN 0302-9743
Tang, Qiang (2010) From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. Technical Report TR-CTIT-10-01, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2010) User-friendly matching protocol for online social networks. In: ACM Conference on Computer and Communications Security, 4-8 Oct 2010, Chicago, IL, USA. pp. 732-734. ACM. ISBN 978-1-4503-0245-6
Tang, Qiang (2010) Privacy Preserving Mapping Schemes Supporting Comparison. In: ACM Cloud Computing Security Workshop (CCSW), 9 Oct 2010, Chicago, Illinois. pp. 53-58. ACM. ISBN 978-1-4503-0089-6
Tang, Qiang and Jeckmans, A.J.P. (2010) On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. Technical Report TR-CTIT-10-02, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang and Jeckmans, A.J.P. (2010) Efficient Client Puzzle Schemes to Mitigate DoS Attacks. In: International Conference on Computational Intelligence and Security (CIS 2010), 11-14 dec 2010, Nanning, China. pp. 293-297. IEEE Computational Intelligence Society. ISBN 978-1-4244-9114-8
Tao, Qian and Veldhuis, R.N.J. (2010) Biometric Authentication System on Mobile Personal Devices. IEEE transactions on instrumentation and measurement, 59 (4). pp. 763-773. ISSN 0018-9456 *** ISI Impact 1,808 ***
van Vliet, F. (2010) Threat Detection Systems. Master's thesis, University of Twente.
van Wanrooij, W. and Pras, A. (2010) Filtering spam from bad neighborhoods. International Journal of Network Management, 20 (6). pp. 433-444. ISSN 1055-7148 *** ISI Impact 0,681 ***
Wiedersheim, B. and Kargl, F. and Ma, Zhendong and Papadimitratos, P. (2010) Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough. In: The Seventh International Conference on Wireless On-demand Network Systems and Services (WONS 2010), Kranska Gora, Slovenia. pp. 176-183. IEEE Computer Society. ISBN 978-1-4244-6059-5
Xu, Haiyun (2010) Spectral Minutiae Representations for Fingerprint Recognition. PhD thesis, University of Twente. ISBN 978-90-365-3080-4
Xu, Haiyun and Veldhuis, R.N.J. (2010) Complex Spectral Minutiae Representation For Fingerprint Recognition. In: Proceedings of IEEE CVPR Workshop on Biometrics, 13-18 Jun 2010, San Francisco, CA, USA. pp. 1-8. IEEE Computer Society. ISBN 978-1-4244-7029-7
Xu, Haiyun and Veldhuis, R.N.J. (2010) Binary Representations of Fingerprint Spectral Minutiae Features. In: 20th International Conference on Pattern Recognition (ICPR 2010), 23-26 August 2010, Istanbul, Turkey. 1212-1216 . IEEE Computer Society. ISBN 978-1-4244-7542-1
Xu, Haiyun and Veldhuis, R.N.J. (2010) Binary spectral minutiae representation with multi-sample fusion for fingerprint recognition. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, 9-10 Sep 2010, Rome, Italy. pp. 73-80. ACM. ISBN 978-1-4503-0286-9
Xu, Haiyun and Veldhuis, R.N.J. (2010) Spectral Minutiae Representations for Fingerprint Recognition. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 15-17 Oct 2010, Darmstadt, Germany. pp. 341-345. IEEE Computer Society. ISBN 978-1-4244-8378-5
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2010) A2THOS: Availability Analysis and Optimisation in SLAs Technical Report TR-CTIT-10-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zannone, N. and Petkovic, M. and Etalle, S. (2010) Towards Data Protection Compliance. In: Proceedings of the 5th International Conference on Security and Cryptography (SECRYPT 2010), 26-28 July 2010, Athens, Greece. pp. 213-216. SciTePress. ISBN 978-989-8425-18-8

2009

Papadopouli, M. and Owezarski, P. and Pras, A., ed. (2009) Traffic Monitoring and Analysis: Proceedings of the First International Traffic Monitoring and Analysis Workshop (TMA2009). Lecture Notes in Computer Science 5537. Springer Verlag, Heidelberg, pp. 1-134. ISBN 978-3-642-01644-8
Preneel, B. and Dodunekov, S. and Rijmen, V. and Nikova, S.I., ed. (2009) Enhancing cryptographic primitives with techniques from error correcting codes. NATO Science for Peace and Security Series D - Information and Communication Security 23. IOS Press, Amsterdam. ISSN 1874-6268 ISBN 978-1-60750-002-5
Sadre, R. and Pras, A., ed. (2009) Scalability of Networks and Services: Proceedings of the Third International Conference on Autonomous Infrastructure, Management and Security (AIMS 2009). Lecture Notes in Computer Science 5637. Springer Verlag, Heidelberg, pp. 1-211. ISSN 0302-9743 ISBN 978-3-642-02626-3
Beumer, G.M. (2009) Face recognition, a landmarks tale. PhD thesis, University of Twente. ISBN 978-90-365-2891-7
Bolzoni, D. (2009) Revisiting Anomaly-based Network Intrusion Detection Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-147 ISBN 978-90-365-2853-5
Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. Technical Report TR-CTIT-09-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. In: Recent Advances in Intrusion Detection (RAID). pp. 1-20. Lecture Notes in Computer Science 5758. Springer Verlag. ISBN 978-3-642-04341-3
Boom, B.J. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2009) Model-Based Illumination Correction for Face Images in Uncontrolled Scenarios. In: Computer Analysis of Images and Patterns 2009, 2-4 Sep 2009, Munster. pp. 33-40. Lecture Notes in Computer Science 5702/2009. Springer Verlag. ISBN 978-3-642-03766-5
Boom, B.J. and Tao, Qian and Spreeuwers, L.J. and Veldhuis, R.N.J. (2009) Combining Illumination Normalization Methods for Better Face Recognition. In: The 3rd IAPR/IEEE International Conference on Biometrics, 2 Jun - 5 Jun 2009, Alghero, Italy. pp. 404-413. Lecture Notes in Computer Science Advances in Biometrics (Volume 5558/2009). Springer Verlag. ISBN 978-3-642-01792-6
Buhan, I.R. and Boom, B.J. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2009) Secure pairing with biometrics. International Journal of Security and Networks, 4 (1/2). pp. 27-42. ISSN 1747-8405
Chen, Chun and Veldhuis, R.N.J. (2009) Binary Biometric Representation through Pairwise Polar Quantization. In: Advances in Biometrics. Lecture Notes in Computer Science 5558. Springer Verlag, Berlin, pp. 72-81. ISBN 978-3-642-01792-6
Chen, Chun and Veldhuis, R.N.J. and Kevenaar, T.A.M. and Akkermans, A.H.M. (2009) Biometric Quantization through Detection Rate Optimized Bit Allocation. EURASIP Journal on Advances in Signal Processing, 2009. 784834. ISSN 1687-6172
Chrząszcz, J. and Huisman, M. and Schubert, A. (2009) BML and Related Tools. In: Formal Methods for Components and Objects, 21-23 Oktober 2008, Sophia Antipolis, France. pp. 278-297. Lecture Notes in Computer Science 5751. Springer Verlag. ISBN 978-3-642-04166-2
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Security Implications of Virtualization: A Literature Study. Technical Report TR-CTIT-09-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Security Implications of Virtualization: A Literature Study. In: 2009 IEEE International Conference on Computational Science and Engineering (CSE09), volume 3, 29 Aug - 31 Aug, Vancouver, BC, Canada. pp. 353-358. IEEE Computer Society. ISBN 978-0-7695-3823-5
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Gooi eigen servers en pc's niet weg. TIEM, Tijdschrift voor Informatie en Management, 34. pp. 8-9. ISSN 1572-5472
van Cleeff, A. and Wieringa, R.J. (2009) Rethinking De-Perimeterisation: Problem Analysis And Solutions. In: Proceedings of the IADIS International Conference Information Systems 2009, 25-27 Feb 2009, Barcelona. pp. 105-112. IADIS press. ISBN 978-972-8924-79-9
Czenko, M.R. (2009) TuLiP : reshaping trust management. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-148 ISBN 978-90-365-2854-2
Czenko, M.R. and Etalle, S. (2009) LP with Flexible Grouping and Aggregates Using Modes. In: 19th International Symposium, LOPSTR, Revised Selected Papers, 9-11 Sep 2009, Coimbra, Portugal. pp. 67-81. LNCS 6037. Springer. ISBN 978-3-642-12591-1
Damjanović, S. and van der Heijden, F. and Spreeuwers, L.J. (2009) A new likelihood function for stereo matching: how to achieve invariance to unknown texture, gains and offsets? In: VISIGRAPP 2009, International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 5-8 Feb 2009, Lisboa, Portugal. pp. 603-608. INSTICC Press. ISBN 978-989-8111-74-6
Dekker, M.A.C. (2009) Flexible Access Control for Dynamic Collaborative Environments. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-159 ISBN 978-90-365-2950-1
Dimkov, T. (2009) The key-free society. In: Living the ICT future. Centre for Telematics and Information Technology University of Twente, Enschede, pp. 28-29. ISBN 978-90-365-2963-1
Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain. Technical Report TR-CTIT-09-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Two methodologies for physical penetration testing using social engineering. Technical Report TR-CTIT-09-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Winsborough, W.H. (2009) Maintaining control while delegating trust: Integrity constraints in trust management. ACM Transactions on Information and System Security, 13 (1). 5:1-5:27. ISSN 1094-9224 *** ISI Impact 0,759 ***
Georg, G. and Ray, I. and Anastasakis, K. and Bordbar, B. and Toahchoodee, M. and Houmb, S.H. (2009) An aspect-oriented methodology for designing secure applications. Information and Software Technology, 50 (5). pp. 846-864. ISSN 0950-5849 *** ISI Impact 1,569 ***
Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) TuLP: A Family of Secure and Practical Message Authentication Codes for Body Sensor Networks. Technical Report TR-CTIT-09-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) Towards Secure and Practical MACs for Body Sensor Networks. In: 10th International Conference on Cryptology in India (INDOCRYPT), 13-16 Dec 2009, New Delhi, India. pp. 182-198. Lecture Notes in Computer Science 5922. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-10627-9
Haverkort, B.R.H.M. and Remke, A.K.I. and Hartel, P.H. (2009) Betere beveiliging Scada-systemen vitaal voor Nederlandse infrastructuren. Bits en chips, 11 (16). pp. 23-23. ISSN 1879-6443
van Heerde, H.J.W. and Fokkinga, M.M. and Anciaux, N.L.G. (2009) A framework to balance privacy and data usability using data degradation. In: Proceedings of the International Conference on Computational Science and Engineering (CSE2009), 29-31 Aug 2009, Vancouver, Canada. pp. 146-153. IEEE Computer Society. ISBN 978-0-7695-3823-5
Hendrikse, A.J. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2009) A Bootstrap Approach to Eigenvalue Correction. In: Ninth IEEE International Conference on Data Mining, 2009. ICDM '09., 6-9 Dec. 2009, Miami Beach, FL, USA. pp. 818-823. IEEE Computer Society. ISSN 1550-4786 ISBN 978-1-4244-5242-2
Hendrikse, A.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2009) Improved variance estimation along sample eigenvectors. In: Proceedings of the 30th Symposium on Information Theory in the Benelux, 28-29 May 2009, Eindhoven, The Netherlands. pp. 25-32. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 978-90-386-1852-4
Hendrikse, A.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. and Bazen, A.M. (2009) Analysis of eigenvalue correction applied to biometrics. In: Advances in Biometrics, 02-05 June 2009, Alghero, Italy. pp. 189-198. Lecture Notes in Computer Science 5558/2009. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-01792-6
Houmb, S.H. and Nunes Leal Franqueira, V. (2009) Estimating ToE Risk Level using CVSS. In: Proceedings of the Fourth International Conference on Availability, Reliability and Security (ARES 2009 - The International Dependability Conference), 16-19 March 2009, Fukuoka, Japan. pp. 718-725. IEEE Conference Proceedings. IEEE Computer Society. ISSN 1077-2626 ISBN 978-0-7695-3564-7
Huisman, M. (2009) On the Interplay between the Semantics of Java's Finally Clauses and the JML Run-Time Checker. In: Proceedings of the 11th International Workshop on Formal Techniques for Java-like Programs, July 5, 2009, Genua. 8:1-8:6. ACM. ISBN 978-1-60558-540-6
Huisman, M. and Aldrich, J. and Barnett, M. and Giannakopoulou, D. and Leavens, G.T. and Sharagyna, N. (2009) Foreword. In: SAVCBS '09 - Proceedings of the 8th International Workshop on Specification and Verification of Component-Based Systems, 25 August 2009, Amsterdam. pp. 3-3. ACM. ISBN 978-1-60558-680-9
Ibraimi, L. and Asim, M. and Petkovic, M. (2009) Secure Management of Personal Health Records by Applying Attribute-Based Encryption. Technical Report TR-CTIT-09-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Petkovic, M. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and its Application (extended version). Technical Report TR-CTIT-09-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Petkovic, M. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In: Information Security Applications, 25-27 August 2009, Busan, Korea. pp. 309-323. Lecture Notes in Computer Science 5932/2009. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-10837-2
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. In: 5th Information Security Practice and Experience Conference (ISPEC), 12-15 April 2009, Xi'an, China. pp. 1-12. Lecture Notes in Computer Science 5451. Springer. ISSN 0302-9743 ISBN 978-3-642-00842-9
Jacobs, B.P.F. and Pieters, W. (2009) Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. In: Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures. Lecture Notes in Computer Science 5705. Springer Verlag, Berlin, pp. 121-144. ISSN 0302-9743 ISBN 978-3-642-03828-0
Jeckmans, A.J.P. (2009) Practical Client Puzzle from Repeated Squaring. Master's thesis, University of Twente.
Jonker, W. and Brinkman, R. and Maubach, S. (2009) Secure storage system and method for secure storing. Patent WO2007125454 (Assigned).
Jonker, W. and Petkovic, M. (2009) Preface. Journal of Computer Security, 17 (1). pp. 1-3. ISSN 0926-227X
Kelkboom, E.J.C. and de Groot, K.T.J. and Chen, Chun and Breebaart, J. and Veldhuis, R.N.J. (2009) Pitfall of the Detection Rate Optimized Bit Allocation within template protection and a remedy. In: IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, 2009. BTAS '09., 28-30 Sep 2009, Washington, DC, USA. pp. 1-8. IEEE Computer Society. ISBN 978-1-4244-5019-0
Kelkboom, E.J.C. and Zhou, Xuebing and Breebaart, J. and Veldhuis, R.N.J. and Busch, C. (2009) Multi-algorithm fusion with template protection. In: IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, 2009. BTAS '09., 28-30 Sep 2009, Washington, DC, USA. pp. 1-8. IEEE Computer Society. ISBN 978-1-4244-5019-0
Morali, A. and Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2009) CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks (extended version). Technical Report TR-CTIT-09-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Houmb, S.H. and Sallhammar, K. and Etalle, S. (2009) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. In: 31st International Conference on Software Engineering - Companion Volume, 16-24 May 2009, Vancouver, Canada. pp. 130-140. IEEE Computer Society. ISBN 978-1-4244-3494-7
Moreira Moura, G.C. and Pras, A. (2009) Scalable Detection and Isolation of Phishing. In: Proceedings of the Third International Conference on Autonomous Infrastructure, Management and Security (AIMS 2009), 30 Jun - 02 Jul 2009, Enschede, The Netherlands. pp. 195-198. Lecture Notes in Computer Science 5637. Springer Verlag. ISBN 978-3-642-02626-3
Nasution, S. and Hartel, P.H. and Suryana, N. and Azman, N. and Shahib, S. (2009) Trust Level and Routing Selection for Mobile Agents in a Smart Home (Extended version). Technical Report TR-CTIT-09-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nasution, S. and Suryana, N. and Shahib, S. and Abu, N.A. and Hartel, P.H. (2009) The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home. In: International Technology, Education and Development Conference (INTED), 9-11 March 2009, Valencia, Spain. 702. International Association of Technology, Education and Development (IATED). ISBN 978-84-612-7578-6
Nunes Leal Franqueira, V. (2009) Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-154 ISBN 978-90-365-2923-5
Nunes Leal Franqueira, V. and van Eck, P.A.T. and Wieringa, R.J. and Lopes, R.H.C. (2009) A Mobile Ambients-based Approach for Network Attack Modelling and Simulation. In: Proceedings of the Fourth International Workshop on Dependability Aspects on Data Warehousing and Mining applications, DAWAM 2009 (in conjunction with ARES 2009, The Fourth International Conference on Availability, Reliability and Security), 16-19 Mar 2009, Fukuoka, Japan. pp. 546-553. IEEE Computer Society. ISBN 978-0-7695-3564-7
Nunes Leal Franqueira, V. and Lopes, R.H.C. and van Eck, P.A.T. (2009) Multi-step Attack Modelling and Simulation (MsAMS) Framework based on Mobile Ambients. In: Proceeding of the 24th Annual ACM Symposium on Applied Computing, SAC'2009, 08-12 March 2009, Honolulu, Hawaii, USA. pp. 66-73. ACM. ISBN 978-1-60558-166-8
Pavlou, G. and Pras, A. (2009) Series editorial: Topics in network and service management. IEEE Communications Magazine, 47 (7). pp. 18-19. ISSN 0163-6804 *** ISI Impact 5,125 ***
Pieters, W. (2009) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2009 (3). pp. 23-25. ISSN 1569-1063
Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. Technical Report TR-CTIT-09-21, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2009) Converging technologies and de-perimeterisation: towards risky active insulation. In: Proceedings of SPT 2009: Converging technologies, changing societies, 7-10 Jul 2009, Enschede, The Netherlands. pp. 58-60. CEPTES, University of Twente. ISBN not assigned
Pieters, W. (2009) Reve{a,i}ling the risks: a phenomenology of information security Technical Report TR-CTIT-09-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. In: E-Voting and Identity: Second International Conference, VOTE-ID 2009, 7-8 Sep 2009, Luxembourg city, Luxembourg. pp. 172-190. Lecture Notes in Computer Science 5767. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-04134-1
Pieters, W. and van Cleeff, A. (2009) The Precautionary Principle in a World of Digital Dependencies. IEEE Computer, 42 (6). pp. 50-56. ISSN 0018-9162 *** ISI Impact 1,115 ***
Pieters, W. and van Cleeff, A. (2009) The precautionary principle in a world of digital dependencies. Technical Report TR-CTIT-09-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and van Cleeff, A. and Wieringa, R.J. (2009) Voor goede keuzes heb je tijd nodig. Trouw, 67 (19855, 5 Aug 2009). 25. ISSN not assigned
Pieters, W. and Consoli, L. (2009) Vulnerabilities and responsibilities: dealing with monsters in computer security. Journal of information, communication and ethics in society, 7 (4). pp. 243-257. ISSN 1477-996X
Pieters, W. and Popkema, M. and Broekhans, B. and Dijkstra, Anne and Boersma, K. and Alberts, G. (2009) Gevoel voor kennis: emoties in de kennissamenleving. In: Gevoel voor kennis. Jaarboek Kennissamenleving 5. Aksant, Amsterdam, pp. 7-20. ISSN 1871-0034 ISBN 978-90-5260-351-3
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. Technical Report TR-CTIT-09-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada. pp. 240-251. Lecture Notes in Computer Science 5645. Springer Verlag. ISBN 978-3-642-03006-2
Pras, A. and Sadre, R. and Sperotto, A. and Fioreze, T. and Hausheer, D. and Schoenwaelder, J. (2009) Using NetFlow/IPFIX for Network Management. Journal of Network and Systems Management, 17 (4). pp. 482-487. ISSN 1064-7570 *** ISI Impact 1,078 ***
Saffarian, M. and Tang, Qiang and Jonker, W. and Hartel, P.H. (2009) Dynamic User Role Assignment in Remote Access Control. Technical Report TR-CTIT-09-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and van Liesdonk, P. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2009) Adaptively Secure Computationally Efficient Searchable Symmetric Encryption. Technical Report TR-CTIT-09-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sperotto, A. and Sadre, R. and de Boer, P.T. and Pras, A. (2009) Hidden Markov Model modeling of SSH brute-force attacks. In: Integrated Management of Systems, Services, Processes and People in IT, Proceedings of the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2009, October 27-28, 2009, Venice, Italy. pp. 164-176. Lecture Notes in Computer Science 5841/2009. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-04988-0
Sperotto, A. and Sadre, R. and van Vliet, D.F. and Pras, A. (2009) A Labeled Data Set For Flow-based Intrusion Detection. In: IP Operations and Management, Proceedings of the 9th IEEE Intenational Workshop IPOM 2009, October 29-30, 2009, Venice, Italy. pp. 39-50. Lecture Notes in Computer Science 5843/2009. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-04967-5
Sperotto, A. and Vliek, G. and Sadre, R. and Pras, A. (2009) Detecting Spam at the Network Level. In: Proceedings of the 15th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2009, 7-9 Sep 2009, Barcelona. pp. 208-216. Lecture Notes in Computer Science 5733. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-03699-6
Spiessens, F. and den Hartog, J.I. and Etalle, S. (2009) Know what you trust. In: Formal Aspects in Security and Trust, 5th International Workshop, Malaga, Spain. pp. 129-142. Lecture Notes in Computer Science 5491. Springer Verlag. ISBN 978-3-642-01464-2
Tang, Qiang (2009) Timed-Ephemerizer: Make Assured Data Appear and Disappear. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. pp. 195-208. Lecture Notes in Computer Science 6391. Springer Verlag. ISBN 978-3-642-16440-8
Tang, Qiang and Chen, Liqun (2009) Public-key Encryption with Registered Keyword Search. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. pp. 163-178. Lecture Notes in Computer Science 6391. Springer Verlag. ISBN 3-642-16440-4
Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Inter-domain Identity-Based Proxy Re-encryption. In: Information Security and Cryptology, 4th International Conference (Inscrypt), December 14-17, 2008, Beijing China. pp. 332-347. Lecture Notes in Computer Science 5487. Springer Verlag. ISBN 978-3-642-01439-0
Tao, Qian (2009) Face Verification for Mobile Personal Devices. PhD thesis, University of Twente. ISBN 978-90-365-2793-4
Tao, Qian and Veldhuis, R.N.J. (2009) Threshold-optimized decision-level fusion and its application to biometrics. Pattern Recognition, 42 (5). pp. 823-836. ISSN 0031-3203 *** ISI Impact 3,399 ***
Trivellato, D. and Spiessens, A.O.D. and Zannone, N. and Etalle, S. (2009) Reputation-based ontology alignment for autonomy and interoperability in distributed access control. In: Proceedings 12th IEEE International conference on Computational Science and Engineering, 29-31 Aug. 2009, Vancouver BC, Canada. pp. 252-258. IEEE. ISBN 978-0-7695-3823-5
Trivellato, D. and Spiessens, A.O.D. and Zonnone, N. and Etalle, S. (2009) POLIPO: Policies & ontologies for interoperability, portability, and autonomy. In: IEEE International Symposium on Policies for Distributed Systems and Networks, 20-22 July 2009, London, UK. pp. 110-113. IEEE. ISBN 978-0-7695-3742-9
Weng, J. and Yang, Yanjiang and Tang, Qiang and Deng, R. and Bao, F. (2009) Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. In: Information Security - 12th International Conference, ISC, Pisa, Italy, September 7-9, 2009, Pisa, Italy. pp. 151-166. Lecture Notes in Computer Science 5735. Springer Verlag. ISBN 978-3-642-04473-1
Xu, Haiyun and Veldhuis, R.N.J. (2009) Spectral Representations of Fingerprint Minutiae Subsets. In: 2nd International Congress on Image and Signal Processing, 2009. CISP '09., 17-19 Oct. 2009, Tianjing, China. pp. 1-5. IEEE Computer Society. ISBN 978-1-4244-4131-0
Xu, Haiyun and Veldhuis, R.N.J. (2009) Spectral minutiae representations of fingerprints enhanced by quality data. In: Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on, 28-30 Sep 2009, Washington DC, USA. pp. 1-5. IEEE Computer Society. ISBN 978-1-4244-5020-6
Xu, Haiyun and Veldhuis, R.N.J. and Bazen, A.M. and Kevenaar, T.A.M. and Akkermans, A.H.M. and Gökberk, B. (2009) Fingerprint Verification Using Spectral Minutiae Representations. IEEE Transactions on Information Forensics and Security, 4 (3). pp. 397-409. ISSN 1556-6013 *** ISI Impact 2,441 ***
Xu, Haiyun and Veldhuis, R.N.J. and Kevenaar, T.A.M. and Akkermans, A.H.M. (2009) A quality integrated spectral minutiae fingerprint recognition system. In: Proceedings of the 30th symposium on information theory in the Benelux, 28-29 May 2009, Eindhoven, the Netherlands. pp. 19-24. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 978-90-386-1852-4
Xu, Haiyun and Veldhuis, R.N.J. and Kevenaar, T.A.M. and Akkermans, A.H.M. (2009) A Fast Minutiae-Based Fingerprint Recognition System. IEEE Systems journal, 3 (4). pp. 418-427. ISSN 1932-8184 *** ISI Impact 2,114 ***
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. and Hartel, P.H. (2009) Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures. Technical Report TR-CTIT-09-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2008

