default search action
BibTeX records: Pieter H. Hartel
@article{DBLP:journals/csur/BarthIH23, author = {Susanne Barth and Dan Ionita and Pieter H. Hartel}, title = {Understanding Online Privacy - {A} Systematic Review of Privacy Visualizations and Privacy by Design Guidelines}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {3}, pages = {63:1--63:37}, year = {2023}, url = {https://doi.org/10.1145/3502288}, doi = {10.1145/3502288}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/BarthIH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-12134, author = {Pieter H. Hartel and Eljo Haspels and Mark van Staalduinen and Octavio Texeira}, title = {DarkDiff: Explainable web page similarity of {TOR} onion sites}, journal = {CoRR}, volume = {abs/2308.12134}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.12134}, doi = {10.48550/ARXIV.2308.12134}, eprinttype = {arXiv}, eprint = {2308.12134}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-12134.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpc/BarthIJHJ21, author = {Susanne Barth and Dan Ionita and Menno D. T. de Jong and Pieter H. Hartel and Marianne Junger}, title = {Privacy Rating: {A} User-Centered Approach for Visualizing Data Handling Practices of Online Services}, journal = {{IEEE} Trans. Prof. Commun.}, volume = {64}, number = {4}, pages = {354--373}, year = {2021}, url = {https://doi.org/10.1109/TPC.2021.3110617}, doi = {10.1109/TPC.2021.3110617}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpc/BarthIJHJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-04486, author = {Pieter H. Hartel and Rolf van Wegberg and Mark van Staalduinen}, title = {Investigating sentence severity with judicial open data - {A} case study on sentencing high-tech crime in the Dutch criminal justice system}, journal = {CoRR}, volume = {abs/2104.04486}, year = {2021}, url = {https://arxiv.org/abs/2104.04486}, eprinttype = {arXiv}, eprint = {2104.04486}, timestamp = {Tue, 13 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-04486.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-06444, author = {Pieter H. Hartel and Rolf van Wegberg}, title = {Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases}, journal = {CoRR}, volume = {abs/2104.06444}, year = {2021}, url = {https://arxiv.org/abs/2104.06444}, eprinttype = {arXiv}, eprint = {2104.06444}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-06444.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/HomoliakBHHBS20, author = {Ivan Homoliak and Dominik Breitenbacher and Ondrej Hujnak and Pieter H. Hartel and Alexander Binder and Pawel Szalachowski}, title = {SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets}, booktitle = {{AFT} '20: 2nd {ACM} Conference on Advances in Financial Technologies, New York, NY, USA, October 21-23, 2020}, pages = {145--162}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419614.3423257}, doi = {10.1145/3419614.3423257}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aft/HomoliakBHHBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BortolameottiEC20, author = {Riccardo Bortolameotti and Thijs van Ede and Andrea Continella and Thomas Hupperich and Maarten H. Everts and Reza Rafati and Willem Jonker and Pieter H. Hartel and Andreas Peter}, editor = {Chih{-}Cheng Hung and Tom{\'{a}}s Cern{\'{y}} and Dongwan Shin and Alessio Bechini}, title = {HeadPrint: detecting anomalous communications through header-based application fingerprinting}, booktitle = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020}, pages = {1696--1705}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3341105.3373862}, doi = {10.1145/3341105.3373862}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BortolameottiEC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tap/HartelS20, author = {Pieter H. Hartel and Richard Schumi}, editor = {Wolfgang Ahrendt and Heike Wehrheim}, title = {Mutation Testing of Smart Contracts at Scale}, booktitle = {Tests and Proofs - 14th International Conference, TAP@STAF 2020, Bergen, Norway, June 22-23, 2020, Proceedings [postponed]}, series = {Lecture Notes in Computer Science}, volume = {12165}, pages = {23--42}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-50995-8\_2}, doi = {10.1007/978-3-030-50995-8\_2}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tap/HartelS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HartelHR19, author = {Pieter H. Hartel and Ivan Homoliak and Dani{\"{e}}l Reijsbergen}, title = {An Empirical Study Into the Success of Listed Smart Contracts in Ethereum}, journal = {{IEEE} Access}, volume = {7}, pages = {177539--177555}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2957284}, doi = {10.1109/ACCESS.2019.2957284}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HartelHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BarthHJM19, author = {Susanne Barth and Pieter H. Hartel and Marianne Junger and Lorena Montoya}, title = {Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of {\textbackslash}"Thinking Like a Thief{\textbackslash}"}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {8--16}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2018.2888781}, doi = {10.1109/MSEC.2018.2888781}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BarthHJM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tele/BarthJJHR19, author = {Susanne Barth and Menno D. T. de Jong and Marianne Junger and Pieter H. Hartel and Janina C. Roppelt}, title = {Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources}, journal = {Telematics Informatics}, volume = {41}, pages = {55--69}, year = {2019}, url = {https://doi.org/10.1016/j.tele.2019.03.003}, doi = {10.1016/J.TELE.2019.03.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tele/BarthJJHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/BortolameottiEC19, author = {Riccardo Bortolameotti and Thijs van Ede and Andrea Continella and Maarten H. Everts and Willem Jonker and Pieter H. Hartel and Andreas Peter}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {Victim-Aware Adaptive Covert Channels}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {304}, pages = {450--471}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37228-6\_22}, doi = {10.1007/978-3-030-37228-6\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/BortolameottiEC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-09208, author = {Pieter H. Hartel and Mark van Staalduinen}, title = {Truffle tests for free - Replaying Ethereum smart contracts for transparency}, journal = {CoRR}, volume = {abs/1907.09208}, year = {2019}, url = {http://arxiv.org/abs/1907.09208}, eprinttype = {arXiv}, eprint = {1907.09208}, timestamp = {Tue, 30 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-09208.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-11597, author = {Pieter H. Hartel and Ivan Homoliak and Dani{\"{e}}l Reijsbergen}, title = {An Empirical Study into the Success of Listed Smart Contracts in Ethereum}, journal = {CoRR}, volume = {abs/1908.11597}, year = {2019}, url = {http://arxiv.org/abs/1908.11597}, eprinttype = {arXiv}, eprint = {1908.11597}, timestamp = {Wed, 04 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-11597.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-12563, author = {Pieter H. Hartel and Richard Schumi}, title = {Gas limit aware mutation testing of smart contracts at scale}, journal = {CoRR}, volume = {abs/1909.12563}, year = {2019}, url = {http://arxiv.org/abs/1909.12563}, eprinttype = {arXiv}, eprint = {1909.12563}, timestamp = {Tue, 07 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-12563.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/ChiaHHMPRSS18, author = {Vincent Chia and Pieter H. Hartel and Qingze Hum and Sebastian Ma and Georgios Piliouras and Dani{\"{e}}l Reijsbergen and Mark van Staalduinen and Pawel Szalachowski}, title = {Rethinking Blockchain Security: Position Paper}, booktitle = {{IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018}, pages = {1273--1280}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/Cybermatics\_2018.2018.00222}, doi = {10.1109/CYBERMATICS\_2018.2018.00222}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/ithings/ChiaHHMPRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-04358, author = {Vincent Chia and Pieter H. Hartel and Qingze Hum and Sebastian Ma and Georgios Piliouras and Dani{\"{e}}l Reijsbergen and Mark van Staalduinen and Pawel Szalachowski}, title = {Rethinking Blockchain Security: Position Paper}, journal = {CoRR}, volume = {abs/1806.04358}, year = {2018}, url = {http://arxiv.org/abs/1806.04358}, eprinttype = {arXiv}, eprint = {1806.04358}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-04358.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BulleeMJH17, author = {Jan{-}Willem Bullee and Lorena Montoya and Marianne Junger and Pieter H. Hartel}, title = {Spear phishing in organisations explained}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {5}, pages = {593--613}, year = {2017}, url = {https://doi.org/10.1108/ICS-03-2017-0009}, doi = {10.1108/ICS-03-2017-0009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BulleeMJH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BortolameottiEC17, author = {Riccardo Bortolameotti and Thijs van Ede and Marco Caselli and Maarten H. Everts and Pieter H. Hartel and Rick Hofstede and Willem Jonker and Andreas Peter}, title = {DECANTeR: DEteCtion of Anomalous outbouNd {HTTP} TRaffic by Passive Application Fingerprinting}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {373--386}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134605}, doi = {10.1145/3134600.3134605}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BortolameottiEC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/JungerMHH17, author = {Marianne Junger and Lorena Montoya and Pieter H. Hartel and Maliheh Heydari}, title = {Towards the normalization of cybercrime victimization: {A} routine activities analysis of cybercrime in europe}, booktitle = {2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), London, United Kingdom, June 19-20, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CyberSA.2017.8073391}, doi = {10.1109/CYBERSA.2017.8073391}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/JungerMHH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/LastdragerGHJ17, author = {Elmer Lastdrager and In{\'{e}}s Carvajal Gallardo and Pieter H. Hartel and Marianne Junger}, title = {How Effective is Anti-Phishing Training for Children?