Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Bart De Decker
@inproceedings{DBLP:conf/esorics/KalantariPDHJD23, author = {Shirin Kalantari and Pieter Philippaerts and Yana Dimova and Danny Hughes and Wouter Joosen and Bart De Decker}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {A User-Centric Approach to {API} Delegations - Enforcing Privacy Policies on OAuth Delegations}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14345}, pages = {318--337}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51476-0\_16}, doi = {10.1007/978-3-031-51476-0\_16}, timestamp = {Thu, 18 Jan 2024 08:27:15 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KalantariPDHJD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KalantariHD22, author = {Shirin Kalantari and Danny Hughes and Bart De Decker}, title = {Listing the ingredients for {IFTTT} recipes}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {1376--1383}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00194}, doi = {10.1109/TRUSTCOM56396.2022.00194}, timestamp = {Wed, 05 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KalantariHD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/KalantariPD21, author = {Shirin Kalantari and Andreas Put and Bart De Decker}, editor = {Nils Gruschka and Luis Filipe Coelho Antunes and Kai Rannenberg and Prokopios Drogkaris}, title = {Trackers in Your Inbox: Criticizing Current Email Tracking Practices}, booktitle = {Privacy Technologies and Policy - 9th Annual Privacy Forum, {APF} 2021, Oslo, Norway, June 17-18, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12703}, pages = {156--167}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-76663-4\_9}, doi = {10.1007/978-3-030-76663-4\_9}, timestamp = {Wed, 19 May 2021 17:57:56 +0200}, biburl = {https://dblp.org/rec/conf/apf/KalantariPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/KalantariPD21, author = {Shirin Kalantari and Andreas Put and Bart De Decker}, title = {PhD Forum: Trust Management for Context-aware Access Control Systems in IoT}, booktitle = {7th {IEEE} World Forum on Internet of Things, WF-IoT 2021, New Orleans, LA, USA, June 14 - July 31, 2021}, pages = {909--910}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WF-IoT51360.2021.9595877}, doi = {10.1109/WF-IOT51360.2021.9595877}, timestamp = {Tue, 16 Nov 2021 08:53:09 +0100}, biburl = {https://dblp.org/rec/conf/wf-iot/KalantariPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotsms/BaelKPD20, author = {Dries Van Bael and Shirin Kalantari and Andreas Put and Bart De Decker}, editor = {Larbi Boubchir and Elhadj Benkhelifa and Yaser Jararweh and Imad Saleh}, title = {A Context-Aware Break Glass Access Control System for IoT Environments}, booktitle = {7th International Conference on Internet of Things: Systems, Management and Security, {IOTSMS} 2020, Virtual Event, France, December 14-16, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IOTSMS52051.2020.9340209}, doi = {10.1109/IOTSMS52051.2020.9340209}, timestamp = {Fri, 12 Feb 2021 12:29:49 +0100}, biburl = {https://dblp.org/rec/conf/iotsms/BaelKPD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/LemaireVDN17, author = {Laurens Lemaire and Jan Vossaert and Bart De Decker and Vincent Naessens}, editor = {Gregorio D'Agostino and Antonio Scala}, title = {Security Evaluation of Cyber-Physical Systems Using Automatically Generated Attack Trees}, booktitle = {Critical Information Infrastructures Security - 12th International Conference, {CRITIS} 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10707}, pages = {225--228}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-99843-5\_20}, doi = {10.1007/978-3-319-99843-5\_20}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/critis/LemaireVDN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/LemaireVDN17, author = {Laurens Lemaire and Jan Vossaert and Bart De Decker and Vincent Naessens}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Extending {FAST-CPS} for the Analysis of Data Flows in Cyber-Physical Systems}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {37--49}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_4}, doi = {10.1007/978-3-319-65127-9\_4}, timestamp = {Thu, 14 Oct 2021 10:27:55 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/LemaireVDN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jices/MilutinovicD16, author = {Milica Milutinovic and Bart De Decker}, title = {Ethical aspects in eHealth - design of a privacy-friendly system}, journal = {J. Inf. Commun. Ethics Soc.}, volume = {14}, number = {1}, pages = {49--69}, year = {2016}, url = {https://doi.org/10.1108/JICES-06-2014-0028}, doi = {10.1108/JICES-06-2014-0028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jices/MilutinovicD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/VossaertLDN16, author = {Jan Vossaert and Jorn Lapon and Bart De Decker and Vincent Naessens}, title = {Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices}, journal = {Secur. Commun. Networks}, volume = {9}, number = {2}, pages = {106--117}, year = {2016}, url = {https://doi.org/10.1002/sec.301}, doi = {10.1002/SEC.301}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/VossaertLDN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/PutD16, author = {Andreas Put and Bart De Decker}, editor = {Mohammad S. Obaidat}, title = {Attribute-Based Privacy-Friendly Access Control with Context}, booktitle = {E-Business and Telecommunications - 13th International Joint Conference, {ICETE} 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {764}, pages = {291--315}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-67876-4\_14}, doi = {10.1007/978-3-319-67876-4\_14}, timestamp = {Mon, 21 Jan 2019 11:20:27 +0100}, biburl = {https://dblp.org/rec/conf/icete/PutD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/risk/LemaireVDN16, author = {Laurens Lemaire and Jan Vossaert and Bart De Decker and Vincent Naessens}, editor = {J{\"{u}}rgen Gro{\ss}mann and Michael Felderer and Fredrik Seehusen}, title = {An Assessment of Security Analysis Tools for Cyber-Physical Systems}, booktitle = {Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, {RISK} 2016, Held in Conjunction with {ICTSS} 2016, Graz, Austria, October 18, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10224}, pages = {66--81}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-57858-3\_6}, doi = {10.1007/978-3-319-57858-3\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/risk/LemaireVDN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PutD16, author = {Andreas Put and Bart De Decker}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {PACCo: Privacy-friendly Access Control with Context}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {159--170}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005969501590170}, doi = {10.5220/0005969501590170}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PutD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/MilutinovicPD15, author = {Milica Milutinovic and Andreas Put and Bart De Decker}, title = {An Efficient, Anonymous and Unlinkable Incentives Scheme}, journal = {Int. J. Inf. Secur. Priv.