Anciaux, N.L.G. and Bouganim, L. and van Heerde, H.J.W. and Pucheral, P. and Apers, P.M.G. (2008) InstantDB: Enforcing Timely Degradation of Sensitive Data. In: Proceedings of the 24th International Conference on Data Engineering (ICDE2008), 7-12 April 2008, Cancun, Mexico. pp. 1373-1375. IEEE Computer Society. ISBN 978-1-4244-1837-4
Anciaux, N.L.G. and Bouganim, L. and van Heerde, H.J.W. and Pucheral, P. and Apers, P.M.G. (2008) Data Degradation: Making Private Data Less Sensitive Over Time. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM2008), 26-30 Oct 2008, Napa valley, California, USA. pp. 1401-1402. ACM. ISBN 978-1-59593-991-3
Anciaux, N.L.G. and Bouganim, L. and van Heerde, H.J.W. and Pucheral, P. and Apers, P.M.G. (2008) The Life-Cycle Policy model. Research report RR-6577, Institut National de Recherche en Informatique et en Automatique, Rocquencourt, France. ISSN 0249-6399
Barosso, D. and Bartle, R. and Chazeran, C. and de Zwart, M. and Doumen, J.M. and Gorniak, S. and Kaźmierczak, M. and Kaskenmaa, M. and Benavente López, D. and Martin, A. and Naumann, I. and Reynolds, R. and Richardson, J. and Rossow, C. and Rywczyoska, A. and Thumann, M. (2008) Security and privacy in massively-multiplayer online games and social and corporate virtual worlds. ENISA Position Paper 1 ENISA (European Network and Information Security Agency), Crete. ISSN not assigned
Bolzoni, D. and Crispo, B. and Etalle, S. (2008) ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems. Technical Report TR-CTIT-08-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. (2008) Approaches in Anomaly-based Network Intrusion Detection Systems. In: Intrusion Detection Systems. Advances in Information Security 38. Springer Verlag, London, pp. 1-16. ISBN 978-0-387-77265-3
Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. Technical Report TR-CTIT-08-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. In: Confederated International Conferences On the Move to Meaningful Internet Systems (OTM), November 9-14, 2008, Monterrey, Mexico. pp. 938-955. Lecture Notes in Computer Science 5332. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-88872-7
Boom, B.J. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2008) Model-based reconstruction for illumination variation in face images. In: 8th IEEE International Conference on Automatic Face and Gesture Recognition, 17 Sept - 19 Sept 2008, Amsterdam, The Netherlands. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-2154-1
Buhan, I.R. (2008) Cryptographic keys from noisy data, theory and applications. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 08-129 ISBN 978-9-03652-738-5
Buhan, I.R. (2008) A New Secure Pairing Protocol using Biometrics. Technical Report TR-CTIT-08-63, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. (2008) Controlling Leakage of Biometric Information using Dithering. In: 16th European Signal Processing Conference, 25-29 Aug 2008, Lausanne, Switzerland. 1569105382. EUSIPCO. EURASIP, European Association for Signal, Speech and Image Processing. ISBN 978-2-8399-0450-6
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Tang, Qiang and Veldhuis, R.N.J. (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, 20 - 22 October, 2008, Birmingham, UK. pp. 294-310. Lecture Notes in Computer Science 5308. Springer. ISBN 978-3-540-88624-2
Chen, Chun and Veldhuis, R.N.J. (2008) Performances of the likelihood-ratio classifier based on different data modelings. In: 10th International Conference on Control, Automation, Robotics and Vision, 2008. ICARCV 2008., 17-20 Dec 2008, Hanoi, Vietnam. pp. 1347-1351. IEEE Computer Society. ISBN 978-1-4244-2287-6
Chen, Chun and Veldhuis, R.N.J. and Kevenaar, T.A.M. and Akkermans, A.H.M. (2008) Biometric binary string generation with detection rate optimized bit allocation. In: 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Workshop on Biometrics, 24-28 Jun 2008, Anchorage, Alaska, US. pp. 1-7. IEEE Computer Society. ISBN 978-1-4244-2340-8
van Cleeff, A. (2008) Future consumer mobile phone security: A case study using the data-centric security model. Information Security Technical Report, 13 (3). pp. 112-117. ISSN 1363-4127
van Cleeff, A. and Wieringa, R.J. (2008) De-perimeterisation as a cycle: tearing down and rebuilding security perimeters. Technical Report TR-CTIT-08-65, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2008) Trust Management in P2P systems using Standard TuLiP. Technical Report TR-CTIT-08-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2008) Trust Management in P2P Systems Using Standard TuLiP. In: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway. pp. 1-16. IFIP International Federation for Information Processing 263/2008. Springer. ISSN 1571-5736 ISBN 978-0-387-09427-4
Czenko, M.R. and Etalle, S. (2008) LP with Flexible Grouping and Aggregates Using Modes. Technical Report TR-CTIT-08-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Crampton, J. and Etalle, S. (2008) RBAC administration in distributed systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, 11-13 June 2008, Estes Park, Colorado, USA. pp. 93-102. ACM. ISBN 978-1-60558-129-3
Delvaux, N. and Chabanne, H. and Bringer, J. and Kindarji, B. and Lindeberg, P. and Midgren, J. and Breebaart, J. and Akkermans, A.H.M. and van der Veen, M. and Veldhuis, R.N.J. and Kindt, E. and Simoens, K. and Busch, C. and Bours, P. and Gafurov, D. and Yang, Bian and Stern, J. and Rust, C. and Cucinelli, B. and Skepastianos, D. (2008) Pseudo Identities Based on Fingerprint Characteristics. In: Intelligent Information Hiding and Multimedia Signal Processing, 2008, IIHMSP '08 International Conference, 15-17 Aug 2008, Harbin, China. pp. 1063-1068. IEEE Computer Society. ISBN 978-0-7695-3278-3
Dimkov, T. and Tang, Qiang and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. In: Proceedings of the Workshop on Modeling Security (MODSEC08), 28 Sep 2008, Toulouse. 18. CEUR Workshop Proceedings. ISSN 1613-0073
Dimkov, T. and Tang, Qiang and Hartel, P.H. (2008) Inability of existing security models to cope with data mobility in dynamic organizations. Technical Report TR-CTIT-08-57, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. (2008) Nice to know. Technical University of Eindhoven, Eindhoven. ISBN 978-90-386-1427-4
Gong, Zheng and Lai, X.J. and Chen, Kefei (2008) On the Design of Secure and Fast Double Block Length Hash Functions. Technical Report TR-CTIT-08-71, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Gong, Zheng and Long, Yu and Hong, Xuan and Chen, Kefei (2008) Practical Certificateless Aggregate Signatures From Bilinear Maps. Technical Report TR-CTIT-08-74, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and Abelmann, L. and Khatib, M.G. (2008) Towards Tamper-Evident Storage on Patterned Media. In: 6th USENIX Conf. on File and Storage Technologies (FAST), Feb. 26-29, 2008, San Jose, California. pp. 283-296. USENIX Association. ISBN 978-1-931971-56-0
Hendrikse, A.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2008) Eigenvalue correction results in face recognition. In: Proceedings of the 29th Symposium on Information Theory in the Benelux, 29-30 May 2008, Leuven, Belgium. pp. 27-35. wic. ISBN 978-90-9023135-8
Houmb, S.H. and Nunes Leal Franqueira, V. and Engum, E.A. (2008) Estimating Impact and Frequency of Risks to Safety and Mission Critical Systems Using CVSS. In: ISSRE 2008 Supplemental Proceedings: 1st Workshop on Dependable Software Engineering, 11 November 2008, Seattle, US. IEEE Computer Society. ISBN 978-1-4244-3417-6
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. Technical Report TR-CTIT-08-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: Proceedings of the 5th VLDB Workshop, SDM 2008, August 24, 2008, Auckland, New Zealand. pp. 185-198. Lecture Notes in Computer Science 5159. Springer Verlag. ISBN 978-3-540-85258-2
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. Technical Report TR-CTIT-08-75, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kelkboom, E.J.C. and Garcia Molina, G. and Kevenaar, T.A.M. and Veldhuis, R.N.J. and Jonker, W. (2008) Binary Biometrics: An Analytic Framework to Estimate the Bit Error Probability under Gaussian Assumption. In: Biometrics: Theory, Applications and BTAS 2008. 2nd IEEE International Conference on Biometrics: Theory Applications and Systems, 2008., 29 Sep - 1 Oct 2008, Washington, USA. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-2729-1
Law, Yee Wei and Moniava, G. and Gong, Zheng and Hartel, P.H. and Palaniswami, M. (2008) KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks. Technical Report TR-CTIT-08-67, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Etalle, S. and Overbeek, P. (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. Technical Report TR-CTIT-08-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Etalle, S. and Overbeek, P. (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. In: Third IEEE International Workshop on Business-Driven IT Management, 07 Apr 2008, Salvador, Brazil. pp. 31-40. IEEE Computer Society. ISBN 978-1-4244-2191-6
Morali, A. and Zambon, Emmanuele and Houmb, S.H. and Sallhammar, K. and Etalle, S. (2008) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. Technical Report TR-CTIT-08-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nikova, S.I. and Rijmen, V. and Schlaffer, M. (2008) Using normal bases for compact hardware implementations of the AES S-box. In: 6th International Conference Security in Communication Networks (SCN), 10-12 Sep 2008, Amalfi, Italy. pp. 236-245. Lecture Notes in Computer Science 5229. Springer Verlag. ISBN 978-3-540-85854-6
Nunes Leal Franqueira, V. and van Keulen, M. (2008) Analysis of the NIST database towards the composition of vulnerabilities in attack scenarios. Technical Report TR-CTIT-08-08, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nunes Leal Franqueira, V. and Lopes, R.H.C. and van Eck, P.A.T. (2008) Multi-step Attack Modelling and Simulation (MsAMS) Framework based on Mobile Ambients. Technical Report TR-CTIT-08-44, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sadre, R. and Haverkort, B.R.H.M. (2008) Fitting heavy-tailed HTTP traces with the new stratified EM-algorithm. In: 4th International Telecommunication Networking Workshop on QoS in Multiservice IP Networks (IT-NEWS), 13-15 Feb 2008, Venice, Italy. pp. 254-261. IEEE Computer Society. ISBN 978-1-4244-1845-9
Sadre, R. and Haverkort, B.R.H.M. (2008) Changes in the Web from 2000 to 2007. In: Managing Large-Scale Service Deployment, 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, 22-26 Sep 2008, Samos Island, Greece. pp. 136-148. Lecture Notes in Computer Science 5273. Springer Verlag. ISBN 978-3-540-85999-4
Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version). Technical Report TR-CTIT-08-50, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption. In: 10th international conference on information and communication security, 20-22 Oct 2008, Birmingham, UK. pp. 345-360. Lecture Notes in Computer Science 5308. Springer. ISSN 0302-9743 ISBN 978-3-540-88624-2
Shang, Xiaoxin (2008) Grip-pattern recognition: Applied to a smart gun. PhD thesis, University of Twente. ISBN 978-90-365-2732-3
Shang, Xiaoxin and Veldhuis, R.N.J. (2008) Grip-Pattern Recognition in Smart Gun Based on Likelihood-Ratio Classifier and Support Vector Machine. In: Lecture Notes in Computer Science: Image and Signal Processing, 1-3 July 2008, Cherbourg, France. pp. 289-295. Lecture Notes in Computer Science 5099/2008. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-69904-0
Shang, Xiaoxin and Veldhuis, R.N.J. (2008) Grip-Pattern Verification for Smart Gun Based on Maximum-Pairwise Comparison and Mean-Template Comparison. In: Biometrics: Theory, Applications and BTAS 2008. 2nd IEEE International Conference on Biometrics: Theory Applications and Systems, 2008., 29 Sept - 1 Oct 2008, Washington, USA. pp. 1-5. IEEE Computer Society. ISBN 978-1-4244-2729-1
Shang, Xiaoxin and Veldhuis, R.N.J. (2008) Grip-pattern verification for a smart gun. Journal of Electronic Imaging, 17 (1). 011017. ISSN 1017-9909 *** ISI Impact 0,616 ***
Sperotto, A. and Sadre, R. and Pras, A. (2008) Anomaly Characterization in Flow-Based Traffic Time Series. In: 8th IEEE International Workshop on IP Operations and Management, IPOM 2008, 22-26 September 2008, Samos, Greece. pp. 15-27. Lecture Notes in Computer Science 5275/2008. Springer Verlag. ISSN 1611-3349 ISBN 978-3-540-87356-3
Spreeuwers, L.J. (2008) Multi-view passive 3D face acquisition device. In: Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 11-12 Sep 2008, Darmstadt, Germany. pp. 13-24. Lecture Notes in Informatics (LNI) - Proceedings P-137. Gesellschaft fuer Informatik. ISSN 1617-5468 ISBN 978-3-88579-231-4
Tang, Qiang (2008) Type-based Proxy Re-encryption and its Construction. Technical Report TR-CTIT-08-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) Revisit the Concept of PEKS: Problems and a Possible Solution. Technical Report TR-CTIT-08-54, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) On Using Encryption Techniques to Enhance Sticky Policies Enforcement. Technical Report TR-CTIT-08-64, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) Type-Based Proxy Re-encryption and Its Construction. In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, December 14-17, 2008, Kharagpur, India. pp. 130-144. Lecture Notes in Computer Science 5365. Springer Verlag. ISBN 978-3-540-89753-8
Tang, Qiang and Bringer, J. and Chabanne, H. and Pointcheval, D. (2008) A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, April 21-23, 2008, Sydney, Australia. pp. 56-70. Lecture Notes in Computer Science 4991. Springer Verlag. ISBN 978-3-540-79103-4
Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Inter-domain Identity-based Proxy Re-encryption. Technical Report TR-CTIT-08-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tao, Qian and Veldhuis, R.N.J. (2008) Hybrid Fusion for Biometrics: Combining Score-level and Decision-level Fusion. In: 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, 28 Jun 2008, Anchorage, Alaska, US. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-2340-8
Veldhuis, R.N.J. and Deravi, F. and Tao, Qian (2008) Multibiometrics for face recognition. Datenschutz und Datensicherheit - DuD, 32 (3). pp. 204-214. ISSN 1614-0702
Welberg, S.M. (2008) Vulnerability management tools for COTS software - A comparison. Technical Report TR-CTIT-08-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Xu, Haiyun and Veldhuis, R.N.J. and Kevenaar, T.A.M. and Akkermans, A.H.M. and Bazen, A.M. (2008) Spectral minutiae: A fixed-length representation of a minutiae set. In: 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Workshop on Biometrics, 24-28 Jun 2008, Anchorage, Alaska, US. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-2340-8
Zych, A.K. and Doumen, J.M. and Jonker, W. and Hartel, P.H. and Petkovic, M. (2008) Method of Key Management. Patent WO2008026184 (Assigned).
Zych, A.K. and Petkovic, M. and Jonker, W. (2008) Efficient key management for cryptographically enforced access control. Computer Standards & Interfaces, 30 (6). pp. 410-417. ISSN 0920-5489 *** ISI Impact 1,268 ***

