BibTeX records: Pieter H. Hartel

download as .bib file

@article{DBLP:journals/csur/BarthIH23,
  author       = {Susanne Barth and
                  Dan Ionita and
                  Pieter H. Hartel},
  title        = {Understanding Online Privacy - {A} Systematic Review of Privacy Visualizations
                  and Privacy by Design Guidelines},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {3},
  pages        = {63:1--63:37},
  year         = {2023},
  url          = {https://doi.org/10.1145/3502288},
  doi          = {10.1145/3502288},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/BarthIH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-12134,
  author       = {Pieter H. Hartel and
                  Eljo Haspels and
                  Mark van Staalduinen and
                  Octavio Texeira},
  title        = {DarkDiff: Explainable web page similarity of {TOR} onion sites},
  journal      = {CoRR},
  volume       = {abs/2308.12134},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.12134},
  doi          = {10.48550/ARXIV.2308.12134},
  eprinttype    = {arXiv},
  eprint       = {2308.12134},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-12134.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpc/BarthIJHJ21,
  author       = {Susanne Barth and
                  Dan Ionita and
                  Menno D. T. de Jong and
                  Pieter H. Hartel and
                  Marianne Junger},
  title        = {Privacy Rating: {A} User-Centered Approach for Visualizing Data Handling
                  Practices of Online Services},
  journal      = {{IEEE} Trans. Prof. Commun.},
  volume       = {64},
  number       = {4},
  pages        = {354--373},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPC.2021.3110617},
  doi          = {10.1109/TPC.2021.3110617},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpc/BarthIJHJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-04486,
  author       = {Pieter H. Hartel and
                  Rolf van Wegberg and
                  Mark van Staalduinen},
  title        = {Investigating sentence severity with judicial open data - {A} case
                  study on sentencing high-tech crime in the Dutch criminal justice
                  system},
  journal      = {CoRR},
  volume       = {abs/2104.04486},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.04486},
  eprinttype    = {arXiv},
  eprint       = {2104.04486},
  timestamp    = {Tue, 13 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-04486.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-06444,
  author       = {Pieter H. Hartel and
                  Rolf van Wegberg},
  title        = {Going dark? Analysing the impact of end-to-end encryption on the outcome
                  of Dutch criminal court cases},
  journal      = {CoRR},
  volume       = {abs/2104.06444},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.06444},
  eprinttype    = {arXiv},
  eprint       = {2104.06444},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-06444.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/HomoliakBHHBS20,
  author       = {Ivan Homoliak and
                  Dominik Breitenbacher and
                  Ondrej Hujnak and
                  Pieter H. Hartel and
                  Alexander Binder and
                  Pawel Szalachowski},
  title        = {SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract
                  Wallets},
  booktitle    = {{AFT} '20: 2nd {ACM} Conference on Advances in Financial Technologies,
                  New York, NY, USA, October 21-23, 2020},
  pages        = {145--162},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419614.3423257},
  doi          = {10.1145/3419614.3423257},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aft/HomoliakBHHBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BortolameottiEC20,
  author       = {Riccardo Bortolameotti and
                  Thijs van Ede and
                  Andrea Continella and
                  Thomas Hupperich and
                  Maarten H. Everts and
                  Reza Rafati and
                  Willem Jonker and
                  Pieter H. Hartel and
                  Andreas Peter},
  editor       = {Chih{-}Cheng Hung and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Dongwan Shin and
                  Alessio Bechini},
  title        = {HeadPrint: detecting anomalous communications through header-based
                  application fingerprinting},
  booktitle    = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online
                  event, [Brno, Czech Republic], March 30 - April 3, 2020},
  pages        = {1696--1705},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3341105.3373862},
  doi          = {10.1145/3341105.3373862},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BortolameottiEC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tap/HartelS20,
  author       = {Pieter H. Hartel and
                  Richard Schumi},
  editor       = {Wolfgang Ahrendt and
                  Heike Wehrheim},
  title        = {Mutation Testing of Smart Contracts at Scale},
  booktitle    = {Tests and Proofs - 14th International Conference, TAP@STAF 2020, Bergen,
                  Norway, June 22-23, 2020, Proceedings [postponed]},
  series       = {Lecture Notes in Computer Science},
  volume       = {12165},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-50995-8\_2},
  doi          = {10.1007/978-3-030-50995-8\_2},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tap/HartelS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HartelHR19,
  author       = {Pieter H. Hartel and
                  Ivan Homoliak and
                  Dani{\"{e}}l Reijsbergen},
  title        = {An Empirical Study Into the Success of Listed Smart Contracts in Ethereum},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {177539--177555},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2957284},
  doi          = {10.1109/ACCESS.2019.2957284},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HartelHR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BarthHJM19,
  author       = {Susanne Barth and
                  Pieter H. Hartel and
                  Marianne Junger and
                  Lorena Montoya},
  title        = {Teaching Empirical Social-Science Research to Cybersecurity Students:
                  The Case of {\textbackslash}"Thinking Like a Thief{\textbackslash}"},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {8--16},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2888781},
  doi          = {10.1109/MSEC.2018.2888781},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BarthHJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tele/BarthJJHR19,
  author       = {Susanne Barth and
                  Menno D. T. de Jong and
                  Marianne Junger and
                  Pieter H. Hartel and
                  Janina C. Roppelt},
  title        = {Putting the privacy paradox to the test: Online privacy and security
                  behaviors among users with technical knowledge, privacy awareness,
                  and financial resources},
  journal      = {Telematics Informatics},
  volume       = {41},
  pages        = {55--69},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tele.2019.03.003},
  doi          = {10.1016/J.TELE.2019.03.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tele/BarthJJHR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BortolameottiEC19,
  author       = {Riccardo Bortolameotti and
                  Thijs van Ede and
                  Andrea Continella and
                  Maarten H. Everts and
                  Willem Jonker and
                  Pieter H. Hartel and
                  Andreas Peter},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {Victim-Aware Adaptive Covert Channels},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {304},
  pages        = {450--471},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37228-6\_22},
  doi          = {10.1007/978-3-030-37228-6\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/BortolameottiEC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-09208,
  author       = {Pieter H. Hartel and
                  Mark van Staalduinen},
  title        = {Truffle tests for free - Replaying Ethereum smart contracts for transparency},
  journal      = {CoRR},
  volume       = {abs/1907.09208},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.09208},
  eprinttype    = {arXiv},
  eprint       = {1907.09208},
  timestamp    = {Tue, 30 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-09208.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-11597,
  author       = {Pieter H. Hartel and
                  Ivan Homoliak and
                  Dani{\"{e}}l Reijsbergen},
  title        = {An Empirical Study into the Success of Listed Smart Contracts in Ethereum},
  journal      = {CoRR},
  volume       = {abs/1908.11597},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.11597},
  eprinttype    = {arXiv},
  eprint       = {1908.11597},
  timestamp    = {Wed, 04 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-11597.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-12563,
  author       = {Pieter H. Hartel and
                  Richard Schumi},
  title        = {Gas limit aware mutation testing of smart contracts at scale},
  journal      = {CoRR},
  volume       = {abs/1909.12563},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.12563},
  eprinttype    = {arXiv},
  eprint       = {1909.12563},
  timestamp    = {Tue, 07 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-12563.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/ChiaHHMPRSS18,
  author       = {Vincent Chia and
                  Pieter H. Hartel and
                  Qingze Hum and
                  Sebastian Ma and
                  Georgios Piliouras and
                  Dani{\"{e}}l Reijsbergen and
                  Mark van Staalduinen and
                  Pawel Szalachowski},
  title        = {Rethinking Blockchain Security: Position Paper},
  booktitle    = {{IEEE} International Conference on Internet of Things (iThings) and
                  {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber,
                  Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData),
                  iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July
                  30 - August 3, 2018},
  pages        = {1273--1280},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/Cybermatics\_2018.2018.00222},
  doi          = {10.1109/CYBERMATICS\_2018.2018.00222},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ithings/ChiaHHMPRSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-04358,
  author       = {Vincent Chia and
                  Pieter H. Hartel and
                  Qingze Hum and
                  Sebastian Ma and
                  Georgios Piliouras and
                  Dani{\"{e}}l Reijsbergen and
                  Mark van Staalduinen and
                  Pawel Szalachowski},
  title        = {Rethinking Blockchain Security: Position Paper},
  journal      = {CoRR},
  volume       = {abs/1806.04358},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.04358},
  eprinttype    = {arXiv},
  eprint       = {1806.04358},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-04358.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BulleeMJH17,
  author       = {Jan{-}Willem Bullee and
                  Lorena Montoya and
                  Marianne Junger and
                  Pieter H. Hartel},
  title        = {Spear phishing in organisations explained},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {5},
  pages        = {593--613},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-03-2017-0009},
  doi          = {10.1108/ICS-03-2017-0009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BulleeMJH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BortolameottiEC17,
  author       = {Riccardo Bortolameotti and
                  Thijs van Ede and
                  Marco Caselli and
                  Maarten H. Everts and
                  Pieter H. Hartel and
                  Rick Hofstede and
                  Willem Jonker and
                  Andreas Peter},
  title        = {DECANTeR: DEteCtion of Anomalous outbouNd {HTTP} TRaffic by Passive
                  Application Fingerprinting},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {373--386},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134605},
  doi          = {10.1145/3134600.3134605},
  timestamp    = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BortolameottiEC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/JungerMHH17,
  author       = {Marianne Junger and
                  Lorena Montoya and
                  Pieter H. Hartel and
                  Maliheh Heydari},
  title        = {Towards the normalization of cybercrime victimization: {A} routine
                  activities analysis of cybercrime in europe},
  booktitle    = {2017 International Conference On Cyber Situational Awareness, Data
                  Analytics And Assessment (Cyber SA), London, United Kingdom, June
                  19-20, 2017},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CyberSA.2017.8073391},
