BibTeX records: Bart De Decker

download as .bib file

@inproceedings{DBLP:conf/esorics/KalantariPDHJD23,
  author       = {Shirin Kalantari and
                  Pieter Philippaerts and
                  Yana Dimova and
                  Danny Hughes and
                  Wouter Joosen and
                  Bart De Decker},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {A User-Centric Approach to {API} Delegations - Enforcing Privacy Policies
                  on OAuth Delegations},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  pages        = {318--337},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_16},
  doi          = {10.1007/978-3-031-51476-0\_16},
  timestamp    = {Thu, 18 Jan 2024 08:27:15 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KalantariPDHJD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KalantariHD22,
  author       = {Shirin Kalantari and
                  Danny Hughes and
                  Bart De Decker},
  title        = {Listing the ingredients for {IFTTT} recipes},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {1376--1383},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00194},
  doi          = {10.1109/TRUSTCOM56396.2022.00194},
  timestamp    = {Wed, 05 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KalantariHD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/KalantariPD21,
  author       = {Shirin Kalantari and
                  Andreas Put and
                  Bart De Decker},
  editor       = {Nils Gruschka and
                  Luis Filipe Coelho Antunes and
                  Kai Rannenberg and
                  Prokopios Drogkaris},
  title        = {Trackers in Your Inbox: Criticizing Current Email Tracking Practices},
  booktitle    = {Privacy Technologies and Policy - 9th Annual Privacy Forum, {APF}
                  2021, Oslo, Norway, June 17-18, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12703},
  pages        = {156--167},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-76663-4\_9},
  doi          = {10.1007/978-3-030-76663-4\_9},
  timestamp    = {Wed, 19 May 2021 17:57:56 +0200},
  biburl       = {https://dblp.org/rec/conf/apf/KalantariPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wf-iot/KalantariPD21,
  author       = {Shirin Kalantari and
                  Andreas Put and
                  Bart De Decker},
  title        = {PhD Forum: Trust Management for Context-aware Access Control Systems
                  in IoT},
  booktitle    = {7th {IEEE} World Forum on Internet of Things, WF-IoT 2021, New Orleans,
                  LA, USA, June 14 - July 31, 2021},
  pages        = {909--910},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WF-IoT51360.2021.9595877},
  doi          = {10.1109/WF-IOT51360.2021.9595877},
  timestamp    = {Tue, 16 Nov 2021 08:53:09 +0100},
  biburl       = {https://dblp.org/rec/conf/wf-iot/KalantariPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotsms/BaelKPD20,
  author       = {Dries Van Bael and
                  Shirin Kalantari and
                  Andreas Put and
                  Bart De Decker},
  editor       = {Larbi Boubchir and
                  Elhadj Benkhelifa and
                  Yaser Jararweh and
                  Imad Saleh},
  title        = {A Context-Aware Break Glass Access Control System for IoT Environments},
  booktitle    = {7th International Conference on Internet of Things: Systems, Management
                  and Security, {IOTSMS} 2020, Virtual Event, France, December 14-16,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IOTSMS52051.2020.9340209},
  doi          = {10.1109/IOTSMS52051.2020.9340209},
  timestamp    = {Fri, 12 Feb 2021 12:29:49 +0100},
  biburl       = {https://dblp.org/rec/conf/iotsms/BaelKPD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/LemaireVDN17,
  author       = {Laurens Lemaire and
                  Jan Vossaert and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Gregorio D'Agostino and
                  Antonio Scala},
  title        = {Security Evaluation of Cyber-Physical Systems Using Automatically
                  Generated Attack Trees},
  booktitle    = {Critical Information Infrastructures Security - 12th International
                  Conference, {CRITIS} 2017, Lucca, Italy, October 8-13, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10707},
  pages        = {225--228},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-99843-5\_20},
  doi          = {10.1007/978-3-319-99843-5\_20},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/LemaireVDN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/LemaireVDN17,
  author       = {Laurens Lemaire and
                  Jan Vossaert and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Extending {FAST-CPS} for the Analysis of Data Flows in Cyber-Physical
                  Systems},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {37--49},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_4},
  doi          = {10.1007/978-3-319-65127-9\_4},
  timestamp    = {Thu, 14 Oct 2021 10:27:55 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/LemaireVDN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jices/MilutinovicD16,
  author       = {Milica Milutinovic and
                  Bart De Decker},
  title        = {Ethical aspects in eHealth - design of a privacy-friendly system},
  journal      = {J. Inf. Commun. Ethics Soc.},
  volume       = {14},
  number       = {1},
  pages        = {49--69},
  year         = {2016},
  url          = {https://doi.org/10.1108/JICES-06-2014-0028},
  doi          = {10.1108/JICES-06-2014-0028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jices/MilutinovicD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/VossaertLDN16,
  author       = {Jan Vossaert and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  title        = {Symmetric key infrastructure for authenticated key establishment between
                  resource constrained nodes and powerful devices},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {2},
  pages        = {106--117},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.301},
  doi          = {10.1002/SEC.301},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/VossaertLDN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/PutD16,
  author       = {Andreas Put and
                  Bart De Decker},
  editor       = {Mohammad S. Obaidat},
  title        = {Attribute-Based Privacy-Friendly Access Control with Context},
  booktitle    = {E-Business and Telecommunications - 13th International Joint Conference,
                  {ICETE} 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {764},
  pages        = {291--315},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-67876-4\_14},
  doi          = {10.1007/978-3-319-67876-4\_14},
  timestamp    = {Mon, 21 Jan 2019 11:20:27 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/PutD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/risk/LemaireVDN16,
  author       = {Laurens Lemaire and
                  Jan Vossaert and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {J{\"{u}}rgen Gro{\ss}mann and
                  Michael Felderer and
                  Fredrik Seehusen},
  title        = {An Assessment of Security Analysis Tools for Cyber-Physical Systems},
  booktitle    = {Risk Assessment and Risk-Driven Quality Assurance - 4th International
                  Workshop, {RISK} 2016, Held in Conjunction with {ICTSS} 2016, Graz,
                  Austria, October 18, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10224},
  pages        = {66--81},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-57858-3\_6},
  doi          = {10.1007/978-3-319-57858-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/risk/LemaireVDN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PutD16,
  author       = {Andreas Put and
                  Bart De Decker},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {PACCo: Privacy-friendly Access Control with Context},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {159--170},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005969501590170},
  doi          = {10.5220/0005969501590170},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PutD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/MilutinovicPD15,