2007

Etalle, S. and Marsh, S., ed. (2007) Trust Management, Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada. IFIP International Federation for Information Processing 238. Springer Verlag, Berlin. ISBN 978-0-387-73654-9
Alvisi, L. and Doumen, J.M. and Guerraoui, R. and Koldehofe, B. and Li, H. and van Renesse, R. and Tredan, G. (2007) How robust are gossip-based communication protocols? Operating Systems Review, 41 (5). pp. 14-18. ISSN 0163-5980
Bhargavan, K. and Corin, R.J. and Fournet, C. (2007) Crypto-Verifying Protocol Implementations in ML. In: 3rd Workshop on Formal and Computational Cryptography, FCC 2007, 4-5 Jul 2007, Venice, Italy. INRIA. ISBN not assigned
Bhargavan, K. and Corin, R.J. and Fournet, C. and Gordon, A.D. (2007) Secure Sessions for Web Services. ACM Transactions on Information and System Security (TISSEC), 10 (2). 8:1-8:46. ISSN 1094-9224 *** ISI Impact 0,759 ***
Bolzoni, D. and Crispo, B. and Etalle, S. (2007) ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. In: Proceedings of the 21st Large Installation System Administration Conference (LISA '07), 11-16 November 2007, Dallas, Texas. pp. 141-152. Usenix Association. ISBN 978-1-931971-55-3
Boom, B.J. and van Rootseler, R.T.A. and Veldhuis, R.N.J. (2007) Investigating the boosting framework for face recognition. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 189-196. Werkgemeenschap voor Informatie- en Communicatietechniek. ISBN 978-90-365-2509-1
Boom, B.J. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2007) Automatic face alignment by maximizing similarity score. In: Proceedings of the 7th International Workshop on Pattern Recognition in Information Systems, 12-13 Jun 2007, Madeira. Portugal. pp. 221-230. Biosignals. INSTICC Press. ISBN 978-972-8865-93-1
Bosch, H.G.P. and Kraml, M. and Mullender, S.J. and Polakos, P. and Samuel, L.G. (2007) Authenticating a tamper-resistant module in a base station router. Patent US20070271458 (Application).
Brinkman, R. (2007) Searching in encrypted data. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 07-98 ISBN 978-90-365-2488-9
Brinkman, R. (2007) Different search strategies on encrypted data compared. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 183-196. ISBN 978-3-540-69860-9
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. Technical Report TR-CTIT-07-69, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Constructing practical Fuzzy Extractors using QIM. Technical Report TR-CTIT-07-52, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. In: First International Workshop on Security for Spontaneous Interaction, 16. September 2007, Innsbruck, Austria. pp. 450-456. Ubicomp 2007 Workshop Proceedings. ISBN 978-3-00-022599-4
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) From Watermarks to Fuzzy Extractors: a Practical Construction. Technical Report TR-CTIT-07-75, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Fuzzy extractors for continuous distributions. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), 20-22 March 2007, Singapore. pp. 353-355. ACM. ISBN 1-59593-574-6
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Feeling Is Believing: A Secure Template Exchange Protocol. In: Advances in Biometrics, International Conference (ICB), 27-29 Aug 2007, Seoul, Korea. pp. 897-906. Lecture Notes in Computer Science 4642. Springer Verlag. ISBN 978-3-540-74548-8
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) A unifying view on template protection schemes. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 35-42. Werkgemeenschap voor Informatie- en Communicatietechniek. ISBN 978-90-365-2509-1
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2007) Audit-based compliance control. International Journal of Information Security, 6 (2-3). pp. 133-151. ISSN 1615-5262 *** ISI Impact 1,279 ***
Chen, Chun and Veldhuis, R.N.J. and Kevenaar, T.A.M. and Akkermans, A.H.M. (2007) Multi-bits biometric string generation based on the likelyhood ratio. In: IEEE conference on Biometrics: Theory, Applications and Systems, 27-29 Sep 2007, Washington DC. pp. 1-6. University of Notre Dame. ISBN 978-1-4244-1597-7
Corin, R.J. (2007) Computational Soundness of Formal Encryption in Coq. In: 3rd Workshop on Formal and Computational Cryptography, FCC 2007, 4-5 Jul 2007, Venice, Italy. INRIA. ISBN not assigned
Corin, R.J. and Deniélou, P.-M. and Fournet, C. and Bhargavan, K. and Leifer, J. (2007) Secure Implementations for Typed Session Abstractions. In: 20th IEEE Computer Security Foundations Symposium (CSF), 6-8 July, Venice, Italy. pp. 170-186. IEEE Computer Society. ISBN 0-7695-2819-8
Corin, R.J. and Denielou, P-M. (2007) A Protocol Compiler for Secure Sessions in ML. In: 3rd Symposium on Trustworthy Global Computing (TGC) Revised Selected Papers, 5-6 Nov 2007, Sophia Antipolis, France. pp. 276-293. Lecture Notes in Computer Science 4912. Springer Verlag. ISBN 978-3-540-78662-7
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2007) Timed Analysis of Security Protocols. Journal of Computer Security, 15 (6). pp. 619-645. ISSN 0926-227X
Czenko, M.R. and Etalle, S. (2007) Core TuLiP. Technical Report TR-CTIT-07-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Etalle, S. (2007) Core TuLiP - Logic Programming for Trust Management. In: Proceedings of the 23rd International Conference on Logic Programming, ICLP 2007, 8-13 Sep 2007, Porto, Portugal. pp. 380-394. Lecture Notes in Computer Science 4670. Springer Verlag. ISBN 978-3-540-74608-9
Czenko, M.R. and Etalle, S. and Li, Dongyi and Winsborough, W.H. (2007) An Introduction to the Role Based Trust Management Framework RT. Technical Report TR-CTIT-07-34, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Etalle, S. and Li, Dongyi and Winsborough, W.H. (2007) An Introduction to the Role Based Trust Management Framework RT. In: Foundations of Security Analysis and Design IV -- FOSAD 2006/2007 Tutorial Lectures. Lecture Notes in Computer Science 4677. Springer Verlag, Berlin, pp. 246-281. ISBN 978-3-540-74809-0
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2007) Extended Privilege Inheritance in RBAC. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security, ASIACCS 2007, March 20-22, Singapore. pp. 383-385. Conference on Computer and Communications Security. ACM Press. ISBN 1-59593-574-6
Dekker, M.A.C. and Crampton, J. and Etalle, S. (2007) RBAC Administration in Distributed Systems. Technical Report TR-CTIT-07-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. Technical Report TR-CTIT-07-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. In: Proceedings of the fourth VLDB Workshop, SDM 2007, 23, 24 Sept 2007, Vienna, Austria. pp. 33-46. Lecture Notes in Computer Science 4721. Springer. ISBN 978-3-540-75247-9
Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2007) Privacy Policies. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 383-397. ISBN 978-3-540-69860-9
Dekker, M.A.C. and den Hartog, J.I. and Etalle, S. (2007) Audit-based Compliance Control (AC2) for EHR Systems. Technical Report TR-CTIT-07-46, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Doumen, J.M. (2007) Non-interactive fuzzy private matching. Technical Report TR-CTIT-07-45, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and den Hartog, J.I. and Marsh, S. (2007) Trust and Punishment. (Invited) In: Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics, Rome, Italy. 5:1-5:6. nstitute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST). ISBN 978-963-9799-09-7
Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. In: Fourth Int. Conf. on Trust, Privacy and Security in Digital Business, TRUSTBUS 2007, 4-6 September 2007, Germany. pp. 145-154. Lecture Notes in Computer Science 4657. Springer Verlag. ISBN 978-3-540-74408-5
Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. Technical Report TR-CTIT-07-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Samarati, P. (2007) Preface of special issue of the proceedings of theSecond International Workshop on Security and Trust Management (STM 2006). In: Proceedings of the Second International Workshop on Security and Trust Management, 20 Sep 2006, Hamburg, Germany. pp. 1-2. Electronic Notes in Theoretical Computer Science 179. Elsevier. ISSN 1571-0661
Etalle, S. and Winsborough, W.H. (2007) A Posteriori Compliance Control. In: 12th ACM Symposium on Access Control Models and Technologies (SACMAT), 20-22 June 2007, Nice, France. pp. 11-20. ACM Press. ISBN 978-1-59593-745-2
Ganzevoort, W.P.T. (2007) IQ imbalance in quadrature demodulators. Master's thesis, University of Twente.
Hartel, P.H. and Abelmann, L. (2007) Towards compliant data retention with probe storage on patterned media. Technical Report TR-CTIT-07-49, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
den Hartog, F.T.H. and Blom, M.A. and Lageweg, C.R. and Peeters, M.E. and Schmidt, J.R. and van der Veer, R. and de Vries, A. and van der Werff, M.R. and Tao, Qian and Veldhuis, R.N.J. and Baken, N. and Selgert, F. (2007) First experiences with Personal Networks as an enabling platform for service providers. In: Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous 2007., 6-10 August 2007, Philadelphia, USA. pp. 1-8. IEEE Computer Society. ISBN 978-1-4244-1024-8
den Hartog, J.I. (2007) Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic. Technical Report TR-CTIT-07-53, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Heerde, H.J.W. and Anciaux, N.L.G. and Fokkinga, M.M. and Apers, P.M.G. (2007) Exploring personalized life cycle policies. Technical Report TR-CTIT-07-85, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hendrikse, A.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2007) Component ordering in independent component analysis based on data power. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 211-218. Werkgemeenschap voor Informatie- en Communicatietechniek. ISBN 978-90-365-2509-1
de Jong, E.K. and Hartel, P.H. (2007) Method and apparatus for deployment of high integrity software using static procedure return addresses. Patent US 7,181,737 (Assigned).
Jonker, W. (2007) An Introduction to Digital Rights Management Systems. In: Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 257-265. ISBN 978-3-540-69860-9
Jonker, W. and Brinkman, R. and Maubach, S. (2007) Secure storage system and method for secure storing. Patent WO2007125454 (Application).
Kuijper, M. and Pinto, R. and Polderman, J.W. (2007) Row reduced representations of behaviors over finite rings. In: Proceedings of the 46th IEEE Conference on Decision and Control, 12-14 Dec 2007, New Orleans, USA. pp. 470-475. IEEE. ISSN 0191-2216 ISBN 1-4244-1498-9
Kuijper, M. and Pinto, R. and Polderman, J.W. (2007) The predictable degree property and row reducedness for systems over a finite ring. Linear Algebra and its Applications, 425 (2-3). pp. 776-796. ISSN 0024-3795 *** ISI Impact 0,965 ***
Kuijper, M. and Polderman, J.W. (2007) Systems theoretic methods in decoding. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 19-26. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 978-90-365-2509-1
Law, Yee Wei and Doumen, J.M. and Palaniswami, M. (2007) Key Management Building Blocks for Wireless Sensor Networks. Technical Report TR-CTIT-07-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Meyer, U. and Tschofenig, H. and Karagiannis, G. (2007) On the security of the Mobile IP protocol family. (Invited) In: Proceedings of 1st IEEE Workshop on Enabling the Future Service-Oriented Internet, Workshop of GLOBECOM 2007, 26-30 Nov 2007, USA. 2. IEEE Communications Society. ISBN not assigned
Nunes Leal Franqueira, V. and van Eck, P.A.T. (2007) Defense against Insider Threat: a Framework for Gathering Goal-based Requirements. In: Proceedings of the 12th International Workshop on Exploring Modeling Methods in Systems Analysis and Design (EMMSAD 2007), held in conjuction with CAISE'07, 11-15 June 2007, Trondheim, Norway. pp. 193-202. Tapir Academic Press. ISBN 978-82-519-2245-6
Nunes Leal Franqueira, V. and Lopes, R.H.C. (2007) Vulnerability Assessment by Learning Attack Specifications in Graphs. In: The Third International Symposium on Information Assurance and Security, 29-31 August 2007, Manchester, UK. pp. 161-164. IEEE Computer Society. ISBN 978-0-7695-2876-2
Nunes Leal Franqueira, V. and Lopes, R.H.C. and van Eck, P.A.T. (2007) An Evolutionary Approach for Learning Attack Specifications in Network Graphs. Technical Report TR-CTIT-07-40, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ooms, W.S. and Karagiannis, G. and van Deventer, M.O. and Veldhuizen, J. (2007) AAA architectures applied in multi-domain IMS (IP multimedia subsystem). In: Proceedings of 1st IEEE Workshop on Enabling the Future Service-Oriented Internet, Workshop of GLOBECOM 2007, 26-30 Nov 2007, USA. 6. IEEE Communications Society. ISBN 978-1-4244-2024-7
Petkovic, M. and Conrado, C. and Schrijen, G.-J. and Jonker, W. (2007) Enhancing Privacy for Digital Rights Management. In: Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 347-364. ISBN 978-3-540-69860-9
Petkovic, M. and Jonker, W. (2007) Privacy and Security Issues in a Digital World. In: Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 3-10. ISBN 978-3-540-69860-9
Petkovic, M. and Jonker, W. (2007) Preface. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, VII-X. ISBN 978-3-540-69860-9
Petriu, D.B. and Woodside, C.M. and Petriu, D.C. and Xu, Jing and Israr, T. and Georg, G. and France, R. and Bieman, J.M. and Houmb, S.H. and Jürjens, J. (2007) Performance Analysis of Security Aspects in UML Models. In: WOSP '07: Proceedings of the 6th international workshop on Software and performance, 5-8 Feb 2007, Buenes Aires, Argentina. pp. 91-102. ACM. ISBN 1-59593-297-6
van Rootseler, R.T.A. (2007) Face recognition using boosted and fused local features. Master's thesis, University of Twente.
Sadre, R. (2007) Decomposition-Based Analysis of Queueing Networks. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 06-95 ISBN 90-365-2444-X
Sadre, R. and Haverkort, B.R.H.M. and Reinelt, P. (2007) A Fixed-Point Algorithm for Closed Queueing Networks. In: Formal Methods and Stochastic Models for Performance Evaluation, Fourth European Performance Engineering Workshop, EPEW 2007, 27-28 September 2007, Berlin, Germany. pp. 154-170. Lecture Notes in Computer Science 4748. Springer. ISSN 0302-9743 ISBN 978-3-540-75210-3
Shang, Xiaoxin and Veldhuis, R.N.J. (2007) Local absolute binary patterns as image preprocessing for grip-pattern recognition in smart gun. In: IEEE conference on Biometrics: Theory, Applications and Systems, 27-29 Sep 2007, Washington DC. pp. 1-6. University of Notre Dame. ISBN 978-1-4244-1597-7
Shao, Xiaoying (2007) Fountain codes for frequency occupancy information dissemination. Master's thesis, University of Twente.
Sperotto, A. and van de Meent, R. (2007) A Survey of the High-Speed Self-Learning Intrusion Detection Research Area. In: First International Conference on Autonomous Infrastructure, Management and Security, 21-22 Jun 2007, Oslo, Norway. pp. 196-199. Lecture Notes in Computer Science 4543. Springer Verlag. ISBN 978-3-540-72985-3
Spreeuwers, L.J. and Boom, B.J. and Veldhuis, R.N.J. (2007) Better than best: matching score based face registration. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 125-132. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 978-90-365-2509-1
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2007) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. In: Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE '07), October 14-20, 2007, Valencia, Spain. pp. 107-114. IEEE Computer Society. ISBN 0-7695-2989-5
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2007) Specifying Information Security Needs for the Delivery of High Quality Security Services. In: 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, BDIM '07, 21-23 May 2007, Munich, Germany. pp. 112-113. IEEE Computer Society. ISBN 1-4244-1295-1
Tao, Qian and van Rootseler, R.T.A. and Veldhuis, R.N.J. and Gehlen, S. and Weber, F. (2007) Optimal decision fusion and its application on 3D face recognition. In: Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 12-13 Jul 2007, Darmstadt, Germany. pp. 15-24. GI-Edition. Gesellschaft fur Informatik e.V.. ISSN 1617-5468 ISBN 978-3-88579-202-4
Tao, Qian and Veldhuis, R.N.J. (2007) Illumination normalization based on simplified local binary patterns for a face verification system. In: Biometrics Symposium 2007 at The Biometrics Consortium Conference, 11-13 Sep 2007, Baltimore, Maryland. pp. 1-7. IEEE Computational Intelligence Society. ISBN 978-1-4244-1549-6
Tao, Qian and Veldhuis, R.N.J. (2007) Optimal decision fusion for a face verification system. In: Proceedings of the 2nd International Conference on Biometrics, 27-29 Aug 2007, Seoul, Korea. pp. 958-967. Image Processing, Computer Vision, Pattern Recognition. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-74548-8
Veldhuis, R.N.J. and Chen, Chun and Kevenaar, T.A.M. and Akkermans, A.H.M. (2007) Method for transforming a feature vector. Patent EP2186040 (Assigned).
Xu, Haiyun and Bazen, A.M. and Veldhuis, R.N.J. and Kevenaar, T.A.M. and Akkermans, A.H.M. (2007) Spectral representation of fingerprints. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 313-319. Werkgemeenschap voor Informatie- en Communicatietechniek. ISBN 978-90-365-2509-1
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. In: Second International Conference on Internet Monitoring and Protection (ICIMP), 1-5 Jul 2007, San Jose, CA, USA. pp. 33-33. IEEE Computer Society. ISBN 0-7695-2911-9
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) Model-Based Mitigation of Availability Risks. Technical Report TR-CTIT-07-04, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. Technical Report TR-CTIT-07-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) Model-Based Mitigation of Availability Risks. In: Second IEEE/IFIP International Workshop on Business-Driven IT Management, 21 May 2007, Munich, Germany. pp. 75-83. IEEE Computer Society. ISBN 1-4244-1295-1
Zych, A.K. and Petkovic, M. and Jonker, W. (2007) The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. In: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 8-11, 2007, Redondo Beach, CA, USA. pp. 95-97. Springer. ISBN 978-3-540-73533-5
Zych, A.K. and Petkovic, M. and Jonker, W. (2007) A Key Management Method for Cryptographically Enforced Access Control. In: 5th International Workshop on Security in Information Systems (WoSIS), Funchal, Madeira. pp. 9-22. INSTICC Press. ISBN 978-972-8865-96-2