  doi          = {10.1109/CYBERSA.2017.8073391},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/JungerMHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/LastdragerGHJ17,
  author       = {Elmer Lastdrager and
                  In{\'{e}}s Carvajal Gallardo and
                  Pieter H. Hartel and
                  Marianne Junger},
  title        = {How Effective is Anti-Phishing Training for Children?},
  booktitle    = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017,
                  Santa Clara, CA, USA, July 12-14, 2017},
  pages        = {229--239},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/lastdrager},
  timestamp    = {Thu, 05 Sep 2024 15:37:23 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/LastdragerGHJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BortolameottiPE16,
  author       = {Riccardo Bortolameotti and
                  Andreas Peter and
                  Maarten H. Everts and
                  Willem Jonker and
                  Pieter H. Hartel},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Reliably determining data leakage in the presence of strong attackers},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {484--495},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991095},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BortolameottiPE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/BulleeMJH16,
  author       = {Jan{-}Willem Bullee and
                  Lorena Montoya and
                  Marianne Junger and
                  Pieter H. Hartel},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Telephone-based social engineering attacks: An experiment testing
                  the success and time decay of an intervention},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {107--114},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-107},
  doi          = {10.3233/978-1-61499-617-0-107},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/BulleeMJH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BakondiPEHJ15,
  author       = {Bence Gabor Bakondi and
                  Andreas Peter and
                  Maarten H. Everts and
                  Pieter H. Hartel and
                  Willem Jonker},
  title        = {Publicly Verifiable Private Aggregation of Time-Series Data},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {50--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.82},
  doi          = {10.1109/ARES.2015.82},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BakondiPEHJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/BulleeMPJH15,
  author       = {Jan{-}Willem Bullee and
                  Lorena Montoya and
                  Wolter Pieters and
                  Marianne Junger and
                  Pieter H. Hartel},
  editor       = {Giampaolo Bella and
                  Gabriele Lenzini},
  title        = {Regression Nodes: Extending Attack Trees with Data from Social Sciences},
  booktitle    = {2015 Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2015, Verona, Italy, July 13, 2015},
  pages        = {17--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/STAST.2015.11},
  doi          = {10.1109/STAST.2015.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/BulleeMPJH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BoschHJP14,
  author       = {Christoph B{\"{o}}sch and
                  Pieter H. Hartel and
                  Willem Jonker and
                  Andreas Peter},
  title        = {A Survey of Provably Secure Searchable Encryption},
  journal      = {{ACM} Comput. Surv.},
  volume       = {47},
  number       = {2},
  pages        = {18:1--18:51},
  year         = {2014},
  url          = {https://doi.org/10.1145/2636328},
  doi          = {10.1145/2636328},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/BoschHJP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/GongHNTZ14,
  author       = {Zheng Gong and
                  Pieter H. Hartel and
                  Svetla Nikova and
                  Shaohua Tang and
                  Bo Zhu},
  title        = {TuLP: {A} Family of Lightweight Message Authentication Codes for Body
                  Sensor Networks},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {29},
  number       = {1},
  pages        = {53--68},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11390-013-1411-8},
  doi          = {10.1007/S11390-013-1411-8},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/GongHNTZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HadziosmanovicSZH14,
  author       = {Dina Hadziosmanovic and
                  Robin Sommer and
                  Emmanuele Zambon and
                  Pieter H. Hartel},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Through the eye of the {PLC:} semantic security monitoring for industrial
                  processes},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {126--135},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664277},
  doi          = {10.1145/2664243.2664277},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HadziosmanovicSZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/BoschPHJ14,
  author       = {Christoph B{\"{o}}sch and
                  Andreas Peter and
                  Pieter H. Hartel and
                  Willem Jonker},
  title        = {{SOFIR:} Securely outsourced Forensic image recognition},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2014, Florence, Italy, May 4-9, 2014},
  pages        = {2694--2698},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICASSP.2014.6854089},
  doi          = {10.1109/ICASSP.2014.6854089},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/BoschPHJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BoschPLLTWHJ14,
  author       = {Christoph B{\"{o}}sch and
                  Andreas Peter and
                  Bram Leenders and
                  Hoon Wei Lim and
                  Qiang Tang and
                  Huaxiong Wang and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Distributed Searchable Symmetric Encryption},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {330--337},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890956},
  doi          = {10.1109/PST.2014.6890956},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/BoschPLLTWHJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MontoyaJH13,
  author       = {Lorena Montoya and
                  Marianne Junger and
                  Pieter H. Hartel},
  title        = {How "Digital" is Traditional Crime?},
  booktitle    = {2013 European Intelligence and Security Informatics Conference, Uppsala,
                  Sweden, August 12-14, 2013},
  pages        = {31--37},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EISIC.2013.12},
  doi          = {10.1109/EISIC.2013.12},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/MontoyaJH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JeckmansPH13,
  author       = {Arjan Jeckmans and
                  Andreas Peter and
                  Pieter H. Hartel},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Efficient Privacy-Enhanced Familiarity-Based Recommender System},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {400--417},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_23},
  doi          = {10.1007/978-3-642-40203-6\_23},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JeckmansPH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MakriEHPAHJ13,
  author       = {Eleftheria Makri and
                  Maarten H. Everts and
                  Sebastiaan de Hoogh and
                  Andreas Peter and
                  Harm op den Akker and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Privacy-Preserving Verification of Clinical Research},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {481--500},
  publisher    = {{GI}},
  year         = {2013},
  url          = {https://dl.gi.de/handle/20.500.12116/20065},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MakriEHPAHJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/LastdragerMHJ13,
  author       = {Elmer Lastdrager and
                  Lorena Montoya and
                  Pieter H. Hartel and
                  Marianne Junger},
  title        = {Applying the Lost-Letter Technique to Assess {IT} Risk Behaviour},
  booktitle    = {Third Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2013, New Orleans, LA, USA, June 29, 2013},
  pages        = {2--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/STAST.2013.15},
  doi          = {10.1109/STAST.2013.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/LastdragerMHJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/JeckmansBEHLT13,
  author       = {Arjan J. P. Jeckmans and
                  Michael Beye and
                  Zekeriya Erkin and
                  Pieter H. Hartel and
                  Reginald L. Lagendijk and
                  Qiang Tang},
  editor       = {Naeem Ramzan and
                  Roelof van Zwol and
                  Jong{-}Seok Lee and
                  Kai Cl{\"{u}}ver and
                  Xian{-}Sheng Hua},
  title        = {Privacy in Recommender Systems},
  booktitle    = {Social Media Retrieval},
  series       = {Computer Communications and Networks},
  pages        = {263--281},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4471-4555-4\_12},
  doi          = {10.1007/978-1-4471-4555-4\_12},
  timestamp    = {Fri, 09 Apr 2021 18:18:56 +0200},
  biburl       = {https://dblp.org/rec/series/ccn/JeckmansBEHLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/critis/2013,
  editor       = {Eric A. M. Luiijf and
                  Pieter H. Hartel},
  title        = {Critical Information Infrastructures Security - 8th International
                  Workshop, {CRITIS} 2013, Amsterdam, The Netherlands, September 16-18,
                  2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8328},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03964-0},
  doi          = {10.1007/978-3-319-03964-0},
  isbn         = {978-3-319-03963-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HadziosmanovicBH12,
  author       = {Dina Hadziosmanovic and
                  Damiano Bolzoni and
                  Pieter H. Hartel},
  title        = {A log mining approach for process monitoring in {SCADA}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {4},
  pages        = {231--251},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0163-8},
  doi          = {10.1007/S10207-012-0163-8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HadziosmanovicBH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/HartelM12,
  author       = {Pieter H. Hartel and
                  Henk L. Muller},
  title        = {Simple algebraic data types for {C}},
  journal      = {Softw. Pract. Exp.},
  volume       = {42},
  number       = {2},
  pages        = {191--210},
  year         = {2012},
  url          = {https://doi.org/10.1002/spe.1058},
  doi          = {10.1002/SPE.1058},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/HartelM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compeng/HadziosmanovicBEH12,
  author       = {Dina Hadziosmanovic and
                  Damiano Bolzoni and
                  Sandro Etalle and
                  Pieter H. Hartel},
  title        = {Challenges and opportunities in securing industrial control systems},
  booktitle    = {Complexity in Engineering, {COMPENG} 2012, Aachen, Germany, June 11-13,
                  2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CompEng.2012.6242970},
  doi          = {10.1109/COMPENG.2012.6242970},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/compeng/HadziosmanovicBEH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/JeckmansTH12,
  author       = {Arjan Jeckmans and
                  Qiang Tang and
                  Pieter H. Hartel},
  editor       = {Waleed W. Smari and
                  Geoffrey Charles Fox},
  title        = {Privacy-preserving collaborative filtering based on horizontally partitioned
                  dataset},
  booktitle    = {2012 International Conference on Collaboration Technologies and Systems,
                  {CTS} 2012, Denver, CO, USA, May 21-25, 2012},
  pages        = {439--446},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CTS.2012.6261088},
  doi          = {10.1109/CTS.2012.6261088},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/JeckmansTH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BoschTHJ12,
  author       = {Christoph B{\"{o}}sch and
                  Qiang Tang and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Dieter Gollmann and
                  Felix C. Freiling},
  title        = {Selective Document Retrieval from Encrypted Database},
  booktitle    = {Information Security - 15th International Conference, {ISC} 2012,
                  Passau, Germany, September 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7483},
  pages        = {224--241},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33383-5\_14},
  doi          = {10.1007/978-3-642-33383-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BoschTHJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LawMGHP11,