}, booktitle = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {229--239}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/lastdrager}, timestamp = {Thu, 05 Sep 2024 15:37:23 +0200}, biburl = {https://dblp.org/rec/conf/soups/LastdragerGHJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BortolameottiPE16, author = {Riccardo Bortolameotti and Andreas Peter and Maarten H. Everts and Willem Jonker and Pieter H. Hartel}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Reliably determining data leakage in the presence of strong attackers}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {484--495}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991095}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BortolameottiPE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/BulleeMJH16, author = {Jan{-}Willem Bullee and Lorena Montoya and Marianne Junger and Pieter H. Hartel}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {107--114}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-107}, doi = {10.3233/978-1-61499-617-0-107}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/BulleeMJH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BakondiPEHJ15, author = {Bence Gabor Bakondi and Andreas Peter and Maarten H. Everts and Pieter H. Hartel and Willem Jonker}, title = {Publicly Verifiable Private Aggregation of Time-Series Data}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {50--59}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.82}, doi = {10.1109/ARES.2015.82}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BakondiPEHJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/BulleeMPJH15, author = {Jan{-}Willem Bullee and Lorena Montoya and Wolter Pieters and Marianne Junger and Pieter H. Hartel}, editor = {Giampaolo Bella and Gabriele Lenzini}, title = {Regression Nodes: Extending Attack Trees with Data from Social Sciences}, booktitle = {2015 Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2015, Verona, Italy, July 13, 2015}, pages = {17--23}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/STAST.2015.11}, doi = {10.1109/STAST.2015.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/BulleeMPJH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BoschHJP14, author = {Christoph B{\"{o}}sch and Pieter H. Hartel and Willem Jonker and Andreas Peter}, title = {A Survey of Provably Secure Searchable Encryption}, journal = {{ACM} Comput. Surv.}, volume = {47}, number = {2}, pages = {18:1--18:51}, year = {2014}, url = {https://doi.org/10.1145/2636328}, doi = {10.1145/2636328}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/BoschHJP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/GongHNTZ14, author = {Zheng Gong and Pieter H. Hartel and Svetla Nikova and Shaohua Tang and Bo Zhu}, title = {TuLP: {A} Family of Lightweight Message Authentication Codes for Body Sensor Networks}, journal = {J. Comput. Sci. Technol.}, volume = {29}, number = {1}, pages = {53--68}, year = {2014}, url = {https://doi.org/10.1007/s11390-013-1411-8}, doi = {10.1007/S11390-013-1411-8}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/GongHNTZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HadziosmanovicSZH14, author = {Dina Hadziosmanovic and Robin Sommer and Emmanuele Zambon and Pieter H. Hartel}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Through the eye of the {PLC:} semantic security monitoring for industrial processes}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {126--135}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664277}, doi = {10.1145/2664243.2664277}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HadziosmanovicSZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/BoschPHJ14, author = {Christoph B{\"{o}}sch and Andreas Peter and Pieter H. Hartel and Willem Jonker}, title = {{SOFIR:} Securely outsourced Forensic image recognition}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2014, Florence, Italy, May 4-9, 2014}, pages = {2694--2698}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICASSP.2014.6854089}, doi = {10.1109/ICASSP.2014.6854089}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/BoschPHJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BoschPLLTWHJ14, author = {Christoph B{\"{o}}sch and Andreas Peter and Bram Leenders and Hoon Wei Lim and Qiang Tang and Huaxiong Wang and Pieter H. Hartel and Willem Jonker}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Distributed Searchable Symmetric Encryption}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {330--337}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890956}, doi = {10.1109/PST.2014.6890956}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/BoschPLLTWHJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MontoyaJH13, author = {Lorena Montoya and Marianne Junger and Pieter H. Hartel}, title = {How "Digital" is Traditional Crime?}, booktitle = {2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013}, pages = {31--37}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EISIC.2013.12}, doi = {10.1109/EISIC.2013.12}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisic/MontoyaJH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JeckmansPH13, author = {Arjan Jeckmans and Andreas Peter and Pieter H. Hartel}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Efficient Privacy-Enhanced Familiarity-Based Recommender System}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {400--417}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_23}, doi = {10.1007/978-3-642-40203-6\_23}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JeckmansPH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MakriEHPAHJ13, author = {Eleftheria Makri and Maarten H. Everts and Sebastiaan de Hoogh and Andreas Peter and Harm op den Akker and Pieter H. Hartel and Willem Jonker}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Privacy-Preserving Verification of Clinical Research}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {481--500}, publisher = {{GI}}, year = {2013}, url = {https://dl.gi.de/handle/20.500.12116/20065}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MakriEHPAHJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/LastdragerMHJ13, author = {Elmer Lastdrager and Lorena Montoya and Pieter H. Hartel and Marianne Junger}, title = {Applying the Lost-Letter Technique to Assess {IT} Risk Behaviour}, booktitle = {Third Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2013, New Orleans, LA, USA, June 29, 2013}, pages = {2--9}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/STAST.2013.15}, doi = {10.1109/STAST.2013.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/LastdragerMHJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/JeckmansBEHLT13, author = {Arjan J. P. Jeckmans and Michael Beye and Zekeriya Erkin and Pieter H. Hartel and Reginald L. Lagendijk and Qiang Tang}, editor = {Naeem Ramzan and Roelof van Zwol and Jong{-}Seok Lee and Kai Cl{\"{u}}ver and Xian{-}Sheng Hua}, title = {Privacy in Recommender Systems}, booktitle = {Social Media Retrieval}, series = {Computer Communications and Networks}, pages = {263--281}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4471-4555-4\_12}, doi = {10.1007/978-1-4471-4555-4\_12}, timestamp = {Fri, 09 Apr 2021 18:18:56 +0200}, biburl = {https://dblp.org/rec/series/ccn/JeckmansBEHLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/critis/2013, editor = {Eric A. M. Luiijf and Pieter H. Hartel}, title = {Critical Information Infrastructures Security - 8th International Workshop, {CRITIS} 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8328}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03964-0}, doi = {10.1007/978-3-319-03964-0}, isbn = {978-3-319-03963-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HadziosmanovicBH12, author = {Dina Hadziosmanovic and Damiano Bolzoni and Pieter H. Hartel}, title = {A log mining approach for process monitoring in {SCADA}}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {4}, pages = {231--251}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0163-8}, doi = {10.1007/S10207-012-0163-8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HadziosmanovicBH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/HartelM12, author = {Pieter H. Hartel and Henk L. Muller}, title = {Simple algebraic data types for {C}}, journal = {Softw. Pract. Exp.}, volume = {42}, number = {2}, pages = {191--210}, year = {2012}, url = {https://doi.org/10.1002/spe.1058}, doi = {10.1002/SPE.1058}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/HartelM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compeng/HadziosmanovicBEH12, author = {Dina Hadziosmanovic and Damiano Bolzoni and Sandro Etalle and Pieter H. Hartel}, title = {Challenges and opportunities in securing industrial control systems}, booktitle = {Complexity in Engineering, {COMPENG} 2012, Aachen, Germany, June 11-13, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CompEng.2012.6242970}, doi = {10.1109/COMPENG.2012.6242970}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/compeng/HadziosmanovicBEH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/JeckmansTH12, author = {Arjan Jeckmans and Qiang Tang and Pieter H. Hartel}, editor = {Waleed W. Smari and Geoffrey Charles Fox}, title = {Privacy-preserving collaborative filtering based on horizontally partitioned dataset}, booktitle = {2012 International Conference on Collaboration Technologies and Systems, {CTS} 2012, Denver, CO, USA, May 21-25, 2012}, pages = {439--446}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CTS.2012.6261088}, doi = {10.1109/CTS.2012.6261088}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cts/JeckmansTH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BoschTHJ12, author = {Christoph B{\"{o}}sch and Qiang Tang and Pieter H. Hartel and Willem Jonker}, editor = {Dieter Gollmann and Felix C. Freiling}, title = {Selective Document Retrieval from Encrypted Database}, booktitle = {Information Security - 15th International Conference, {ISC} 2012, Passau, Germany, September 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7483}, pages = {224--241}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33383-5\_14}, doi = {10.1007/978-3-642-33383-5\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/BoschTHJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LawMGHP11, author = {Yee Wei Law and Giorgi Moniava and Zheng Gong and Pieter H. Hartel and Marimuthu Palaniswami}, title = {KALwEN: a new practical and interoperable key management scheme for body sensor networks}, journal = {Secur. Commun. Networks}, volume = {4}, number = {11}, pages = {1309--1329}, year = {2011}, url = {https://doi.org/10.1002/sec.256}, doi = {10.1002/SEC.256}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LawMGHP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/ZambonEWH11, author = {Emmanuele Zambon and Sandro Etalle and Roel J. Wieringa and Pieter H. Hartel}, title = {Model-based qualitative risk assessment for availability of {IT} infrastructures}, journal = {Softw. Syst. Model.