2006

Etalle, S. and Truszczynski, M., ed. (2006) Logic Programming, 22nd International Conference, ICLP 2006, Seattle, WA, USA, August 17-20, 2006. Proceedings. Lecture Notes in Computer Science 4079. Springer-Verlag, New York. ISBN 3-540-36635-0
Jonker, W. and Petkovic, M., ed. (2006) Proceedings of the 3rd VLDB Workshop on Secure Data Management (SDM 2006). Lecture Notes in Computer Science 4165. Springer Verlag, Berlin. ISBN 978-3-540-38984-2
Abadi, M. and Corin, R.J. and Fournet, C. (2006) Computational Secrecy by Typing for the Pi Calculus. In: The Fourth ASIAN Symposium on Programming Languages and Systems (APLAS 2006), 8 Nov - 10 Nov 2006, Sydney, Australia. pp. 253-269. Lecture Notes in Computer Science 4279. Springer Verlag. ISBN 3-540-48937-1
Alonso-Fernandez, F. and Veldhuis, R.N.J. and Bazen, A.M. and Fierrez-Aguilar, J. and Ortega-Garcia, J. (2006) Sensor Interoperability and Fusion in Fingerprint Verification: A Case Study using Minutiae-and Ridge-Based Matchers. In: 9th International Conference on Control, Automation, Robotics and Vision, ICARCV '06, 5-8 Dec 2006, Singapore. pp. 1-6. IEEE Computer Society. ISBN 1-4244-0341-3
Berendsen, J. and Jansen, D.N. and Katoen, J.P. (2006) Probably on time and within budget: on reachability in priced probabilistic timed automata. Technical Report TR-CTIT-06-26, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Beumer, G.M. and Tao, Qian and Bazen, A.M. and Veldhuis, R.N.J. (2006) A landmark paper in face recognition. In: Automatic Face and Gesture Recognition, 2006. FGR 2006. 7th International Conference on, 10-12 April 2006, Southampton, UK. pp. 73-78. IEEE Computer Society. ISBN 0-7695-2503-2
Blake, M.B. and Cheung, W.K.W. and Wombacher, A. (2006) WSC-06: The Web Service Challenge; in Proceedings of the Web Service Challenge. In: The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services (CEC/EEE'06), 26.-29.06. 2006, San Francisco, USA. pp. 422-423. IEEE Computer Society. ISBN 0-7695-2511-3
Bolzoni, D. and Etalle, S. (2006) APHRODITE: an Anomaly-based Architecture for False Positive Reduction. Technical Report TR-CTIT-06-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Zambon, Emmanuele and Etalle, S. and Hartel, P.H. (2006) Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System. In: 4th IEEE Int. Information Assurance Workshop (IWIA2006), 13-14 Apr 2006, London, UK. pp. 144-156. IEEE Computer Society. ISBN 0 7695 2564 4
Boom, B.J. and Beumer, G.M. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2006) The effect of image resolution on the performance of a face recognition system. In: Proceedings of the Ninth International Conference on Control, Automation, Robotics and Vision (ICARCV), 05-08 Dec 2006, Singapore, Malaysia. pp. 409-414. IEEE Computer Society. ISBN 1-4244-0342-1
Boom, B.J. and Beumer, G.M. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2006) Matching score based face recognition. In: 17th Annual Workshop on Circuits, 23-24 Nov 2006, Veldhoven, The Netherlands. pp. 1-4. Technology Foundation STW. ISBN 978-90-73461-44-4
Buhan, I.R. and Bazen, A.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems (Poster Paper). In: 2nd Int. Conf. on Biometrics (ICB), Hong Kong, China. pp. 728-736. Lecture Notes in Computer Science 3832. Springer-Verlag. ISBN 3-540-31111-4
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis. Technical Report TR-CTIT-06-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2006) Fuzzy extractors for continuous distributions. Technical Report TR-CTIT-06-72, University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2006) The Audit Logic: Policy Compliance in Distributed Systems. Technical Report TR-CTIT-06-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Torabi Dashti, M. (2006) An intruder model for verifying liveness in security protocols. In: FMSE '06: Proceedings of the fourth ACM workshop on Formal methods in security, Alexandria, Virginia, USA. pp. 23-32. ACM. ISBN 1-59593-550-9
Chong, Chuen Ngen and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Yee Wei and Tokmakoff, A. (2006) LicenseScript: A Logical Language for Digital Rights Management. Annals of telecommunications special issue on Network and Information systems security, 61 (3-4). pp. 284-331. ISSN 0003-4347 *** ISI Impact 0,722 ***
Corin, R.J. (2006) Analysis Models for Security Protocols. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 05-76 ISBN 90-365-2279-X
Corin, R.J. and Galindo, D. and Hoepman, J.H. (2006) Securing data accountability in decentralized systems. In: Proceedings of 1st International Workshop on Information Security, IS'06, 30 Oct - 3 Nov 2006, Montpellier, France. pp. 626-635. Lecture Notes in Computer Science 4277. Springer. ISBN 978-3-540-48269-7
Corin, R.J. and den Hartog, J.I. (2006) A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs. In: ICALP 2006 track C, 9-13 Jul 2006, Venice, Italy. pp. 252-263. Lecture Notes in Computer Science 4052. Springer-Verlag. ISBN 3-540-35907-9
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2006) A Logic for Constraint-based Security Protocol Analysis. In: IEEE Symposium on Security and Privacy, 21-25 May 2006, Oakland, US. pp. 155-168. IEEE Computer Society. ISBN 0-7695-2574-1
Daneva, M. (2006) Applying Real Options Thinking to Information Security in Networked Organizations. Technical Report TR-CTIT-06-11, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-06-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-07-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. Technical Report TR-CTIT-06-49, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. In: Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA), 16-17 Sept 2006, Bertinoro, Italy. pp. 221-236. Elsevier Electronic Notes in Theoretical Computer Science 168. Elsevier. ISSN 1571-0661
Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2006) Privacy in an Ambient World. Technical Report TR-CTIT-06-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Veugen, P.J.M. and Etalle, S. (2006) Audit-based Access Control in de Zorg. Informatiebeveiliging, 8. pp. 19-23. ISSN 1569-1063
Delzanno, G. and Etalle, S. and Gabbrielli, M. (2006) Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. Theory and Practice of Logic Programming, 6 (3). pp. 225-226. ISSN 1471-0684 *** ISI Impact 0,952 ***
Hafkamp, W.H.M. (2006) IT Security Vulnerability and Incident Response Management. In: Int. Conf. on Securing Electronic Business Processes -- ISSE 2006, 10-12 Oct. 2006, Rome, Italy. pp. 387-395. Vieweg. ISBN 978-3-8348-0213-2
Huisman, P. and van Munster, R. and Moro-Ellenberger, S. and Veldhuis, R.N.J. and Bazen, A.M. (2006) Making 2D face recognition more robust using AAMs for pose compensation. In: 7th International Conference on Automatic Face and Gesture Recognition, FGR 2006, 2-6 Apr 2006, Southampton, UK. 9054468 . IEEE Computer Society. ISBN 0-7695-2503-2
van Kampen, D. (2006) Implementation of an OFDM-demodulation and WCDMA-equalization module for a dual-mode receiver. Master's thesis, University of Twente.
Knežević, P. and Wombacher, A. and Risse, T. (2006) Highly Available DHTs: Keeping Data Consistency After Updates. In: 4th International Workshop, AP2PC 2005, July 25, 2005, Revised Papers, July 25, 2005, Utrecht, Netherlands. pp. 70-80. Lecture Notes in Computer Science 4118. Springer Verlag. ISBN 978-3-540-49025-8
Kuijper, M. and Pinto, R. and Polderman, J.W. and Rocha, P. (2006) Autonomicity and the absence of free variables for behaviors over finite rings. In: Proceedings of the Portuguese Conference on Automatic Control 2006, 11-13 July 2006, Lisbon. Portuguese Association of Automatic Control. ISBN 978-972-97025-2-5
Law, Yee Wei and Doumen, J.M. and Hartel, P.H. (2006) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks, 2 (1). pp. 65-93. ISSN 1550-4859 *** ISI Impact 1,448 ***
Law, Yee Wei and Havinga, P.J.M. (2006) How to Secure a Wireless Sensor Network. Technical Report TR-CTIT-06-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Mahleko, B. and Wombacher, A. (2006) Indexing business processes based on annotated finite state automata. In: IEEE International Conerence on Web Services, ICWS 2006, 18-22 Sep 2006, Chicago, USA. pp. 303-311. IEEE Computer Society. ISBN 0 7695 2669 1
Moseley, N.A. and Slump, C.H. (2006) A low-complexity feed-forward I/Q imbalance compensation algorithm. In: 17th Annual Workshop on Circuits, 23-24 Nov 2006, Veldhoven, The Netherlands. pp. 158-164. Technology Foundation STW. ISBN 978-90-73461-44-4
Nunes Leal Franqueira, V. (2006) Access Control from an Intrusion Detection Perspective. Technical Report TR-CTIT-06-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nunes Leal Franqueira, V. (2006) Evolution of security policies. In: Doctoral Symposium Proceedings of the 14th IEEE International Requirements Engineering Conference (RE06), 11-15 Sep 2006, Minnesota, USA. Univ. of Zuerich. ISBN not assigned
Nunes Leal Franqueira, V. and van Eck, P.A.T. (2006) Towards alignment of architectural domains in security policy specifications. Technical Report TR-CTIT-06-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nunes Leal Franqueira, V. and van Eck, P.A.T. (2006) Defense against Insider Threat: a Framework for Gathering Goal-based Requirements. Technical Report TR-CTIT-06-75, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nunes Leal Franqueira, V. and van Eck, P.A.T. (2006) Towards alignment of architectural domains in security policy specifications. In: Proccedings of the 8th International Symposium on System and Information Security, 08-10 Nov 2006, Sao Jose dos Campos, Brazil. Fundacao Casimiro Montenegro Filho - CTA/ITA. ISBN 85-87978-13-6
Reichert, M. and Verma, K. and Wombacher, A. (2006) Preface on Workshop on Dynamic Process Management (DPM 2006). In: Proceedings of Business Process Management Workshops, 4 Sep 2006, Vienna, Austria. pp. 167-168. Lecture Notes in Computer Science 4103. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-32595-6
Rinderle, S.B. and Wombacher, A. and Reichert, M. (2006) On the controlled evolution of process choreographies. In: 22nd International Conference on Data Engineering, 03-08 April 2006, Atlante, GA, USA. pp. 124-127. IEEE Computer Society. ISBN 0 7695 2570 9
Shang, Xiaoxin and Kooi, K. and Veldhuis, R.N.J. and Ganzevoort, W.P.T. (2006) Restoration of missing lines in grip patterns for biometrics authentication on a smart gun. In: Proceedings of SPS-DARTS 2006 the second annual IEEE Benelux/DSP Valley Signal Processing Symposium, 28-29 Mar 2006, Antwerp, Belgium. pp. 95-98. IEEE Benelux Signal Processing Chapter. ISBN 978-90-73461-44-4
Shang, Xiaoxin and Veldhuis, R.N.J. (2006) Registration of hand-grip pattern in smart gun. In: 17th Annual Workshop on Circuits, 23-24 Nov 2006, Veldhoven, The Netherlands. pp. 192-195. Technology Foundation STW. ISBN 978-90-73461-44-4
Spreeuwers, L.J. (2006) De invloed van belichting op automatische gezichtsherkenning. In: Belichting. ETSV Scintilla Universiteit Twente, Enschede, The Netherlands, pp. 102-108. ISBN not assigned
Su, X. (2006) An Overview of Economic Approaches to Information Security Management. Technical Report TR-CTIT-06-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. Technical Report TR-CTIT-06-08, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. Technical Report TR-CTIT-06-73, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. In: 11th International Workshop on Exploring Modeling Methods in Systems Analysis and Design (EMMSAD2006), 5-9 Jun 2006, Luxembourg. pp. 465-472. Presses Universitaries de Namur. ISBN 2-87037-525-5
Su, X. and Gulla, J.A. (2006) An information retrieval approach to ontology mapping. Data and knowledge engineering, 58 (1). pp. 47-69. ISSN 0169-023X *** ISI Impact 1,500 ***
Tao, Qian and Veldhuis, R.N.J. (2006) Biometric authentication for a mobile personal device. In: Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, 2006, 17-21 July, 2006, San Jose, USA. pp. 1-3. IEEE Computer Society. ISBN 1-4244-0498-3
Tao, Qian and Veldhuis, R.N.J. (2006) Verifying a user in a personal face space. In: Proceedings of the Ninth International Conference on Control, Automation, Robotics and Vision (ICARCV), 05-08 Dec 2006, Singapore, Malaysia. pp. 197-200. IEEE Computer Society. ISBN 1-4244-0342-1