}, volume = {9}, number = {3}, pages = {1--20}, year = {2015}, url = {https://doi.org/10.4018/IJISP.2015070101}, doi = {10.4018/IJISP.2015070101}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/MilutinovicPD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bis/DecroixLLDN15, author = {Koen Decroix and Jorn Lapon and Laurens Lemaire and Bart De Decker and Vincent Naessens}, editor = {Witold Abramowicz}, title = {Formal Reasoning About Privacy and Trust in Loyalty Systems}, booktitle = {Business Information Systems Workshops - {BIS} 2015 International Workshops, Pozna{\'{n}}, Poland, June 24-26, 2015, Revised Papers}, series = {Lecture Notes in Business Information Processing}, volume = {228}, pages = {211--223}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26762-3\_19}, doi = {10.1007/978-3-319-26762-3\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bis/DecroixLLDN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MilutinovicDND15, author = {Milica Milutinovic and Koen Decroix and Vincent Naessens and Bart De Decker}, editor = {Pierangela Samarati}, title = {Privacy-Preserving Public Transport Ticketing System}, booktitle = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9149}, pages = {135--150}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20810-7\_9}, doi = {10.1007/978-3-319-20810-7\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MilutinovicDND15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MilutinovicDPD15, author = {Milica Milutinovic and Italo Dacosta and Andreas Put and Bart De Decker}, title = {uCentive: An Efficient, Anonymous and Unlinkable Incentives Scheme}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {588--595}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.423}, doi = {10.1109/TRUSTCOM.2015.423}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MilutinovicDPD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DacostaPD14, author = {Italo Dacosta and Andreas Put and Bart De Decker}, title = {EmailCloak: {A} Practical and Flexible Approach to Improve Email Privacy}, booktitle = {Ninth International Conference on Availability, Reliability and Security, {ARES} 2014, Fribourg, Switzerland, September 8-12, 2014}, pages = {242--250}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ARES.2014.39}, doi = {10.1109/ARES.2014.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DacostaPD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/BoukayouaLDN14, author = {Faysal Boukayoua and Jorn Lapon and Bart De Decker and Vincent Naessens}, editor = {Bart De Decker and Andr{\'{e}} Z{\'{u}}quete}, title = {Secure Storage on Android with Context-Aware Access Control}, booktitle = {Communications and Multimedia Security - 15th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8735}, pages = {46--59}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44885-4\_4}, doi = {10.1007/978-3-662-44885-4\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/BoukayouaLDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/LemaireLDN14, author = {Laurens Lemaire and Jorn Lapon and Bart De Decker and Vincent Naessens}, editor = {Helge Janicke and Kevin I. Jones}, title = {A SysML Extension for Security Analysis of Industrial Control Systems}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53223}, timestamp = {Thu, 25 Aug 2016 11:36:27 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/LemaireLDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prisms/BoukayouaDN14, author = {Faysal Boukayoua and Bart De Decker and Vincent Naessens}, title = {A keyboard that manages your passwords in Android}, booktitle = {2014 International Conference on Privacy and Security in Mobile Systems, {PRISMS} 2014, Aalborg, Denmark, May 11-14, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/PRISMS.2014.6970592}, doi = {10.1109/PRISMS.2014.6970592}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/prisms/BoukayouaDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PutDMD14, author = {Andreas Put and Italo Dacosta and Milica Milutinovic and Bart De Decker}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications}, booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, pages = {403--416}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5\_34}, doi = {10.1007/978-3-642-55415-5\_34}, timestamp = {Wed, 25 Sep 2019 18:08:09 +0200}, biburl = {https://dblp.org/rec/conf/sec/PutDMD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/VossaertLDN14, author = {Jan Vossaert and Jorn Lapon and Bart De Decker and Vincent Naessens}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {Trusted Computing to Increase Security and Privacy in eID Authentication}, booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, pages = {485--492}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5\_41}, doi = {10.1007/978-3-642-55415-5\_41}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/VossaertLDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/PutDMDSBNVPM14, author = {Andreas Put and Italo Dacosta and Milica Milutinovic and Bart De Decker and Stefaan Seys and Faysal Boukayoua and Vincent Naessens and Kris Vanhecke and Toon De Pessemier and Luc Martens}, title = {inShopnito: An Advanced yet Privacy-Friendly Mobile Shopping Application}, booktitle = {2014 {IEEE} World Congress on Services, {SERVICES} 2014, Anchorage, AK, USA, June 27 - July 2, 2014}, pages = {129--136}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SERVICES.2014.32}, doi = {10.1109/SERVICES.2014.