  author       = {Milica Milutinovic and
                  Andreas Put and
                  Bart De Decker},
  title        = {An Efficient, Anonymous and Unlinkable Incentives Scheme},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {9},
  number       = {3},
  pages        = {1--20},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJISP.2015070101},
  doi          = {10.4018/IJISP.2015070101},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/MilutinovicPD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bis/DecroixLLDN15,
  author       = {Koen Decroix and
                  Jorn Lapon and
                  Laurens Lemaire and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Witold Abramowicz},
  title        = {Formal Reasoning About Privacy and Trust in Loyalty Systems},
  booktitle    = {Business Information Systems Workshops - {BIS} 2015 International
                  Workshops, Pozna{\'{n}}, Poland, June 24-26, 2015, Revised Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {228},
  pages        = {211--223},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26762-3\_19},
  doi          = {10.1007/978-3-319-26762-3\_19},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bis/DecroixLLDN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MilutinovicDND15,
  author       = {Milica Milutinovic and
                  Koen Decroix and
                  Vincent Naessens and
                  Bart De Decker},
  editor       = {Pierangela Samarati},
  title        = {Privacy-Preserving Public Transport Ticketing System},
  booktitle    = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP}
                  {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15,
                  2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9149},
  pages        = {135--150},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20810-7\_9},
  doi          = {10.1007/978-3-319-20810-7\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MilutinovicDND15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MilutinovicDPD15,
  author       = {Milica Milutinovic and
                  Italo Dacosta and
                  Andreas Put and
                  Bart De Decker},
  title        = {uCentive: An Efficient, Anonymous and Unlinkable Incentives Scheme},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {588--595},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.423},
  doi          = {10.1109/TRUSTCOM.2015.423},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MilutinovicDPD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DacostaPD14,
  author       = {Italo Dacosta and
                  Andreas Put and
                  Bart De Decker},
  title        = {EmailCloak: {A} Practical and Flexible Approach to Improve Email Privacy},
  booktitle    = {Ninth International Conference on Availability, Reliability and Security,
                  {ARES} 2014, Fribourg, Switzerland, September 8-12, 2014},
  pages        = {242--250},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ARES.2014.39},
  doi          = {10.1109/ARES.2014.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DacostaPD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/BoukayouaLDN14,
  author       = {Faysal Boukayoua and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Bart De Decker and
                  Andr{\'{e}} Z{\'{u}}quete},
  title        = {Secure Storage on Android with Context-Aware Access Control},
  booktitle    = {Communications and Multimedia Security - 15th {IFIP} {TC} 6/TC 11
                  International Conference, {CMS} 2014, Aveiro, Portugal, September
                  25-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8735},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44885-4\_4},
  doi          = {10.1007/978-3-662-44885-4\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/BoukayouaLDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/LemaireLDN14,
  author       = {Laurens Lemaire and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {A SysML Extension for Security Analysis of Industrial Control Systems},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53223},
  timestamp    = {Thu, 25 Aug 2016 11:36:27 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/LemaireLDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prisms/BoukayouaDN14,
  author       = {Faysal Boukayoua and
                  Bart De Decker and
                  Vincent Naessens},
  title        = {A keyboard that manages your passwords in Android},
  booktitle    = {2014 International Conference on Privacy and Security in Mobile Systems,
                  {PRISMS} 2014, Aalborg, Denmark, May 11-14, 2014},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/PRISMS.2014.6970592},
  doi          = {10.1109/PRISMS.2014.6970592},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/prisms/BoukayouaDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PutDMD14,
  author       = {Andreas Put and
                  Italo Dacosta and
                  Milica Milutinovic and
                  Bart De Decker},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {PriMan: Facilitating the Development of Secure and Privacy-Preserving
                  Applications},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {403--416},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_34},
  doi          = {10.1007/978-3-642-55415-5\_34},
  timestamp    = {Wed, 25 Sep 2019 18:08:09 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PutDMD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VossaertLDN14,
  author       = {Jan Vossaert and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Trusted Computing to Increase Security and Privacy in eID Authentication},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {485--492},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_41},
  doi          = {10.1007/978-3-642-55415-5\_41},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/VossaertLDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/PutDMDSBNVPM14,
  author       = {Andreas Put and
                  Italo Dacosta and
                  Milica Milutinovic and
                  Bart De Decker and
                  Stefaan Seys and
                  Faysal Boukayoua and
                  Vincent Naessens and
                  Kris Vanhecke and
                  Toon De Pessemier and
                  Luc Martens},
  title        = {inShopnito: An Advanced yet Privacy-Friendly Mobile Shopping Application},
  booktitle    = {2014 {IEEE} World Congress on Services, {SERVICES} 2014, Anchorage,
                  AK, USA, June 27 - July 2, 2014},
  pages        = {129--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERVICES.2014.32},
  doi          = {10.1109/SERVICES.2014.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/PutDMDSBNVPM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cms/2014,
  editor       = {Bart De Decker and
                  Andr{\'{e}} Z{\'{u}}quete},
  title        = {Communications and Multimedia Security - 15th {IFIP} {TC} 6/TC 11
                  International Conference, {CMS} 2014, Aveiro, Portugal, September
                  25-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8735},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44885-4},
  doi          = {10.1007/978-3-662-44885-4},
  isbn         = {978-3-662-44884-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/VossaertLDN13,
  author       = {Jan Vossaert and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  title        = {User-centric identity management using trusted modules},
  journal      = {Math. Comput. Model.},
  volume       = {57},
  number       = {7-8},
  pages        = {1592--1605},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2012.06.010},
  doi          = {10.1016/J.MCM.2012.06.010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mcm/VossaertLDN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/VossaertLDN13,
  author       = {Jan Vossaert and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Bart De Decker and
                  Jana Dittmann and
                  Christian Kraetzer and
                  Claus Vielhauer},
  title        = {Client-Side Biometric Verification Based on Trusted Computing},
  booktitle    = {Communications and Multimedia Security - 14th {IFIP} {TC} 6/TC 11