Ter Burg, S. (2006) Musical note extraction. Master's thesis, University of Twente.
Tolido, R. and Borsoi, P. and Bronk, H. and Elsinga, B. and Greuter, R. and Hafkamp, W.H.M. and Jochem, A. and van der Heide, M. and Rorive, K. and Schiltmans, T. and Schuurman, J. and Reijers, R. (2006) CERT in the organisation. Expertbrieven Genootschap van Informatiebeveiligers, 4. pp. 1-18. ISSN not assigned
Wassink, R.G.V. and Baten, C.T.M. and Veltink, P.H. and Veldhuis, R.N.J. and Smeding, J.H. (2006) Monitoring of human activities using a trainable system based on Hidden Markov modelling technology. Gait and Posture, 24 (Supplement 2). S109-S110. ISSN 0966-6362 *** ISI Impact 2,286 ***
Wombacher, A. (2006) Evaluation of technical measures for workflow similarity based on a pilot study. In: Proc. 14th Int'l Conf. on Cooperative Information Systems (CoopIS'06), 1.-3. Nov 2006, Montpellier, France. pp. 255-272. Lecture Notes in Computer Science 4275. Springer Verlag. ISSN 0302-9743
Wombacher, A. (2006) Decentralized Consistency Checking in Cross-organizational Workflows. In: The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services (CEC/EEE'06), 26.-29.06. 2006, San Francisco, USA. pp. 39-46. IEEE Computer Society. ISBN 0-7695-2511-3
Wombacher, A. and Hauswirth, M. (2006) Message from the STD3S 2006 Organizers. In: Proceedings 22nd International Conference on Data Engineering Workshops, Atlanta, Georgia. xvii. IEEE Computer Society. ISBN 0 7695 2571 7
Wombacher, A. and Rozie, M. (2006) Piloting an empirical study on measures for workflow similarity. In: IEEE Intl. Conf. on Service Computing, SCC 2006, 18-22 Sep 2006, Chicago, USA. pp. 94-102. IEEE Computer Society. ISBN 0 7695 2670 5
Wombacher, A. and Rozie, M. (2006) Evolution of workflow similarity measures in service discovery. In: Konferenz im Rahmen der Multikonferenz Wirtschaftsinformatik, 2006, 20-22 Feb 2006, Passau, Germany. pp. 57-71. Gesellschaft fuer Informatik. ISBN 3 88579 174 9
Zych, A.K. and Doumen, J.M. and Jonker, W. and Hartel, P.H. and Petkovic, M. (2006) Method of Key Management. Patent PH006387, WO-IB2007/053498, EP-06119878.4 (Application).

2005

Petkovic, M. and Jonker, W., ed. (2005) Proceedings of the 2nd VLDB Workshop on Secure Data Management (SDM 2005). Lecture Notes in Computer Science 3674. Springer Verlag, Berlin. ISBN 3-540-28798-1
Bazen, A.M. (2005) Technieken voor biometrische identificatie: hoge eisen maken multi-modale biometrie noodzakelijk. Informatie, 47 (2). pp. 20-27. ISSN 0019-9907
Bazen, A.M. and Veldhuis, R.N.J. and Gerez, S.H. (2005) Hybrid Fingerprint Matching using Minutiae and Shape. In: Computer Aided Intelligent Recognition Techniques and Applications. John Wiley, pp. 119-129. ISBN 0-470-09414-1
Beumer, G.M. and Bazen, A.M. and Veldhuis, R.N.J. (2005) On the accuracy of EERs in face recognition and the importance of reliable registration. In: 5th IEEE Benelux Signal Processing Symposium (SPS-2005), Antwerp, Belgium. pp. 85-88. IEEE Benelux Signal Processing Chapter. ISBN not assigned
Beumer, G.M. and Tao, Qian and Bazen, A.M. and Veldhuis, R.N.J. (2005) Comparing Landmarking Methods for Face Recognition. In: ProRISC 2005, 16th Workshop on Circuits, Systems and Signal Processing, 17-18 November 2005, Veldhoven, The Netherlands. pp. 594-597. Technology Foundation STW. ISBN 90-73461-50-2
Bistarelli, S. and Cervesato, I. and Lenzini, G. and Martinelli, F. (2005) Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis. Journal of Computer Security, 13 (1). pp. 3-47. ISSN 0926-227x
Blake, M.B. and Tsui, K.C. and Wombacher, A. (2005) The EEE-05 Challenge: A New Web Service Discovery and Composition Competition. In: IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'05), 29 Mar-1 Apr 2005, Hong Kong, China. pp. 780-781. IEEE Computer Society. ISBN 0769522742
Bolzoni, D. and Zambon, Emmanuele and Etalle, S. and Hartel, P.H. (2005) Poseidon: A 2-tier Anomaly-based Intrusion Detection System. Technical Report TR-CTIT-05-53, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Breij, P.A.E. (2005) The Importance of Workplace Privacy. In: The Ethics of Workplace Privacy. Work & Society 50. Peter Lang Verlagsgruppe, Bruxelles, pp. 97-118. ISBN 978-90-5201-293-3
Brinkman, R. and Schoenmakers, B. and Doumen, J.M. and Jonker, W. (2005) Experiments With Queries Over Encrypted Data Using Secret Sharing. In: VLDB Workshop on Secure Data Management (SDM), September 2-3, 2005, Trondheim, Norway. pp. 33-46. Lecture Notes in Computer Science 3674. Springer-Verlag. ISBN 3-540-28798-1
Buhan, I.R. and Hartel, P.H. (2005) The state of the art in abuse of biometrics. Technical Report TR-CTIT-05-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2005) An Audit Logic for Accountability. In: 6th International Workshop on Policies for Distributed Systems & Networks (POLICY 2005), 6-8 Jun 2005, Stockholm, Sweden. pp. 34-43. IEEE Computer Society. ISBN 0-7695-2265-3
Cederquist, J.G. and Corin, R.J. and Torabi Dashti, M. (2005) On the quest for impartiality: Design and analysis of a Fair Non-repudiation protocol. In: 7th International Conference on Information and Communications Security, ICICS 2005, 10-13 Dec 2005, Beijing, China. pp. 27-39. Lecture Notes in Computer Science 3783. Springer-Verlag. ISBN 3-540-30934-9
Cederquist, J.G. and Torabi Dashti, M. (2005) An Intruder Model for Verifying Termination in Security Protocols. Technical Report TR-CTIT-05-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cheng, Jieyin and Chong, Chuen Ngen and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Nikolaus, S. (2005) STREAMTO: Streaming Content using a Tamper-Resistant Token (Workshop paper). In: 20th IFIP TC11 Int. Conf. on Security and Privacy in the Age of Ubiquitous Computing (SEC), Makuhari-Messe, Chiba, Japan. pp. 601-612. Springer-Verlag. ISBN 0-387-25658-X
Chong, Chuen Ngen (2005) Experiments in rights control: Expression and Enforcement. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 05-68 ISBN 90-75176-40-6
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Joosten, R. and Kleinhuis, G. (2005) Service Brokerage with Prolog (Poster paper). In: 7th Int. Conf. on Enterprise Information Systems (ICEIS), Miami, Florida, USA. pp. 409-412. INSTICC Press. ISBN 972-8865-19-8
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A Formal Security Analysis of an OSA/Parlay Authentication Interface. Technical Report TR-CTIT-05-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A Formal Security Analysis of an OSA/Parlay Authentication Interface. In: 7th IFIP WG 6.1 Int. Conf. on Formal Methods for Open Object-Based Distributed Systems (FMOODS), Athens, Greece. pp. 131-146. Springer-Verlag. ISBN 3-540-26181-8
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2005) PS-LTL for Constraint-Based Security Protocol Analysis. In: Logic Programming, 21st International Conference, ICLP 2005, October 2-5, 2005, Sitges, Spain. pp. 439-440. Electronic Notes in Theoretical Computer Science 3668. Springer Verlag. ISBN 3-540-29208-X
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2005) Trust in Virtual Communities. ERCIM News -- Special: Security and Trust Management, 63. pp. 29-30. ISSN 0926-4981
Czenko, M.R. and Tran, H.M. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and den Hartog, J.I. (2005) Nonmonotonic Trust Management for P2P Applications. In: 1st Int. Workshop on Security and Trust Management (STM), Milan, Italy. pp. 113-130. Electronic Notes in Theoretical Computer Science 157. Elsevier Science. ISSN 1571-0661
Doumen, J.M. and Hulsebosch, B. and Iacob, S.M. and Koster, P. and Kragt, E. and Montaner, J. and Muijen, R. and Petkovic, M. and Vrielink, K. (2005) Security Aspects of the MESEC Architecture. Technical Report TI/RS/2005/018, Telematica Instituut, Enschede.
Doumen, J.M. and Hulsebosch, B. and Iacob, S.M. and Koster, P. and Petkovic, M. (2005) User Controlled Sharing of Commercial and Personal Content. Technical Report TI/RS/2005/017, Telematica Instituut, Enschede.
Dubbeld, L. (2005) Bescherming van persoonsgegevens bij telemonitoring van hartpatiënten. Privacy & Informatie, 8 (1). pp. 2-7. ISSN 1388-0241
Etalle, S. and Winsborough, W.H. (2005) Integrity Constraints in Trust Management. Technical Report TR-CTIT-05-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Winsborough, W.H. (2005) Integrity Constraints in Trust Management (Extended Abstract). In: 10th ACM Symp. on Access Control Models and Technologies (SACMAT), June 01 - 03, 2005, Stockholm, Sweden. pp. 1-10. ACM Press. ISBN 1-59593-045-0
Fahrenholtz, D. and Wombacher, A. (2005) A Formal Communication Model for Lookup Operations in a Hypercube-based P2P Data Store. In: 1st International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateComp), 19-21 Dec 2005, San Jose, California, USA. IEEE Computer Society. ISBN 1-4244-0030-9
Hafkamp, W.H.M. (2005) Phishing: hengelen naar uw identiteitsgegevens. Bank- en effectenbedrijf. pp. 34-35. ISSN 0005-5018
Hartel, P.H. (2005) A Trace Semantics for Positive Core XPath. In: 12th Int. Symp. on Temporal Representation and Reasoning (TIME), Burlington, Vermont. pp. 103-112. IEEE Computer Society. ISBN 0-7695-2370-6
de Jong, E.K. and Hartel, P.H. and Peyret, P. and Cattaneo, P. (2005) Java Card: An analysis of the most successful smart card operating system. Technical Report TR-CTIT-05-50, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jonker, W. and Brinkman, R. and Doumen, J.M. and Schoenmakers, B. (2005) Method of and device for querying of protected structured data. Patent WO2005116792 (Assigned).
Law, Yee Wei (2005) Key management and link-layer security of wireless sensor networks : Energy-efficient attack and defense. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 05-75 ISBN 90-365-2282-X
Law, Yee Wei and Doumen, J.M. and Hartel, P.H. (2005) Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract). Technical Report TR-CTIT-05-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Hartel, P.H. and Etalle, S. and Havinga, P.J.M. and Di Pietro, R. and Mancini, L.V. (2005) Overview of Security Research in EYES. Technical Report TR-CTIT-05-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Hartel, P.H. and den Hartog, J.I. and Havinga, P.J.M. (2005) Link-layer jamming attacks on S-MAC. In: 2nd European Workshop on Wireless Sensor Networks (EWSN), Istanbul, Turkey. pp. 217-225. IEEE Computer Society. ISBN 0-7803-8801-1
Law, Yee Wei and Havinga, P.J.M. (2005) How to secure a wireless sensor network. (Invited) In: 2nd Int. Conf. on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Melbourne, Australia. pp. 89-95. IEEE Computer Society. ISBN 0-7803-9399-6
Law, Yee Wei and van Hoesel, L.F.W. and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2005) Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. In: 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Alexandria, Virginia. pp. 76-88. ACM Press. ISBN 1-59593-227-5
Lenzini, G. (2005) Integration of Analysis Techniques in Security and Fault-Tolerance. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 05-70 ISBN 90-365-2200-5
Tuyls, P. and Akkermans, A.H.M. and Kevenaar, T.A.M. and Schrijen, G.-J. and Bazen, A.M. and Veldhuis, R.N.J. (2005) Practical Biometric Authentication with Template Protection. In: 5th Int. Conf. on Audio- and Video-Based Personal Authentication (AVBPA), Rye Brook, New York. pp. 436-446. Springer-Verlag Berlin. ISBN 3-540-27887-7
Veldhuis, R.N.J. and Bazen, A.M. (2005) One-to-template and ono-to-one verification in the single- and multi-user case. In: 26th Symposium on Information Theory in the Benelux, Brussels, Belgium. pp. 39-46. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 90-71048-21-7
Veldhuis, R.N.J. and Bazen, A.M. and Booij, W.D.T. and Hendrikse, A.J. (2005) Hand-Geometry Recognition Based on Contour Parameters. In: SPIE Biometric Technology for Human Identification II, Orlando, FL, USA. pp. 344-353. SPIE -- The Int. Society for Optical Engineering. ISBN 0-8194-5764-7
Zych, A.K. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2005) A Diffie-Hellman based Key Management Scheme for Hierarchical Access Control. Technical Report TR-CTIT-05-57, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2004