}, volume = {10}, number = {4}, pages = {553--580}, year = {2011}, url = {https://doi.org/10.1007/s10270-010-0166-8}, doi = {10.1007/S10270-010-0166-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/ZambonEWH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/IbraimiNHJ11, author = {Luan Ibraimi and Svetla Nikova and Pieter H. Hartel and Willem Jonker}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Public-Key Encryption with Delegated Search}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {532--549}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_31}, doi = {10.1007/978-3-642-21554-4\_31}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/IbraimiNHJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cason/JeckmansTH11, author = {Arjan Jeckmans and Qiang Tang and Pieter H. Hartel}, title = {Privacy-preserving profile matching using the social graph}, booktitle = {International Conference on Computational Aspects of Social Networks, CASoN 2011, Salamanca, Spain, October 19-21, 2011}, pages = {42--47}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CASON.2011.6085916}, doi = {10.1109/CASON.2011.6085916}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cason/JeckmansTH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JeckmansTH11, author = {Arjan Jeckmans and Qiang Tang and Pieter H. Hartel}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: privacy-preserving profile similarity computation in online social networks}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {793--796}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093495}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JeckmansTH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ec2nd/HadziosmanovicB11, author = {Dina Hadziosmanovic and Damiano Bolzoni and Pieter H. Hartel and Sandro Etalle}, title = {{MELISSA:} Towards Automated Detection of Undesirable User Actions in Critical Infrastructures}, booktitle = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011, Gothenburg, Sweden, September 6-7, 2011}, pages = {41--48}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/EC2ND.2011.10}, doi = {10.1109/EC2ND.2011.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ec2nd/HadziosmanovicB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SedghiHJN11, author = {Saeed Sedghi and Pieter H. Hartel and Willem Jonker and Svetla Nikova}, editor = {Feng Bao and Jian Weng}, title = {Privacy Enhanced Access Control by Means of Policy Blinding}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {108--122}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_9}, doi = {10.1007/978-3-642-21031-0\_9}, timestamp = {Tue, 12 May 2020 10:56:38 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SedghiHJN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BoschBHJ11, author = {Christoph B{\"{o}}sch and Richard Brinkman and Pieter H. Hartel and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Conjunctive Wildcard Search over Encrypted Data}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {114--127}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_8}, doi = {10.1007/978-3-642-23556-6\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BoschBHJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/DimkovPH11, author = {Trajce Dimkov and Wolter Pieters and Pieter H. Hartel}, editor = {Thomas J. Cortina and Ellen Lowenfeld Walker and Laurie A. Smith King and David R. Musicant}, title = {Training students to steal: a practical assignment in computer security education}, booktitle = {Proceedings of the 42nd {ACM} technical symposium on Computer science education, {SIGCSE} 2011, Dallas, TX, USA, March 9-12, 2011}, pages = {21--26}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1953163.1953175}, doi = {10.1145/1953163.1953175}, timestamp = {Wed, 10 Mar 2021 13:17:16 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/DimkovPH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcmam/IbraimiTHJ10, author = {Luan Ibraimi and Qiang Tang and Pieter H. Hartel and Willem Jonker}, title = {Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records}, journal = {Int. J. Comput. Model. Algorithms Medicine}, volume = {1}, number = {2}, pages = {1--21}, year = {2010}, url = {https://doi.org/10.4018/jcmam.2010040101}, doi = {10.4018/JCMAM.2010040101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcmam/IbraimiTHJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BuhanDHTV10, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel and Qiang Tang and Raymond N. J. Veldhuis}, title = {Embedding renewable cryptographic keys into noisy data}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {3}, pages = {193--208}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0103-4}, doi = {10.1007/S10207-010-0103-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BuhanDHTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tos/KhatibH10, author = {Mohammed G. Khatib and Pieter H. Hartel}, title = {Optimizing MEMS-based storage devices for mobile battery-powered systems}, journal = {{ACM} Trans. Storage}, volume = {6}, number = {1}, pages = {1:1--1:37}, year = {2010}, url = {https://doi.org/10.1145/1714454.1714455}, doi = {10.1145/1714454.1714455}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tos/KhatibH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/KhatibHD10, author = {Mohammed G. Khatib and Pieter H. Hartel and Hylke W. van Dijk}, title = {Energy-Efficient Streaming Using Non-volatile Memory}, journal = {J. Signal Process. Syst.}, volume = {60}, number = {2}, pages = {149--168}, year = {2010}, url = {https://doi.org/10.1007/s11265-008-0308-1}, doi = {10.1007/S11265-008-0308-1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vlsisp/KhatibHD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DimkovPH10, author = {Trajce Dimkov and Wolter Pieters and Pieter H. Hartel}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Two methodologies for physical penetration testing using social engineering}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {399--408}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920319}, doi = {10.1145/1920261.1920319}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DimkovPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DimkovPH10, author = {Trajce Dimkov and Wolter Pieters and Pieter H. Hartel}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Laptop theft: a case study on the effectiveness of security mechanisms in open organizations}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {666--668}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866391}, doi = {10.1145/1866307.1866391}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DimkovPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/greencom/DimkovPH10, author = {Trajce Dimkov and Wolter Pieters and Pieter H. Hartel}, editor = {Peidong Zhu and Lizhe Wang and Feng Xia and Huajun Chen and Ian McLoughlin and Shiao{-}Li Tsao and Mitsuhisa Sato and Sun{-}Ki Chai and Irwin King}, title = {Effectiveness of Physical, Social and Digital Mechanisms against Laptop Theft in Open Organizations}, booktitle = {2010 {IEEE/ACM} Int'l Conference on Green Computing and Communications, GreenCom 2010, {\&} Int'l Conference on Cyber, Physical and Social Computing, CPSCom 2010, Hangzhou, China, December 18-20, 2010}, pages = {727--732}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/GreenCom-CPSCom.2010.165}, doi = {10.1109/GREENCOM-CPSCOM.2010.165}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/greencom/DimkovPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DimkovPH10, author = {Trajce Dimkov and Wolter Pieters and Pieter H. Hartel}, editor = {Alessandro Armando and Gavin Lowe}, title = {Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {112--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_9}, doi = {10.1007/978-3-642-16074-5\_9}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/DimkovPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HadziosmanovicBH10, author = {Dina Hadziosmanovic and Damiano Bolzoni and Pieter H. Hartel}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {{MEDUSA:} Mining Events to Detect Undesirable uSer Actions in {SCADA}}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {500--501}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_33}, doi = {10.1007/978-3-642-15512-3\_33}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/HadziosmanovicBH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/SedghiLNHJ10, author = {Saeed Sedghi and Peter van Liesdonk and Svetla Nikova and Pieter H. Hartel and Willem Jonker}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Searching Keywords with Wildcards on Encrypted Data}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {138--153}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_10}, doi = {10.1007/978-3-642-15317-4\_10}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/SedghiLNHJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/LiesdonkSDHJ10, author = {Peter van Liesdonk and Saeed Sedghi and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Computationally Efficient Searchable Symmetric Encryption}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {87--100}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_7}, doi = {10.1007/978-3-642-15546-8\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/LiesdonkSDHJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BuhanBDHV09, author = {Ileana Buhan and Bas Boom and Jeroen Doumen and Pieter H. Hartel and Raymond N. J. Veldhuis}, title = {Secure pairing with biometrics}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {27--42}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023424}, doi = {10.1504/IJSN.2009.023424}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BuhanBDHV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/LawPHDHH09, author = {Yee Wei Law and Marimuthu Palaniswami and Lodewijk van Hoesel and Jeroen Doumen and Pieter H. Hartel and Paul J. M. Havinga}, title = {Energy-efficient link-layer jamming attacks against wireless sensor network {MAC} protocols}, journal = {{ACM} Trans. Sens. Networks}, volume = {5}, number = {1}, pages = {6:1--6:38}, year = {2009}, url = {https://doi.org/10.1145/1464420.1464426}, doi = {10.1145/1464420.1464426}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/LawPHDHH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GongHNZ09, author = {Zheng Gong and Pieter H. Hartel and Svetla Nikova and Bo Zhu}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {Towards Secure and Practical MACs for Body Sensor Networks}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {182--198}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_13}, doi = {10.1007/978-3-642-10628-6\_13}, timestamp = {Mon, 15 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GongHNZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/IbraimiTHJ09, author = {Luan Ibraimi and Qiang Tang and