                  International Conference, {CMS} 2013, Magdeburg, Germany, September
                  25-26, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8099},
  pages        = {34--49},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40779-6\_3},
  doi          = {10.1007/978-3-642-40779-6\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/VossaertLDN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/DecroixLDN13,
  author       = {Koen Decroix and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Jan J{\"{u}}rjens and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic
                  Services},
  booktitle    = {Engineering Secure Software and Systems - 5th International Symposium,
                  ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7781},
  pages        = {155--170},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36563-8\_11},
  doi          = {10.1007/978-3-642-36563-8\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/DecroixLDN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DecroixLDN13,
  author       = {Koen Decroix and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Aditya Bagchi and
                  Indrakshi Ray},
  title        = {A Framework for Formal Reasoning about Privacy Properties Based on
                  Trust Relationships in Complex Electronic Services},
  booktitle    = {Information Systems Security - 9th International Conference, {ICISS}
                  2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {106--120},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45204-8\_8},
  doi          = {10.1007/978-3-642-45204-8\_8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/DecroixLDN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/MilutinovicDPD13,
  author       = {Milica Milutinovic and
                  Italo Dacosta and
                  Andreas Put and
                  Bart De Decker},
  editor       = {Marit Hansen and
                  Jaap{-}Henk Hoepman and
                  Ronald E. Leenes and
                  Diane Whitehouse},
  title        = {An Advanced, Privacy-Friendly Loyalty System},
  booktitle    = {Privacy and Identity Management for Emerging Services and Technologies
                  - 8th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer
                  School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {421},
  pages        = {128--138},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-55137-6\_10},
  doi          = {10.1007/978-3-642-55137-6\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/MilutinovicDPD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cms/2013,
  editor       = {Bart De Decker and
                  Jana Dittmann and
                  Christian Kraetzer and
                  Claus Vielhauer},
  title        = {Communications and Multimedia Security - 14th {IFIP} {TC} 6/TC 11
                  International Conference, {CMS} 2013, Magdeburg, Germany, September
                  25-26, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8099},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40779-6},
  doi          = {10.1007/978-3-642-40779-6},
  isbn         = {978-3-642-40778-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/BichselCDLNS12,
  author       = {Patrik Bichsel and
                  Jan Camenisch and
                  Bart De Decker and
                  Jorn Lapon and
                  Vincent Naessens and
                  Dieter Sommer},
  editor       = {Bart De Decker and
                  David W. Chadwick},
  title        = {Data-Minimizing Authentication Goes Mobile},
  booktitle    = {Communications and Multimedia Security - 13th {IFIP} {TC} 6/TC 11
                  International Conference, {CMS} 2012, Canterbury, UK, September 3-5,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7394},
  pages        = {55--71},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32805-3\_5},
  doi          = {10.1007/978-3-642-32805-3\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/BichselCDLNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/MilutinovicND12,
  author       = {Milica Milutinovic and
                  Vincent Naessens and
                  Bart De Decker},
  editor       = {Bart De Decker and
                  David W. Chadwick},
  title        = {Privacy-Preserving Scheduling Mechanism for eHealth Systems},
  booktitle    = {Communications and Multimedia Security - 13th {IFIP} {TC} 6/TC 11
                  International Conference, {CMS} 2012, Canterbury, UK, September 3-5,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7394},
  pages        = {198--200},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32805-3\_18},
  doi          = {10.1007/978-3-642-32805-3\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/MilutinovicND12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec/BoukayouaVDN12,
  author       = {Faysal Boukayoua and
                  Jan Vossaert and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Andreas U. Schmidt and
                  Giovanni Russello and
                  Ioannis Krontiris and
                  Shiguo Lian},
  title        = {Claim-Based versus Network-Based Identity Management: {A} Hybrid Approach},
  booktitle    = {Security and Privacy in Mobile Information and Communication Systems
                  - 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany,
                  June 25-26, 2012, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {107},
  pages        = {38--50},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33392-7\_4},
  doi          = {10.1007/978-3-642-33392-7\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisec/BoukayouaVDN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KolkowskaD12,
  author       = {Ella Kolkowska and
                  Bart De Decker},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Analyzing Value Conflicts for a Work-Friendly {ISS} Policy Implementation},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {339--351},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_28},
  doi          = {10.1007/978-3-642-30436-1\_28},
  timestamp    = {Sun, 02 Jun 2019 21:15:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KolkowskaD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MilutinovicND12,
  author       = {Milica Milutinovic and
                  Vincent Naessens and
                  Bart De Decker},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive
                  eHealth System},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {555--560},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_48},
  doi          = {10.1007/978-3-642-30436-1\_48},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/MilutinovicND12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cms/2012,
  editor       = {Bart De Decker and
                  David W. Chadwick},
  title        = {Communications and Multimedia Security - 13th {IFIP} {TC} 6/TC 11
                  International Conference, {CMS} 2012, Canterbury, UK, September 3-5,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7394},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32805-3},
  doi          = {10.1007/978-3-642-32805-3},
  isbn         = {978-3-642-32804-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/LaponKDN11,
  author       = {Jorn Lapon and
                  Markulf Kohlweiss and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Bart De Decker and
                  Jorn Lapon and
                  Vincent Naessens and
                  Andreas Uhl},
  title        = {Analysis of Revocation Strategies for Anonymous Idemix Credentials},
  booktitle    = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC}
                  11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7025},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24712-5\_1},
  doi          = {10.1007/978-3-642-24712-5\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/LaponKDN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/DecroixMDN11,
  author       = {Koen Decroix and
                  Milica Milutinovic and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Bart De Decker and
                  Jorn Lapon and
                  Vincent Naessens and
                  Andreas Uhl},