Etalle, S., ed. (2004) Logic Based Program Synthesis and Transformation 14th International Symposium, LOPSTR 2004, Verona, Italy, August 26-28, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3573. Springer-Verlag, Berlin. ISBN 3-540-26655-0
Jonker, W. and Petkovic, M., ed. (2004) Secure Data Management: Proceedings of the VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004. Lecture Notes in Computer Science 3178. Springer, Berlin, Germany. ISSN 0302-9743 ISBN 3-540-22983-3
Barthe, G. and Cederquist, J.G. and Tarento, S. (2004) A Machine-Checked Formalization of the Generic Model and the Random Oracle Model. In: 2nd International Joint Conference on Automated Reasoning, IJCAR , 4-8 Jul 2004, Cork, Ireland. pp. 385-399. Lecture Notes in Computer Science 3097. Springer-Verlag. ISBN 3-540-22345-2
Bazen, A.M. and Bouman, N. and Veldhuis, R.N.J. (2004) A multi-scale approach to directional field reconstruction. In: 15th Annual Workshop on Circuits Systems and Signal Processing (ProRISC), Veldhoven, The Netherlands. pp. 215-218. Technology Foundation STW. ISBN 90-73461-43-X
Bazen, A.M. and Veldhuis, R.N.J. (2004) Likelihood Ratio-Based Biometric Verification. IEEE Transactions on Circuits and Systems for Video Technology, 14 (1). pp. 86-94. ISSN 1051-8215 *** ISI Impact 2,254 ***
Bazen, A.M. and Veldhuis, R.N.J. (2004) Detection of cores in fingerprints with improved dimension reduction. In: 4th IEEE Benelux Signal Processing Symposium (SPS-2004), Hilvarenbeek, The Netherlands. pp. 41-44. IEEE Benelux Signal Processing Chapter.
ter Beek, M. and Lenzini, G. and Petrocchi, M. (2004) Team Automata for Security (A Survey). In: Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems (SecCo 2004), Aug.30-Sept.4, 2004, London, United Kingdom. pp. 105-119. Electronic Notes in Theoretical Computer Science 128 (5). Elsevier. ISSN 1571-0661
Beumer, G.M. and Veldhuis, R.N.J. and Bazen, A.M. (2004) Transparent face recognition in the home environment. In: 15th Annual Workshop on Circuits Systems and Signal Processing (ProRISC), Veldhoven, The Netherlands. pp. 225-229. Technology Foundation STW. ISBN 90-73461-43-X
Bhargavan, K. and Corin, R.J. and Fournet, C. and Gordon, A.D. (2004) Secure Sessions for Web Services. In: ACM Workshop on Secure Web Services (SWS), October 29 - 29, 200, Fairfax, Virginia. pp. 56-66. ACM Press. ISBN 1-58113-973-X
Breij, P.A.E. (2004) Ethical Aspects of Facial Recognition Systems in Public Places. Journal of information, communication and ethics in society, 2 (2). pp. 97-109. ISSN 1477-996X
Brinkman, R. and Doumen, J.M. and Jonker, W. (2004) Using secret sharing for searching in encrypted data. Technical Report TR-CTIT-04-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Doumen, J.M. and Jonker, W. (2004) Using secret sharing for searching in encrypted data. In: Workshop on Secure Data Management in a Connected World (SDM), 30 Aug 2004, Toronto, Canada. pp. 18-27. Lecture Notes in Computer Science 3178. Springer-Verlag. ISSN 0302-9743 ISBN 3-540-22983-3
Brinkman, R. and Doumen, J.M. and Jonker, W. and Schoenmakers, B. (2004) Method of and device for querying of protected structured data. Patent PHNL040611 US (Application).
Brinkman, R. and Feng, Ling and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Technical Report TR-CTIT-04-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Feng, Ling and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Information Systems Security Journal, 13 (3). pp. 14-21. ISSN 1065-898X
Brinkman, R. and Feng, Ling and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. In: Proceedings of the 2nd International Workshop on Security In Information Systems (WOSIS), 13-14 Apr 2004, Porto, Portugal. pp. 126-135. INSTICC Press. ISBN 972-8865-07-4
Cederquist, J.G. and Torabi Dashti, M. (2004) Formal Analysis of a Fair Payment Protocol. In: 2nd International Workshop on Formal Aspect of Security and Trust (FAST), 22-27 Aug 2004, Toulouse, France. pp. 41-54. IFIP International Federation for Information Processing 173. Kluwer Academic Publishers. ISBN 9780387240503
Chong, Chuen Ngen and Ren, B. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Corin, R.J. (2004) License protection with a tamper-resistant token. In: 5th Workshop on Information Security Applications (WISA), Jeju Island, Korea. pp. 223-237. Springer-Verlag. ISBN 3-540-24015-2
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security Analysis of Parlay/OSA Framework. In: 9th Int. Conf. on Intelligence in service delivery Networks ICIN, Bordeaux, France. pp. 54-59. IOS Press.
Corin, R.J. and Doumen, J.M. and Etalle, S. (2004) Analysing Password Protocol Security Against Off-line Dictionary Attacks. In: Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004), 26 June 2004, Bologna, Italy. pp. 47-63. Electronic Notes in Theoretical Computer Science 121. Elsevier. ISSN 1571-0661
Corin, R.J. and Etalle, S. (2004) A simple procedure for finding guessing attacks (Extended Abstract). Technical Report TR-CTIT-04-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2004) Timed Model Checking of Security Protocols. Technical Report TR-CTIT-04-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2004) Timed Model Checking of Security Protocols. In: 2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE), Fairfax, Virginia. pp. 23-32. ACM Press. ISBN 1-58113-971-3
Corin, R.J. and Etalle, S. and den Hartog, J.I. and Lenzini, G. and Staicu, I.S. (2004) A Logic for Auditing Accountability in Decentralized Systems. In: 2nd Int. Workshop on Formal Aspect of Security and Trust (FAST), Toulouse, France. pp. 187-201. Springer-Verlag. ISBN 0-387-24050-0
van Dijk, J.A.G.M. (2004) Divides in succession: possession, skills and use of the new media for participation. In: Media Access: Social and Psychological Dimensions of New Technology Use. Lawrence Erlbaum Assoc, Hillsdale, New Jersey. ISBN 0805841091
Doumen, J.M. and Brinkman, R. and Jonker, W. (2004) Searching in Encrypted Data. In: Finite Fields: Theory and Applications, 5-11 Dec 2004, Oberwolfach, Germany. pp. 2951-2951. Oberwolfach Reports 54/2004. European Mathematical Society. ISSN 1660-8933
Dubbeld, L. (2004) Limits on surveillance: frictions, fragilities and failures in the operation of camera surveillance. Journal of information, communication and ethics in society, 2 (1). pp. 9-19. ISSN 1477-996X
Dubbeld, L. (2004) Protecting personal data in camera surveillance practices. Surveillance and Society, 2 (4). pp. 546-563. ISSN 1477-7487
Dubbeld, L. (2004) The role of technology in shaping CCTV surveillance practices. Information, Communication & Society.
Dubbeld, L. (2004) The regulation of the observing gaze: privacy implications of video surveillance. PhD thesis, University of Twente.
Feng, Ling and Apers, P.M.G. and Jonker, W. (2004) Towards Context-Aware Data Management for Ambient Intelligence. In: Proceedings of the 15th International Conference on Database and Expert Systems Applications (DEXA 2004), Aug 30-Sep 3, 2004, Zaragoza, Spain. pp. 422-431. Lecture Notes in Computer Science 3180. Springer-Verlag. ISBN 3-540-22936-1
Feng, Ling and Jonker, W. (2004) Preparations for Encrypted XML Metadata Querying. International Journal of Computer Systems Science & Engineering, 19 (3/4). pp. 95-103. ISSN 0267-6192 *** ISI Impact 0,291 ***
Hartel, P.H. and van Eck, P.A.T. and Etalle, S. and Wieringa, R.J. (2004) Modelling mobility aspects of security policies. (Invited) In: Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS), March 10-14, 2004, Marseille, France. pp. 172-191. Lecture Notes in Computer Science 3362. Springer-Verlag. ISBN 3-540-24287-2
den Hartog, J.I. and de Vink, E.P. (2004) Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. In: 2nd Int. Workshop on Formal Aspect of Security and Trust (FAST), Toulouse, France. pp. 85-98. Kluwer Academic Publishers. ISBN 0-387-24050-0
Hollestelle, G. and Burgers, W. and den Hartog, J.I. (2004) Power analysis on smartcard algorithms using simulation. Technical report CSR 04-22, Eindhoven University of Technology, Eindhoven.
Kalker, T. and Epema, D.H.J. and Hartel, P.H. and Lagendijk, R.L. and van Steen, M. (2004) Music2Share - Copyright-Compliant Music Sharing in P2P Systems. Proceedings of the IEEE Special Issue on Digital Rights Management, 92 (6). pp. 961-970. ISSN 0018-9219 *** ISI Impact 5,629 ***
Kuijper, M. and Polderman, J.W. (2004) R-S list decoding from a system theoretic perspective. IEEE Transactions on Information Theory, 50. pp. 259-271. ISSN 0018-9448 *** ISI Impact 1,737 ***
Law, Yee Wei and Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Corin, R.J. (2004) Licensing Structured Data with Ease. In: 2nd IFIP TC6 WG6.11 Int. Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmenau, Germany. Technical Univ. Ilmenau. ISBN not assigned
Law, Yee Wei and Doumen, J.M. and Hartel, P.H. (2004) Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract). In: 1st IEEE Int. Conf. on Mobile Ad-hoc and Sensor Systems (MASS), 25-27 Oct. 2004, Fort Lauderdale, Florida. pp. 447-456. IEEE Computer Society. ISBN 0-7803-8815-1
Risse, T. and Aberer, K. and Wombacher, A. and Surridge, M. and Taylor, S. (2004) Configuration of distributed message converter systems. Performance evaluation, 58 (1). pp. 43-80. ISSN 0166-5316 *** ISI Impact 0,944 ***
Veldhuis, R.N.J. and Bazen, A.M. (2004) Maximum Discrimination Analysis (MDA) as a Means for Dimension Reduction in Biometric Verification. In: Workshop on Biometrics: Challenges arising from Theory to Practice, Cambridge, UK. pp. 31-34. The International Association for Pattern Recognition.
Veldhuis, R.N.J. and Bazen, A.M. (2004) Figures of Merit for Biometric Verification and a Means for Dimension Reduction. In: 25th Symposium on Information Theory in the Benelux, Rolduc, The Netherlands. pp. 145-152. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 90-71048-20-9
Veldhuis, R.N.J. and Bazen, A.M. and Booij, W.D.T. and Hendrikse, A.J. (2004) A Comparison of Hand-Geometry Recognition Methods Based on Low- and High-Level Features. In: 15th Annual Workshop on Circuits Systems and Signal Processing (ProRISC), Veldhoven, The Netherlands. pp. 326-330. Technology Foundation STW. ISBN 90-73461-43-X
Veldhuis, R.N.J. and Bazen, A.M. and Kauffman, J.A. and Hartel, P.H. (2004) Biometric verification based on grip-pattern recognition. (Invited) In: IS&T/SPIE 16th Annual Symp. on Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California. pp. 634-641. SPIE -- The Int. Society for Optical Engineering. ISBN 0-8194-5209-2
Wombacher, A. and Aberer, K. (2004) Requirements for workflow modeling in P2P-Workflows derived from collaboration establishment. In: 15th International Workshop on Database and Expert Systems Applications, DEXA'04, 30 Aug - 03 Sep 2004, Zaragoza, Spain. pp. 1036-1041. IEEE Computer Society. ISBN 0769521959

