default search action
Pieter H. Hartel
Person information
- affiliation: University of Twente, Enschede, Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j51]Susanne Barth, Dan Ionita, Pieter H. Hartel:
Understanding Online Privacy - A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines. ACM Comput. Surv. 55(3): 63:1-63:37 (2023) - [i12]Pieter H. Hartel, Eljo Haspels, Mark van Staalduinen, Octavio Texeira:
DarkDiff: Explainable web page similarity of TOR onion sites. CoRR abs/2308.12134 (2023) - 2021
- [j50]Susanne Barth, Dan Ionita, Menno D. T. de Jong, Pieter H. Hartel, Marianne Junger:
Privacy Rating: A User-Centered Approach for Visualizing Data Handling Practices of Online Services. IEEE Trans. Prof. Commun. 64(4): 354-373 (2021) - [i11]Pieter H. Hartel, Rolf van Wegberg, Mark van Staalduinen:
Investigating sentence severity with judicial open data - A case study on sentencing high-tech crime in the Dutch criminal justice system. CoRR abs/2104.04486 (2021) - [i10]Pieter H. Hartel, Rolf van Wegberg:
Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases. CoRR abs/2104.06444 (2021) - 2020
- [c100]Ivan Homoliak, Dominik Breitenbacher, Ondrej Hujnak, Pieter H. Hartel, Alexander Binder, Pawel Szalachowski:
SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. AFT 2020: 145-162 - [c99]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Thomas Hupperich, Maarten H. Everts, Reza Rafati, Willem Jonker, Pieter H. Hartel, Andreas Peter:
HeadPrint: detecting anomalous communications through header-based application fingerprinting. SAC 2020: 1696-1705 - [c98]Pieter H. Hartel, Richard Schumi:
Mutation Testing of Smart Contracts at Scale. TAP@STAF 2020: 23-42
2010 – 2019
- 2019
- [j49]Pieter H. Hartel, Ivan Homoliak, Daniël Reijsbergen:
An Empirical Study Into the Success of Listed Smart Contracts in Ethereum. IEEE Access 7: 177539-177555 (2019) - [j48]Susanne Barth, Pieter H. Hartel, Marianne Junger, Lorena Montoya:
Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of \"Thinking Like a Thief\". IEEE Secur. Priv. 17(3): 8-16 (2019) - [j47]Susanne Barth, Menno D. T. de Jong, Marianne Junger, Pieter H. Hartel, Janina C. Roppelt:
Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics Informatics 41: 55-69 (2019) - [c97]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Maarten H. Everts, Willem Jonker, Pieter H. Hartel, Andreas Peter:
Victim-Aware Adaptive Covert Channels. SecureComm (1) 2019: 450-471 - [i9]Pieter H. Hartel, Mark van Staalduinen:
Truffle tests for free - Replaying Ethereum smart contracts for transparency. CoRR abs/1907.09208 (2019) - [i8]Pieter H. Hartel, Ivan Homoliak, Daniël Reijsbergen:
An Empirical Study into the Success of Listed Smart Contracts in Ethereum. CoRR abs/1908.11597 (2019) - [i7]Pieter H. Hartel, Richard Schumi:
Gas limit aware mutation testing of smart contracts at scale. CoRR abs/1909.12563 (2019) - 2018
- [c96]Vincent Chia, Pieter H. Hartel, Qingze Hum, Sebastian Ma, Georgios Piliouras, Daniël Reijsbergen, Mark van Staalduinen, Pawel Szalachowski:
Rethinking Blockchain Security: Position Paper. iThings/GreenCom/CPSCom/SmartData 2018: 1273-1280 - [i6]Vincent Chia, Pieter H. Hartel, Qingze Hum, Sebastian Ma, Georgios Piliouras, Daniël Reijsbergen, Mark van Staalduinen, Pawel Szalachowski:
Rethinking Blockchain Security: Position Paper. CoRR abs/1806.04358 (2018) - 2017
- [j46]Jan-Willem Bullee, Lorena Montoya, Marianne Junger, Pieter H. Hartel:
Spear phishing in organisations explained. Inf. Comput. Secur. 25(5): 593-613 (2017) - [c95]Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter:
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. ACSAC 2017: 373-386 - [c94]Marianne Junger, Lorena Montoya, Pieter H. Hartel, Maliheh Heydari:
Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe. CyberSA 2017: 1-8 - [c93]Elmer Lastdrager, Inés Carvajal Gallardo, Pieter H. Hartel, Marianne Junger:
How Effective is Anti-Phishing Training for Children? SOUPS 2017: 229-239 - 2016
- [c92]Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel:
Reliably determining data leakage in the presence of strong attackers. ACSAC 2016: 484-495 - [c91]Jan-Willem Bullee, Lorena Montoya, Marianne Junger, Pieter H. Hartel:
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. SG-CRC 2016: 107-114 - 2015
- [c90]Bence Gabor Bakondi, Andreas Peter, Maarten H. Everts, Pieter H. Hartel, Willem Jonker:
Publicly Verifiable Private Aggregation of Time-Series Data. ARES 2015: 50-59 - [c89]Jan-Willem Bullee, Lorena Montoya, Wolter Pieters, Marianne Junger, Pieter H. Hartel:
Regression Nodes: Extending Attack Trees with Data from Social Sciences. STAST 2015: 17-23 - 2014
- [j45]Christoph Bösch, Pieter H. Hartel, Willem Jonker, Andreas Peter:
A Survey of Provably Secure Searchable Encryption. ACM Comput. Surv. 47(2): 18:1-18:51 (2014) - [j44]Zheng Gong, Pieter H. Hartel, Svetla Nikova, Shaohua Tang, Bo Zhu:
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks. J. Comput. Sci. Technol. 29(1): 53-68 (2014) - [c88]Dina Hadziosmanovic, Robin Sommer, Emmanuele Zambon, Pieter H. Hartel:
Through the eye of the PLC: semantic security monitoring for industrial processes. ACSAC 2014: 126-135 - [c87]Christoph Bösch, Andreas Peter, Pieter H. Hartel, Willem Jonker:
SOFIR: Securely outsourced Forensic image recognition. ICASSP 2014: 2694-2698 - [c86]Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter H. Hartel, Willem Jonker:
Distributed Searchable Symmetric Encryption. PST 2014: 330-337 - 2013
- [c85]Lorena Montoya, Marianne Junger, Pieter H. Hartel:
How "Digital" is Traditional Crime? EISIC 2013: 31-37 - [c84]Arjan Jeckmans, Andreas Peter, Pieter H. Hartel:
Efficient Privacy-Enhanced Familiarity-Based Recommender System. ESORICS 2013: 400-417 - [c83]Eleftheria Makri, Maarten H. Everts, Sebastiaan de Hoogh, Andreas Peter, Harm op den Akker, Pieter H. Hartel, Willem Jonker:
Privacy-Preserving Verification of Clinical Research. Sicherheit 2013: 481-500 - [c82]Elmer Lastdrager, Lorena Montoya, Pieter H. Hartel, Marianne Junger:
Applying the Lost-Letter Technique to Assess IT Risk Behaviour. STAST 2013: 2-9 - [p1]Arjan J. P. Jeckmans, Michael Beye, Zekeriya Erkin, Pieter H. Hartel, Reginald L. Lagendijk, Qiang Tang:
Privacy in Recommender Systems. Social Media Retrieval 2013: 263-281 - [e3]Eric A. M. Luiijf, Pieter H. Hartel:
Critical Information Infrastructures Security - 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8328, Springer 2013, ISBN 978-3-319-03963-3 [contents] - 2012
- [j43]Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel:
A log mining approach for process monitoring in SCADA. Int. J. Inf. Sec. 11(4): 231-251 (2012) - [j42]Pieter H. Hartel, Henk L. Muller:
Simple algebraic data types for C. Softw. Pract. Exp. 42(2): 191-210 (2012) - [c81]Dina Hadziosmanovic, Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel:
Challenges and opportunities in securing industrial control systems. COMPENG 2012: 1-6 - [c80]Arjan Jeckmans, Qiang Tang, Pieter H. Hartel:
Privacy-preserving collaborative filtering based on horizontally partitioned dataset. CTS 2012: 439-446 - [c79]Christoph Bösch, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Selective Document Retrieval from Encrypted Database. ISC 2012: 224-241 - 2011
- [j41]Yee Wei Law, Giorgi Moniava, Zheng Gong, Pieter H. Hartel, Marimuthu Palaniswami:
KALwEN: a new practical and interoperable key management scheme for body sensor networks. Secur. Commun. Networks 4(11): 1309-1329 (2011) - [j40]Emmanuele Zambon, Sandro Etalle, Roel J. Wieringa, Pieter H. Hartel:
Model-based qualitative risk assessment for availability of IT infrastructures. Softw. Syst. Model. 10(4): 553-580 (2011) - [c78]Luan Ibraimi, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Public-Key Encryption with Delegated Search. ACNS 2011: 532-549 - [c77]Arjan Jeckmans, Qiang Tang, Pieter H. Hartel:
Privacy-preserving profile matching using the social graph. CASoN 2011: 42-47 - [c76]Arjan Jeckmans, Qiang Tang, Pieter H. Hartel:
Poster: privacy-preserving profile similarity computation in online social networks. CCS 2011: 793-796 - [c75]Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel, Sandro Etalle:
MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. EC2ND 2011: 41-48 - [c74]Saeed Sedghi, Pieter H. Hartel, Willem Jonker, Svetla Nikova:
Privacy Enhanced Access Control by Means of Policy Blinding. ISPEC 2011: 108-122 - [c73]Christoph Bösch, Richard Brinkman, Pieter H. Hartel, Willem Jonker:
Conjunctive Wildcard Search over Encrypted Data. Secure Data Management 2011: 114-127 - [c72]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel:
Training students to steal: a practical assignment in computer security education. SIGCSE 2011: 21-26 - 2010
- [j39]Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. Int. J. Comput. Model. Algorithms Medicine 1(2): 1-21 (2010) - [j38]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis:
Embedding renewable cryptographic keys into noisy data. Int. J. Inf. Sec. 9(3): 193-208 (2010) - [j37]Mohammed G. Khatib, Pieter H. Hartel:
Optimizing MEMS-based storage devices for mobile battery-powered systems. ACM Trans. Storage 6(1): 1:1-1:37 (2010) - [j36]Mohammed G. Khatib, Pieter H. Hartel, Hylke W. van Dijk:
Energy-Efficient Streaming Using Non-volatile Memory. J. Signal Process. Syst. 60(2): 149-168 (2010) - [c71]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel:
Two methodologies for physical penetration testing using social engineering. ACSAC 2010: 399-408 - [c70]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel:
Laptop theft: a case study on the effectiveness of security mechanisms in open organizations. CCS 2010: 666-668 - [c69]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel:
Effectiveness of Physical, Social and Digital Mechanisms against Laptop Theft in Open Organizations. GreenCom/CPSCom 2010: 727-732 - [c68]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel:
Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain. ARSPA-WITS 2010: 112-129 - [c67]Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel:
MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. RAID 2010: 500-501 - [c66]Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Searching Keywords with Wildcards on Encrypted Data. SCN 2010: 138-153 - [c65]Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Computationally Efficient Searchable Symmetric Encryption. Secure Data Management 2010: 87-100
2000 – 2009
- 2009
- [j35]Ileana Buhan, Bas Boom, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis:
Secure pairing with biometrics. Int. J. Secur. Networks 4(1/2): 27-42 (2009) - [j34]Yee Wei Law, Marimuthu Palaniswami, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans. Sens. Networks 5(1): 6:1-6:38 (2009) - [c64]Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zhu:
Towards Secure and Practical MACs for Body Sensor Networks. INDOCRYPT 2009: 182-198 - [c63]Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. ISPEC 2009: 1-12 - [c62]Mohammed G. Khatib, Pieter H. Hartel:
Policies for probe-wear leveling in MEMS-based storage devices. MASCOTS 2009: 1-10 - [c61]Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel:
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. RAID 2009: 1-20 - [c60]Luan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. WISA 2009: 309-323 - [i5]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel:
Fuzzy extractors for continuous distributions. IACR Cryptol. ePrint Arch. 2009: 545 (2009) - 2008
- [j33]Raluca Marin-Perianu, Hans Scholten, Paul J. M. Havinga, Pieter H. Hartel:
Cluster-based service discovery for heterogeneous wireless sensor networks. Int. J. Parallel Emergent Distributed Syst. 23(4): 325-346 (2008) - [c59]Mohammed G. Khatib, Pieter H. Hartel:
Power management of MEMS-based storage devices for mobile systems. CASES 2008: 245-254 - [c58]Qiang Tang, Pieter H. Hartel, Willem Jonker:
Inter-domain Identity-Based Proxy Re-encryption. Inscrypt 2008: 332-347 - [c57]Mohammed G. Khatib, Ethan L. Miller, Pieter H. Hartel:
Workload-based configuration of MEMS-based storage devices for mobile systems. EMSOFT 2008: 41-50 - [c56]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel:
Controlling leakage of biometric information using dithering. EUSIPCO 2008: 1-5 - [c55]Pieter H. Hartel, Leon Abelmann, Mohammed G. Khatib:
Towards Tamper-evident Storage on Patterned Media. FAST 2008: 283-296 - [c54]Pieter H. Hartel, Theo C. Ruys, Marc C. W. Geilen:
Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow. FMCAD 2008: 1-10 - [c53]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis:
Embedding Renewable Cryptographic Keys into Continuous Noisy Data. ICICS 2008: 294-310 - [c52]Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Towards an Information Theoretic Analysis of Searchable Encryption. ICICS 2008: 345-360 - [c51]Raluca Marin-Perianu, Johann L. Hurink, Pieter H. Hartel:
A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks. ISPA 2008: 863-870 - [c50]Trajce Dimkov, Qiang Tang, Pieter H. Hartel:
On the Inability of Existing Security Models to Cope with Data Mobility in Dynamic Organizations. MODSEC@MoDELS 2008 - [c49]Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker:
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. Secure Data Management 2008: 185-198 - 2007
- [j32]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed analysis of security protocols. J. Comput. Secur. 15(6): 619-645 (2007) - [c48]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis:
Fuzzy extractors for continuous distributions. AsiaCCS 2007: 353-355 - [c47]Mohammed G. Khatib, Berend-Jan van der Zwaag, Pieter H. Hartel, Gerard J. M. Smit:
Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. ESTIMedia 2007: 7-12 - [c46]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis:
Feeling Is Believing: A Secure Template Exchange Protocol. ICB 2007: 897-906 - 2006
- [j31]Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, Andrew Tokmakoff:
LicenseScript: a logical language for digital rights management. Ann. des Télécommunications 61(3-4): 284-331 (2006) - [j30]Yee Wei Law, Jeroen Doumen, Pieter H. Hartel:
Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sens. Networks 2(1): 65-93 (2006) - [c45]Ileana Buhan, Asker M. Bazen, Pieter H. Hartel, Raymond N. J. Veldhuis:
A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems. ICB 2006: 728-736 - [c44]Vasughi Sundramoorthy, Pieter H. Hartel, Hans Scholten:
On consistency maintenance in service discovery. IPDPS 2006 - [c43]Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon:
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. IWIA 2006: 144-156 - [c42]Raluca Marin-Perianu, Hans Scholten, Paul J. M. Havinga, Pieter H. Hartel:
Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. LCN 2006: 931-938 - 2005
- [c41]Yee Wei Law, Pieter H. Hartel, Jerry den Hartog, Paul J. M. Havinga:
Link-layer jamming attacks on S-MAC. EWSN 2005: 217-225 - [c40]Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Rieks Joosten, Geert Kleinhuis:
Service Brokerage in Prolog. ICEIS (3) 2005: 409-412 - [c39]Vasughi Sundramoorthy, Pieter H. Hartel, Jerry den Hartog, Hans Scholten, C. Tan:
Functional Principles of Registry-based Service Discovery. LCN 2005: 209-217 - [c38]Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. SASN 2005: 76-88 - [c37]Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus:
StreamTo: Streaming Content using a Tamper-Resistant Token. SEC 2005: 601-612 - [c36]Pieter H. Hartel:
A Trace Semantics for Positive Core XPath. TIME 2005: 103-112 - [c35]Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications. STM 2005: 113-130 - [i4]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed Analysis of Security Protocols. CoRR abs/cs/0503036 (2005) - [i3]Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications. CoRR abs/cs/0510061 (2005) - [i2]Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter H. Hartel:
Poseidon: a 2-tier Anomaly-based Intrusion Detection System. CoRR abs/cs/0511043 (2005) - 2004
- [j29]Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Efficient Tree Search in Encrypted Data. Inf. Secur. J. A Glob. Perspect. 13(3): 14-21 (2004) - [j28]Pieter H. Hartel, Henk L. Muller, Hugh Glaser:
The Functional "C" experience. J. Funct. Program. 14(2): 129-135 (2004) - [j27]Ton Kalker, Dick H. J. Epema, Pieter H. Hartel, Reginald L. Lagendijk, Maarten van Steen:
Music2Share - Copyright-Compliant Music Sharing in P2P Systems. Proc. IEEE 92(6): 961-970 (2004) - [c34]Pieter H. Hartel, Pascal van Eck, Sandro Etalle, Roel J. Wieringa:
Modelling Mobility Aspects of Security Policies. CASSIS 2004: 172-191 - [c33]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed model checking of security protocols. FMSE 2004: 23-32 - [c32]Yee Wei Law, Jeroen Doumen, Pieter H. Hartel:
Benchmarking block ciphers for wireless sensor networks. MASS 2004: 447-456 - [c31]Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Efficient Tree Search in Encrypted Data. WOSIS 2004: 126-135 - [c30]Raymond N. J. Veldhuis, Asker M. Bazen, Joost A. Kauffman, Pieter H. Hartel:
Biometric verification based on grip-pattern recognition. Security, Steganography, and Watermarking of Multimedia Contents 2004: 634-641 - [c29]Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin:
License Protection with a Tamper-Resistant Token. WISA 2004: 223-237 - [i1]Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter H. Hartel:
A Trace Logic for Local Security Properties. CoRR cs.CR/0411010 (2004) - 2003
- [c28]Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Yee Wei Law:
Approximating Fair Use in LicenseScript. ICADL 2003: 432-443 - [c27]Yee Wei Law, Ricardo Corin, Sandro Etalle, Pieter H. Hartel:
A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. PWC 2003: 27-39 - [c26]Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel:
Comparing Logic-Based and XML-Based Rights Expression Languages. OTM Workshops 2003: 779-792 - [c25]Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel:
Secure Audit Logging with Tamper-Resistant Hardware. SEC 2003: 73-84