  title        = {A Generic Architecture for Integrating Health Monitoring and Advanced
                  Care Provisioning},
  booktitle    = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC}
                  11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7025},
  pages        = {163--170},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24712-5\_14},
  doi          = {10.1007/978-3-642-24712-5\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/DecroixMDN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/MilutinovicPD11,
  author       = {Milica Milutinovic and
                  Roel Peeters and
                  Bart De Decker},
  editor       = {Bart De Decker and
                  Jorn Lapon and
                  Vincent Naessens and
                  Andreas Uhl},
  title        = {Secure Negotiation for Manual Authentication Protocols},
  booktitle    = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC}
                  11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7025},
  pages        = {214--221},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24712-5\_20},
  doi          = {10.1007/978-3-642-24712-5\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/MilutinovicPD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/MilutinovicDND11,
  author       = {Milica Milutinovic and
                  Koen Decroix and
                  Vincent Naessens and
                  Bart De Decker},
  editor       = {Jan Camenisch and
                  Dogan Kesdogan},
  title        = {Commercial Home Assistance (eHealth) Services},
  booktitle    = {Open Problems in Network Security - {IFIP} {WG} 11.4 International
                  Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7039},
  pages        = {28--42},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27585-2\_3},
  doi          = {10.1007/978-3-642-27585-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/MilutinovicDND11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/BoukayouaVDN11,
  author       = {Faysal Boukayoua and
                  Jan Vossaert and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Jan Camenisch and
                  Bruno Crispo and
                  Simone Fischer{-}H{\"{u}}bner and
                  Ronald Leenes and
                  Giovanni Russello},
  title        = {Using a Smartphone to Access Personalized Web Services on a Workstation},
  booktitle    = {Privacy and Identity Management for Life - 7th {IFIP} {WG} 9.2, 9.6/11.7,
                  11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September
                  5-9, 2011, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {375},
  pages        = {144--156},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31668-5\_11},
  doi          = {10.1007/978-3-642-31668-5\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/BoukayouaVDN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/DecroixDN11,
  author       = {Koen Decroix and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Jan Camenisch and
                  Bruno Crispo and
                  Simone Fischer{-}H{\"{u}}bner and
                  Ronald Leenes and
                  Giovanni Russello},
  title        = {Designing Privacy-Enhancing Mobile Applications},
  booktitle    = {Privacy and Identity Management for Life - 7th {IFIP} {WG} 9.2, 9.6/11.7,
                  11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September
                  5-9, 2011, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {375},
  pages        = {157--170},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31668-5\_12},
  doi          = {10.1007/978-3-642-31668-5\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/DecroixDN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/MilutinovicDND11,
  author       = {Milica Milutinovic and
                  Koen Decroix and
                  Vincent Naessens and
                  Bart De Decker},
  editor       = {Jan Camenisch and
                  Bruno Crispo and
                  Simone Fischer{-}H{\"{u}}bner and
                  Ronald Leenes and
                  Giovanni Russello},
  title        = {Privacy Preserving Mechanisms for a Pervasive eHealth System},
  booktitle    = {Privacy and Identity Management for Life - 7th {IFIP} {WG} 9.2, 9.6/11.7,
                  11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September
                  5-9, 2011, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {375},
  pages        = {221--231},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31668-5\_17},
  doi          = {10.1007/978-3-642-31668-5\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/MilutinovicDND11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cms/2011,
  editor       = {Bart De Decker and
                  Jorn Lapon and
                  Vincent Naessens and
                  Andreas Uhl},
  title        = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC}
                  11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7025},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24712-5},
  doi          = {10.1007/978-3-642-24712-5},
  isbn         = {978-3-642-24711-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LaponNVVD10,
  author       = {Jorn Lapon and
                  Vincent Naessens and
                  Bram Verdegem and
                  Pieter Verhaeghe and
                  Bart De Decker},
  title        = {Building advanced applications with the Belgian eID},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {5},
  pages        = {439--451},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.192},
  doi          = {10.1002/SEC.192},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LaponNVVD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaiss/NigusseD10,
  author       = {Girma Nigusse and
                  Bart De Decker},
  title        = {conf/cse/NigusseDN09 conf/dbsec/VerslypeDNNLV08 Girma Nigusse = Girma
                  Enideg Nigusse Privacy Codes of Practice for the Social Web: The Analysis
                  of Existing Privacy Codes and Emerging Social-Centric Privacy Risks},
  booktitle    = {Intelligent Information Privacy Management, Papers from the 2010 {AAAI}
                  Spring Symposium, Technical Report SS-10-05, Stanford, California,
                  USA, March 22-24, 2010},
  publisher    = {{AAAI}},
  year         = {2010},
  url          = {http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/view/1054},
  timestamp    = {Sat, 18 Feb 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aaaiss/NigusseD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VerslypeVLND10,
  author       = {Kristof Verslype and
                  Pieter Verhaeghe and
                  Jorn Lapon and
                  Vincent Naessens and
                  Bart De Decker},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {\emph{PriMan} : {A} Privacy-Preserving Identity Framework},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {327--334},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_24},
  doi          = {10.1007/978-3-642-13739-6\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/VerslypeVLND10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ehealth/SandikkayaDN10,
  author       = {Mehmet Tahir Sandikkaya and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Martin Szomszor and
                  Patty Kostkova},
  title        = {Privacy in Commercial Medical Storage Systems},
  booktitle    = {Electronic Healthcare - Third International Conference, eHealth 2010,
                  Casablanca, Morocco, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {69},
  pages        = {247--258},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23635-8\_32},
  doi          = {10.1007/978-3-642-23635-8\_32},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ehealth/SandikkayaDN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/VossaertLDN10,
  author       = {Jan Vossaert and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Jan Camenisch and
                  Costas Lambrinoudakis},
  title        = {User-Centric Identity Management Using Trusted Modules},
  booktitle    = {Public Key Infrastructures, Services and Applications - 7th European