2003

Gras, F. and Le Dantec, B. and Trébucq, O. and Cucinelli, B. and Leduc, M. and Simplot, D. and Bueker, U. and Barthe, G. and Michaud, B. and Hartel, P.H. and Thevenot, B. and Moedl, A. and Quisquater, J.-J. and Thomasson, J.-P. and Canto, E., ed. (2003) RESET Roadmap for European research on Smartcard rElated Technologies. Report Type UNSPECIFIED Number UNSPECIFIED
Misa, T.J. and Breij, P.A.E. and Feenberg, A., ed. (2003) Modernity and Technology. MIT Press, Cambridge, Massachusetts. ISBN 0262134217
Oudshoorn, N.E.J. and Pinch, T.J., ed. (2003) How Users Matter. The Co-construction of Technologies and Users. MIT Press, Cambridge, Massachusetts. ISBN 0262151073
Bazen, A.M. and Gerez, S.H. (2003) Fingerprint Matching by Thin-plate Spline Modelling of Elastic Deformations. Pattern recognition, 36 (8). pp. 1859-1867. ISSN 0031-3203 *** ISI Impact 3,399 ***
Bazen, A.M. and Veldhuis, R.N.J. and Croonen, G.H. (2003) Likelihood Ratio-Based Detection of Facial Features. In: 14th Annual Workshop on Circuits Systems and Signal Processing (ProRISC), Veldhoven, The Netherlands. pp. 323-329. Technology Foundation STW. ISBN 90-73461-39-1
ter Beek, M. and Lenzini, G. and Petrocchi, M. (2003) Team Automata for Security Analysis of Multicast/Broadcast Communication. In: ATPN Workshop on Issues in Security and Petri Nets (WISP), 23 June 2003, Eindhoven, The Netherlands. pp. 57-62. Beta Research School for Operations Management and Logistics. ISBN not assigned
Bistarelli, S. and Cervesato, I. and Lenzini, G. and Martinelli, F. (2003) Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. In: 2nd Int. Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS), St. Petersburg, Russia. pp. 86-99. Springer-Verlag. ISBN 3-540-40797-9
Breij, P.A.E. (2003) Theorizing Technology and Modernity. In: Modernity and Technology. MIT Press, Cambridge, Massachusetts. ISBN 0262134217
Brinkman, R. and Feng, Ling and Etalle, S. and Hartel, P.H. and Jonker, W. (2003) Experimenting with linear search in encrypted data. Technical Report TR-CTIT-03-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Jonker, W. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. In: 3rd Int. Conf. on Web Delivering of Music (WEDELMUSIC), Leeds, UK. pp. 122-129. IEEE Computer Society. ISBN 0-7695-1935-0
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language. In: IFIP TC6 WG6.11 Int. Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmenau, Germany. pp. 104-115. Technical Univ. Ilmenau.
Chong, Chuen Ngen and Corin, R.J. and Law, Yee Wei and Etalle, S. (2003) License Interpreter, Manager and Interface for LicenseScript. Report Type UNSPECIFIED Number UNSPECIFIED,
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. (2003) Comparing Logic-based and XML-based Rights Expression Languages. In: Confederated Int. Workshops: On The Move to Meaningful Internet Systems (OTM), Catania, Sicily, Italy. pp. 779-792. Springer-Verlag. ISBN 3-540-20494-6
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Law, Yee Wei (2003) Approximating Fair Use in LicenseScript. In: 6th Int. Conf. of Asian Digital Libraries (ICADL), Kuala Lumpur, Malaysia. pp. 432-443. Springer-Verlag. ISBN 3-540-20608-6
Chong, Chuen Ngen and Peng, Zhonghong and Hartel, P.H. (2003) Secure Audit Logging with Tamper-Resistant Hardware. In: 18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC), Athens, Greece. pp. 73-84. Kluwer Academic Publishers. ISBN 1-4020-7449-2
Corin, R.J. and Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. (2003) How to pay in LicenseScript. Technical Report TR-CTIT-03-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2003) A Trace Logic for Local Security Properties. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003), December 14 2003, Mumbai, India. pp. 129-143. Electronic Notes in Theoretical Computer Science 118. Elsevier. ISSN 1571-0661
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2003) On Modelling Real-time and Security properties of Distributed Systems (Extended Abstract). Technical Report TR-CTIT-03-46, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Malladi, S. and Alves-Foss, J. and Etalle, S. (2003) Guess what? Here is a new tool that finds some new guessing attacks (Extended Abstract). In: IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security (WITS), Warsaw, Poland. pp. 62-71. Dipartamento di Scienze dell'Informazione Universita di Bologna.
Di Pietro, R. and Mancini, L.V. and Law, Yee Wei and Etalle, S. and Havinga, P.J.M. (2003) LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In: 32nd Int. Conf. on Parallel Processing Workshops (ICPP), Kaohsiung, Taiwan. pp. 397-406. IEEE Computer Society. ISBN 0-7695-2018-9
Dillema, F.W. and Stabell-Kulø, T. (2003) Pesto flavoured security. In: 22nd Symp. on Reliable Distributed Systems (SRDS), Florence, Italy. pp. 241-249. IEEE Computer Society. ISBN 0-7695-1955-5
Doumen, J.M. (2003) Some Applications of Coding Theory in Cryptography. PhD thesis, Eindhoven University of Technology. ISBN 90-386-0702-4
Etalle, S. and Mukhopadhyay, S. and Roychoudhury, A. (2003) Preface. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003), December 14 2003, Mumbai, India. 1. Electronic Notes in Theoretical Computer Science 118. Elsevier. ISSN 1571-0661
Feng, Ling and Jonker, W. (2003) Efficient Processing of Secured XML Metadata. In: On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 3-7 November 2003, Catania, Sicily, Italy. pp. 704-717. Lecture Notes in Computer Science 2889. Springer-Verlag. ISSN 0302-9743 ISBN 3-540-20494-6
Gebska, M. and Montoya Morales, A.L. and Paresi, C. (2003) Manage data – manage hazards – development of urban hazard information infrastructure for Windhoek (Namibia). In: First International ICSC Symposium on Information Technologies in Environmental Engineering ITEE'2003, 24-27 June 2003, Gdansk, Poland. -70. ICSC-NAISO Academic Press. ISBN 3-906454-33-9
Gnesi, S. and Lenzini, G. and Martinelli, F. (2003) Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability. In: Proceedings of the MEFISTO Project 2003, Formal Methods for Security and Time, Pisa, Italy. pp. 111-126. Electronic Notes in Theoretical Computer Science 99. Elsevier. ISSN 1571-0661
Gnesi, S. and Lenzini, G. and Martinelli, F. (2003) Logical Specification and Analysis of Fault Tolerant Systems through Partial Model Checking. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003), December 14 2003, Mumbai, India. pp. 57-70. Electronic Notes in Theoretical Computer Science 118. Elsevier. ISSN 1571-0661
Hafkamp, W.H.M. (2003) Thema Cybercrime: gewaarschuwde organisatie telt voor twee. Tijdschrift controlling, 18 (6). pp. 19-24. ISSN 1389-7713
den Hartog, J.I. and Verschuren, J. and de Vink, E.P. and Vos, J. and Wiersma, W. (2003) PINPAS: A Tool for Power Analysis of Smartcards. In: 18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC), Athens, Greece. pp. 453-457. Kluwer Academic Publishers. ISBN 1-4020-7449-2
Jansen, D.N. (2003) Extensions of Statecharts with probability, time, and stochastic timing. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 03-57 ISBN 3-9522850-0-5
Jansen, D.N. and Hermanns, H. and Katoen, J.P. (2003) A QoS-oriented extension of UML statecharts. In: «UML» 2003: the unified modeling language, 20-24 Oct 2003, San Francisco, Calif., USA. pp. 76-91. Lecture Notes in Computer Science 2863. Springer-Verlag. ISBN 3-540-20243-9
de Jong, E.K. and Hartel, P.H. (2003) Method and apparatus for deployment of high integrity software using static procedure return addresses. Patent US20030177474 (Application).
Jonker, W. (2003) XML and Secure Data Management in an Ambient World. International Journal of Computer Systems Science & Engineering, 18 (5). pp. 311-317. ISSN 0267-6192 *** ISI Impact 0,291 ***
Kauffman, J.A. and Bazen, A.M. and Gerez, S.H. and Veldhuis, R.N.J. (2003) Grip-pattern recognition for smart guns. In: 14th Annual Workshop on Circuits Systems and Signal Processing (ProRISC), Veldhoven, The Netherlands. pp. 379-384. Technology Foundation STW. ISBN 90-73461-39-1
Kuijper, M. and Polderman, J.W. (2003) A behavioral framework for Reed-Solomon decoding through multiplicative bivariate interpolation. In: 42nd IEEE Conf. Decision and Control, Maui, Hawaii. pp. 1621-1626. IEEE Computer Society. ISBN 0-7803-7925-x
te Kulve, H. and Smit, W.A. (2003) Civilian-military co-operation strategies in developing new technologies. Research Policy, 32 (6). pp. 955-970. ISSN 0048-7333 *** ISI Impact 3,470 ***
Laud, P. and Corin, R.J. (2003) Sound Computational Interpretation of Formal Encryption with Composed Keys. Technical Report TR-CTIT-03-42, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Laud, P. and Corin, R.J. (2003) Sound Computational Interpretation of Formal Encryption with Composed Keys. In: 6th Annual Int. Conf. on Information Security and Cryptology (ICISC), Seoul, Korea. pp. 55-66. Springer-Verlag. ISBN 3-540-21376-7
Law, Yee Wei and Corin, R.J. and Etalle, S. and Hartel, P.H. (2003) A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. In: 4th IFIP TC6/WG6.8 Int. Conf on Personal Wireless Communications (PWC), Venice, Italy. pp. 27-39. Springer-Verlag. ISBN 3-540-20123-8
Law, Yee Wei and Etalle, S. and Hartel, P.H. (2003) Assessing Security in Energy-Efficient Sensor Networks. In: 18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC), May 26-28, 2003, Athens, Greece. pp. 459-463. Kluwer Academic Publishers. ISBN 1-4020-7449-2
Lenzini, G. and Gnesi, S. and Latella, D. (2003) Spider: a Security Model Checker. In: 1st Int. Workshop on Formal Aspect of Security and Trust (FAST), Pisa, Italy. pp. 163-180. Istituto di Informatica e Telematica (IIT-CNR).
Maathuis, I.H.J. and Smit, W.A. (2003) The battle between standards: TCP/IP vs OSI victory through path dependency or by quality. In: 3rd IEEE Conf. on Standardization and Innovation in Information Technology, Delft, The Netherlands. pp. 161-176. The Institute of Electrical and Electronics Engineers. ISBN 0-7803-8172-6
Oudshoorn, N.E.J. and Pinch, T.J. (2003) How users and non-users matter. In: How Users Matter. The Co-construction of Technologies and Users. MIT Press, Cambridge, Massachusetts, pp. 4-22. ISBN 0262151073
Oudshoorn, N.E.J. and Rommes, E. and Stienstra, M. (2003) Configuring the user as everybody: gender and design cultures in information and communication technologies. Science, Technology and Human Values, 29 (1). pp. 30-63. ISSN 0162-2439 *** ISI Impact 2,646 ***
Rip, A. (2003) Societal challenges for R&D evaluation. In: Learning from Science and Technology Policy Evaluation. Edward Elgar Publishing Ltd., Cheltenham, UK, pp. 32-53. ISBN 1-84064-875-9
Veldhuis, R.N.J. and Bazen, A.M. and Boersma, M. (2003) Biometric verification: A result and an exotic example. In: 24th Symposium on Information Theory in the Benelux, Veldhoven, The Netherlands. pp. 109-116. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 90-71048-18-7
Veldhuis, R.N.J. and Klabbers, E.A.M. (2003) On the computation of the Kullback-Leibler measure for spectral distances. IEEE Transactions on Speech and Audio Processing, 11 (1). pp. 100-103. ISSN 1063-6676
Xu, Sheng-bo and Doumen, J.M. and van Tilborg, H.C.A. (2003) On the Security of Digital Signature Schemes Based on Error-Correcting Codes. Designs, Codes and Cryptography, 28 (2). pp. 187-199. ISSN 0925-1022 *** ISI Impact 0,781 ***

2002

Abelmann, L. and Chong, Chuen Ngen and Hartel, P.H. and Lodder, J.C. (2002) Design Rationale for Secure Probe Storage based on Patterned Magnetic Media. Technical Report TR-CTIT-02-42, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bazen, A.M. (2002) Fingerprint Identification - Feature Extraction, Matching and Database Search. PhD thesis, University of Twente. ISBN 9036517818
Bazen, A.M. and Gerez, S.H. (2002) Systematic Methods for the Computation of the Directional Fields and Singular Points of Fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24 (7). pp. 905-919. ISSN 0162-8828 *** ISI Impact 6,077 ***
Bazen, A.M. and Veldhuis, R.N.J. (2002) Likelihood-ratio-based biometric verification. In: 13th Annual Workshop on Circuits Systems and Signal Processing (ProRISC), Veldhoven, The Netherlands. pp. 184-189. Technology Foundation STW. ISBN 90-73461-33-2
Beelen, P. and Doumen, J.M. (2002) Pseudorandom sequences from elliptic curves. In: 6th Int. Conf. Finite Fields with Applications to Coding Theory, Cryptography and Related Areas, Oaxaca, Mexico. pp. 37-52. Springer-Verlag. ISBN 3540439617
Brinkman, R. and Hoepman, J.H. (2002) Secure Method Invocation in JASON. In: 5th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), Nov. 20-22, 2002, San Jose, California. pp. 29-40. USENIX Association. ISBN 1-931971-04-8
Chong, Chuen Ngen and van Buuren, R. and Hartel, P.H. and Kleinhuis, G. (2002) Security Attributes Based Digital Rights Management. In: Joint Int. Workshop on Interactive Distributed Multimedia Systems / Protocols for Multimedia Systems (IDMS/PROMS), Coimbra, Portugal. pp. 339-352. Springer-Verlag. ISBN 3-540-00169-7
Corin, R.J. and Etalle, S. (2002) An Improved Constraint-based system for the verification of security protocols. In: 9th Int. Static Analysis Symp. (SAS), Madrid, Spain. pp. 239-265. Springer-Verlag. ISBN 3-540-44235-9
El Abdouni Khayari, R. and Sadre, R. and Haverkort, B.R.H.M. and Zoschke, N. (2002) A Class-Based Weighted-Fair Queueing Algorithm for WWW Proxy Scheduling. In: SPIE 4865 Internet Performance and Control of Network Systems III, Boston, Massachusetts. pp. 120-131. Int. Soc. for Optial Engineering.
Eshuis, H. and Jansen, D.N. and Wieringa, R.J. (2002) Requirements-level semantics and model checking of object-oriented statecharts. Requirements Engineering, 7 (4). pp. 243-263. ISSN 0947-3602 *** ISI Impact 1,105 ***
Eshuis, H. and Wieringa, R.J. (2002) Verification Support for Workflow Design with UML Activity Graphs. In: 24th Int. Conf. on Software Engineering (ICSE 2002), Orlando, Florida. pp. 166-176. ACM Press. ISBN 1-58113-472-X
Gnesi, S. and Latella, D. and Lenzini, G. (2002) Towards Model Checking a Spi-Calculus Dialect. Technical Report 2002-TR-10, Istituto di Scienza e Tecnologia Informatica (ISTI-CNR), Pisa, Italy.
Hafkamp, W.H.M. (2002) De "mission impossible" van CERT. Informatiebeveiliging, 6. pp. 4-9. ISSN 1569-1063
Hafkamp, W.H.M. (2002) Telt een gewaarschuwde organisatie voor twee? Management & informatie, 10 (6). pp. 19-26. ISSN 0929-1792
Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2002) Low-Cost Planar PTF Sensors for the Identity Verification of Smartcard Holders. (Invited) In: 1st IEEE Int. Conf. on Sensors, Orlando, Florida. pp. 1614-1619. IEEE Computer Society. ISBN 0-7803-7455-X
Henderson, N.J. and White, N.M. and Veldhuis, R.N.J. and Hartel, P.H. and Slump, C.H. (2002) Sensing pressure for authentication. In: 3rd IEEE Benelux Signal Processing Symp. (SPS), Leuven, Belgium. pp. 241-244. ISBN not assigned
van den Heuvel, S.A.F.A. and Jonker, W. and Kamperman, F.L.A.J. and Lenoir, P.J. (2002) Secure content management in authorised domains. In: Int. Broadcasting Convention (IBC), Amsterdam, The Netherlands. pp. 467-474. Broadcastpapers Pty Ltd.
Jansen, D.N. (2002) Probabilistic UML statecharts for specification and verification: a case study. In: Critical systems development with UML: proceedings of the UML'02 workshop, Leipzig, Germany. pp. 121-131. Technical Report TUM-I0208. Technische Universität München.
Jansen, D.N. and Hermanns, H. and Katoen, J.P. (2002) A probabilistic extension of UML statecharts: specification and verification. Technical Report TR-CTIT-02-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jansen, D.N. and Hermanns, H. and Katoen, J.P. (2002) A probabilistic extension of UML statecharts: specification and verification. In: Formal techniques in real-time and fault-tolerant systems: ... FTRTFT, September 9-12, 2002, Oldenburg, Germany. pp. 355-374. Lecture Notes in Computer Science 2469. Springer-Verlag. ISBN 3-540-44165-4
Jansen, D.N. and Wieringa, R.J. (2002) Extending CTL with actions and real time. Journal of logic and Computation, 12 (4). pp. 607-621. ISSN 0955-792X *** ISI Impact 0,585 ***
Klein, S. and Bazen, A.M. and Veldhuis, R.N.J. (2002) Fingerprint segmentation based on hidden Markov models. In: 13th Annual Workshop on Circuits Systems and Signal Processing (ProRISC), Veldhoven, The Netherlands. pp. 310-318. Technology Foundation STW. ISBN 90-73461-33-2
Kuijper, M. and Polderman, J.W. (2002) Behavioral models for list decoding. Mathematical and Computer Modelling of Dynamical Systems, 8 (4). pp. 429-444. ISSN 1387-3954 *** ISI Impact 0,625 ***
Law, Yee Wei and Etalle, S. and Hartel, P.H. (2002) Key Management with Group-Wise Pre-Deployed Keying and Secret Sharing Pre-Deployed Keying. Technical Report TR-CTIT-02-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Oliván Bescós, J. and Smit, J. and Slump, C.H. (2002) Interactive 4D Cardiac MRI Imaging Based on Iso-Surface Volume Rendering. In: Biomedical Optics and Imaging Symposium, 24-26 Feb 2002, San Diego, California, USA. pp. 322-329. Proceedings of SPIE 4681. SPIE. ISBN 081944426X
Poll, E. and Hartel, P.H. and de Jong, E.K. (2002) A Java Reference Model of Transacted Memory for Smart Cards. In: 5th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), San Jose, California. pp. 75-86. USENIX Association. ISBN 1-931971-04-8
Rip, A. (2002) Contributions from Social Studies of Science and Constructive Technology Assessment. In: On Science and Precaution in the Management of Technological Risk. ESTO Project Report. Volume II. Case Studies, Report EUR 19056/EN/2, European Commission Joint Research Centre, Brussels, pp. 94-122.
Rip, A. and Smit, W.A. (2002) Het risicobegrip vanuit een wetenschapsfilosofisch en sociologisch perspectief. In: Perspectieven op milieurisico's. WRR Werkdocumenten, W128, Wetenschappelijke Raad voor het Regeringsbeleid, Den Haag, pp. 67-102.
Stabell-Kulø, T. (2002) Private Computing: The Trusted Digital Assistant. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 03-45 ISBN 90-365-1762-1
Veldhuis, R.N.J. (2002) The Centroid of the Symmetrical Kullback-Leibler Distance. IEEE signal processing letters, 9 (3). pp. 96-99. ISSN 1070-9908 *** ISI Impact 1,661 ***
Verheul, E. and Doumen, J.M. and van Tilborg, H.C.A. (2002) Sloppy Alice Attacks! Adaptive Chosen Ciphertext Attacks on the McEliece cryptosystem. In: Information, Coding and Mathematics. Kluwer Academic Publishers, Boston, Massachusetts, pp. 99-119. ISBN 1-4020-7079-9