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/PutDMDSBNVPM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cms/2014, editor = {Bart De Decker and Andr{\'{e}} Z{\'{u}}quete}, title = {Communications and Multimedia Security - 15th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8735}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44885-4}, doi = {10.1007/978-3-662-44885-4}, isbn = {978-3-662-44884-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/VossaertLDN13, author = {Jan Vossaert and Jorn Lapon and Bart De Decker and Vincent Naessens}, title = {User-centric identity management using trusted modules}, journal = {Math. Comput. Model.}, volume = {57}, number = {7-8}, pages = {1592--1605}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2012.06.010}, doi = {10.1016/J.MCM.2012.06.010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mcm/VossaertLDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/VossaertLDN13, author = {Jan Vossaert and Jorn Lapon and Bart De Decker and Vincent Naessens}, editor = {Bart De Decker and Jana Dittmann and Christian Kraetzer and Claus Vielhauer}, title = {Client-Side Biometric Verification Based on Trusted Computing}, booktitle = {Communications and Multimedia Security - 14th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8099}, pages = {34--49}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40779-6\_3}, doi = {10.1007/978-3-642-40779-6\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/VossaertLDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/DecroixLDN13, author = {Koen Decroix and Jorn Lapon and Bart De Decker and Vincent Naessens}, editor = {Jan J{\"{u}}rjens and Benjamin Livshits and Riccardo Scandariato}, title = {A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services}, booktitle = {Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7781}, pages = {155--170}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36563-8\_11}, doi = {10.1007/978-3-642-36563-8\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/DecroixLDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/DecroixLDN13, author = {Koen Decroix and Jorn Lapon and Bart De Decker and Vincent Naessens}, editor = {Aditya Bagchi and Indrakshi Ray}, title = {A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services}, booktitle = {Information Systems Security - 9th International Conference, {ICISS} 2013, Kolkata, India, December 16-20, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {106--120}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45204-8\_8}, doi = {10.1007/978-3-642-45204-8\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/DecroixLDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/MilutinovicDPD13, author = {Milica Milutinovic and Italo Dacosta and Andreas Put and Bart De Decker}, editor = {Marit Hansen and Jaap{-}Henk Hoepman and Ronald E. Leenes and Diane Whitehouse}, title = {An Advanced, Privacy-Friendly Loyalty System}, booktitle = {Privacy and Identity Management for Emerging Services and Technologies - 8th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {421}, pages = {128--138}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-55137-6\_10}, doi = {10.1007/978-3-642-55137-6\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/MilutinovicDPD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cms/2013, editor = {Bart De Decker and Jana Dittmann and Christian Kraetzer and Claus Vielhauer}, title = {Communications and Multimedia Security - 14th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8099}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40779-6}, doi = {10.1007/978-3-642-40779-6}, isbn = {978-3-642-40778-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/BichselCDLNS12, author = {Patrik Bichsel and Jan Camenisch and Bart De Decker and Jorn Lapon and Vincent Naessens and Dieter Sommer}, editor = {Bart De Decker and David W. Chadwick}, title = {Data-Minimizing Authentication Goes Mobile}, booktitle = {Communications and Multimedia Security - 13th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2012, Canterbury, UK, September 3-5, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7394}, pages = {55--71}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32805-3\_5}, doi = {10.1007/978-3-642-32805-3\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/BichselCDLNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/MilutinovicND12, author = {Milica Milutinovic and Vincent Naessens and Bart De Decker}, editor = {Bart De Decker and David W. Chadwick}, title = {Privacy-Preserving Scheduling Mechanism for eHealth Systems}, booktitle = {Communications and Multimedia Security - 13th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2012, Canterbury, UK, September 3-5, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7394}, pages = {198--200}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32805-3\_18}, doi = {10.1007/978-3-642-32805-3\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/MilutinovicND12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/BoukayouaVDN12, author = {Faysal Boukayoua and Jan Vossaert and Bart De Decker and Vincent Naessens}, editor = {Andreas U. Schmidt and Giovanni Russello and Ioannis Krontiris and Shiguo Lian}, title = {Claim-Based versus Network-Based Identity Management: {A} Hybrid Approach}, booktitle = {Security and Privacy in Mobile Information and Communication Systems - 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {107}, pages = {38--50}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33392-7\_4}, doi = {10.1007/978-3-642-33392-7\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/BoukayouaVDN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KolkowskaD12, author = {Ella Kolkowska and Bart De Decker}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Analyzing Value Conflicts for a Work-Friendly {ISS} Policy Implementation}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {339--351}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_28}, doi = {10.1007/978-3-642-30436-1\_28}, timestamp = {Sun, 02 Jun 2019 21:15:16 +0200}, biburl = {https://dblp.org/rec/conf/sec/KolkowskaD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/MilutinovicND12, author = {Milica Milutinovic and Vincent Naessens and Bart De Decker}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {555--560}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_48}, doi = {10.1007/978-3-642-30436-1\_48}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/MilutinovicND12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cms/2012, editor = {Bart De Decker and David W. Chadwick}, title = {Communications and Multimedia Security - 13th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2012, Canterbury, UK, September 