                  Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6711},
  pages        = {155--170},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22633-5\_11},
  doi          = {10.1007/978-3-642-22633-5\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/VossaertLDN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec/VossaertLDN10,
  author       = {Jan Vossaert and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Andreas U. Schmidt and
                  Giovanni Russello and
                  Antonio Lioy and
                  Neeli R. Prasad and
                  Shiguo Lian},
  title        = {Personalized Mobile Services with Lightweight Security in a Sports
                  Association},
  booktitle    = {Security and Privacy in Mobile Information and Communication Systems
                  - Second International {ICST} Conference, MobiSec 2010, Catania, Sicily,
                  Italy, May 27-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {47},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17502-2\_1},
  doi          = {10.1007/978-3-642-17502-2\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisec/VossaertLDN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec/VerhaegheVLND10,
  author       = {Pieter Verhaeghe and
                  Kristof Verslype and
                  Jorn Lapon and
                  Vincent Naessens and
                  Bart De Decker},
  editor       = {Andreas U. Schmidt and
                  Giovanni Russello and
                  Antonio Lioy and
                  Neeli R. Prasad and
                  Shiguo Lian},
  title        = {A Mobile and Reliable Anonymous ePoll Infrastructure},
  booktitle    = {Security and Privacy in Mobile Information and Communication Systems
                  - Second International {ICST} Conference, MobiSec 2010, Catania, Sicily,
                  Italy, May 27-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {47},
  pages        = {41--52},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17502-2\_4},
  doi          = {10.1007/978-3-642-17502-2\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisec/VerhaegheVLND10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/VossaertVDN10,
  author       = {Jan Vossaert and
                  Pieter Verhaeghe and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Penny Duquenoy and
                  Marit Hansen and
                  Ronald Leenes and
                  Ge Zhang},
  title        = {A Smart Card Based Solution for User-Centric Identity Management},
  booktitle    = {Privacy and Identity Management for Life - 6th {IFIP} {WG} 9.2, 9.6/11.7,
                  11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden,
                  August 2-6, 2010, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {352},
  pages        = {164--177},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-20769-3\_14},
  doi          = {10.1007/978-3-642-20769-3\_14},
  timestamp    = {Fri, 05 Aug 2022 07:31:50 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/VossaertVDN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LaponKDN10,
  author       = {Jorn Lapon and
                  Markulf Kohlweiss and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Kai Rannenberg and
                  Vijay Varadharajan and
                  Christian Weber},
  title        = {Performance Analysis of Accumulator-Based Revocation Mechanisms},
  booktitle    = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
                  International Information Security Conference, {SEC} 2010, Held as
                  Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {330},
  pages        = {289--301},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15257-3\_26},
  doi          = {10.1007/978-3-642-15257-3\_26},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LaponKDN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cms/2010,
  editor       = {Bart De Decker and
                  Ingrid Schaum{\"{u}}ller{-}Bichl},
  title        = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International
                  Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6109},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13241-4},
  doi          = {10.1007/978-3-642-13241-4},
  isbn         = {978-3-642-13240-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/WuytsSDJ09,
  author       = {Kim Wuyts and
                  Riccardo Scandariato and
                  Bart De Decker and
                  Wouter Joosen},
  title        = {Linking Privacy Solutions to Developer Goals},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {847--852},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.51},
  doi          = {10.1109/ARES.2009.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/WuytsSDJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/NigusseDN09,
  author       = {Girma Nigusse and
                  Bart De Decker and
                  Vincent Naessens},
  title        = {Specification of Fair Data Practice Principles Using Privacy Policy
                  Languages},
  booktitle    = {Proceedings of the 12th {IEEE} International Conference on Computational
                  Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
                  29-31, 2009},
  pages        = {430--437},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSE.2009.187},
  doi          = {10.1109/CSE.2009.187},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/NigusseDN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LayouniVSDV09,
  author       = {Mohamed Layouni and
                  Kristof Verslype and
                  Mehmet Tahir Sandikkaya and
                  Bart De Decker and
                  Hans Vangheluwe},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Privacy-Preserving Telemonitoring for eHealth},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {95--110},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_7},
  doi          = {10.1007/978-3-642-03007-9\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LayouniVSDV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/ChandaND09,
  author       = {Prasit Bikash Chanda and
                  Vincent Naessens and
                  Bart De Decker},
  editor       = {Claude Godart and
                  Norbert Gronau and
                  Sushil K. Sharma and
                  G{\'{e}}r{\^{o}}me Canals},
  title        = {Anonymous, Yet Trustworthy Auctions},
  booktitle    = {Software Services for e-Business and e-Society, 9th {IFIP} {WG} 6.1
                  Conference on e-Business, e-Services and e-Society, {I3E} 2009, Nancy,
                  France, September 23-25, 2009. Proceedings},
  series       = {{IFIP}},
  volume       = {305},
  pages        = {225--239},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04280-5\_19},
  doi          = {10.1007/978-3-642-04280-5\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/ChandaND09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/VerslypeD09,
  author       = {Kristof Verslype and
                  Bart De Decker},
  editor       = {Mohammad S. Obaidat and
                  Joaquim Filipe},
  title        = {Flexible and Time-Based Anonymous Access Restrictions},
  booktitle    = {e-Business and Telecommunications - 6th International Joint Conference,
                  {ICETE} 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {130},
  pages        = {237--250},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-20077-9\_17},
  doi          = {10.1007/978-3-642-20077-9\_17},
  timestamp    = {Sat, 19 Oct 2019 20:35:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/VerslypeD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/NaessensSLVVND09,
  author       = {Vincent Naessens and
                  Mehmet Tahir Sandikkaya and
                  Jorn Lapon and
                  Kristof Verslype and
                  Pieter Verhaeghe and
                  Girma Nigusse and
                  Bart De Decker},
  editor       = {Jan Camenisch and
                  Dogan Kesdogan},
  title        = {Privacy Policies, Tools and Mechanisms of the Future},
  booktitle    = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP}
                  {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24,