Pieter H. Hartel and Willem Jonker}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {1--12}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_1}, doi = {10.1007/978-3-642-00843-6\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/IbraimiTHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/KhatibH09, author = {Mohammed G. Khatib and Pieter H. Hartel}, title = {Policies for probe-wear leveling in MEMS-based storage devices}, booktitle = {17th Annual Meeting of the {IEEE/ACM} International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems, {MASCOTS} 2009, September 21-23, 2009, South Kensington Campus, Imperial College, London, {UK}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MASCOT.2009.5366652}, doi = {10.1109/MASCOT.2009.5366652}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/KhatibH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BolzoniEH09, author = {Damiano Bolzoni and Sandro Etalle and Pieter H. Hartel}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {1--20}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_1}, doi = {10.1007/978-3-642-04342-0\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BolzoniEH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IbraimiPNHJ09, author = {Luan Ibraimi and Milan Petkovic and Svetla Nikova and Pieter H. Hartel and Willem Jonker}, editor = {Heung Youl Youm and Moti Yung}, title = {Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {309--323}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_23}, doi = {10.1007/978-3-642-10838-9\_23}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IbraimiPNHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuhanDH09, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel}, title = {Fuzzy extractors for continuous distributions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2009}, url = {http://eprint.iacr.org/2009/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BuhanDH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/Marin-PerianuSHH08, author = {Raluca Marin{-}Perianu and Hans Scholten and Paul J. M. Havinga and Pieter H. Hartel}, title = {Cluster-based service discovery for heterogeneous wireless sensor networks}, journal = {Int. J. Parallel Emergent Distributed Syst.}, volume = {23}, number = {4}, pages = {325--346}, year = {2008}, url = {https://doi.org/10.1080/17445760801930948}, doi = {10.1080/17445760801930948}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/paapp/Marin-PerianuSHH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/KhatibH08, author = {Mohammed G. Khatib and Pieter H. Hartel}, editor = {Erik R. Altman}, title = {Power management of MEMS-based storage devices for mobile systems}, booktitle = {Proceedings of the 2008 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, {CASES} 2008, Atlanta, GA, USA, October 19-24, 2008}, pages = {245--254}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1450095.1450131}, doi = {10.1145/1450095.1450131}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/KhatibH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TangHJ08, author = {Qiang Tang and Pieter H. Hartel and Willem Jonker}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Inter-domain Identity-Based Proxy Re-encryption}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {332--347}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_26}, doi = {10.1007/978-3-642-01440-6\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TangHJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emsoft/KhatibMH08, author = {Mohammed G. Khatib and Ethan L. Miller and Pieter H. Hartel}, editor = {Luca de Alfaro and Jens Palsberg}, title = {Workload-based configuration of MEMS-based storage devices for mobile systems}, booktitle = {Proceedings of the 8th {ACM} {\&} {IEEE} International conference on Embedded software, {EMSOFT} 2008, Atlanta, GA, USA, October 19-24, 2008}, pages = {41--50}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1450058.1450065}, doi = {10.1145/1450058.1450065}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/emsoft/KhatibMH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/BuhanDH08, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel}, title = {Controlling leakage of biometric information using dithering}, booktitle = {2008 16th European Signal Processing Conference, {EUSIPCO} 2008, Lausanne, Switzerland, August 25-29, 2008}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://ieeexplore.ieee.org/document/7080711/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/BuhanDH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fast/HartelAK08, author = {Pieter H. Hartel and Leon Abelmann and Mohammed G. Khatib}, editor = {Mary Baker and Erik Riedel}, title = {Towards Tamper-evident Storage on Patterned Media}, booktitle = {6th {USENIX} Conference on File and Storage Technologies, {FAST} 2008, February 26-29, 2008, San Jose, CA, {USA}}, pages = {283--296}, publisher = {{USENIX}}, year = {2008}, url = {http://www.usenix.org/events/fast08/tech/hartel.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fast/HartelAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmcad/HartelRG08, author = {Pieter H. Hartel and Theo C. Ruys and Marc C. W. Geilen}, editor = {Alessandro Cimatti and Robert B. Jones}, title = {Scheduling Optimisations for {SPIN} to Minimise Buffer Requirements in Synchronous Data Flow}, booktitle = {Formal Methods in Computer-Aided Design, {FMCAD} 2008, Portland, Oregon, USA, 17-20 November 2008}, pages = {1--10}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/FMCAD.2008.ECP.25}, doi = {10.1109/FMCAD.2008.ECP.25}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fmcad/HartelRG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/BuhanDHTV08, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel and Qiang Tang and Raymond N. J. Veldhuis}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Embedding Renewable Cryptographic Keys into Continuous Noisy Data}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {294--310}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_20}, doi = {10.1007/978-3-540-88625-9\_20}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/BuhanDHTV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SedghiDHJ08, author = {Saeed Sedghi and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Towards an Information Theoretic Analysis of Searchable Encryption}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {345--360}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_23}, doi = {10.1007/978-3-540-88625-9\_23}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/SedghiDHJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/Marin-PerianuHH08, author = {Raluca Marin{-}Perianu and Johann L. Hurink and Pieter H. Hartel}, title = {A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks}, booktitle = {{IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA} 2008, Sydney, NSW, Australia, December 10-12, 2008}, pages = {863--870}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISPA.2008.18}, doi = {10.1109/ISPA.2008.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/Marin-PerianuHH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/DimkovTH08, author = {Trajce Dimkov and Qiang Tang and Pieter H. Hartel}, editor = {Jon Whittle and Jan J{\"{u}}rjens and Bashar Nuseibeh and Glen Dobson}, title = {On the Inability of Existing Security Models to Cope with Data Mobility in Dynamic Organizations}, booktitle = {Proceedings of the Workshop on Modeling Security {(} {MODSEC08} {)} held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems {(} {MODELS} {)} Toulouse, France, September 28, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {413}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-413/paper18.pdf}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/models/DimkovTH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/IbraimiTHJ08, author = {Luan Ibraimi and Qiang Tang and Pieter H. Hartel and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {185--198}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_12}, doi = {10.1007/978-3-540-85259-9\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/IbraimiTHJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CorinEHM07, author = {Ricardo Corin and Sandro Etalle and Pieter H. Hartel and Angelika Mader}, title = {Timed analysis of security protocols}, journal = {J. Comput. Secur.}, volume = {15}, number = {6}, pages = {619--645}, year = {2007}, url = {https://doi.org/10.3233/jcs-2007-15603}, doi = {10.3233/JCS-2007-15603}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CorinEHM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BuhanDHV07, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel and Raymond N. J. Veldhuis}, editor = {Feng Bao and Steven Miller}, title = {Fuzzy extractors for continuous distributions}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {353--355}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229325}, doi = {10.1145/1229285.1229325}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BuhanDHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/estimedia/KhatibZHS07, author = {Mohammed G. Khatib and Berend{-}Jan van der Zwaag and Pieter H. Hartel and Gerard J. M. Smit}, editor = {Samarjit Chakraborty and Petru Eles}, title = {Interposing Flash between Disk and {DRAM} to Save Energy for Streaming Workloads}, booktitle = {Proceedings of the 2007 5th Workshop on Embedded Systems for Real-Time Multimedia, ESTIMedia 2007, October 4-5, Salzburg, Austria, conjunction with {CODES+ISSS} 2007}, pages = {7--12}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ESTMED.2007.4375793}, doi = {10.1109/ESTMED.2007.4375793}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/estimedia/KhatibZHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/BuhanDHV07, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel and Raymond N. J. Veldhuis}, editor = {Seong{-}Whan Lee and Stan Z. Li}, title = {Feeling Is Believing: {A} Secure Template Exchange Protocol}, booktitle = {Advances in Biometrics, International Conference, {ICB} 2007, Seoul, Korea, August 27-29, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4642}, pages = {897--906}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74549-5\_94}, doi = {10.1007/978-3-540-74549-5\_94}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/icb/BuhanDHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/ChongCDEHLT06, author = {Cheun Ngen Chong and Ricardo Corin and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Yee Wei Law and Andrew Tokmakoff}, title = {LicenseScript: a logical language for digital rights management}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {61}, number = {3-4}, pages = {284--331}, year = {2006}, url = {https://doi.org/10.1007/BF03219910}, doi = {10.1007/BF03219910}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/ChongCDEHLT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/LawDH06, author = {Yee Wei Law and Jeroen Doumen and Pieter H. Hartel}, title = {Survey and benchmark of block ciphers for wireless sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {2}, number = {1}, pages = {65--93}, year = {2006}, url = {https://doi.org/10.1145/1138127.1138130}, doi = {10.1145/1138127.1138130}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/LawDH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/BuhanBHV06, author = {Ileana Buhan and Asker M. Bazen and Pieter H. Hartel and Raymond N. J. Veldhuis}, editor = {David Zhang and Anil K. Jain}, title = {A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems}, booktitle = {Advances in Biometrics, International Conference, {ICB} 2006, Hong Kong, China, January 5-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3832}, pages = {728--736}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11608288\_97}, doi = {10.1007/11608288\_97}, timestamp = {Thu, 17 Oct 2019 12:39:20 +0200}, biburl = {https://dblp.org/rec/conf/icb/BuhanBHV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/SundramoorthyHS06, author = {Vasughi Sundramoorthy and Pieter H. Hartel and Hans Scholten}, title = {On consistency maintenance in service discovery}, booktitle = {20th International Parallel and Distributed Processing Symposium {(IPDPS} 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/IPDPS.2006.1639274}, doi = {10.1109/IPDPS.2006.1639274}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/SundramoorthyHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/BolzoniEHZ06, author = {Damiano Bolzoni and Sandro Etalle and Pieter H. Hartel and Emmanuele Zambon}, title = {{POSEIDON:} a 2-tier Anomaly-based Network Intrusion Detection System}, booktitle = {Proceedings of the 4th {IEEE} International Workshop on Information Assurance {(IWIA} 2006), 13-14 April 2006, Egham, Surrey, {UK}}, pages = {144--156}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IWIA.2006.18}, doi = {10.1109/IWIA.2006.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/BolzoniEHZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/Marin-PerianuSHH06, author = {Raluca Marin{-}Perianu and Hans Scholten and Paul J. M. Havinga and Pieter H. Hartel}, title = {Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks}, booktitle = {{LCN} 2006, The 31st Annual {IEEE} Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006}, pages = {931--938}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/LCN.2006.322202}, doi = {10.1109/LCN.2006.322202}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/Marin-PerianuSHH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsn/LawHHH05, author = {Yee Wei Law and Pieter H. Hartel and Jerry den Hartog and Paul J. M. Havinga}, title = {Link-layer jamming attacks on {S-MAC}}, booktitle = {Wireless Sensor Networks, Second European Workshop, {EWSN} 2005, Istanbul, Turkey, January 31 - February 2, 2005, Proceedings}, pages = {217--225}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/EWSN.2005.1462013}, doi = {10.1109/EWSN.2005.1462013}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ewsn/LawHHH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/ChongEHJK05, author = {Cheun Ngen Chong and Sandro Etalle and Pieter H. Hartel and Rieks Joosten and Geert Kleinhuis}, editor = {Chin{-}Sheng Chen and Joaquim Filipe and Isabel Seruca and Jos{\'{e}} Cordeiro}, title = {Service Brokerage in Prolog}, booktitle = {{ICEIS} 2005, Proceedings of the Seventh International Conference on Enterprise Information Systems, Miami, USA, May 25-28, 2005}, pages = {409--412}, year = {2005}, timestamp = {Thu, 02 Feb 2017 12:53:54 +0100}, biburl = {https://dblp.org/rec/conf/iceis/ChongEHJK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/SundramoorthyHHST05, author = {Vasughi Sundramoorthy and Pieter H. Hartel and Jerry den Hartog and Hans Scholten and C. Tan}, title = {Functional Principles of Registry-based Service Discovery}, booktitle = {30th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2005), 15-17 November 2005, Sydney, Australia, Proceedings}, pages = {209--217}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/LCN.2005.71}, doi = {10.1109/LCN.2005.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/SundramoorthyHHST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/LawHDH05, author = {Yee Wei Law and Lodewijk van Hoesel and Jeroen Doumen and Pieter H. Hartel and Paul J. M. Havinga}, editor = {Vijay Atluri and Peng Ning and Wenliang Du}, title = {Energy-efficient link-layer jamming attacks against wireless sensor network {MAC} protocols}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {76--88}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102219.1102234}, doi = {10.1145/1102219.1102234}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/LawHDH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ChengCDEHN05, author = {Jieyin Cheng and Cheun Ngen Chong and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Stefan Nikolaus}, editor = {Ry{\^{o}}ichi Sasaki and Sihan Qing and Eiji Okamoto and Hiroshi Yoshiura}, title = {StreamTo: Streaming Content using a Tamper-Resistant Token}, booktitle = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11} 20th International Conference on Information Security {(SEC} 2005), May 30 - June 1, 2005, Chiba, Japan}, series = {{IFIP}}, volume = {181}, pages = {601--612}, publisher = {Springer}, year = {2005}, timestamp = {Fri, 19 May 2017 01:25:10 +0200}, biburl = {https://dblp.org/rec/conf/sec/ChengCDEHN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/time/Hartel05, author = {Pieter H. Hartel}, title = {A Trace Semantics for Positive Core XPath}, booktitle = {12th International Symposium on Temporal Representation and Reasoning {(TIME} 2005), 23-25 June 2005, Burlington, Vermont, {USA}}, pages = {103--112}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/TIME.2005.9}, doi = {10.1109/TIME.2005.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/time/Hartel05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CzenkoTDEHH06, author = {Marcin Czenko and Ha Tran and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Jerry den Hartog}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Nonmonotonic Trust Management for {P2P} Applications}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {113--130}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.037}, doi = {10.1016/J.ENTCS.2005.09.037}, timestamp = {Fri, 20 Jan 2023 11:50:26 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CzenkoTDEHH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0503036, author = {Ricardo Corin and Sandro Etalle and Pieter H. Hartel and Angelika Mader}, title = {Timed Analysis of Security Protocols}, journal = {CoRR}, volume = {abs/cs/0503036}, year = {2005}, url = {http://arxiv.org/abs/cs/0503036}, eprinttype = {arXiv}, eprint = {cs/0503036}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0503036.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0510061, author = {Marcin Czenko and Ha Tran and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Jerry den Hartog}, title = {Nonmonotonic Trust Management for {P2P} Applications}, journal = {CoRR}, volume = {abs/cs/0510061}, year = {2005}, url = {http://arxiv.org/abs/cs/0510061}, eprinttype = {arXiv}, eprint = {cs/0510061}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0510061.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0511043, author = {Damiano Bolzoni and Emmanuele Zambon and Sandro Etalle and Pieter H. Hartel}, title = {Poseidon: a 2-tier Anomaly-based Intrusion Detection System}, journal = {CoRR}, volume = {abs/cs/0511043}, year = {2005}, url = {http://arxiv.org/abs/cs/0511043}, eprinttype = {arXiv}, eprint = {cs/0511043}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0511043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BrinkmanFDHJ04, author = {Richard Brinkman and Ling Feng and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, title = {Efficient Tree Search in Encrypted Data}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {3}, pages = {14--21}, year = {2004}, url = {https://doi.org/10.1201/1086/44530.13.3.20040701/83065.3}, doi = {10.1201/1086/44530.13.3.20040701/83065.3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/BrinkmanFDHJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/HartelMG04, author = {Pieter H. Hartel and Henk L. Muller and Hugh Glaser}, title = {The Functional "C" experience}, journal = {J. Funct. Program.}, volume = {14}, number = {2}, pages = {129--135}, year = {2004}, url = {https://doi.org/10.1017/S0956796803004817}, doi = {10.1017/S0956796803004817}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jfp/HartelMG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/KalkerEHLV04, author = {Ton Kalker and Dick H. J. Epema and Pieter H. Hartel and Reginald L. Lagendijk and Maarten van Steen}, title = {Music2Share - Copyright-Compliant Music Sharing in {P2P} Systems}, journal = {Proc. {IEEE}}, volume = {92}, number = {6}, pages = {961--970}, year = {2004}, url = {https://doi.org/10.1109/JPROC.2004.827368}, doi = {10.1109/JPROC.2004.827368}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/KalkerEHLV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cassis/HartelEEW04, author = {Pieter H. Hartel and Pascal van Eck and Sandro Etalle and Roel J. Wieringa}, editor = {Gilles Barthe and Lilian Burdy and Marieke Huisman and Jean{-}Louis Lanet and Traian Muntean}, title = {Modelling Mobility Aspects of Security Policies}, booktitle = {Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop, {CASSIS} 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3362}, pages = {172--191}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30569-9\_9}, doi = {10.1007/978-3-540-30569-9\_9}, timestamp = {Fri, 09 Apr 2021 18:40:44 +0200}, biburl = {https://dblp.org/rec/conf/cassis/HartelEEW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CorinEHM04, author = {Ricardo Corin and Sandro Etalle and Pieter H. Hartel and Angelika Mader}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Timed model checking of security protocols}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {23--32}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029137}, doi = {10.1145/1029133.1029137}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CorinEHM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/LawDH04, author = {Yee Wei Law and Jeroen Doumen and Pieter H. Hartel}, title = {Benchmarking block ciphers for wireless sensor networks}, booktitle = {2004 {IEEE} International Conference on Mobile Ad-hoc and Sensor Systems, Fort Lauderdale, FL, USA, October 25-27, 2004}, pages = {447--456}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/MAHSS.2004.1392185}, doi = {10.1109/MAHSS.2004.1392185}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/LawDH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/BrinkmanFDHJ04, author = {Richard Brinkman and Ling Feng and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and L. Javier Garc{\'{\i}}a{-}Villalba}, title = {Efficient Tree Search in Encrypted Data}, booktitle = {Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction with {ICEIS} 2004, Porto, Portugal, April 2004}, pages = {126--135}, publisher = {{INSTICC} Press}, year = {2004}, timestamp = {Tue, 14 Sep 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sis/BrinkmanFDHJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/VeldhuisBKH04, author = {Raymond N. J. Veldhuis and Asker M. Bazen and Joost A. Kauffman and Pieter H. Hartel}, editor = {Edward J. Delp III and Ping Wah Wong}, title = {Biometric verification based on grip-pattern recognition}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, California, USA, January 18-22, 2004, Proceedings}, series = {Proceedings of {SPIE}}, volume = {5306}, pages = {634--641}, publisher = {{SPIE}}, year = {2004}, url = {https://doi.org/10.1117/12.530967}, doi = {10.1117/12.530967}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/VeldhuisBKH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChongRDEHC04, author = {Cheun Ngen Chong and Bin Ren and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Ricardo Corin}, editor = {Chae Hoon Lim and Moti Yung}, title = {License Protection with a Tamper-Resistant Token}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {223--237}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_19}, doi = {10.1007/978-3-540-31815-6\_19}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChongRDEHC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0411010, author = {Ricardo Corin and Antonio Durante and Sandro Etalle and Pieter H. Hartel}, title = {A Trace Logic for Local Security Properties}, journal = {CoRR}, volume = {cs.CR/0411010}, year = {2004}, url = {http://arxiv.org/abs/cs.CR/0411010}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0411010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icadl/ChongEHL03, author = {Cheun Ngen Chong and Sandro Etalle and Pieter H. Hartel and Yee Wei Law}, editor = {Tengku M. T. Sembok and Halimah Badioze Zaman and Hsinchun Chen and Shalini R. Urs and Sung{-}Hyon Myaeng}, title = {Approximating Fair Use in LicenseScript}, booktitle = {Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 6th International Conference on Asian Digital Libraries, {ICADL} 2003, Kuala Lumpur, Malaysia, December 8-12, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2911}, pages = {432--443}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24594-0\_44}, doi = {10.1007/978-3-540-24594-0\_44}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/icadl/ChongEHL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-8/LawCEH03, author = {Yee Wei Law and Ricardo Corin and Sandro Etalle and Pieter H. Hartel}, editor = {Marco Conti and Silvia Giordano and Enrico Gregori and Stephan Olariu}, title = {A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks}, booktitle = {Personal Wireless Communications, {IFIP-TC6} 8th International Conference, {PWC} 2003, Venice, Italy, September 23-25, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2775}, pages = {27--39}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39867-7\_3}, doi = {10.1007/978-3-540-39867-7\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ifip6-8/LawCEH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/ChongEH03, author = {Cheun Ngen Chong and Sandro Etalle and Pieter H. Hartel}, editor = {Robert Meersman and Zahir Tari}, title = {Comparing Logic-Based and XML-Based Rights Expression Languages}, booktitle = {On The Move to Meaningful Internet Systems 2003: {OTM} 2003 Workshops, {OTM} Confederated International Workshops, HCI-SWWA, IPW, JTRES, WORM, WMS, and {WRSM} 2003, Catania, Sicily, Italy, November 3-7, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2889}, pages = {779--792}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39962-9\_78}, doi = {10.1007/978-3-540-39962-9\_78}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/ChongEH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ChongPH03, author = {Cheun Ngen Chong and Zhonghong Peng and Pieter H. Hartel}, editor = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati and Pierangela Samarati and Sokratis K. Katsikas}, title = {Secure Audit Logging with Tamper-Resistant Hardware}, booktitle = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece}, series = {{IFIP} Conference Proceedings}, volume = {250}, pages = {73--84}, publisher = {Kluwer}, year = {2003}, timestamp = {Tue, 13 May 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ChongPH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LawEH03, author = {Yee Wei Law and Sandro Etalle and Pieter H. Hartel}, editor = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati and Pierangela Samarati and Sokratis K. Katsikas}, title = {Assessing Security in Energy-Efficient Sensor Networks}, booktitle = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece}, series = {{IFIP} Conference Proceedings}, volume = {250}, pages = {459--463}, publisher = {Kluwer}, year = {2003}, timestamp = {Fri, 25 Apr 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LawEH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wedelmusic/ChongCEHJL03, author = {Cheun Ngen Chong and Ricardo Corin and Sandro Etalle and Pieter H. Hartel and Willem Jonker and Yee Wei Law}, title = {LicenseScript: a novel digital rights language and its semantics}, booktitle = {3rd International Conference on {WEB} Delivering of Music {(WEDELMUSIC} 2003), 15-17 September 2003, Leeds, {UK}}, pages = {122--129}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/WDM.2003.1233885}, doi = {10.1109/WDM.2003.1233885}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wedelmusic/ChongCEHJL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CorinEHD05, author = {Ricardo Corin and Sandro Etalle and Pieter H. Hartel and Antonio Durante}, editor = {Sandro Etalle and Supratik Mukhopadhyay and Abhik Roychoudhury}, title = {A Trace Logic for Local Security Properties}, booktitle = {Proceedings of the International Workshop on Software Verification and Validation, SVV@ICLP 2003, Mumbai, India, December 14, 2003}, series = {Electronic Notes in Theoretical Computer Science}, volume = {118}, pages = {129--143}, publisher = {Elsevier}, year = {2003}, url = {https://doi.org/10.1016/j.entcs.2004.12.019}, doi = {10.1016/J.ENTCS.2004.12.019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/CorinEHD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/Hartel02, author = {Pieter H. Hartel}, editor = {Peter Honeyman}, title = {The State of {WG} 8.8}, booktitle = {Proceedings of the Fifth Smart Card Research and Advanced Application Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}}, publisher = {{USENIX}}, year = {2002}, timestamp = {Wed, 04 Jul 2018 13:06:35 +0200}, biburl = {https://dblp.org/rec/conf/cardis/Hartel02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/PollHJ02, author = {Erik Poll and Pieter H. Hartel and Eduard de Jong}, editor = {Peter Honeyman}, title = {A Java Reference Model of Transacted Memory for Smart Cards}, booktitle = {Proceedings of the Fifth Smart Card Research and Advanced Application Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}}, pages = {75--86}, publisher = {{USENIX}}, year = {2002}, url = {http://www.usenix.org/publications/library/proceedings/cardis02/poll.html}, timestamp = {Tue, 14 Sep 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/PollHJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idms/ChongBHK02, author = {Cheun Ngen Chong and Ren{\'{e}} van Buuren and Pieter H. Hartel and Geert Kleinhuis}, editor = {Fernando Boavida and Edmundo Monteiro and Jo{\~{a}}o Orvalho}, title = {Security Attributes Based Digital Rights Management}, booktitle = {Protocols and Systems for Interactive Distributed Multimedia, Joint International Workshops on Interactive Distributed Multimedia Systems and Protocols for Multimedia Systems, {IDMS/PROMS} 2002, Coimbra, Portugal, November 26-29, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2515}, pages = {339--352}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36166-9\_29}, doi = {10.1007/3-540-36166-9\_29}, timestamp = {Tue, 21 Mar 2023 21:01:30 +0100}, biburl = {https://dblp.org/rec/conf/idms/ChongBHK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/ScholtenJHHHS02, author = {Hans Scholten and Pierre G. Jansen and Ferdy Hanssen and Pieter H. Hartel and T. Hattink and Vasughi Sundramoorthy}, title = {Multimedia QoS in Low-Cost Home Networks}, booktitle = {27th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2002), 6-8 November 2002, Tampa, FL, USA, Proceedings}, pages = {327--328}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/LCN.2002.1181800}, doi = {10.1109/LCN.2002.1181800}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/ScholtenJHHHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Domingo-FerrerH01, author = {Josep Domingo{-}Ferrer and Pieter H. Hartel}, title = {Current directions in smart cards}, journal = {Comput. Networks}, volume = {36}, number = {4}, pages = {377--379}, year = {2001}, url = {https://doi.org/10.1016/S1389-1286(01)00160-8}, doi = {10.1016/S1389-1286(01)00160-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Domingo-FerrerH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HartelM01, author = {Pieter H. Hartel and Luc Moreau}, title = {Formalizing the safety of Java, the Java virtual machine, and Java card}, journal = {{ACM} Comput. Surv.