  author       = {Yee Wei Law and
                  Giorgi Moniava and
                  Zheng Gong and
                  Pieter H. Hartel and
                  Marimuthu Palaniswami},
  title        = {KALwEN: a new practical and interoperable key management scheme for
                  body sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {11},
  pages        = {1309--1329},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.256},
  doi          = {10.1002/SEC.256},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LawMGHP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/ZambonEWH11,
  author       = {Emmanuele Zambon and
                  Sandro Etalle and
                  Roel J. Wieringa and
                  Pieter H. Hartel},
  title        = {Model-based qualitative risk assessment for availability of {IT} infrastructures},
  journal      = {Softw. Syst. Model.},
  volume       = {10},
  number       = {4},
  pages        = {553--580},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10270-010-0166-8},
  doi          = {10.1007/S10270-010-0166-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/ZambonEWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/IbraimiNHJ11,
  author       = {Luan Ibraimi and
                  Svetla Nikova and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Public-Key Encryption with Delegated Search},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {532--549},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_31},
  doi          = {10.1007/978-3-642-21554-4\_31},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/IbraimiNHJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cason/JeckmansTH11,
  author       = {Arjan Jeckmans and
                  Qiang Tang and
                  Pieter H. Hartel},
  title        = {Privacy-preserving profile matching using the social graph},
  booktitle    = {International Conference on Computational Aspects of Social Networks,
                  CASoN 2011, Salamanca, Spain, October 19-21, 2011},
  pages        = {42--47},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CASON.2011.6085916},
  doi          = {10.1109/CASON.2011.6085916},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cason/JeckmansTH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JeckmansTH11,
  author       = {Arjan Jeckmans and
                  Qiang Tang and
                  Pieter H. Hartel},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: privacy-preserving profile similarity computation in online
                  social networks},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {793--796},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093495},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JeckmansTH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/HadziosmanovicB11,
  author       = {Dina Hadziosmanovic and
                  Damiano Bolzoni and
                  Pieter H. Hartel and
                  Sandro Etalle},
  title        = {{MELISSA:} Towards Automated Detection of Undesirable User Actions
                  in Critical Infrastructures},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {41--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.10},
  doi          = {10.1109/EC2ND.2011.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/HadziosmanovicB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SedghiHJN11,
  author       = {Saeed Sedghi and
                  Pieter H. Hartel and
                  Willem Jonker and
                  Svetla Nikova},
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {Privacy Enhanced Access Control by Means of Policy Blinding},
  booktitle    = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  pages        = {108--122},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0\_9},
  doi          = {10.1007/978-3-642-21031-0\_9},
  timestamp    = {Tue, 12 May 2020 10:56:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/SedghiHJN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BoschBHJ11,
  author       = {Christoph B{\"{o}}sch and
                  Richard Brinkman and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Conjunctive Wildcard Search over Encrypted Data},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {114--127},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_8},
  doi          = {10.1007/978-3-642-23556-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BoschBHJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/DimkovPH11,
  author       = {Trajce Dimkov and
                  Wolter Pieters and
                  Pieter H. Hartel},
  editor       = {Thomas J. Cortina and
                  Ellen Lowenfeld Walker and
                  Laurie A. Smith King and
                  David R. Musicant},
  title        = {Training students to steal: a practical assignment in computer security
                  education},
  booktitle    = {Proceedings of the 42nd {ACM} technical symposium on Computer science
                  education, {SIGCSE} 2011, Dallas, TX, USA, March 9-12, 2011},
  pages        = {21--26},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1953163.1953175},
  doi          = {10.1145/1953163.1953175},
  timestamp    = {Wed, 10 Mar 2021 13:17:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/DimkovPH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmam/IbraimiTHJ10,
  author       = {Luan Ibraimi and
                  Qiang Tang and
                  Pieter H. Hartel and
                  Willem Jonker},
  title        = {Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely
                  Manage Personal Health Records},
  journal      = {Int. J. Comput. Model. Algorithms Medicine},
  volume       = {1},
  number       = {2},
  pages        = {1--21},
  year         = {2010},
  url          = {https://doi.org/10.4018/jcmam.2010040101},
  doi          = {10.4018/JCMAM.2010040101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmam/IbraimiTHJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BuhanDHTV10,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Qiang Tang and
                  Raymond N. J. Veldhuis},
  title        = {Embedding renewable cryptographic keys into noisy data},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {3},
  pages        = {193--208},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0103-4},
  doi          = {10.1007/S10207-010-0103-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BuhanDHTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tos/KhatibH10,
  author       = {Mohammed G. Khatib and
                  Pieter H. Hartel},
  title        = {Optimizing MEMS-based storage devices for mobile battery-powered systems},
  journal      = {{ACM} Trans. Storage},
  volume       = {6},
  number       = {1},
  pages        = {1:1--1:37},
  year         = {2010},
  url          = {https://doi.org/10.1145/1714454.1714455},
  doi          = {10.1145/1714454.1714455},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tos/KhatibH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/KhatibHD10,
  author       = {Mohammed G. Khatib and
                  Pieter H. Hartel and
                  Hylke W. van Dijk},
  title        = {Energy-Efficient Streaming Using Non-volatile Memory},
  journal      = {J. Signal Process. Syst.},
  volume       = {60},
  number       = {2},
  pages        = {149--168},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11265-008-0308-1},
  doi          = {10.1007/S11265-008-0308-1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vlsisp/KhatibHD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DimkovPH10,
  author       = {Trajce Dimkov and
                  Wolter Pieters and
                  Pieter H. Hartel},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Two methodologies for physical penetration testing using social engineering},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {399--408},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920319},
  doi          = {10.1145/1920261.1920319},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DimkovPH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DimkovPH10,
  author       = {Trajce Dimkov and
                  Wolter Pieters and
                  Pieter H. Hartel},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Laptop theft: a case study on the effectiveness of security mechanisms
                  in open organizations},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {666--668},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866391},
  doi          = {10.1145/1866307.1866391},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DimkovPH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/greencom/DimkovPH10,
  author       = {Trajce Dimkov and
                  Wolter Pieters and
                  Pieter H. Hartel},
  editor       = {Peidong Zhu and
                  Lizhe Wang and
                  Feng Xia and
                  Huajun Chen and
                  Ian McLoughlin and
                  Shiao{-}Li Tsao and
                  Mitsuhisa Sato and
                  Sun{-}Ki Chai and
                  Irwin King},
  title        = {Effectiveness of Physical, Social and Digital Mechanisms against Laptop
                  Theft in Open Organizations},
  booktitle    = {2010 {IEEE/ACM} Int'l Conference on Green Computing and Communications,
                  GreenCom 2010, {\&} Int'l Conference on Cyber, Physical and Social
                  Computing, CPSCom 2010, Hangzhou, China, December 18-20, 2010},
  pages        = {727--732},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/GreenCom-CPSCom.2010.165},
  doi          = {10.1109/GREENCOM-CPSCOM.2010.165},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/greencom/DimkovPH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/DimkovPH10,
  author       = {Trajce Dimkov and
                  Wolter Pieters and
                  Pieter H. Hartel},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Portunes: Representing Attack Scenarios Spanning through the Physical,
                  Digital and Social Domain},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_9},
  doi          = {10.1007/978-3-642-16074-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/DimkovPH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HadziosmanovicBH10,
  author       = {Dina Hadziosmanovic and
                  Damiano Bolzoni and
                  Pieter H. Hartel},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {{MEDUSA:} Mining Events to Detect Undesirable uSer Actions in {SCADA}},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {500--501},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_33},
  doi          = {10.1007/978-3-642-15512-3\_33},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HadziosmanovicBH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/SedghiLNHJ10,
  author       = {Saeed Sedghi and
                  Peter van Liesdonk and
                  Svetla Nikova and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Searching Keywords with Wildcards on Encrypted Data},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {138--153},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_10},
  doi          = {10.1007/978-3-642-15317-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/SedghiLNHJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/LiesdonkSDHJ10,
  author       = {Peter van Liesdonk and
                  Saeed Sedghi and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Computationally Efficient Searchable Symmetric Encryption},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {87--100},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_7},
  doi          = {10.1007/978-3-642-15546-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/LiesdonkSDHJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BuhanBDHV09,
  author       = {Ileana Buhan and
                  Bas Boom and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Raymond N. J. Veldhuis},
  title        = {Secure pairing with biometrics},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {27--42},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023424},
  doi          = {10.1504/IJSN.2009.023424},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BuhanBDHV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/LawPHDHH09,
  author       = {Yee Wei Law and
                  Marimuthu Palaniswami and
                  Lodewijk van Hoesel and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Paul J. M. Havinga},
  title        = {Energy-efficient link-layer jamming attacks against wireless sensor
                  network {MAC} protocols},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {5},
  number       = {1},
  pages        = {6:1--6:38},
  year         = {2009},
  url          = {https://doi.org/10.1145/1464420.1464426},
  doi          = {10.1145/1464420.1464426},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/LawPHDHH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GongHNZ09,
  author       = {Zheng Gong and
                  Pieter H. Hartel and
                  Svetla Nikova and