                  2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {309},
  pages        = {125--138},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05437-2\_12},
  doi          = {10.1007/978-3-642-05437-2\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/NaessensSLVVND09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec/LaponVVND09,
  author       = {Jorn Lapon and
                  Bram Verdegem and
                  Pieter Verhaeghe and
                  Vincent Naessens and
                  Bart De Decker},
  editor       = {Andreas U. Schmidt and
                  Shiguo Lian},
  title        = {Extending the Belgian eID Technology with Mobile Security Functionality},
  booktitle    = {Security and Privacy in Mobile Information and Communication Systems,
                  First International {ICST} Conference, MobiSec 2009, Turin, Italy,
                  June 3-5, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {17},
  pages        = {97--109},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04434-2\_9},
  doi          = {10.1007/978-3-642-04434-2\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisec/LaponVVND09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VerhaegheLDNV09,
  author       = {Pieter Verhaeghe and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens and
                  Kristof Verslype},
  editor       = {Dimitris Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Security and Privacy Improvements for the Belgian eID Technology},
  booktitle    = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC}
                  11 International Information Security Conference, {SEC} 2009, Pafos,
                  Cyprus, May 18-20, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {297},
  pages        = {237--247},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01244-0\_21},
  doi          = {10.1007/978-3-642-01244-0\_21},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/VerhaegheLDNV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VerslypeD09,
  author       = {Kristof Verslype and
                  Bart De Decker},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Service and Timeframe Dependent Unlinkable One-time Pseudonyms},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {13--20},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 21:15:22 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VerslypeD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VerslypeDNNLV08,
  author       = {Kristof Verslype and
                  Bart De Decker and
                  Vincent Naessens and
                  Girma Nigusse and
                  Jorn Lapon and
                  Pieter Verhaeghe},
  editor       = {Vijay Atluri},
  title        = {A Privacy-Preserving Ticketing System},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {97--112},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_8},
  doi          = {10.1007/978-3-540-70567-3\_8},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/VerslypeDNNLV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/DeckerLVV08,
  author       = {Bart De Decker and
                  Mohamed Layouni and
                  Hans Vangheluwe and
                  Kristof Verslype},
  editor       = {Stig Fr. Mj{\o}lsnes and
                  Sjouke Mauw and
                  Sokratis K. Katsikas},
  title        = {A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare
                  System},
  booktitle    = {Public Key Infrastructure, 5th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5057},
  pages        = {118--133},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69485-4\_9},
  doi          = {10.1007/978-3-540-69485-4\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/DeckerLVV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VerslypeD08,
  author       = {Kristof Verslype and
                  Bart De Decker},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Ubiquitous Privacy-Preserving Identity Managment},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {589--603},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_38},
  doi          = {10.1007/978-0-387-09699-5\_38},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/VerslypeD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BrandsDD07,
  author       = {Stefan Brands and
                  Liesje Demuynck and
                  Bart De Decker},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {A Practical System for Globally Revoking the Unlinkable Pseudonyms
                  of Unknown Users},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {400--415},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_29},
  doi          = {10.1007/978-3-540-73458-1\_29},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BrandsDD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DemuynckDJ07,
  author       = {Liesje Demuynck and
                  Bart De Decker and
                  Wouter Joosen},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Les Labuschagne and
                  Jan H. P. Eloff and
                  Rossouw von Solms},
  title        = {A Credential-Based System for the Anonymous Delegation of Rights},
  booktitle    = {New Approaches for Security, Privacy and Trust in Complex Environments,
                  Proceedings of the {IFIP} {TC-11} 22nd International Information Security
                  Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  series       = {{IFIP}},
  volume       = {232},
  pages        = {169--180},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-72367-9\_15},
  doi          = {10.1007/978-0-387-72367-9\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DemuynckDJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GeversVD07,
  author       = {Steven Gevers and
                  Kristof Verslype and
                  Bart De Decker},
  editor       = {Peng Ning and
                  Ting Yu},
  title        = {Enhancing privacy in identity management systems},
  booktitle    = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {60--63},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314333.1314344},
  doi          = {10.1145/1314333.1314344},
  timestamp    = {Mon, 04 Apr 2022 16:00:14 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/GeversVD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/NaessensDD06,
  author       = {Vincent Naessens and
                  Liesje Demuynck and
                  Bart De Decker},
  editor       = {Herbert Leitold and
                  Evangelos P. Markatos},
  title        = {A Fair Anonymous Submission and Review System},
  booktitle    = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2006, Heraklion, Crete, Greece, October
                  19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4237},
  pages        = {43--53},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11909033\_5},
  doi          = {10.1007/11909033\_5},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/NaessensDD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/VerslypeD06,
  author       = {Kristof Verslype and
                  Bart De Decker},
  editor       = {Herbert Leitold and
                  Evangelos P. Markatos},
  title        = {A Flexible and Open {DRM} Framework},
  booktitle    = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2006, Heraklion, Crete, Greece, October
                  19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4237},
  pages        = {173--184},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11909033\_16},
  doi          = {10.1007/11909033\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/VerslypeD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/GeversD06,
  author       = {Steven Gevers and
                  Bart De Decker},
  editor       = {Robert Meersman and
                  Zahir Tari and
                  Pilar Herrero},
  title        = {Privacy Friendly Information Disclosure},
  booktitle    = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops,
                  {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS,
                  COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM}
                  Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier,