}, volume = {33}, number = {4}, pages = {517--558}, year = {2001}, url = {https://doi.org/10.1145/503112.503115}, doi = {10.1145/503112.503115}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/HartelM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esmart/HendersonWH01, author = {Neil James Henderson and Neil M. White and Pieter H. Hartel}, editor = {Isabelle Attali and Thomas P. Jensen}, title = {iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric}, booktitle = {Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2140}, pages = {124--134}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45418-7\_11}, doi = {10.1007/3-540-45418-7\_11}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esmart/HendersonWH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/HartelBJL01, author = {Pieter H. Hartel and Michael J. Butler and Eduard de Jong and Mark Longley}, editor = {Jos{\'{e}} Nuno Oliveira and Pamela Zave}, title = {Transacted Memory for Smart Cards}, booktitle = {{FME} 2001: Formal Methods for Increasing Software Productivity, International Symposium of Formal Methods Europe, Berlin, Germany, March 12-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2021}, pages = {478--499}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45251-6\_28}, doi = {10.1007/3-540-45251-6\_28}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/HartelBJL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/FieldHM01, author = {Adam Field and Pieter H. Hartel and Wim Mooij}, editor = {Vincent Y. Shen and Nobuo Saito and Michael R. Lyu and Mary Ellen Zurko}, title = {Personal DJ, an architecture for personalised content delivery}, booktitle = {Proceedings of the Tenth International World Wide Web Conference, {WWW} 10, Hong Kong, China, May 1-5, 2001}, pages = {1--7}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/371920.371921}, doi = {10.1145/371920.371921}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/FieldHM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GlaserHG00, author = {Hugh Glaser and Pieter H. Hartel and Paul W. Garratt}, title = {Programming by Numbers: {A} Programming Method for Novices}, journal = {Comput. J.}, volume = {43}, number = {4}, pages = {252--265}, year = {2000}, url = {https://doi.org/10.1093/comjnl/43.4.252}, doi = {10.1093/COMJNL/43.4.252}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GlaserHG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/DiehlHS00, author = {Stephan Diehl and Pieter H. Hartel and Peter Sestoft}, title = {Principles of abstract machines}, journal = {Future Gener. Comput. Syst.}, volume = {16}, number = {7}, year = {2000}, url = {https://doi.org/10.1016/S0167-739X(99)00087-4}, doi = {10.1016/S0167-739X(99)00087-4}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/DiehlHS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/DiehlHS00a, author = {Stephan Diehl and Pieter H. Hartel and Peter Sestoft}, title = {Abstract machines for programming language implementation}, journal = {Future Gener. Comput. Syst.}, volume = {16}, number = {7}, pages = {739--751}, year = {2000}, url = {https://doi.org/10.1016/S0167-739X(99)00088-6}, doi = {10.1016/S0167-739X(99)00088-6}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/DiehlHS00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/Hartel00, author = {Pieter H. Hartel}, editor = {Josep Domingo{-}Ferrer and David Chan and Anthony Watson}, title = {Formalising Java Safety - An overview}, booktitle = {Smart Card Research and Advanced Applications, Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, {CARDIS} 2000, September 20-22, 2000, Bristol, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {180}, pages = {115--134}, publisher = {Kluwer}, year = {2000}, timestamp = {Mon, 09 Sep 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/Hartel00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/HendersonH00, author = {Neil James Henderson and Pieter H. Hartel}, editor = {Josep Domingo{-}Ferrer and David Chan and Anthony Watson}, title = {Pressure Sequence - {A} Novel Method of Protecting Smart Cards}, booktitle = {Smart Card Research and Advanced Applications, Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, {CARDIS} 2000, September 20-22, 2000, Bristol, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {180}, pages = {241--256}, publisher = {Kluwer}, year = {2000}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/HendersonH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/javacard/HartelJ00, author = {Pieter H. Hartel and Eduard de Jong}, editor = {Isabelle Attali and Thomas P. Jensen}, title = {A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations}, booktitle = {Java on Smart Cards: Programming and Security, First International Workshop, JavaCard 2000, Cannes, France, September 14, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2041}, pages = {52--72}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45165-X\_5}, doi = {10.1007/3-540-45165-X\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/javacard/HartelJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/EtalleHV99, author = {Sandro Etalle and Pieter H. Hartel and Willem G. Vree}, title = {Declarative solutions to partitioned-grid problems}, journal = {Softw. Pract. Exp.}, volume = {29}, number = {13}, pages = {1173--1200}, year = {1999}, url = {https://doi.org/10.1002/(SICI)1097-024X(199911)29:13\&\#60;1173::AID-SPE276\&\#62;3.0.CO;2-X}, doi = {10.1002/(SICI)1097-024X(199911)29:13\&\#60;1173::AID-SPE276\&\#62;3.0.CO;2-X}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/EtalleHV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/Hartel99, author = {Pieter H. Hartel}, title = {{LETOS} - a lightweight execution tool for operational semantics}, journal = {Softw. Pract. Exp.}, volume = {29}, number = {15}, pages = {1379--1416}, year = {1999}, url = {https://doi.org/10.1002/(SICI)1097-024X(19991225)29:15\&\#60;1379::AID-SPE286\&\#62;3.0.CO;2-V}, doi = {10.1002/(SICI)1097-024X(19991225)29:15\&\#60;1379::AID-SPE286\&\#62;3.0.CO;2-V}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/Hartel99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/ButlerH99, author = {Michael J. Butler and Pieter H. Hartel}, title = {Reasoning about Grover's quantum search algorithm using probabilistic \emph{wp}}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {21}, number = {3}, pages = {417--429}, year = {1999}, url = {https://doi.org/10.1145/319301.319303}, doi = {10.1145/319301.319303}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/ButlerH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/java/HartelBL99, author = {Pieter H. Hartel and Michael J. Butler and Moshe Levy}, editor = {Jim Alves{-}Foss}, title = {The Operational Semantics of a Java Secure Processor}, booktitle = {Formal Syntax and Semantics of Java}, series = {Lecture Notes in Computer Science}, volume = {1523}, pages = {313--352}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48737-9\_9}, doi = {10.1007/3-540-48737-9\_9}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/java/HartelBL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/HartelHS98, author = {Pieter H. Hartel and Jake Hill and Matt Sims}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {An Operational Model of QuickPay - Extended Abstract}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {19--28}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_2}, doi = {10.1007/10721064\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/HartelHS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0091720, author = {Pieter H. Hartel and Henk L. Muller}, title = {Functional {C}}, publisher = {Addison-Wesley-Longman}, year = {1997}, isbn = {978-0-201-41950-4}, timestamp = {Tue, 26 Apr 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0091720.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Hartel97, author = {Pieter H. Hartel}, title = {{FGCS} special issue on smart cards}, journal = {Future Gener. Comput. Syst.}, volume = {13}, number = {1}, pages = {1--2}, year = {1997}, url = {https://doi.org/10.1016/S0167-739X(97)89107-8}, doi = {10.1016/S0167-739X(97)89107-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/Hartel97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AlberdaHF97, author = {Marjan I. Alberda and Pieter H. Hartel and Eduard K. de Jong Frz}, title = {Using formal methods to cultivate trust in smart card operating systems}, journal = {Future Gener. Comput. Syst.}, volume = {13}, number = {1}, pages = {39--54}, year = {1997}, url = {https://doi.org/10.1016/S0167-739X(97)89110-8}, doi = {10.1016/S0167-739X(97)89110-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AlberdaHF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ker/Hartel97, author = {Pieter H. Hartel}, title = {Elementary Standard {ML} by Greg Michaelson, University College London Press, UK, 1995, {ISBN} 1-85728-398-8 PB, pp 306}, journal = {Knowl. Eng. Rev.}, volume = {12}, number = {1}, pages = {99--102}, year = {1997}, url = {https://doi.org/10.1017/S0269888997210647}, doi = {10.1017/S0269888997210647}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ker/Hartel97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/plilp/1997, editor = {Hugh Glaser and Pieter H. Hartel and Herbert Kuchen}, title = {Programming Languages: Implementations, Logics, and Programs, 9th International Symposium, PLILP'97, Including a Special Trach on Declarative Programming Languages in Education, Southampton, UK, September 3-5, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1292}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0033832}, doi = {10.1007/BFB0033832}, isbn = {3-540-63398-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/plilp/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/HartelG96, author = {Pieter H. Hartel and Hugh Glaser}, title = {The Resource Constrained Shortest Path Problem Implemented in a Lazy Functional Language}, journal = {J. Funct. Program.}, volume = {6}, number = {1}, pages = {29--45}, year = {1996}, url = {https://doi.org/10.1017/S0956796800001568}, doi = {10.1017/S0956796800001568}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/HartelG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/HartelFAABBCFGGHHIJKLLLLRSTTTWWW96, author = {Pieter H. Hartel and Marc Feeley and Martin Helmut Alt and Lennart Augustsson and Peter Baumann and Marcel Beemster and Emmanuel Chailloux and Christine H. Flood and Wolfgang Grieskamp and John H. G. van Groningen and Kevin Hammond and Bogumil Hausman and Melody Y. Ivory and Richard E. Jones and Jasper Kamperman and Peter Lee and Xavier Leroy and Rafael Dueire Lins and Sandra Loosemore and Niklas R{\"{o}}jemo and Manuel Serrano and Jean{-}Pierre Talpin and Jon Thackray and Stephen Thomas and Pum Walters and Pierre Weis and Peter Wentworth}, title = {Benchmarking Implementations of Functional Languages with 'Pseudoknot', a Float-Intensive Benchmark}, journal = {J. Funct. Program.