2001

Cucinelli, B., ed. (2001) Research for the Smart Card of 2010. external_report Number UNSPECIFIED European Commission - Information Society Directorate-General, Brussels.
Jonker, W., ed. (2001) Databases in Telecommunications II, Proceedings of the VLDB 2001 International Workshop (DBTel 2001). Lecture Notes in Computer Science 2209. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-540-42623-3
Breij, P.A.E. (2001) The role of social and ethical studies of IT in the university curriculum. (Invited) In: 2nd Int. Workshop for Foundations of Information Ethics (FINE), Hiroshima, Japan. 10. Hiroshima Univ. Press.
Delzanno, G. and Etalle, S. (2001) Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. In: 11th Int. Logic Based Program Synthesis and Transformation (LOPSTR), Paphos, Greece. pp. 76-90. Springer-Verlag. ISSN 0302-9743 ISBN 3-540-43915-3
van Dijk, J.A.G.M. and de Vos, L. (2001) Searching for the Holy Grail, Images of interactive television. New media and society, 3 (4). pp. 443-465. ISSN 1461-7315
Domingo-Ferrer, J. and Hartel, P.H. (2001) Current directions in smart cards. Computer Networks, 36 (4). pp. 377-379. ISSN 1389-1286 *** ISI Impact 1,446 ***
van Eck, P.A.T. and Engelfriet, J. and Fensel, D. and van Harmelen, F.A. and Venemaand, Y. and Willems, M. (2001) A Survey of Languages for Specifying Dynamics: A Knowledge Engineering Perspective. IEEE Transactions on Knowledge and Data Engineering, 13 (3). pp. 462-496. ISSN 1041-4347 *** ISI Impact 2,476 ***
Ehren, S. and Ludwig, N. and Haverkort, B.R.H.M. and El Abdouni Khayari, R. (2001) Entwurf, Implementierung und Bewertung eines Kryptographiemoduls fuer Client-Server Handelssysteme. In: 5th Int. Conf. on Wirtschaftsinformatik -- Information Age Economy, Augsburg, Germany. pp. 503-516. Physica-Verlag.
Hartel, P.H. (2001) Veiligheid in Gedistribueerde Systemen. University of Twente. ISBN not assigned
Hartel, P.H. and Butler, M.J. and de Jong, E.K. and Longley, M. (2001) Transacted Memory for Smart Cards. In: 10th Formal Methods for Increasing Software Productivity (FME), Berlin, Germany. pp. 478-499. Springer-Verlag. ISBN 3-540-41791-5
Hartel, P.H. and Jacobs, B.P.F. (2001) De Smartcard van 2010. Smart Cards in Business, 6 (7). pp. 14-16. ISSN 1569-1179
Hartel, P.H. and Moreau, L.A.V. (2001) Formalizing the Safety of Java, the Java Virtual Machine and Java Card. ACM Computing Surveys, 33 (4). pp. 517-558. ISSN 0360-0300 *** ISI Impact 5,243 ***
Henderson, N.J. and Papakostas, T.V. and White, N.M. and Hartel, P.H. (2001) Polymer thick-film sensors: Possibilities for smartcard biometrics. In: 11th Conf. on Sensors and Their Applications, London, UK. pp. 83-88. IOP Publishing. ISBN 0750308214
Henderson, N.J. and White, N.M. and Hartel, P.H. (2001) iButton enrolment and verification times for the pressure sequence smartcard biometric. In: 2nd Conf. Smart card Programming and Security (E-smart), Cannes, France. pp. 124-134. Lecture Notes in Computer Science 2140. Springer-Verlag. ISBN 3-540-42610-8
Spruit, P.A. and Wieringa, R.J. and Meyer, J.J.C. (2001) Regular database update logics. Theoretical computer science, 254 (1-2). pp. 591-661. ISSN 0304-3975 *** ISI Impact 0,643 ***
Wieringa, R.J. and Jansen, D.N. (2001) Techniques for reactive system design: the tools in TRADE. In: Advanced information systems engineering: 13th international conference, CAiSE. pp. 93-107. Lecture notes in computer science 2068. Springer-Verlag. ISBN 3-540-42215-3

2000

Breij, P.A.E. (2000) Disclosive Computer Ethics: The Exposure and Evaluation of Embedded Normativity in Computer Technology. Computers and Society, 30. pp. 10-16. ISSN 0095-2737
Geels, F.W. and Smit, W.A. (2000) Failed technology futures: pitfalls and lessons from a historical survey. Futures, 32. pp. 867-885.
Gnesi, S. and Latella, D. and Lenzini, G. (2000) A BRUTUS Logic for a Spi-Calculus Dialect. Report Type UNSPECIFIED TR-B4-27,
Hartel, P.H. (2000) Formalising Java safety -- An overview. In: 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), Bristol, UK. pp. 115-134. Kluwer Academic Publishers. ISBN 0-7923-7953-5
Hartel, P.H. and de Jong, E.K. (2000) A programming and a modelling perspective on the evaluation of Java Card implementations. In: 1st Java on Smart Cards: Programming and Security (Java Card Workshop), Cannes, France. pp. 52-72. Springer-Verlag. ISBN 3-540-42167-X
Henderson, N.J. and Hartel, P.H. (2000) Pressure Sequence - A Novel Method of Protecting Smart Cards. In: 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), Bristol, UK. pp. 241-256. Kluwer Academic Publishers. ISBN 0-7923-7953-5
Jansen, D.N. and Wieringa, R.J. (2000) Reducing the extensions of CTL with actions and real time. Technical Report TR-CTIT-00-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Risse, T. and Wombacher, A. and Aberer, K. (2000) Efficient Processing Of Voluminous EDI Documents. In: 8th European Conference on Information Systems (ECIS 2000), 3-5 July 2000, Vienna, Austria. online.
Schuba, M. and Haverkort, B.R.H.M. and Schneider, G. (2000) Performance Evaluation of Multicast Communication in Packet-Switched Networks. Performance evaluation, 39. pp. 61-80. ISSN 0166-5316 *** ISI Impact 0,944 ***
Tettero, O. (2000) Intrinsic information Security: Embedding security issues in the design process of telematics systems. PhD thesis, Telematica Instituut Fundamental Research Series TI/FRS/006. ISBN 90-75176-22-8

1999

Bruinsma, G.J.N. and van der Vijver, C.D., ed. (1999) Public Safety in Europe. IPIT, Enschede. ISBN 90-365-1373-1
Jonker, W., ed. (1999) Proceedings of the International Workshop on Databases in Telecommunications, Co-located with VLDB-99 Edinburgh, Scotland, UK, September 6th, 1999. Lecture Notes in Computer Science 1819. Springer Verlag, Berlin. ISBN 978-3-540-67667-6
Breij, P.A.E. (1999) Worker Autonomy and the Drama of Digital Networks in Organizations. Journal of Business Ethics, 22 (1). pp. 15-25. ISSN 0167-4544 *** ISI Impact 1,837 ***
van Dijk, J.A.G.M. (1999) The one-dimensional network society of Manuel Castells. New Media and Society, 1 (1). pp. 127-138.
van Dijk, J.A.G.M. (1999) The Quantity and Quality of Political Participation on the Internet. In: 49th Annual Conf. of the Int. Communication Association, San Francisco, California. 22. Int. Communication Association.
Hartel, P.H. and Butler, M.J. and Levy, M. (1999) The Operational Semantics of a Java Secure Processor. In: Formal Syntax and Semantics of Java. Springer-Verlag, Berlin, pp. 313-352. ISBN 3-540-66158-1
Helme, A. and Stabell-Kulø, T. (1999) Offline delegation. In: 8th USENIX Security Symposium 1999, 23-26 Aug 1999, Washington, DC. pp. 25-33. USENIX Association. ISBN 1880446286
Revill, J.D. and Hartel, P.H. (1999) Modelling a Java Ring based implementation of an N-Count payment system. In: 2nd Workshop on Security in Communication Networks, Amalfi, Italy. pp. 139-150. Univ. of Salerno.

1998

Glentis, G.O. and Slump, C.H. and Herrmann, O.E. (1998) A Versatile Algorithm for Two-Dimensional Symmetric Noncausal Modeling. IEEE transactions on circuits and systems II: analog and digital signal processing, 45 (2). pp. 251-256. ISSN 1057-7130
Hartel, P.H. and Hill, J. and Sims, M. (1998) An Operational Model of QuickPay. In: 3rd Smart card research and advanced application (CARDIS), Louvain la Neuve, Belgium. pp. 19-28. Springer-Verlag. ISBN 3 540 67923 5
Stabell-Kulø, T. and Helme, A. and Dini, G. (1998) Detecting Key-Dependencies. In: 3rd Australasian Conf. on Information Security and Privacy (ACISP), Brisbane, Queensland, Australia. pp. 356-366. Springer-Verlag. ISBN 3-540-64732-5

1997

Alberda, M.I. and Hartel, P.H. and de Jong, E.K. (1997) Using Formal Methods to Cultivate Trust in Smart Card Operating Systems. Future Generation Computer Systems, 13 (1). pp. 39-54. ISSN 0167-739X *** ISI Impact 2,430 ***
den Boer, J.A. and Hoenderop, R.K.K.M. and Smink, J. and Dornseiffen, G. and Koch, P.W.A.A. and Slump, C.H. and Volker, E.D.P. and den Vos, R.A.I. and Mulder, J.H. (1997) Pharmacokinetic Analysis of Gd-DTPA Enhancement in Dynamic Three-Dimensional MRI of Breast Lesions. Journal of magnetic resonance imaging, 7 (4). pp. 702-715. ISSN 1053-1807 *** ISI Impact 3,250 ***
Butler, M.J. and Hartel, P.H. and de Jong, E.K. and Longley, M. (1997) Applying Formal Methods to the Design of Smart Card Software. Technical Report DSSE-TR-97-8, Department of Electronics and Computer Science, University of Southampton, University of Southampton. ISSN not assigned
van Dijk, J.A.G.M. (1997) The Reality of Virtual Community. Trends in Communication, 1 (1). pp. 39-63.
Frints, J.P.G. and Michiels, E.F. (1997) Netwerkbeheer en beveiliging. In: Telematica. Samsom BedrijfsInformatie, Alphen aan de Rijn, pp. 383-403. ISBN 90-14-04439-9
Hartel, P.H. (1997) Special issue: Smart cards. Future Generation Computer Systems, 13 (1). pp. 1-2. ISSN 0167-739X *** ISI Impact 2,430 ***
Helme, A. (1997) A system for secure user-controlled electronic transactions. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 97-17 ISBN 90-423-0011-6
Helme, A. and Stabell-Kulø, T. (1997) Security Functions for a File Repository. Operating Systems Review, 31 (2). pp. 3-8. ISSN 0163-5980
Smit, G.J.M. and Havinga, P.J.M. and van Os, D. (1997) The Harpoon Security System for Helper Programs on a Pocket Companion. In: 23rd Euromicro Conf. -- New Frontiers of Information Technology, Budapest, Hungary. pp. 231-238. IEEE Computer Society. ISSN 1089-6503 ISBN 0-8186-8129-2

1996

Hartel, P.H. and Paradinas, P. and Quisquater, J.-J., ed. (1996) 2nd Smart Card Research and Advanced Application (CARDIS). CWI (Centrum voor Wiskunde en Informatica), Amsterdam. ISBN 90 6196 465 2
Glaser, H. and Hartel, P.H. and de Jong, E.K. (1996) Structuring and Visualising an IC-card Security Standard. In: 2nd Smart card research and advanced application (CARDIS), Amsterdam, The Netherlands. pp. 89-110. CWI (Centrum voor Wiskunde en Informatica). ISBN 90 6196 465 2
Hartel, P.H. and de Jong, E.K. (1996) Smart Cards and Card Operating Systems. In: UNIFORUM, San-Francisco, California. pp. 725-730. Uniforum.
Hartvigsen, G. and Johansen, S. and Helme, A. and Widding, R.A. and Bellika, G. and Cao, W. (1996) The Virtual Secretary Architecture for Secure Software Agents. In: 1st Int. Conf. on the Practical Application of Intelligent Agents and Multi-Agent Technology (PAAM), London, UK. pp. 843-851. Practical Application Company. ISBN 0952555433
Havinga, P.J.M. and Smit, G.J.M. and Helme, A. (1996) Survey of electronic payment methods and systems. In: Web technology, new media, communications and telematics theory, methods, tools and applications (Euromedia), London, UK. pp. 180-187. Society for Computer Simulation. ISBN 1-56555-102-8

1995

Spreeuwers, L.J. and Schutte, K. and Houkes, Z. (1995) A solution to the correspondence problem in multi-view imagery. In: Proceedings of the 1st Annual Conference of the Advanced School for Computing and Imaging, ASCI '95, May 16-18, 1995, Heijen, The Netherlands. pp. 313-322. ASCI. ISBN 9789090083445

1994

Hartel, P.H. and de Jong, E.K. (1994) Towards testability in smart card operating system design. In: 1st Smart card research and advanced application (CARDIS), Lille, France. pp. 73-88. Univ. de Lille.