                  France, October 29 - November 3, 2006. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4277},
  pages        = {636--646},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11915034\_87},
  doi          = {10.1007/11915034\_87},
  timestamp    = {Thu, 14 Oct 2021 10:28:26 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/GeversD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NaessensD06,
  author       = {Vincent Naessens and
                  Bart De Decker},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {A Methodology for Designing Controlled Anonymous Applications},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {111--122},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_10},
  doi          = {10.1007/0-387-33406-8\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/NaessensD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/DemuynckD05,
  author       = {Liesje Demuynck and
                  Bart De Decker},
  editor       = {Jana Dittmann and
                  Stefan Katzenbeisser and
                  Andreas Uhl},
  title        = {Privacy-Preserving Electronic Health Records},
  booktitle    = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2005, Salzburg, Austria, September
                  19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3677},
  pages        = {150--159},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552055\_15},
  doi          = {10.1007/11552055\_15},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/DemuynckD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/GoovaertsWDJ05,
  author       = {Tom Goovaerts and
                  Bart De Win and
                  Bart De Decker and
                  Wouter Joosen},
  editor       = {Jana Dittmann and
                  Stefan Katzenbeisser and
                  Andreas Uhl},
  title        = {Assessment of Palm {OS} Susceptibility to Malicious Code Threats},
  booktitle    = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2005, Salzburg, Austria, September
                  19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3677},
  pages        = {240--249},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552055\_24},
  doi          = {10.1007/11552055\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/GoovaertsWDJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MichielsVJD05,
  author       = {Sam Michiels and
                  Kristof Verslype and
                  Wouter Joosen and
                  Bart De Decker},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Towards a software architecture for {DRM}},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {65--74},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102559},
  doi          = {10.1145/1102546.1102559},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/MichielsVJD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NaessensDD05,
  author       = {Vincent Naessens and
                  Bart De Decker and
                  Liesje Demuynck},
  editor       = {Ry{\^{o}}ichi Sasaki and
                  Sihan Qing and
                  Eiji Okamoto and
                  Hiroshi Yoshiura},
  title        = {Accountable Anonymous E-Mail},
  booktitle    = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
                  20th International Conference on Information Security {(SEC} 2005),
                  May 30 - June 1, 2005, Chiba, Japan},
  series       = {{IFIP}},
  volume       = {181},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2005},
  timestamp    = {Fri, 19 May 2017 01:25:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/NaessensDD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DeckerNP03,
  author       = {Bart De Decker and
                  Gregory Neven and
                  Frank Piessens},
  editor       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sokratis K. Katsikas},
  title        = {Secure Vickrey Auctions without a Trusted Third Party},
  booktitle    = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\)
                  International Conference on Information Security (SEC2003), May 26-28,
                  2003, Athens, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {250},
  pages        = {337--348},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Fri, 25 Apr 2003 10:12:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DeckerNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/WinVD02,
  author       = {Bart De Win and
                  Bart Vanhaute and
                  Bart De Decker},
  title        = {How aspect-oriented programming can help to build secure software},
  journal      = {Informatica (Slovenia)},
  volume       = {26},
  number       = {2},
  year         = {2002},
  timestamp    = {Mon, 15 Feb 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/WinVD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dais/DeckerNPH01,
  author       = {Bart De Decker and
                  Gregory Neven and
                  Frank Piessens and
                  Erik Van Hoeymissen},
  editor       = {Krzysztof Zielinski and
                  Kurt Geihs and
                  Aleksander Laurentowski},
  title        = {Second Price Auctions - {A} Case Study of Secure Distributed Computating},
  booktitle    = {New Developments in Distributed Applications and Interoperable Systems,
                  {IFIP} {TC6} / {WG6.1} Third International Working Conference on Distributed
                  Applications and Interoperable Systems, September 17-19, 2001, Krak{\'{o}}w,
                  Poland},
  series       = {{IFIP} Conference Proceedings},
  volume       = {198},
  pages        = {217--228},
  publisher    = {Kluwer},
  year         = {2001},
  url          = {https://doi.org/10.1007/0-306-47005-5\_19},
  doi          = {10.1007/0-306-47005-5\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dais/DeckerNPH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsec/NaessensVD01,
  author       = {Vincent Naessens and
                  Bart Vanhaute and
                  Bart De Decker},
  editor       = {Bart De Decker and
                  Frank Piessens and
                  Jan Smits and
                  Els Van Herreweghen},
  title        = {Securing {RMI} Communication},
  booktitle    = {Advances in Network and Distributed Systems Security, {IFIP} {TC11}
                  {WG11.4} First Annual Working Conference on Network Security, November
                  26-27, 2001, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {206},
  pages        = {93--105},
  publisher    = {Kluwer},
  year         = {2001},
  url          = {https://doi.org/10.1007/0-306-46958-8\_7},
  doi          = {10.1007/0-306-46958-8\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsec/NaessensVD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsec/WinVD01,
  author       = {Bart De Win and
                  Bart Vanhaute and
                  Bart De Decker},
  editor       = {Bart De Decker and
                  Frank Piessens and
                  Jan Smits and
                  Els Van Herreweghen},
  title        = {Security Through Aspect-Oriented Programming},
  booktitle    = {Advances in Network and Distributed Systems Security, {IFIP} {TC11}
                  {WG11.4} First Annual Working Conference on Network Security, November
                  26-27, 2001, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {206},
  pages        = {125--138},
  publisher    = {Kluwer},
  year         = {2001},
  url          = {https://doi.org/10.1007/0-306-46958-8\_9},
  doi          = {10.1007/0-306-46958-8\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsec/WinVD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/HerleaCPNPD01,
  author       = {T. Herlea and
                  Joris Claessens and
                  Bart Preneel and
                  Gregory Neven and
                  Frank Piessens and
                  Bart De Decker},
  editor       = {Michel Dupuy and
                  Pierre Paradinas},
  title        = {On Securely Scheduling a Meeting},
  booktitle    = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth
                  Annual Working Conference on Information Security (IFIP/Sec'01), June
                  11-13, 2001, Paris, France},
  series       = {{IFIP} Conference Proceedings},
  volume       = {193},