3-5, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7394}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32805-3}, doi = {10.1007/978-3-642-32805-3}, isbn = {978-3-642-32804-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/LaponKDN11, author = {Jorn Lapon and Markulf Kohlweiss and Bart De Decker and Vincent Naessens}, editor = {Bart De Decker and Jorn Lapon and Vincent Naessens and Andreas Uhl}, title = {Analysis of Revocation Strategies for Anonymous Idemix Credentials}, booktitle = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC} 11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7025}, pages = {3--17}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24712-5\_1}, doi = {10.1007/978-3-642-24712-5\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/LaponKDN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/DecroixMDN11, author = {Koen Decroix and Milica Milutinovic and Bart De Decker and Vincent Naessens}, editor = {Bart De Decker and Jorn Lapon and Vincent Naessens and Andreas Uhl}, title = {A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning}, booktitle = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC} 11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7025}, pages = {163--170}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24712-5\_14}, doi = {10.1007/978-3-642-24712-5\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/DecroixMDN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/MilutinovicPD11, author = {Milica Milutinovic and Roel Peeters and Bart De Decker}, editor = {Bart De Decker and Jorn Lapon and Vincent Naessens and Andreas Uhl}, title = {Secure Negotiation for Manual Authentication Protocols}, booktitle = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC} 11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7025}, pages = {214--221}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24712-5\_20}, doi = {10.1007/978-3-642-24712-5\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/MilutinovicPD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/MilutinovicDND11, author = {Milica Milutinovic and Koen Decroix and Vincent Naessens and Bart De Decker}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Commercial Home Assistance (eHealth) Services}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7039}, pages = {28--42}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27585-2\_3}, doi = {10.1007/978-3-642-27585-2\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/MilutinovicDND11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/BoukayouaVDN11, author = {Faysal Boukayoua and Jan Vossaert and Bart De Decker and Vincent Naessens}, editor = {Jan Camenisch and Bruno Crispo and Simone Fischer{-}H{\"{u}}bner and Ronald Leenes and Giovanni Russello}, title = {Using a Smartphone to Access Personalized Web Services on a Workstation}, booktitle = {Privacy and Identity Management for Life - 7th {IFIP} {WG} 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {375}, pages = {144--156}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31668-5\_11}, doi = {10.1007/978-3-642-31668-5\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/BoukayouaVDN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/DecroixDN11, author = {Koen Decroix and Bart De Decker and Vincent Naessens}, editor = {Jan Camenisch and Bruno Crispo and Simone Fischer{-}H{\"{u}}bner and Ronald Leenes and Giovanni Russello}, title = {Designing Privacy-Enhancing Mobile Applications}, booktitle = {Privacy and Identity Management for Life - 7th {IFIP} {WG} 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {375}, pages = {157--170}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31668-5\_12}, doi = {10.1007/978-3-642-31668-5\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/DecroixDN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/MilutinovicDND11, author = {Milica Milutinovic and Koen Decroix and Vincent Naessens and Bart De Decker}, editor = {Jan Camenisch and Bruno Crispo and Simone Fischer{-}H{\"{u}}bner and Ronald Leenes and Giovanni Russello}, title = {Privacy Preserving Mechanisms for a Pervasive eHealth System}, booktitle = {Privacy and Identity Management for Life - 7th {IFIP} {WG} 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {375}, pages = {221--231}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31668-5\_17}, doi = {10.1007/978-3-642-31668-5\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/MilutinovicDND11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cms/2011, editor = {Bart De Decker and Jorn Lapon and Vincent Naessens and Andreas Uhl}, title = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC} 11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7025}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24712-5}, doi = {10.1007/978-3-642-24712-5}, isbn = {978-3-642-24711-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LaponNVVD10, author = {Jorn Lapon and Vincent Naessens and Bram Verdegem and Pieter Verhaeghe and Bart De Decker}, title = {Building advanced applications with the Belgian eID}, journal = {Secur. Commun. Networks}, volume = {3}, number = {5}, pages = {439--451}, year = {2010}, url = {https://doi.org/10.1002/sec.192}, doi = {10.1002/SEC.192}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LaponNVVD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaiss/NigusseD10, author = {Girma Nigusse and Bart De Decker}, title = {conf/cse/NigusseDN09 conf/dbsec/VerslypeDNNLV08 Girma Nigusse = Girma Enideg Nigusse Privacy Codes of Practice for the Social Web: The Analysis of Existing Privacy Codes and Emerging Social-Centric Privacy Risks}, booktitle = {Intelligent Information Privacy Management, Papers from the 2010 {AAAI} Spring Symposium, Technical Report SS-10-05, Stanford, California, USA, March 22-24, 2010}, publisher = {{AAAI}}, year = {2010}, url = {http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/view/1054}, timestamp = {Sat, 18 Feb 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaaiss/NigusseD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VerslypeVLND10, author = {Kristof Verslype and Pieter Verhaeghe and Jorn Lapon and Vincent Naessens and Bart De Decker}, editor = {Sara Foresti and Sushil Jajodia}, title = {\emph{PriMan} : {A} Privacy-Preserving Identity Framework}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {327--334}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_24}, doi = {10.1007/978-3-642-13739-6\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/VerslypeVLND10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ehealth/SandikkayaDN10, author = {Mehmet Tahir Sandikkaya and Bart De Decker and Vincent Naessens}, editor = {Martin Szomszor and Patty Kostkova}, title = {Privacy in Commercial Medical Storage Systems}, booktitle = {Electronic Healthcare - Third International Conference, eHealth 2010, Casablanca, Morocco, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {69}, pages = {247--258}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23635-8\_32}, doi = {10.1007/978-3-642-23635-8\_32}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ehealth/SandikkayaDN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/VossaertLDN10, author = {Jan Vossaert and Jorn Lapon and Bart De Decker and Vincent Naessens}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {User-Centric Identity Management Using Trusted Modules}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {155--170}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_11}, doi = {10.1007/978-3-642-22633-5\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/VossaertLDN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/VossaertLDN10, author = {Jan Vossaert and Jorn Lapon and Bart De Decker and Vincent Naessens}, editor = {Andreas U. Schmidt and Giovanni Russello and Antonio Lioy and Neeli R. Prasad and Shiguo Lian}, title = {Personalized Mobile Services with Lightweight Security in a Sports Association}, booktitle = {Security and Privacy in Mobile Information and Communication Systems - Second International {ICST} Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {47}, pages = {3--14}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17502-2\_1}, doi = {10.1007/978-3-642-17502-2\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/VossaertLDN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/VerhaegheVLND10, author = {Pieter Verhaeghe and Kristof Verslype and Jorn Lapon and Vincent Naessens and Bart De Decker}, editor = {Andreas U. Schmidt and Giovanni Russello and Antonio Lioy and Neeli R. Prasad and Shiguo Lian}, title = {A Mobile and Reliable Anonymous ePoll Infrastructure}, booktitle = {Security and Privacy in Mobile Information and Communication Systems - Second International {ICST} Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {47}, pages = {41--52}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17502-2\_4}, doi = {10.1007/978-3-642-17502-2\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/VerhaegheVLND10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/VossaertVDN10, author = {Jan Vossaert and Pieter Verhaeghe and Bart De Decker and Vincent Naessens}, editor = {Simone Fischer{-}H{\"{u}}bner and Penny Duquenoy and Marit Hansen and Ronald Leenes and Ge Zhang}, title = {A Smart Card Based Solution for User-Centric Identity Management}, booktitle = {Privacy and Identity Management for Life - 6th {IFIP} {WG} 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {352}, pages = {164--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-20769-3\_14}, doi = {10.1007/978-3-642-20769-3\_14}, timestamp = {Fri, 05 Aug 2022 07:31:50 +0200}, biburl = {https://dblp.org/rec/conf/primelife/VossaertVDN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LaponKDN10, author = {Jorn Lapon and Markulf Kohlweiss and Bart De Decker and Vincent Naessens}, editor = {Kai Rannenberg and Vijay Varadharajan and Christian Weber}, title = {Performance Analysis of Accumulator-Based Revocation Mechanisms}, booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11} International Information Security Conference, {SEC} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {330}, pages = {289--301}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15257-3\_26}, doi = {10.1007/978-3-642-15257-3\_26}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LaponKDN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cms/2010, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4}, doi = {10.1007/978-3-642-13241-4}, isbn = {978-3-642-13240-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/WuytsSDJ09, author = {Kim Wuyts and Riccardo Scandariato and Bart De Decker and Wouter Joosen}, title = {Linking Privacy Solutions to Developer Goals}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {847--852}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.51}, doi = {10.1109/ARES.2009.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/WuytsSDJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/NigusseDN09, author = {Girma Nigusse and Bart De Decker and Vincent Naessens}, title = {Specification of Fair Data Practice Principles Using Privacy Policy Languages}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {430--437}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.187}, doi = {10.1109/CSE.2009.187}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/NigusseDN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LayouniVSDV09, author = {Mohamed Layouni and Kristof Verslype and Mehmet Tahir Sandikkaya and Bart De Decker and Hans Vangheluwe}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Privacy-Preserving Telemonitoring for eHealth}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {95--110}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_7}, doi = {10.1007/978-3-642-03007-9\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LayouniVSDV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/ChandaND09, author = {Prasit Bikash Chanda and Vincent Naessens and Bart De Decker}, editor = {Claude Godart and Norbert Gronau and Sushil K. Sharma and G{\'{e}}r{\^{o}}me Canals}, title = {Anonymous, Yet Trustworthy Auctions}, booktitle = {Software Services for e-Business and e-Society, 9th {IFIP} {WG} 6.1 Conference on e-Business, e-Services and e-Society, {I3E} 2009, Nancy, France, September 23-25, 2009. Proceedings}, series = {{IFIP}}, volume = {305}, pages = {225--239}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04280-5\_19}, doi = {10.1007/978-3-642-04280-5\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i3e/ChandaND09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/VerslypeD09, author = {Kristof Verslype and Bart De Decker}, editor = {Mohammad S. Obaidat and Joaquim Filipe}, title = {Flexible and Time-Based Anonymous Access Restrictions}, booktitle = {e-Business and Telecommunications - 6th International Joint Conference, {ICETE} 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {130}, pages = {237--250}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-20077-9\_17}, doi = {10.1007/978-3-642-20077-9\_17}, timestamp = {Sat, 19 Oct 2019 20:35:36 +0200}, biburl = {https://dblp.org/rec/conf/icete/VerslypeD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/NaessensSLVVND09, author = {Vincent Naessens and Mehmet Tahir Sandikkaya and Jorn Lapon and Kristof Verslype and Pieter Verhaeghe and Girma Nigusse and Bart De Decker}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Privacy Policies, Tools and Mechanisms of the Future}, booktitle = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {309}, pages = {125--138}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05437-2\_12}, doi = {10.1007/978-3-642-05437-2\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/NaessensSLVVND09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/LaponVVND09, author = {Jorn Lapon and Bram Verdegem and Pieter Verhaeghe and Vincent Naessens and Bart De Decker}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {Extending the Belgian eID Technology with Mobile Security Functionality}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {97--109}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_9}, doi = {10.1007/978-3-642-04434-2\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/LaponVVND09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/VerhaegheLDNV09, author = {Pieter Verhaeghe and Jorn Lapon and Bart De Decker and Vincent Naessens and Kristof Verslype}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {Security and Privacy Improvements for the Belgian eID Technology}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {237--247}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_21}, doi = {10.1007/978-3-642-01244-0\_21}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/VerhaegheLDNV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VerslypeD09, author = {Kristof Verslype and Bart De Decker}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Service and Timeframe Dependent Unlinkable One-time Pseudonyms}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {13--20}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 21:15:22 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VerslypeD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VerslypeDNNLV08, author = {Kristof Verslype and Bart De Decker and Vincent Naessens and Girma Nigusse and Jorn Lapon and Pieter Verhaeghe}, editor = {Vijay Atluri}, title = {A Privacy-Preserving Ticketing System}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {97--112}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_8}, doi = {10.1007/978-3-540-70567-3\_8}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/VerslypeDNNLV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/DeckerLVV08, author = {Bart De Decker and Mohamed Layouni and Hans Vangheluwe and Kristof Verslype}, editor = {Stig Fr. Mj{\o}lsnes and Sjouke Mauw and Sokratis K. Katsikas}, title = {A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System}, booktitle = {Public Key Infrastructure, 5th European {PKI} Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5057}, pages = {118--133}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69485-4\_9}, doi = {10.1007/978-3-540-69485-4\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/DeckerLVV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/VerslypeD08, author = {Kristof Verslype and Bart De Decker}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Ubiquitous Privacy-Preserving Identity Managment}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {589--603}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_38}, doi = {10.1007/978-0-387-09699-5\_38}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/VerslypeD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BrandsDD07, author = {Stefan Brands and Liesje Demuynck and Bart De Decker}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {400--415}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_29}, doi = {10.1007/978-3-540-73458-1\_29}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BrandsDD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DemuynckDJ07, author = {Liesje Demuynck and Bart De Decker and Wouter Joosen}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {A Credential-Based System for the Anonymous Delegation of Rights}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {169--180}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_15}, doi = {10.1007/978-0-387-72367-9\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DemuynckDJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GeversVD07, author = {Steven Gevers and Kristof Verslype and Bart De Decker}, editor = {Peng Ning and Ting Yu}, title = {Enhancing privacy in identity management systems}, booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007}, pages = {60--63}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314333.1314344}, doi = {10.1145/1314333.1314344}, timestamp = {Mon, 04 Apr 2022 16:00:14 +0200}, biburl = {https://dblp.org/rec/conf/wpes/GeversVD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/NaessensDD06, author = {Vincent Naessens and Liesje Demuynck and Bart De Decker}, editor = {Herbert Leitold and Evangelos P. Markatos}, title = {A Fair Anonymous Submission and Review System}, booktitle = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4237}, pages = {43--53}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11909033\_5}, doi = {10.1007/11909033\_5}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/NaessensDD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/VerslypeD06, author = {Kristof Verslype and Bart De Decker}, editor = {Herbert Leitold and Evangelos P. Markatos}, title = {A Flexible and Open {DRM} Framework}, booktitle = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4237}, pages = {173--184}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11909033\_16}, doi = {10.1007/11909033\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/VerslypeD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/GeversD06, author = {Steven Gevers and Bart De Decker}, editor = {Robert Meersman and Zahir Tari and Pilar Herrero}, title = {Privacy Friendly Information Disclosure}, booktitle = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops, {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM} Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4277}, pages = {636--646}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11915034\_87}, doi = {10.1007/11915034\_87}, timestamp = {Thu, 14 Oct 2021 10:28:26 +0200}, biburl = {https://dblp.org/rec/conf/otm/GeversD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/NaessensD06, author = {Vincent Naessens and Bart De Decker}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {A Methodology for Designing Controlled Anonymous Applications}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {111--122}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_10}, doi = {10.1007/0-387-33406-8\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/NaessensD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/DemuynckD05, author = {Liesje Demuynck and Bart De Decker}, editor = {Jana Dittmann and Stefan Katzenbeisser and Andreas Uhl}, title = {Privacy-Preserving Electronic Health Records}, booktitle = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2005, Salzburg, Austria, September 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3677}, pages = {150--159}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552055\_15}, doi = {10.1007/11552055\_15}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/DemuynckD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/GoovaertsWDJ05, author = {Tom Goovaerts and Bart De Win and Bart De Decker and Wouter Joosen}, editor = {Jana Dittmann and Stefan Katzenbeisser and Andreas Uhl}, title = {Assessment of Palm {OS} Susceptibility to Malicious Code Threats}, booktitle = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2005, Salzburg, Austria, September 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3677}, pages = {240--249}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552055\_24}, doi = {10.1007/11552055\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/GoovaertsWDJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/MichielsVJD05, author = {Sam Michiels and Kristof Verslype and Wouter Joosen and Bart De Decker}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Towards a software architecture for {DRM}}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {65--74}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102559}, doi = {10.1145/1102546.1102559}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/MichielsVJD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/NaessensDD05, author = {Vincent Naessens and Bart De Decker and Liesje Demuynck}, editor = {Ry{\^{o}}ichi Sasaki and Sihan Qing and Eiji Okamoto and Hiroshi Yoshiura}, title = {Accountable Anonymous E-Mail}, booktitle = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11} 20th International Conference on Information Security {(SEC} 2005), May 30 - June 1, 2005, Chiba, Japan}, series = {{IFIP}}, volume = {181}, pages = {3--18}, publisher = {Springer}, year = {2005}, timestamp = {Fri, 19 May 2017 01:25:10 +0200}, biburl = {https://dblp.org/rec/conf/sec/NaessensDD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DeckerNP03, author = {Bart De Decker and Gregory Neven and Frank Piessens}, editor = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati and Pierangela Samarati and Sokratis K. Katsikas}, title = {Secure Vickrey Auctions without a Trusted Third Party}, booktitle = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece}, series = {{IFIP} Conference Proceedings}, volume = {250}, pages = {337--348}, publisher = {Kluwer}, year = {2003}, timestamp = {Fri, 25 Apr 2003 10:12:34 +0200}, biburl = {https://dblp.org/rec/conf/sec/DeckerNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/WinVD02, author = {Bart De Win and Bart Vanhaute and Bart De Decker}, title = {How aspect-oriented programming can help to build secure software}, journal = {Informatica (Slovenia)}, volume = {26}, number = {2}, year = {2002}, timestamp = {Mon, 15 Feb 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/WinVD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dais/DeckerNPH01, author = {Bart De Decker and Gregory Neven and Frank Piessens and Erik Van Hoeymissen}, editor = {Krzysztof Zielinski and Kurt Geihs and Aleksander Laurentowski}, title = {Second Price Auctions - {A} Case Study of Secure Distributed Computating}, booktitle = {New Developments in Distributed Applications and Interoperable Systems, {IFIP} {TC6} / {WG6.1} Third International Working Conference on Distributed Applications and Interoperable Systems, September 17-19, 2001, Krak{\'{o}}w, Poland}, series = {{IFIP} Conference Proceedings}, volume = {198}, pages = {217--228}, publisher = {Kluwer}, year = {2001}, url = {https://doi.org/10.1007/0-306-47005-5\_19}, doi = {10.1007/0-306-47005-5\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dais/DeckerNPH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsec/NaessensVD01, author = {Vincent Naessens and Bart Vanhaute and Bart De Decker}, editor = {Bart De Decker and Frank Piessens and Jan Smits and Els Van Herreweghen}, title = {Securing {RMI} Communication}, booktitle = {Advances in Network and Distributed Systems Security, {IFIP} {TC11} {WG11.4} First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {206}, pages = {93--105}, publisher = {Kluwer}, year = {2001}, url = {https://doi.org/10.1007/0-306-46958-8\_7}, doi = {10.1007/0-306-46958-8\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsec/NaessensVD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsec/WinVD01, author = {Bart De Win and Bart Vanhaute and Bart De Decker}, editor = {Bart De Decker and Frank Piessens and Jan Smits and Els Van Herreweghen}, title = {Security Through Aspect-Oriented Programming}, booktitle = {Advances in Network and Distributed Systems Security, {IFIP} {TC11} {WG11.4} First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {206}, pages = {125--138}, publisher = {Kluwer}, year = {2001}, url = {https://doi.org/10.1007/0-306-46958-8\_9}, doi = {10.1007/0-306-46958-8\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsec/WinVD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/HerleaCPNPD01, author = {T. Herlea and Joris Claessens and Bart Preneel and Gregory Neven and Frank Piessens and Bart De Decker}, editor = {Michel Dupuy and Pierre Paradinas}, title = {On Securely Scheduling a Meeting}, booktitle = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France}, series = {{IFIP} Conference Proceedings}, volume = {193}, pages = {183--198}, publisher = {Kluwer}, year = {2001}, timestamp = {Fri, 26 Jul 2002 13:05:24 +0200}, biburl = {https://dblp.org/rec/conf/sec/HerleaCPNPD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/PiessensDW01, author = {Frank Piessens and Bart De Decker and Bart De Win}, editor = {Michael Gertz and Erik Guldentops and Leon Strous}, title = {Developing secure software. {A} survey and classification of common software vulnerabilities}, booktitle = {Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, {IFIP} {TC11/WG11.5} Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {211}, pages = {27--40}, publisher = {Kluwer}, year = {2001}, timestamp = {Mon, 07 Dec 2020 17:16:29 +0100}, biburl = {https://dblp.org/rec/conf/tc11-5/PiessensDW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/netsec/2001, editor = {Bart De Decker and Frank Piessens and Jan Smits and Els Van Herreweghen}, title = {Advances in Network and Distributed Systems Security, {IFIP} {TC11} {WG11.4} First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {206}, publisher = {Kluwer}, year = {2001}, isbn = {0-7923-7558-0}, timestamp = {Thu, 03 Jan 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netsec/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mata/DeckerPHN00, author = {Bart De Decker and Frank Piessens and Erik Van Hoeymissen and Gregory Neven}, editor = {Eric Horlait}, title = {Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations}, booktitle = {Mobile Agents for Telecommunication Applications, Second International Workshop, {MATA} 2000, Paris, France, September 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1931}, pages = {219--232}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45391-1\_18}, doi = {10.1007/3-540-45391-1\_18}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/mata/DeckerPHN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/NevenPD00, author = {Gregory Neven and Frank Piessens and Bart De Decker}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {On the Practical Feasibiltiy of Secure Distributed Computing: {A} Case Study}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {361--370}, publisher = {Kluwer}, year = {2000}, timestamp = {Fri, 26 Jul 2002 13:04:43 +0200}, biburl = {https://dblp.org/rec/conf/sec/NevenPD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/WinBMDJ00, author = {Bart De Win and Jan Van den Bergh and Frank Matthijs and Bart De Decker and Wouter Joosen}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {A Security Architecture for Electronic Commerce Applications}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {491--500}, publisher = {Kluwer}, year = {2000}, timestamp = {Fri, 10 Nov 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/WinBMDJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Decker97, author = {Bart De Decker}, editor = {Bart Preneel and Vincent Rijmen}, title = {Introduction to Computer Security}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {377--393}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_19}, doi = {10.1007/3-540-49248-8\_19}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Decker97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/BerbersDJMR97, author = {Yolande Berbers and Bart De Decker and Wouter Joosen and Frank Matthijs and Bert Robben}, editor = {Hamid R. Arabnia}, title = {Management of Events in a multi-agent system}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 1997, June 30 - July 3, 1997, Las Vegas, Nevada, {USA}}, pages = {1141--1150}, publisher = {{CSREA} Press}, year = {1997}, timestamp = {Tue, 20 Apr 2004 14:47:02 +0200}, biburl = {https://dblp.org/rec/conf/pdpta/BerbersDJMR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/calisce/VannesteDCW96, author = {Philip Vanneste and Bart De Decker and Marcin Chrzanowski and Ken Warkentyne}, editor = {Arantza D{\'{\i}}az de Ilarraza S{\'{a}}nchez and Isabel Fern{\'{a}}ndez de Castro}, title = {Panel Discussion: The Use of Internet in Education}, booktitle = {Computer Aided Learning and Instruction in Science and Engineering, Third International Conference, {CALISCE} '96, San Sebastian, Spain, July 29-31, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1108}, pages = {39--41}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0022589}, doi = {10.1007/BFB0022589}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/calisce/VannesteDCW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppig/VannesteBD96, author = {Philip Vanneste and Koen Bertels and Bart De Decker}, title = {{CAMUS:} {A} Cognitive Model for Reverse Engineering-Bases Program Analysis}, booktitle = {Proceedings of the 8th Annual Workshop of the Psychology of Programming Interest Group, {PPIG} 1996, Ghent, Belgium, April 10-12, 1996}, pages = {14}, publisher = {Psychology of Programming Interest Group}, year = {1996}, url = {https://ppig.org/papers/1996-ppig-8th-vanneste/}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ppig/VannesteBD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigopsE/BerbersDJ96, author = {Yolande Berbers and Bart De Decker and Wouter Joosen}, editor = {Andrew Herbert and Andrew S. Tanenbaum}, title = {Infrastructure for mobile agents}, booktitle = {Proceedings of the 7th {ACM} {SIGOPS} European Workshop: Systems Support for Worldwide Applications, 1996, Connemara, Ireland, September 9-11, 1996}, pages = {173--180}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/504450.504483}, doi = {10.1145/504450.504483}, timestamp = {Thu, 07 Nov 2019 10:24:25 +0100}, biburl = {https://dblp.org/rec/conf/sigopsE/BerbersDJ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PiessensDJ93, author = {Frank Piessens and Bart De Decker and Phil Janson}, title = {Interconnecting domains with heterogeneous key distribution and authentication protocols}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {66--79}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287642}, doi = {10.1109/RISP.1993.287642}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/PiessensDJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Decker91, author = {Bart De Decker}, editor = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, title = {Unix Security {\&} Kerberos}, booktitle = {Computer Security and Industrial Cryptography - State of the Art and Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991}, series = {Lecture Notes in Computer Science}, volume = {741}, pages = {257--274}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57341-0\_68}, doi = {10.1007/3-540-57341-0\_68}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Decker91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.