                  Bo Zhu},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Towards Secure and Practical MACs for Body Sensor Networks},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {182--198},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_13},
  doi          = {10.1007/978-3-642-10628-6\_13},
  timestamp    = {Mon, 15 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GongHNZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/IbraimiTHJ09,
  author       = {Luan Ibraimi and
                  Qiang Tang and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption
                  Schemes},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_1},
  doi          = {10.1007/978-3-642-00843-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/IbraimiTHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/KhatibH09,
  author       = {Mohammed G. Khatib and
                  Pieter H. Hartel},
  title        = {Policies for probe-wear leveling in MEMS-based storage devices},
  booktitle    = {17th Annual Meeting of the {IEEE/ACM} International Symposium on Modelling,
                  Analysis and Simulation of Computer and Telecommunication Systems,
                  {MASCOTS} 2009, September 21-23, 2009, South Kensington Campus, Imperial
                  College, London, {UK}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MASCOT.2009.5366652},
  doi          = {10.1109/MASCOT.2009.5366652},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/KhatibH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BolzoniEH09,
  author       = {Damiano Bolzoni and
                  Sandro Etalle and
                  Pieter H. Hartel},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Panacea: Automating Attack Classification for Anomaly-Based Network
                  Intrusion Detection Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_1},
  doi          = {10.1007/978-3-642-04342-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BolzoniEH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IbraimiPNHJ09,
  author       = {Luan Ibraimi and
                  Milan Petkovic and
                  Svetla Nikova and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_23},
  doi          = {10.1007/978-3-642-10838-9\_23},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/IbraimiPNHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuhanDH09,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel},
  title        = {Fuzzy extractors for continuous distributions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BuhanDH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/Marin-PerianuSHH08,
  author       = {Raluca Marin{-}Perianu and
                  Hans Scholten and
                  Paul J. M. Havinga and
                  Pieter H. Hartel},
  title        = {Cluster-based service discovery for heterogeneous wireless sensor
                  networks},
  journal      = {Int. J. Parallel Emergent Distributed Syst.},
  volume       = {23},
  number       = {4},
  pages        = {325--346},
  year         = {2008},
  url          = {https://doi.org/10.1080/17445760801930948},
  doi          = {10.1080/17445760801930948},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/paapp/Marin-PerianuSHH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/KhatibH08,
  author       = {Mohammed G. Khatib and
                  Pieter H. Hartel},
  editor       = {Erik R. Altman},
  title        = {Power management of MEMS-based storage devices for mobile systems},
  booktitle    = {Proceedings of the 2008 International Conference on Compilers, Architecture,
                  and Synthesis for Embedded Systems, {CASES} 2008, Atlanta, GA, USA,
                  October 19-24, 2008},
  pages        = {245--254},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1450095.1450131},
  doi          = {10.1145/1450095.1450131},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/KhatibH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/TangHJ08,
  author       = {Qiang Tang and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Inter-domain Identity-Based Proxy Re-encryption},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {332--347},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_26},
  doi          = {10.1007/978-3-642-01440-6\_26},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/TangHJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emsoft/KhatibMH08,
  author       = {Mohammed G. Khatib and
                  Ethan L. Miller and
                  Pieter H. Hartel},
  editor       = {Luca de Alfaro and
                  Jens Palsberg},
  title        = {Workload-based configuration of MEMS-based storage devices for mobile
                  systems},
  booktitle    = {Proceedings of the 8th {ACM} {\&} {IEEE} International conference
                  on Embedded software, {EMSOFT} 2008, Atlanta, GA, USA, October 19-24,
                  2008},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1450058.1450065},
  doi          = {10.1145/1450058.1450065},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/emsoft/KhatibMH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/BuhanDH08,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel},
  title        = {Controlling leakage of biometric information using dithering},
  booktitle    = {2008 16th European Signal Processing Conference, {EUSIPCO} 2008, Lausanne,
                  Switzerland, August 25-29, 2008},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/document/7080711/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/BuhanDH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/HartelAK08,
  author       = {Pieter H. Hartel and
                  Leon Abelmann and
                  Mohammed G. Khatib},
  editor       = {Mary Baker and
                  Erik Riedel},
  title        = {Towards Tamper-evident Storage on Patterned Media},
  booktitle    = {6th {USENIX} Conference on File and Storage Technologies, {FAST} 2008,
                  February 26-29, 2008, San Jose, CA, {USA}},
  pages        = {283--296},
  publisher    = {{USENIX}},
  year         = {2008},
  url          = {http://www.usenix.org/events/fast08/tech/hartel.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fast/HartelAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmcad/HartelRG08,
  author       = {Pieter H. Hartel and
                  Theo C. Ruys and
                  Marc C. W. Geilen},
  editor       = {Alessandro Cimatti and
                  Robert B. Jones},
  title        = {Scheduling Optimisations for {SPIN} to Minimise Buffer Requirements
                  in Synchronous Data Flow},
  booktitle    = {Formal Methods in Computer-Aided Design, {FMCAD} 2008, Portland, Oregon,
                  USA, 17-20 November 2008},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/FMCAD.2008.ECP.25},
  doi          = {10.1109/FMCAD.2008.ECP.25},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fmcad/HartelRG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BuhanDHTV08,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Qiang Tang and
                  Raymond N. J. Veldhuis},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Embedding Renewable Cryptographic Keys into Continuous Noisy Data},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {294--310},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_20},
  doi          = {10.1007/978-3-540-88625-9\_20},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/BuhanDHTV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SedghiDHJ08,
  author       = {Saeed Sedghi and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Towards an Information Theoretic Analysis of Searchable Encryption},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {345--360},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_23},
  doi          = {10.1007/978-3-540-88625-9\_23},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/SedghiDHJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/Marin-PerianuHH08,
  author       = {Raluca Marin{-}Perianu and
                  Johann L. Hurink and
                  Pieter H. Hartel},
  title        = {A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks},
  booktitle    = {{IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications, {ISPA} 2008, Sydney, NSW, Australia, December 10-12,
                  2008},
  pages        = {863--870},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISPA.2008.18},
  doi          = {10.1109/ISPA.2008.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/Marin-PerianuHH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/DimkovTH08,
  author       = {Trajce Dimkov and
                  Qiang Tang and
                  Pieter H. Hartel},
  editor       = {Jon Whittle and
                  Jan J{\"{u}}rjens and
                  Bashar Nuseibeh and
                  Glen Dobson},
  title        = {On the Inability of Existing Security Models to Cope with Data Mobility
                  in Dynamic Organizations},
  booktitle    = {Proceedings of the Workshop on Modeling Security {(} {MODSEC08} {)}
                  held as part of the 2008 International Conference on Model Driven
                  Engineering Languages and Systems {(} {MODELS} {)} Toulouse, France,
                  September 28, 2008},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {413},
  publisher    = {CEUR-WS.org},
  year         = {2008},
  url          = {https://ceur-ws.org/Vol-413/paper18.pdf},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/models/DimkovTH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/IbraimiTHJ08,
  author       = {Luan Ibraimi and
                  Qiang Tang and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application
                  in Healthcare},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {185--198},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_12},
  doi          = {10.1007/978-3-540-85259-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/IbraimiTHJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CorinEHM07,
  author       = {Ricardo Corin and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Angelika Mader},
  title        = {Timed analysis of security protocols},
  journal      = {J. Comput. Secur.},
  volume       = {15},
  number       = {6},
  pages        = {619--645},
  year         = {2007},
  url          = {https://doi.org/10.3233/jcs-2007-15603},
  doi          = {10.3233/JCS-2007-15603},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CorinEHM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BuhanDHV07,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Raymond N. J. Veldhuis},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Fuzzy extractors for continuous distributions},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {353--355},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229325},
  doi          = {10.1145/1229285.1229325},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BuhanDHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/estimedia/KhatibZHS07,
  author       = {Mohammed G. Khatib and
                  Berend{-}Jan van der Zwaag and
                  Pieter H. Hartel and
                  Gerard J. M. Smit},
  editor       = {Samarjit Chakraborty and
                  Petru Eles},
  title        = {Interposing Flash between Disk and {DRAM} to Save Energy for Streaming
                  Workloads},
  booktitle    = {Proceedings of the 2007 5th Workshop on Embedded Systems for Real-Time
                  Multimedia, ESTIMedia 2007, October 4-5, Salzburg, Austria, conjunction
                  with {CODES+ISSS} 2007},
  pages        = {7--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ESTMED.2007.4375793},
  doi          = {10.1109/ESTMED.2007.4375793},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/estimedia/KhatibZHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/BuhanDHV07,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Raymond N. J. Veldhuis},
  editor       = {Seong{-}Whan Lee and
                  Stan Z. Li},
  title        = {Feeling Is Believing: {A} Secure Template Exchange Protocol},
  booktitle    = {Advances in Biometrics, International Conference, {ICB} 2007, Seoul,
                  Korea, August 27-29, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4642},
  pages        = {897--906},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74549-5\_94},
  doi          = {10.1007/978-3-540-74549-5\_94},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/BuhanDHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/ChongCDEHLT06,
  author       = {Cheun Ngen Chong and
                  Ricardo Corin and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Yee Wei Law and
                  Andrew Tokmakoff},
  title        = {LicenseScript: a logical language for digital rights management},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {61},
  number       = {3-4},
  pages        = {284--331},
  year         = {2006},
  url          = {https://doi.org/10.1007/BF03219910},
  doi          = {10.1007/BF03219910},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/ChongCDEHLT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/LawDH06,
  author       = {Yee Wei Law and