}, volume = {6}, number = {4}, pages = {621--655}, year = {1996}, url = {https://doi.org/10.1017/S0956796800001891}, doi = {10.1017/S0956796800001891}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/HartelFAABBCFGGHHIJKLLLLRSTTTWWW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/AlberdaHF96, author = {Marjan I. Alberda and Pieter H. Hartel and Eduard K. de Jong Frz}, title = {Using formal methods to cultivate trust in Smart Card Operating Systems}, booktitle = {Proceedings of the Second Smart Card Research and Advanced Application Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam, The Netherlands}, year = {1996}, timestamp = {Fri, 15 Oct 2004 16:01:14 +0200}, biburl = {https://dblp.org/rec/conf/cardis/AlberdaHF96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/GlaserHF96, author = {Hugh Glaser and Pieter H. Hartel and Eduard K. de Jong Frz}, title = {Structuring and Visualising an IC-card Security Standard}, booktitle = {Proceedings of the Second Smart Card Research and Advanced Application Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam, The Netherlands}, year = {1996}, timestamp = {Fri, 15 Oct 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/GlaserHF96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/HartelQ96, author = {Pieter H. Hartel and Jean{-}Jacques Quisquater}, title = {Introduction to {CARDIS} 1996}, booktitle = {Proceedings of the Second Smart Card Research and Advanced Application Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam, The Netherlands}, year = {1996}, timestamp = {Fri, 15 Oct 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/HartelQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/HartelHLMVH95, author = {Pieter H. Hartel and Rutger F. H. Hofman and Koen Langendoen and Henk L. Muller and Willem G. Vree and Louis O. Hertzberger}, title = {A toolkit for parallel functional programming}, journal = {Concurr. Pract. Exp.}, volume = {7}, number = {8}, pages = {765--793}, year = {1995}, url = {https://doi.org/10.1002/cpe.4330070803}, doi = {10.1002/CPE.4330070803}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/HartelHLMVH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jflp/HaydarlouH95, author = {A. Reza Haydarlou and Pieter H. Hartel}, title = {Thunk Lifting: Reducing Heap Usage in an Implementation of a Lazy Functional Language}, journal = {J. Funct. Log. Program.}, volume = {1995}, number = {1}, year = {1995}, url = {http://danae.uni-muenster.de/lehre/kuchen/JFLP/articles/1995/A95-01/A95-01.html}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jflp/HaydarlouH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/HartelP95, author = {Pieter H. Hartel and Marinus J. Plasmeijer}, title = {Special Issue on State-of-the-Art Applications of Pure Functional Programming Languages}, journal = {J. Funct. Program.}, volume = {5}, number = {3}, pages = {279--281}, year = {1995}, url = {https://doi.org/10.1017/S0956796800001362}, doi = {10.1017/S0956796800001362}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/HartelP95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/VreeH95, author = {Willem G. Vree and Pieter H. Hartel}, title = {Communication Lifting: Fixed Point Computation for Parallelism}, journal = {J. Funct. Program.}, volume = {5}, number = {4}, pages = {549--581}, year = {1995}, url = {https://doi.org/10.1017/S0956796800001477}, doi = {10.1017/S0956796800001477}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/VreeH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcse/HartelH95, author = {Pieter H. Hartel and Louis O. Hertzberger}, title = {Paradigms and laboratories in the core computer science curriculum: an overview}, journal = {{ACM} {SIGCSE} Bull.}, volume = {27}, number = {4}, pages = {13--20}, year = {1995}, url = {https://doi.org/10.1145/216511.216521}, doi = {10.1145/216511.216521}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcse/HartelH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fple/HartelET95, author = {Pieter H. Hartel and Bert van Es and Dick Tromp}, editor = {Pieter H. Hartel and Marinus J. Plasmeijer}, title = {Basic Proof Skills of Computer Science Students}, booktitle = {Functional Programming Languages in Education, First International Symposium, FPLE'95, Nijmegen, The Netherlands, December 4-6, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1022}, pages = {269--287}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60675-0\_50}, doi = {10.1007/3-540-60675-0\_50}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fple/HartelET95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/plilp/McEvoyH95, author = {Hugh McEvoy and Pieter H. Hartel}, editor = {Manuel V. Hermenegildo and S. Doaitse Swierstra}, title = {Local Linear Logic for Locality Consciousness in Multiset Transformation}, booktitle = {Programming Languages: Implementations, Logics and Programs, 7th International Symposium, PLILP'95, Utrecht, The Netherlands, September 20-22, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {982}, pages = {357--379}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0026830}, doi = {10.1007/BFB0026830}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/plilp/McEvoyH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fple/1995, editor = {Pieter H. Hartel and Marinus J. Plasmeijer}, title = {Functional Programming Languages in Education, First International Symposium, FPLE'95, Nijmegen, The Netherlands, December 4-6, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1022}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60675-0}, doi = {10.1007/3-540-60675-0}, isbn = {3-540-60675-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fple/1995.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cl/HartelV94, author = {Pieter H. Hartel and Willem G. Vree}, title = {Experiments wiht Destructive Updates in a Lazy Functional Language}, journal = {Comput. Lang.}, volume = {20}, number = {3}, pages = {177--192}, year = {1994}, url = {https://doi.org/10.1016/0096-0551(94)90003-5}, doi = {10.1016/0096-0551(94)90003-5}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cl/HartelV94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/HartelGW94, author = {Pieter H. Hartel and Hugh Glaser and John M. Wild}, title = {Compilation of Functional Languages using Flow Graph Analysis}, journal = {Softw. Pract. Exp.}, volume = {24}, number = {2}, pages = {127--173}, year = {1994}, url = {https://doi.org/10.1002/spe.4380240202}, doi = {10.1002/SPE.4380240202}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/HartelGW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/BeemsterHHHLLMV93, author = {Marcel Beemster and Pieter H. Hartel and Louis O. Hertzberger and Rutger F. H. Hofman and Koen Langendoen and L. L. Li and R. Milikowski and Willem G. Vree and Hendrik Pieter Barendregt and J. C. Mulder}, title = {Experience with a clustered parallel reduction machine}, journal = {Future Gener. Comput. Syst.}, volume = {9}, number = {3}, pages = {175--200}, year = {1993}, url = {https://doi.org/10.1016/0167-739X(93)90011-D}, doi = {10.1016/0167-739X(93)90011-D}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/BeemsterHHHLLMV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fp/HartelV93, author = {Pieter H. Hartel and Willem G. Vree}, editor = {John T. O'Donnell and Kevin Hammond}, title = {Experiments with destructive updates in a lazy functional language (extended abstract)}, booktitle = {Proceedings of the 1993 Glasgow Workshop on Functional Programming, Ayr, Scotland, UK, July 5-7, 1993}, series = {Workshops in Computing}, pages = {69--82}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/978-1-4471-3236-3\_6}, doi = {10.1007/978-1-4471-3236-3\_6}, timestamp = {Mon, 24 Jun 2019 15:54:14 +0200}, biburl = {https://dblp.org/rec/conf/fp/HartelV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpca/HartelL93, author = {Pieter H. Hartel and Koen Langendoen}, editor = {John Williams}, title = {Benchmarking Implementations of Lazy Functional Languages}, booktitle = {Proceedings of the conference on Functional programming languages and computer architecture, {FPCA} 1993, Copenhagen, Denmark, June 9-11, 1993}, pages = {341--349}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/165180.165230}, doi = {10.1145/165180.165230}, timestamp = {Tue, 06 Nov 2018 11:07:48 +0100}, biburl = {https://dblp.org/rec/conf/fpca/HartelL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cc/LangendoenH92, author = {Koen Langendoen and Pieter H. Hartel}, editor = {Uwe Kastens and Peter Pfahler}, title = {{FCG:} {A} Code Generator for Lazy Functional Languages}, booktitle = {Compiler Construction, 4th International Conference on Compiler Construction, CC'92, Paderborn, Germany, October 5-7, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {641}, pages = {278--296}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-55984-1\_26}, doi = {10.1007/3-540-55984-1\_26}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cc/LangendoenH92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/Hartel91, author = {Pieter H. Hartel}, title = {Performance of Lazy Combinator Graph Reduction}, journal = {Softw. Pract. Exp.}, volume = {21}, number = {3}, pages = {299--329}, year = {1991}, url = {https://doi.org/10.1002/spe.4380210306}, doi = {10.1002/SPE.4380210306}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/Hartel91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stp/Hartel90, author = {Pieter H. Hartel}, title = {A Comparison of Three Garbage Collection Algorithms}, journal = {Struct. Program.}, volume = {11}, number = {3}, pages = {117--128}, year = {1990}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stp/Hartel90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/HartelV88, author = {Pieter H. Hartel and Arthur H. Veen}, title = {Statistics on Graph Reduction of {SASL} Programs}, journal = {Softw. Pract. Exp.}, volume = {18}, number = {3}, pages = {239--253}, year = {1988}, url = {https://doi.org/10.1002/spe.4380180305}, doi = {10.1002/SPE.4380180305}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/HartelV88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wg/Hartel88, author = {Pieter H. Hartel}, editor = {Jan van Leeuwen}, title = {The Average Size of Ordered Binary Subgraphs}, booktitle = {Graph-Theoretic Concepts in Computer Science, 14th International Workshop, {WG} '88, Amsterdam, The Netherlands, June 15-17, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {344}, pages = {327--351}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-50728-0\_55}, doi = {10.1007/3-540-50728-0\_55}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/wg/Hartel88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/BarendregtEPHHV87, author = {Hendrik Pieter Barendregt and Marko C. J. D. van Eekelen and Marinus J. Plasmeijer and Pieter H. Hartel and Louis O. Hertzberger and Willem G. Vree}, title = {The Dutch parallel reduction machine project}, journal = {Future Gener. Comput. Syst.}, volume = {3}, number = {4}, pages = {261--270}, year = {1987}, url = {https://doi.org/10.1016/0167-739X(87)90030-6}, doi = {10.1016/0167-739X(87)90030-6}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/BarendregtEPHHV87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/BosPH83, author = {Jan van den Bos and Marinus J. Plasmeijer and Pieter H. Hartel}, title = {Input-Output Tools: {A} Language Facility for Interactive and Real-Time Systems}, journal = {{IEEE} Trans. Software Eng.}, volume = {9}, number = {3}, pages = {247--259}, year = {1983}, url = {https://doi.org/10.1109/TSE.1983.236734}, doi = {10.1109/TSE.1983.236734}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/BosPH83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.