EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Project: BRICKS/PDC1: Security, Identification and Authentication
Home Policy Brochure Browse Search User Area Contact Help

2007

Bhargavan, K. and Corin, R.J. and Fournet, C. (2007) Crypto-Verifying Protocol Implementations in ML. In: 3rd Workshop on Formal and Computational Cryptography, FCC 2007, 4-5 Jul 2007, Venice, Italy. INRIA. ISBN not assigned
Bhargavan, K. and Corin, R.J. and Fournet, C. and Gordon, A.D. (2007) Secure Sessions for Web Services. ACM Transactions on Information and System Security (TISSEC), 10 (2). 8:1-8:46. ISSN 1094-9224 *** ISI Impact 0,759 ***
Boom, B.J. and van Rootseler, R.T.A. and Veldhuis, R.N.J. (2007) Investigating the boosting framework for face recognition. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 189-196. Werkgemeenschap voor Informatie- en Communicatietechniek. ISBN 978-90-365-2509-1
Boom, B.J. and Spreeuwers, L.J. and Veldhuis, R.N.J. (2007) Automatic face alignment by maximizing similarity score. In: Proceedings of the 7th International Workshop on Pattern Recognition in Information Systems, 12-13 Jun 2007, Madeira. Portugal. pp. 221-230. Biosignals. INSTICC Press. ISBN 978-972-8865-93-1
Corin, R.J. (2007) Computational Soundness of Formal Encryption in Coq. In: 3rd Workshop on Formal and Computational Cryptography, FCC 2007, 4-5 Jul 2007, Venice, Italy. INRIA. ISBN not assigned
Corin, R.J. and Deniélou, P.-M. and Fournet, C. and Bhargavan, K. and Leifer, J. (2007) Secure Implementations for Typed Session Abstractions. In: 20th IEEE Computer Security Foundations Symposium (CSF), 6-8 July, Venice, Italy. pp. 170-186. IEEE Computer Society. ISBN 0-7695-2819-8
Corin, R.J. and Denielou, P-M. (2007) A Protocol Compiler for Secure Sessions in ML. In: 3rd Symposium on Trustworthy Global Computing (TGC) Revised Selected Papers, 5-6 Nov 2007, Sophia Antipolis, France. pp. 276-293. Lecture Notes in Computer Science 4912. Springer Verlag. ISBN 978-3-540-78662-7
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2007) Timed Analysis of Security Protocols. Journal of Computer Security, 15 (6). pp. 619-645. ISSN 0926-227X
Gerez, S.H. (2007) Ontwerptraject digitale IC's. In: Poly-elektronica zakboek. Reed Business bv, Doetinchem, pp. 1-59. ISBN 978-90-6228-484-9
den Hartog, J.I. (2007) Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic. Technical Report TR-CTIT-07-53, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hendrikse, A.J. and Veldhuis, R.N.J. and Spreeuwers, L.J. (2007) Component ordering in independent component analysis based on data power. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 211-218. Werkgemeenschap voor Informatie- en Communicatietechniek. ISBN 978-90-365-2509-1
Spreeuwers, L.J. and Boom, B.J. and Veldhuis, R.N.J. (2007) Better than best: matching score based face registration. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 125-132. Werkgemeenschap voor Informatie- en Communicatietheorie. ISBN 978-90-365-2509-1

2006

Cederquist, J.G. and Torabi Dashti, M. (2006) An intruder model for verifying liveness in security protocols. In: FMSE '06: Proceedings of the fourth ACM workshop on Formal methods in security, Alexandria, Virginia, USA. pp. 23-32. ACM. ISBN 1-59593-550-9
Delzanno, G. and Etalle, S. and Gabbrielli, M. (2006) Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. Theory and Practice of Logic Programming, 6 (3). pp. 225-226. ISSN 1471-0684 *** ISI Impact 0,952 ***
Hendrikse, A.J. (2006) FRICA, face recognition with independent component analysis. Master's thesis, University of Twente.
Veldhuis, R.N.J. and Bazen, A.M. and Booij, W.D.T. and Hendrikse, A.J. (2006) Hand-geometry recognition based on contour landmarks. In: Proceedings of the 29th Annual Conference of the Gesellschaft fur Klassifikation e.V., 09-11 Mar 2005, Magdeburg, Germany. pp. 646-653. Studies in classification, data analysis, and knowledge organisation. Springer Verlag. ISBN 978-3-540-31313-7

2005

Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A Formal Security Analysis of an OSA/Parlay Authentication Interface. In: 7th IFIP WG 6.1 Int. Conf. on Formal Methods for Open Object-Based Distributed Systems (FMOODS), Athens, Greece. pp. 131-146. Springer-Verlag. ISBN 3-540-26181-8
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2005) PS-LTL for Constraint-Based Security Protocol Analysis. In: Logic Programming, 21st International Conference, ICLP 2005, October 2-5, 2005, Sitges, Spain. pp. 439-440. Electronic Notes in Theoretical Computer Science 3668. Springer Verlag. ISBN 3-540-29208-X

2004

Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security Analysis of Parlay/OSA Framework. In: 9th Int. Conf. on Intelligence in service delivery Networks ICIN, Bordeaux, France. pp. 54-59. IOS Press.
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2004) Timed Model Checking of Security Protocols. In: 2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE), Fairfax, Virginia. pp. 23-32. ACM Press. ISBN 1-58113-971-3