                  Jeroen Doumen and
                  Pieter H. Hartel},
  title        = {Survey and benchmark of block ciphers for wireless sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {2},
  number       = {1},
  pages        = {65--93},
  year         = {2006},
  url          = {https://doi.org/10.1145/1138127.1138130},
  doi          = {10.1145/1138127.1138130},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/LawDH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/BuhanBHV06,
  author       = {Ileana Buhan and
                  Asker M. Bazen and
                  Pieter H. Hartel and
                  Raymond N. J. Veldhuis},
  editor       = {David Zhang and
                  Anil K. Jain},
  title        = {A False Rejection Oriented Threat Model for the Design of Biometric
                  Authentication Systems},
  booktitle    = {Advances in Biometrics, International Conference, {ICB} 2006, Hong
                  Kong, China, January 5-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3832},
  pages        = {728--736},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11608288\_97},
  doi          = {10.1007/11608288\_97},
  timestamp    = {Thu, 17 Oct 2019 12:39:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/BuhanBHV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/SundramoorthyHS06,
  author       = {Vasughi Sundramoorthy and
                  Pieter H. Hartel and
                  Hans Scholten},
  title        = {On consistency maintenance in service discovery},
  booktitle    = {20th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/IPDPS.2006.1639274},
  doi          = {10.1109/IPDPS.2006.1639274},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/SundramoorthyHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/BolzoniEHZ06,
  author       = {Damiano Bolzoni and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Emmanuele Zambon},
  title        = {{POSEIDON:} a 2-tier Anomaly-based Network Intrusion Detection System},
  booktitle    = {Proceedings of the 4th {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}},
  pages        = {144--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWIA.2006.18},
  doi          = {10.1109/IWIA.2006.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/BolzoniEHZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/Marin-PerianuSHH06,
  author       = {Raluca Marin{-}Perianu and
                  Hans Scholten and
                  Paul J. M. Havinga and
                  Pieter H. Hartel},
  title        = {Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor
                  Networks},
  booktitle    = {{LCN} 2006, The 31st Annual {IEEE} Conference on Local Computer Networks,
                  Tampa, Florida, USA, 14-16 November 2006},
  pages        = {931--938},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/LCN.2006.322202},
  doi          = {10.1109/LCN.2006.322202},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/Marin-PerianuSHH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/LawHHH05,
  author       = {Yee Wei Law and
                  Pieter H. Hartel and
                  Jerry den Hartog and
                  Paul J. M. Havinga},
  title        = {Link-layer jamming attacks on {S-MAC}},
  booktitle    = {Wireless Sensor Networks, Second European Workshop, {EWSN} 2005, Istanbul,
                  Turkey, January 31 - February 2, 2005, Proceedings},
  pages        = {217--225},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/EWSN.2005.1462013},
  doi          = {10.1109/EWSN.2005.1462013},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ewsn/LawHHH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/ChongEHJK05,
  author       = {Cheun Ngen Chong and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Rieks Joosten and
                  Geert Kleinhuis},
  editor       = {Chin{-}Sheng Chen and
                  Joaquim Filipe and
                  Isabel Seruca and
                  Jos{\'{e}} Cordeiro},
  title        = {Service Brokerage in Prolog},
  booktitle    = {{ICEIS} 2005, Proceedings of the Seventh International Conference
                  on Enterprise Information Systems, Miami, USA, May 25-28, 2005},
  pages        = {409--412},
  year         = {2005},
  timestamp    = {Thu, 02 Feb 2017 12:53:54 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/ChongEHJK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/SundramoorthyHHST05,
  author       = {Vasughi Sundramoorthy and
                  Pieter H. Hartel and
                  Jerry den Hartog and
                  Hans Scholten and
                  C. Tan},
  title        = {Functional Principles of Registry-based Service Discovery},
  booktitle    = {30th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2005),
                  15-17 November 2005, Sydney, Australia, Proceedings},
  pages        = {209--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/LCN.2005.71},
  doi          = {10.1109/LCN.2005.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/SundramoorthyHHST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/LawHDH05,
  author       = {Yee Wei Law and
                  Lodewijk van Hoesel and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Paul J. M. Havinga},
  editor       = {Vijay Atluri and
                  Peng Ning and
                  Wenliang Du},
  title        = {Energy-efficient link-layer jamming attacks against wireless sensor
                  network {MAC} protocols},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {76--88},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102219.1102234},
  doi          = {10.1145/1102219.1102234},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/LawHDH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ChengCDEHN05,
  author       = {Jieyin Cheng and
                  Cheun Ngen Chong and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Stefan Nikolaus},
  editor       = {Ry{\^{o}}ichi Sasaki and
                  Sihan Qing and
                  Eiji Okamoto and
                  Hiroshi Yoshiura},
  title        = {StreamTo: Streaming Content using a Tamper-Resistant Token},
  booktitle    = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
                  20th International Conference on Information Security {(SEC} 2005),
                  May 30 - June 1, 2005, Chiba, Japan},
  series       = {{IFIP}},
  volume       = {181},
  pages        = {601--612},
  publisher    = {Springer},
  year         = {2005},
  timestamp    = {Fri, 19 May 2017 01:25:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ChengCDEHN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/time/Hartel05,
  author       = {Pieter H. Hartel},
  title        = {A Trace Semantics for Positive Core XPath},
  booktitle    = {12th International Symposium on Temporal Representation and Reasoning
                  {(TIME} 2005), 23-25 June 2005, Burlington, Vermont, {USA}},
  pages        = {103--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIME.2005.9},
  doi          = {10.1109/TIME.2005.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/time/Hartel05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CzenkoTDEHH06,
  author       = {Marcin Czenko and
                  Ha Tran and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Jerry den Hartog},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Nonmonotonic Trust Management for {P2P} Applications},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {113--130},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.037},
  doi          = {10.1016/J.ENTCS.2005.09.037},
  timestamp    = {Fri, 20 Jan 2023 11:50:26 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CzenkoTDEHH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0503036,
  author       = {Ricardo Corin and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Angelika Mader},
  title        = {Timed Analysis of Security Protocols},
  journal      = {CoRR},
  volume       = {abs/cs/0503036},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0503036},
  eprinttype    = {arXiv},
  eprint       = {cs/0503036},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0503036.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0510061,
  author       = {Marcin Czenko and
                  Ha Tran and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Jerry den Hartog},
  title        = {Nonmonotonic Trust Management for {P2P} Applications},
  journal      = {CoRR},
  volume       = {abs/cs/0510061},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0510061},
  eprinttype    = {arXiv},
  eprint       = {cs/0510061},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0510061.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0511043,
  author       = {Damiano Bolzoni and
                  Emmanuele Zambon and
                  Sandro Etalle and
                  Pieter H. Hartel},
  title        = {Poseidon: a 2-tier Anomaly-based Intrusion Detection System},
  journal      = {CoRR},
  volume       = {abs/cs/0511043},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0511043},
  eprinttype    = {arXiv},
  eprint       = {cs/0511043},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0511043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/BrinkmanFDHJ04,
  author       = {Richard Brinkman and
                  Ling Feng and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Willem Jonker},
  title        = {Efficient Tree Search in Encrypted Data},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {3},
  pages        = {14--21},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44530.13.3.20040701/83065.3},
  doi          = {10.1201/1086/44530.13.3.20040701/83065.3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/BrinkmanFDHJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/HartelMG04,
  author       = {Pieter H. Hartel and
                  Henk L. Muller and
                  Hugh Glaser},
  title        = {The Functional "C" experience},
  journal      = {J. Funct. Program.},
  volume       = {14},
  number       = {2},
  pages        = {129--135},
  year         = {2004},
  url          = {https://doi.org/10.1017/S0956796803004817},
  doi          = {10.1017/S0956796803004817},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jfp/HartelMG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/KalkerEHLV04,
  author       = {Ton Kalker and
                  Dick H. J. Epema and
                  Pieter H. Hartel and
                  Reginald L. Lagendijk and
                  Maarten van Steen},
  title        = {Music2Share - Copyright-Compliant Music Sharing in {P2P} Systems},
  journal      = {Proc. {IEEE}},
  volume       = {92},
  number       = {6},
  pages        = {961--970},
  year         = {2004},
  url          = {https://doi.org/10.1109/JPROC.2004.827368},
  doi          = {10.1109/JPROC.2004.827368},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/KalkerEHLV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cassis/HartelEEW04,
  author       = {Pieter H. Hartel and
                  Pascal van Eck and
                  Sandro Etalle and
                  Roel J. Wieringa},
  editor       = {Gilles Barthe and
                  Lilian Burdy and
                  Marieke Huisman and
                  Jean{-}Louis Lanet and
                  Traian Muntean},
  title        = {Modelling Mobility Aspects of Security Policies},
  booktitle    = {Construction and Analysis of Safe, Secure, and Interoperable Smart
                  Devices, International Workshop, {CASSIS} 2004, Marseille, France,
                  March 10-14, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3362},
  pages        = {172--191},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30569-9\_9},
  doi          = {10.1007/978-3-540-30569-9\_9},
  timestamp    = {Fri, 09 Apr 2021 18:40:44 +0200},
  biburl       = {https://dblp.org/rec/conf/cassis/HartelEEW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CorinEHM04,
  author       = {Ricardo Corin and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Angelika Mader},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Timed model checking of security protocols},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029137},
  doi          = {10.1145/1029133.1029137},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CorinEHM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/LawDH04,
  author       = {Yee Wei Law and
                  Jeroen Doumen and
                  Pieter H. Hartel},
  title        = {Benchmarking block ciphers for wireless sensor networks},
  booktitle    = {2004 {IEEE} International Conference on Mobile Ad-hoc and Sensor Systems,
                  Fort Lauderdale, FL, USA, October 25-27, 2004},
  pages        = {447--456},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/MAHSS.2004.1392185},
  doi          = {10.1109/MAHSS.2004.1392185},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/LawDH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/BrinkmanFDHJ04,
  author       = {Richard Brinkman and
                  Ling Feng and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  L. Javier Garc{\'{\i}}a{-}Villalba},
  title        = {Efficient Tree Search in Encrypted Data},
  booktitle    = {Security In Information Systems, Proceedings of the 2nd International
                  Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction
                  with {ICEIS} 2004, Porto, Portugal, April 2004},
  pages        = {126--135},
  publisher    = {{INSTICC} Press},
  year         = {2004},
  timestamp    = {Tue, 14 Sep 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sis/BrinkmanFDHJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/VeldhuisBKH04,
  author       = {Raymond N. J. Veldhuis and
                  Asker M. Bazen and
                  Joost A. Kauffman and
                  Pieter H. Hartel},
  editor       = {Edward J. Delp III and
                  Ping Wah Wong},
  title        = {Biometric verification based on grip-pattern recognition},
  booktitle    = {Security, Steganography, and Watermarking of Multimedia Contents VI,
                  San Jose, California, USA, January 18-22, 2004, Proceedings},
  series       = {Proceedings of {SPIE}},
  volume       = {5306},
  pages        = {634--641},
  publisher    = {{SPIE}},
  year         = {2004},
  url          = {https://doi.org/10.1117/12.530967},
  doi          = {10.1117/12.530967},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/VeldhuisBKH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChongRDEHC04,
  author       = {Cheun Ngen Chong and
                  Bin Ren and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Ricardo Corin},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {License Protection with a Tamper-Resistant Token},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_19},
  doi          = {10.1007/978-3-540-31815-6\_19},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChongRDEHC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0411010,
  author       = {Ricardo Corin and
                  Antonio Durante and
                  Sandro Etalle and
                  Pieter H. Hartel},
  title        = {A Trace Logic for Local Security Properties},
  journal      = {CoRR},
  volume       = {cs.CR/0411010},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs.CR/0411010},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0411010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icadl/ChongEHL03,
  author       = {Cheun Ngen Chong and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Yee Wei Law},
  editor       = {Tengku M. T. Sembok and
                  Halimah Badioze Zaman and
                  Hsinchun Chen and
                  Shalini R. Urs and
                  Sung{-}Hyon Myaeng},
  title        = {Approximating Fair Use in LicenseScript},
  booktitle    = {Digital Libraries: Technology and Management of Indigenous Knowledge
                  for Global Access, 6th International Conference on Asian Digital Libraries,
                  {ICADL} 2003, Kuala Lumpur, Malaysia, December 8-12, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2911},
  pages        = {432--443},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24594-0\_44},
  doi          = {10.1007/978-3-540-24594-0\_44},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icadl/ChongEHL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6-8/LawCEH03,
  author       = {Yee Wei Law and
                  Ricardo Corin and
                  Sandro Etalle and
                  Pieter H. Hartel},
  editor       = {Marco Conti and
                  Silvia Giordano and
                  Enrico Gregori and
                  Stephan Olariu},
  title        = {A Formally Verified Decentralized Key Management Architecture for
                  Wireless Sensor Networks},
  booktitle    = {Personal Wireless Communications, {IFIP-TC6} 8th International Conference,
                  {PWC} 2003, Venice, Italy, September 23-25, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2775},
  pages        = {27--39},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39867-7\_3},
  doi          = {10.1007/978-3-540-39867-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip6-8/LawCEH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/ChongEH03,
  author       = {Cheun Ngen Chong and
                  Sandro Etalle and
                  Pieter H. Hartel},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {Comparing Logic-Based and XML-Based Rights Expression Languages},
  booktitle    = {On The Move to Meaningful Internet Systems 2003: {OTM} 2003 Workshops,
                  {OTM} Confederated International Workshops, HCI-SWWA, IPW, JTRES,
                  WORM, WMS, and {WRSM} 2003, Catania, Sicily, Italy, November 3-7,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2889},
  pages        = {779--792},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39962-9\_78},
  doi          = {10.1007/978-3-540-39962-9\_78},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/ChongEH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ChongPH03,
  author       = {Cheun Ngen Chong and
                  Zhonghong Peng and
                  Pieter H. Hartel},
  editor       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sokratis K. Katsikas},
  title        = {Secure Audit Logging with Tamper-Resistant Hardware},
  booktitle    = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\)
                  International Conference on Information Security (SEC2003), May 26-28,
                  2003, Athens, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {250},
  pages        = {73--84},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Tue, 13 May 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ChongPH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LawEH03,
  author       = {Yee Wei Law and
                  Sandro Etalle and
                  Pieter H. Hartel},
  editor       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sokratis K. Katsikas},
  title        = {Assessing Security in Energy-Efficient Sensor Networks},
  booktitle    = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\)
                  International Conference on Information Security (SEC2003), May 26-28,
                  2003, Athens, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {250},
  pages        = {459--463},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Fri, 25 Apr 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LawEH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wedelmusic/ChongCEHJL03,
  author       = {Cheun Ngen Chong and
                  Ricardo Corin and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Willem Jonker and
                  Yee Wei Law},
  title        = {LicenseScript: a novel digital rights language and its semantics},
  booktitle    = {3rd International Conference on {WEB} Delivering of Music {(WEDELMUSIC}
                  2003), 15-17 September 2003, Leeds, {UK}},
  pages        = {122--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/WDM.2003.1233885},
  doi          = {10.1109/WDM.2003.1233885},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wedelmusic/ChongCEHJL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CorinEHD05,
  author       = {Ricardo Corin and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Antonio Durante},
  editor       = {Sandro Etalle and
                  Supratik Mukhopadhyay and
                  Abhik Roychoudhury},
  title        = {A Trace Logic for Local Security Properties},
  booktitle    = {Proceedings of the International Workshop on Software Verification
                  and Validation, SVV@ICLP 2003, Mumbai, India, December 14, 2003},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {118},
  pages        = {129--143},
  publisher    = {Elsevier},
  year         = {2003},
  url          = {https://doi.org/10.1016/j.entcs.2004.12.019},
  doi          = {10.1016/J.ENTCS.2004.12.019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/CorinEHD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Hartel02,
  author       = {Pieter H. Hartel},
  editor       = {Peter Honeyman},
  title        = {The State of {WG} 8.8},
  booktitle    = {Proceedings of the Fifth Smart Card Research and Advanced Application
                  Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}},
  publisher    = {{USENIX}},
  year         = {2002},
  timestamp    = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/Hartel02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/PollHJ02,
  author       = {Erik Poll and
                  Pieter H. Hartel and
                  Eduard de Jong},
  editor       = {Peter Honeyman},
  title        = {A Java Reference Model of Transacted Memory for Smart Cards},
  booktitle    = {Proceedings of the Fifth Smart Card Research and Advanced Application
                  Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}},
  pages        = {75--86},
  publisher    = {{USENIX}},
  year         = {2002},
  url          = {http://www.usenix.org/publications/library/proceedings/cardis02/poll.html},
  timestamp    = {Tue, 14 Sep 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/PollHJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idms/ChongBHK02,
  author       = {Cheun Ngen Chong and
                  Ren{\'{e}} van Buuren and
                  Pieter H. Hartel and
                  Geert Kleinhuis},
  editor       = {Fernando Boavida and
                  Edmundo Monteiro and
                  Jo{\~{a}}o Orvalho},
  title        = {Security Attributes Based Digital Rights Management},
  booktitle    = {Protocols and Systems for Interactive Distributed Multimedia, Joint
                  International Workshops on Interactive Distributed Multimedia Systems
                  and Protocols for Multimedia Systems, {IDMS/PROMS} 2002, Coimbra,
                  Portugal, November 26-29, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2515},
  pages        = {339--352},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36166-9\_29},
  doi          = {10.1007/3-540-36166-9\_29},
  timestamp    = {Tue, 21 Mar 2023 21:01:30 +0100},
  biburl       = {https://dblp.org/rec/conf/idms/ChongBHK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ScholtenJHHHS02,
  author       = {Hans Scholten and
                  Pierre G. Jansen and
                  Ferdy Hanssen and
                  Pieter H. Hartel and
                  T. Hattink and
                  Vasughi Sundramoorthy},
  title        = {Multimedia QoS in Low-Cost Home Networks},
  booktitle    = {27th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2002),
                  6-8 November 2002, Tampa, FL, USA, Proceedings},
  pages        = {327--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/LCN.2002.1181800},
  doi          = {10.1109/LCN.2002.1181800},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/ScholtenJHHHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Domingo-FerrerH01,
  author       = {Josep Domingo{-}Ferrer and
                  Pieter H. Hartel},
  title        = {Current directions in smart cards},
  journal      = {Comput. Networks},
  volume       = {36},
  number       = {4},
  pages        = {377--379},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1389-1286(01)00160-8},
  doi          = {10.1016/S1389-1286(01)00160-8},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Domingo-FerrerH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/HartelM01,
  author       = {Pieter H. Hartel and
                  Luc Moreau},
  title        = {Formalizing the safety of Java, the Java virtual machine, and Java
                  card},
  journal      = {{ACM} Comput. Surv.},
  volume       = {33},
  number       = {4},
  pages        = {517--558},
  year         = {2001},
  url          = {https://doi.org/10.1145/503112.503115},
  doi          = {10.1145/503112.503115},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/HartelM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esmart/HendersonWH01,
  author       = {Neil James Henderson and
                  Neil M. White and
                  Pieter H. Hartel},
  editor       = {Isabelle Attali and
                  Thomas P. Jensen},
  title        = {iButton Enrolment and Verification Requirements for the Pressure Sequence
                  Smartcard Biometric},
  booktitle    = {Smart Card Programming and Security, International Conference on Research
                  in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2140},
  pages        = {124--134},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45418-7\_11},
  doi          = {10.1007/3-540-45418-7\_11},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esmart/HendersonWH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/HartelBJL01,
  author       = {Pieter H. Hartel and
                  Michael J. Butler and
                  Eduard de Jong and
                  Mark Longley},
  editor       = {Jos{\'{e}} Nuno Oliveira and
                  Pamela Zave},
  title        = {Transacted Memory for Smart Cards},
  booktitle    = {{FME} 2001: Formal Methods for Increasing Software Productivity, International
                  Symposium of Formal Methods Europe, Berlin, Germany, March 12-16,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2021},
  pages        = {478--499},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45251-6\_28},
  doi          = {10.1007/3-540-45251-6\_28},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/HartelBJL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/FieldHM01,
  author       = {Adam Field and
                  Pieter H. Hartel and
                  Wim Mooij},
  editor       = {Vincent Y. Shen and
                  Nobuo Saito and
                  Michael R. Lyu and
                  Mary Ellen Zurko},
  title        = {Personal DJ, an architecture for personalised content delivery},
  booktitle    = {Proceedings of the Tenth International World Wide Web Conference,
                  {WWW} 10, Hong Kong, China, May 1-5, 2001},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/371920.371921},
  doi          = {10.1145/371920.371921},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/FieldHM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GlaserHG00,
  author       = {Hugh Glaser and
                  Pieter H. Hartel and
                  Paul W. Garratt},
  title        = {Programming by Numbers: {A} Programming Method for Novices},
  journal      = {Comput. J.},
  volume       = {43},
  number       = {4},
  pages        = {252--265},
  year         = {2000},
  url          = {https://doi.org/10.1093/comjnl/43.4.252},
  doi          = {10.1093/COMJNL/43.4.252},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/GlaserHG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DiehlHS00,
  author       = {Stephan Diehl and
                  Pieter H. Hartel and
                  Peter Sestoft},
  title        = {Principles of abstract machines},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {16},
  number       = {7},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-739X(99)00087-4},
  doi          = {10.1016/S0167-739X(99)00087-4},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/DiehlHS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DiehlHS00a,
  author       = {Stephan Diehl and
                  Pieter H. Hartel and
                  Peter Sestoft},
  title        = {Abstract machines for programming language implementation},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {16},
  number       = {7},
  pages        = {739--751},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-739X(99)00088-6},
  doi          = {10.1016/S0167-739X(99)00088-6},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/DiehlHS00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Hartel00,
  author       = {Pieter H. Hartel},
  editor       = {Josep Domingo{-}Ferrer and
                  David Chan and
                  Anthony Watson},
  title        = {Formalising Java Safety - An overview},
  booktitle    = {Smart Card Research and Advanced Applications, Proceedings of the
                  Fourth Working Conference on Smart Card Research and Advanced Applications,
                  {CARDIS} 2000, September 20-22, 2000, Bristol, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {180},
  pages        = {115--134},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Mon, 09 Sep 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/Hartel00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HendersonH00,
  author       = {Neil James Henderson and
                  Pieter H. Hartel},
  editor       = {Josep Domingo{-}Ferrer and
                  David Chan and
                  Anthony Watson},
  title        = {Pressure Sequence - {A} Novel Method of Protecting Smart Cards},
  booktitle    = {Smart Card Research and Advanced Applications, Proceedings of the
                  Fourth Working Conference on Smart Card Research and Advanced Applications,
                  {CARDIS} 2000, September 20-22, 2000, Bristol, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {180},
  pages        = {241--256},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/HendersonH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/javacard/HartelJ00,
  author       = {Pieter H. Hartel and
                  Eduard de Jong},
  editor       = {Isabelle Attali and
                  Thomas P. Jensen},
  title        = {A Programming and a Modelling Perspective on the Evaluation of Java
                  Card Implementations},
  booktitle    = {Java on Smart Cards: Programming and Security, First International
                  Workshop, JavaCard 2000, Cannes, France, September 14, 2000, Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2041},
  pages        = {52--72},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45165-X\_5},
  doi          = {10.1007/3-540-45165-X\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/javacard/HartelJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/EtalleHV99,
  author       = {Sandro Etalle and
                  Pieter H. Hartel and
                  Willem G. Vree},
  title        = {Declarative solutions to partitioned-grid problems},
  journal      = {Softw. Pract. Exp.},
  volume       = {29},
  number       = {13},
  pages        = {1173--1200},
  year         = {1999},
  url          = {https://doi.org/10.1002/(SICI)1097-024X(199911)29:13\&\#60;1173::AID-SPE276\&\#62;3.0.CO;2-X},
  doi          = {10.1002/(SICI)1097-024X(199911)29:13\&\#60;1173::AID-SPE276\&\#62;3.0.CO;2-X},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/EtalleHV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/Hartel99,
  author       = {Pieter H. Hartel},
  title        = {{LETOS} - a lightweight execution tool for operational semantics},
  journal      = {Softw. Pract. Exp.},
  volume       = {29},
  number       = {15},
  pages        = {1379--1416},
  year         = {1999},
  url          = {https://doi.org/10.1002/(SICI)1097-024X(19991225)29:15\&\#60;1379::AID-SPE286\&\#62;3.0.CO;2-V},
  doi          = {10.1002/(SICI)1097-024X(19991225)29:15\&\#60;1379::AID-SPE286\&\#62;3.0.CO;2-V},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/Hartel99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/ButlerH99,
  author       = {Michael J. Butler and
                  Pieter H. Hartel},
  title        = {Reasoning about Grover's quantum search algorithm using probabilistic
                  \emph{wp}},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {21},
  number       = {3},
  pages        = {417--429},
  year         = {1999},
  url          = {https://doi.org/10.1145/319301.319303},
  doi          = {10.1145/319301.319303},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/ButlerH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/java/HartelBL99,
  author       = {Pieter H. Hartel and
                  Michael J. Butler and
                  Moshe Levy},
  editor       = {Jim Alves{-}Foss},
  title        = {The Operational Semantics of a Java Secure Processor},
  booktitle    = {Formal Syntax and Semantics of Java},
  series       = {Lecture Notes in Computer Science},
  volume       = {1523},
  pages        = {313--352},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48737-9\_9},
  doi          = {10.1007/3-540-48737-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/java/HartelBL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HartelHS98,
  author       = {Pieter H. Hartel and
                  Jake Hill and
                  Matt Sims},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {An Operational Model of QuickPay - Extended Abstract},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {19--28},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_2},
  doi          = {10.1007/10721064\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/HartelHS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0091720,
  author       = {Pieter H. Hartel and
                  Henk L. Muller},
  title        = {Functional {C}},
  publisher    = {Addison-Wesley-Longman},
  year         = {1997},
  isbn         = {978-0-201-41950-4},
  timestamp    = {Tue, 26 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0091720.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Hartel97,
  author       = {Pieter H. Hartel},
  title        = {{FGCS} special issue on smart cards},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {13},
  number       = {1},
  pages        = {1--2},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-739X(97)89107-8},
  doi          = {10.1016/S0167-739X(97)89107-8},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/Hartel97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AlberdaHF97,
  author       = {Marjan I. Alberda and
                  Pieter H. Hartel and
                  Eduard K. de Jong Frz},
  title        = {Using formal methods to cultivate trust in smart card operating systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {13},
  number       = {1},
  pages        = {39--54},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-739X(97)89110-8},
  doi          = {10.1016/S0167-739X(97)89110-8},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/AlberdaHF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ker/Hartel97,
  author       = {Pieter H. Hartel},
  title        = {Elementary Standard {ML} by Greg Michaelson, University College London
                  Press, UK, 1995, {ISBN} 1-85728-398-8 PB, pp 306},
  journal      = {Knowl. Eng. Rev.},
  volume       = {12},
  number       = {1},
  pages        = {99--102},
  year         = {1997},
  url          = {https://doi.org/10.1017/S0269888997210647},
  doi          = {10.1017/S0269888997210647},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ker/Hartel97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/plilp/1997,
  editor       = {Hugh Glaser and
                  Pieter H. Hartel and
                  Herbert Kuchen},
  title        = {Programming Languages: Implementations, Logics, and Programs, 9th
                  International Symposium, PLILP'97, Including a Special Trach on Declarative
                  Programming Languages in Education, Southampton, UK, September 3-5,
                  1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1292},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0033832},
  doi          = {10.1007/BFB0033832},
  isbn         = {3-540-63398-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/plilp/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/HartelG96,
  author       = {Pieter H. Hartel and
                  Hugh Glaser},
  title        = {The Resource Constrained Shortest Path Problem Implemented in a Lazy
                  Functional Language},
  journal      = {J. Funct. Program.},
  volume       = {6},
  number       = {1},
  pages        = {29--45},
  year         = {1996},
  url          = {https://doi.org/10.1017/S0956796800001568},
  doi          = {10.1017/S0956796800001568},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/HartelG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/HartelFAABBCFGGHHIJKLLLLRSTTTWWW96,
  author       = {Pieter H. Hartel and
                  Marc Feeley and
                  Martin Helmut Alt and
                  Lennart Augustsson and
                  Peter Baumann and
                  Marcel Beemster and
                  Emmanuel Chailloux and
                  Christine H. Flood and
                  Wolfgang Grieskamp and
                  John H. G. van Groningen and
                  Kevin Hammond and
                  Bogumil Hausman and
                  Melody Y. Ivory and
                  Richard E. Jones and
                  Jasper Kamperman and
                  Peter Lee and
                  Xavier Leroy and
                  Rafael Dueire Lins and
                  Sandra Loosemore and
                  Niklas R{\"{o}}jemo and
                  Manuel Serrano and
                  Jean{-}Pierre Talpin and
                  Jon Thackray and
                  Stephen Thomas and
                  Pum Walters and
                  Pierre Weis and
                  Peter Wentworth},
  title        = {Benchmarking Implementations of Functional Languages with 'Pseudoknot',
                  a Float-Intensive Benchmark},
  journal      = {J. Funct. Program.},
  volume       = {6},
  number       = {4},
  pages        = {621--655},
  year         = {1996},
  url          = {https://doi.org/10.1017/S0956796800001891},
  doi          = {10.1017/S0956796800001891},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/HartelFAABBCFGGHHIJKLLLLRSTTTWWW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/AlberdaHF96,
  author       = {Marjan I. Alberda and
                  Pieter H. Hartel and
                  Eduard K. de Jong Frz},
  title        = {Using formal methods to cultivate trust in Smart Card Operating Systems},
  booktitle    = {Proceedings of the Second Smart Card Research and Advanced Application
                  Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam,
                  The Netherlands},
  year         = {1996},
  timestamp    = {Fri, 15 Oct 2004 16:01:14 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/AlberdaHF96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/GlaserHF96,
  author       = {Hugh Glaser and
                  Pieter H. Hartel and
                  Eduard K. de Jong Frz},
  title        = {Structuring and Visualising an IC-card Security Standard},
  booktitle    = {Proceedings of the Second Smart Card Research and Advanced Application
                  Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam,
                  The Netherlands},
  year         = {1996},
  timestamp    = {Fri, 15 Oct 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/GlaserHF96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HartelQ96,
  author       = {Pieter H. Hartel and
                  Jean{-}Jacques Quisquater},
  title        = {Introduction to {CARDIS} 1996},
  booktitle    = {Proceedings of the Second Smart Card Research and Advanced Application
                  Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam,
                  The Netherlands},
  year         = {1996},
  timestamp    = {Fri, 15 Oct 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/HartelQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/HartelHLMVH95,
  author       = {Pieter H. Hartel and
                  Rutger F. H. Hofman and
                  Koen Langendoen and
                  Henk L. Muller and
                  Willem G. Vree and
                  Louis O. Hertzberger},
  title        = {A toolkit for parallel functional programming},
  journal      = {Concurr. Pract. Exp.},
  volume       = {7},
  number       = {8},
  pages        = {765--793},
  year         = {1995},
  url          = {https://doi.org/10.1002/cpe.4330070803},
  doi          = {10.1002/CPE.4330070803},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/HartelHLMVH95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jflp/HaydarlouH95,
  author       = {A. Reza Haydarlou and
                  Pieter H. Hartel},
  title        = {Thunk Lifting: Reducing Heap Usage in an Implementation of a Lazy
                  Functional Language},
  journal      = {J. Funct. Log. Program.},
  volume       = {1995},
  number       = {1},
  year         = {1995},
  url          = {http://danae.uni-muenster.de/lehre/kuchen/JFLP/articles/1995/A95-01/A95-01.html},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jflp/HaydarlouH95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/HartelP95,
  author       = {Pieter H. Hartel and
                  Marinus J. Plasmeijer},
  title        = {Special Issue on State-of-the-Art Applications of Pure Functional
                  Programming Languages},
  journal      = {J. Funct. Program.},
  volume       = {5},
  number       = {3},
  pages        = {279--281},
  year         = {1995},
  url          = {https://doi.org/10.1017/S0956796800001362},
  doi          = {10.1017/S0956796800001362},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/HartelP95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/VreeH95,
  author       = {Willem G. Vree and
                  Pieter H. Hartel},
  title        = {Communication Lifting: Fixed Point Computation for Parallelism},
  journal      = {J. Funct. Program.},
  volume       = {5},
  number       = {4},
  pages        = {549--581},
  year         = {1995},
  url          = {https://doi.org/10.1017/S0956796800001477},
  doi          = {10.1017/S0956796800001477},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/VreeH95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcse/HartelH95,
  author       = {Pieter H. Hartel and
                  Louis O. Hertzberger},
  title        = {Paradigms and laboratories in the core computer science curriculum:
                  an overview},
  journal      = {{ACM} {SIGCSE} Bull.},
  volume       = {27},
  number       = {4},
  pages        = {13--20},
  year         = {1995},
  url          = {https://doi.org/10.1145/216511.216521},
  doi          = {10.1145/216511.216521},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcse/HartelH95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fple/HartelET95,
  author       = {Pieter H. Hartel and
                  Bert van Es and
                  Dick Tromp},
  editor       = {Pieter H. Hartel and
                  Marinus J. Plasmeijer},
  title        = {Basic Proof Skills of Computer Science Students},
  booktitle    = {Functional Programming Languages in Education, First International
                  Symposium, FPLE'95, Nijmegen, The Netherlands, December 4-6, 1995,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1022},
  pages        = {269--287},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60675-0\_50},
  doi          = {10.1007/3-540-60675-0\_50},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fple/HartelET95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/plilp/McEvoyH95,
  author       = {Hugh McEvoy and
                  Pieter H. Hartel},
  editor       = {Manuel V. Hermenegildo and
                  S. Doaitse Swierstra},
  title        = {Local Linear Logic for Locality Consciousness in Multiset Transformation},
  booktitle    = {Programming Languages: Implementations, Logics and Programs, 7th International
                  Symposium, PLILP'95, Utrecht, The Netherlands, September 20-22, 1995,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {982},
  pages        = {357--379},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0026830},
  doi          = {10.1007/BFB0026830},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/plilp/McEvoyH95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fple/1995,
  editor       = {Pieter H. Hartel and
                  Marinus J. Plasmeijer},
  title        = {Functional Programming Languages in Education, First International
                  Symposium, FPLE'95, Nijmegen, The Netherlands, December 4-6, 1995,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1022},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60675-0},
  doi          = {10.1007/3-540-60675-0},
  isbn         = {3-540-60675-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fple/1995.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cl/HartelV94,
  author       = {Pieter H. Hartel and
                  Willem G. Vree},
  title        = {Experiments wiht Destructive Updates in a Lazy Functional Language},
  journal      = {Comput. Lang.},
  volume       = {20},
  number       = {3},
  pages        = {177--192},
  year         = {1994},
  url          = {https://doi.org/10.1016/0096-0551(94)90003-5},
  doi          = {10.1016/0096-0551(94)90003-5},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cl/HartelV94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/HartelGW94,
  author       = {Pieter H. Hartel and
                  Hugh Glaser and
                  John M. Wild},
  title        = {Compilation of Functional Languages using Flow Graph Analysis},
  journal      = {Softw. Pract. Exp.},
  volume       = {24},
  number       = {2},
  pages        = {127--173},
  year         = {1994},
  url          = {https://doi.org/10.1002/spe.4380240202},
  doi          = {10.1002/SPE.4380240202},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/HartelGW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/BeemsterHHHLLMV93,
  author       = {Marcel Beemster and
                  Pieter H. Hartel and
                  Louis O. Hertzberger and
                  Rutger F. H. Hofman and
                  Koen Langendoen and
                  L. L. Li and
                  R. Milikowski and
                  Willem G. Vree and
                  Hendrik Pieter Barendregt and
                  J. C. Mulder},
  title        = {Experience with a clustered parallel reduction machine},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {9},
  number       = {3},
  pages        = {175--200},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-739X(93)90011-D},
  doi          = {10.1016/0167-739X(93)90011-D},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/BeemsterHHHLLMV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fp/HartelV93,
  author       = {Pieter H. Hartel and
                  Willem G. Vree},
  editor       = {John T. O'Donnell and
                  Kevin Hammond},
  title        = {Experiments with destructive updates in a lazy functional language
                  (extended abstract)},
  booktitle    = {Proceedings of the 1993 Glasgow Workshop on Functional Programming,
                  Ayr, Scotland, UK, July 5-7, 1993},
  series       = {Workshops in Computing},
  pages        = {69--82},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/978-1-4471-3236-3\_6},
  doi          = {10.1007/978-1-4471-3236-3\_6},
  timestamp    = {Mon, 24 Jun 2019 15:54:14 +0200},
  biburl       = {https://dblp.org/rec/conf/fp/HartelV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpca/HartelL93,
  author       = {Pieter H. Hartel and
                  Koen Langendoen},
  editor       = {John Williams},
  title        = {Benchmarking Implementations of Lazy Functional Languages},
  booktitle    = {Proceedings of the conference on Functional programming languages
                  and computer architecture, {FPCA} 1993, Copenhagen, Denmark, June
                  9-11, 1993},
  pages        = {341--349},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/165180.165230},
  doi          = {10.1145/165180.165230},
  timestamp    = {Tue, 06 Nov 2018 11:07:48 +0100},
  biburl       = {https://dblp.org/rec/conf/fpca/HartelL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cc/LangendoenH92,
  author       = {Koen Langendoen and
                  Pieter H. Hartel},
  editor       = {Uwe Kastens and
                  Peter Pfahler},
  title        = {{FCG:} {A} Code Generator for Lazy Functional Languages},
  booktitle    = {Compiler Construction, 4th International Conference on Compiler Construction,
                  CC'92, Paderborn, Germany, October 5-7, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {641},
  pages        = {278--296},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-55984-1\_26},
  doi          = {10.1007/3-540-55984-1\_26},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cc/LangendoenH92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/Hartel91,
  author       = {Pieter H. Hartel},
  title        = {Performance of Lazy Combinator Graph Reduction},
  journal      = {Softw. Pract. Exp.},
  volume       = {21},
  number       = {3},
  pages        = {299--329},
  year         = {1991},
  url          = {https://doi.org/10.1002/spe.4380210306},
  doi          = {10.1002/SPE.4380210306},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/Hartel91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stp/Hartel90,
  author       = {Pieter H. Hartel},
  title        = {A Comparison of Three Garbage Collection Algorithms},
  journal      = {Struct. Program.},
  volume       = {11},
  number       = {3},
  pages        = {117--128},
  year         = {1990},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/stp/Hartel90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/HartelV88,
  author       = {Pieter H. Hartel and
                  Arthur H. Veen},
  title        = {Statistics on Graph Reduction of {SASL} Programs},
  journal      = {Softw. Pract. Exp.},
  volume       = {18},
  number       = {3},
  pages        = {239--253},
  year         = {1988},
  url          = {https://doi.org/10.1002/spe.4380180305},
  doi          = {10.1002/SPE.4380180305},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/HartelV88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wg/Hartel88,
  author       = {Pieter H. Hartel},
  editor       = {Jan van Leeuwen},
  title        = {The Average Size of Ordered Binary Subgraphs},
  booktitle    = {Graph-Theoretic Concepts in Computer Science, 14th International Workshop,
                  {WG} '88, Amsterdam, The Netherlands, June 15-17, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {344},
  pages        = {327--351},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-50728-0\_55},
  doi          = {10.1007/3-540-50728-0\_55},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/wg/Hartel88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/BarendregtEPHHV87,
  author       = {Hendrik Pieter Barendregt and
                  Marko C. J. D. van Eekelen and
                  Marinus J. Plasmeijer and
                  Pieter H. Hartel and
                  Louis O. Hertzberger and
                  Willem G. Vree},
  title        = {The Dutch parallel reduction machine project},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {3},
  number       = {4},
  pages        = {261--270},
  year         = {1987},
  url          = {https://doi.org/10.1016/0167-739X(87)90030-6},
  doi          = {10.1016/0167-739X(87)90030-6},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/BarendregtEPHHV87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/BosPH83,
  author       = {Jan van den Bos and
                  Marinus J. Plasmeijer and
                  Pieter H. Hartel},
  title        = {Input-Output Tools: {A} Language Facility for Interactive and Real-Time
                  Systems},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {9},
  number       = {3},
  pages        = {247--259},
  year         = {1983},
  url          = {https://doi.org/10.1109/TSE.1983.236734},
  doi          = {10.1109/TSE.1983.236734},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/BosPH83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}