  pages        = {183--198},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Fri, 26 Jul 2002 13:05:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/HerleaCPNPD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/PiessensDW01,
  author       = {Frank Piessens and
                  Bart De Decker and
                  Bart De Win},
  editor       = {Michael Gertz and
                  Erik Guldentops and
                  Leon Strous},
  title        = {Developing secure software. {A} survey and classification of common
                  software vulnerabilities},
  booktitle    = {Integrity, Internal Control and Security in Information Systems: Connecting
                  Governance and Technology, {IFIP} {TC11/WG11.5} Fourth Working Conference
                  on Integrity, Internal Control and Security in Information Systems,
                  November 15-16, 2001, Brussels, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {211},
  pages        = {27--40},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Mon, 07 Dec 2020 17:16:29 +0100},
  biburl       = {https://dblp.org/rec/conf/tc11-5/PiessensDW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/netsec/2001,
  editor       = {Bart De Decker and
                  Frank Piessens and
                  Jan Smits and
                  Els Van Herreweghen},
  title        = {Advances in Network and Distributed Systems Security, {IFIP} {TC11}
                  {WG11.4} First Annual Working Conference on Network Security, November
                  26-27, 2001, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {206},
  publisher    = {Kluwer},
  year         = {2001},
  isbn         = {0-7923-7558-0},
  timestamp    = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netsec/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mata/DeckerPHN00,
  author       = {Bart De Decker and
                  Frank Piessens and
                  Erik Van Hoeymissen and
                  Gregory Neven},
  editor       = {Eric Horlait},
  title        = {Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed
                  Computations},
  booktitle    = {Mobile Agents for Telecommunication Applications, Second International
                  Workshop, {MATA} 2000, Paris, France, September 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1931},
  pages        = {219--232},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45391-1\_18},
  doi          = {10.1007/3-540-45391-1\_18},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/mata/DeckerPHN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NevenPD00,
  author       = {Gregory Neven and
                  Frank Piessens and
                  Bart De Decker},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {On the Practical Feasibiltiy of Secure Distributed Computing: {A}
                  Case Study},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {361--370},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Fri, 26 Jul 2002 13:04:43 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/NevenPD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/WinBMDJ00,
  author       = {Bart De Win and
                  Jan Van den Bergh and
                  Frank Matthijs and
                  Bart De Decker and
                  Wouter Joosen},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {A Security Architecture for Electronic Commerce Applications},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {491--500},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Fri, 10 Nov 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/WinBMDJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Decker97,
  author       = {Bart De Decker},
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {Introduction to Computer Security},
  booktitle    = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  pages        = {377--393},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-49248-8\_19},
  doi          = {10.1007/3-540-49248-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Decker97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/BerbersDJMR97,
  author       = {Yolande Berbers and
                  Bart De Decker and
                  Wouter Joosen and
                  Frank Matthijs and
                  Bert Robben},
  editor       = {Hamid R. Arabnia},
  title        = {Management of Events in a multi-agent system},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 1997, June 30 - July
                  3, 1997, Las Vegas, Nevada, {USA}},
  pages        = {1141--1150},
  publisher    = {{CSREA} Press},
  year         = {1997},
  timestamp    = {Tue, 20 Apr 2004 14:47:02 +0200},
  biburl       = {https://dblp.org/rec/conf/pdpta/BerbersDJMR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/calisce/VannesteDCW96,
  author       = {Philip Vanneste and
                  Bart De Decker and
                  Marcin Chrzanowski and
                  Ken Warkentyne},
  editor       = {Arantza D{\'{\i}}az de Ilarraza S{\'{a}}nchez and
                  Isabel Fern{\'{a}}ndez de Castro},
  title        = {Panel Discussion: The Use of Internet in Education},
  booktitle    = {Computer Aided Learning and Instruction in Science and Engineering,
                  Third International Conference, {CALISCE} '96, San Sebastian, Spain,
                  July 29-31, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1108},
  pages        = {39--41},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0022589},
  doi          = {10.1007/BFB0022589},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/calisce/VannesteDCW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppig/VannesteBD96,
  author       = {Philip Vanneste and
                  Koen Bertels and
                  Bart De Decker},
  title        = {{CAMUS:} {A} Cognitive Model for Reverse Engineering-Bases Program
                  Analysis},
  booktitle    = {Proceedings of the 8th Annual Workshop of the Psychology of Programming
                  Interest Group, {PPIG} 1996, Ghent, Belgium, April 10-12, 1996},
  pages        = {14},
  publisher    = {Psychology of Programming Interest Group},
  year         = {1996},
  url          = {https://ppig.org/papers/1996-ppig-8th-vanneste/},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ppig/VannesteBD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigopsE/BerbersDJ96,
  author       = {Yolande Berbers and
                  Bart De Decker and
                  Wouter Joosen},
  editor       = {Andrew Herbert and
                  Andrew S. Tanenbaum},
  title        = {Infrastructure for mobile agents},
  booktitle    = {Proceedings of the 7th {ACM} {SIGOPS} European Workshop: Systems Support
                  for Worldwide Applications, 1996, Connemara, Ireland, September 9-11,
                  1996},
  pages        = {173--180},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/504450.504483},
  doi          = {10.1145/504450.504483},
  timestamp    = {Thu, 07 Nov 2019 10:24:25 +0100},
  biburl       = {https://dblp.org/rec/conf/sigopsE/BerbersDJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PiessensDJ93,
  author       = {Frank Piessens and
                  Bart De Decker and
                  Phil Janson},
  title        = {Interconnecting domains with heterogeneous key distribution and authentication
                  protocols},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {66--79},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287642},
  doi          = {10.1109/RISP.1993.287642},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/PiessensDJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Decker91,
  author       = {Bart De Decker},
  editor       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  title        = {Unix Security {\&} Kerberos},
  booktitle    = {Computer Security and Industrial Cryptography - State of the Art and
                  Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991},
  series       = {Lecture Notes in Computer Science},
  volume       = {741},
  pages        = {257--274},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57341-0\_68},
  doi          = {10.1007/3-540-57341-0\_68},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Decker91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics