References of "Mauw, Sjouke 50002343"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailSelective location blinding using hash chains
Lenzini, Gabriele UL; Mauw, Sjouke UL; Pang, Jun UL

in Proc. 19th International Workshop on Security Protocols (2011)

Detailed reference viewed: 101 (0 UL)
Full Text
Peer Reviewed
See detailSelective location blinding using hash chains (transcript of discussion)
Mauw, Sjouke UL

in In B. Christianson et al., editor, Proc. 19th Security Protocols Workshop (2011), 7114

Detailed reference viewed: 52 (0 UL)
Full Text
Peer Reviewed
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proc. 6th International Workshop on Security and Trust Management (2011)

Detailed reference viewed: 71 (1 UL)
Full Text
Peer Reviewed
See detailGame-based verification of multi-party contract signing protocols
Zhang, Ying UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)

Detailed reference viewed: 72 (3 UL)
Full Text
Peer Reviewed
See detailFair Exchange
Dashti, M. Torabi; Mauw, Sjouke UL

in Rosenberg, G. (Ed.) Handbook of Financial Cryptography and Security (2010)

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailFoundations of Attack-Defense Trees
Kordy, Barbara UL; Mauw, Sjouke UL; Radomirovic, Sasa UL et al

in Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (2010)

We introduce and give formal definitions of attack–defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic ... [more ▼]

We introduce and give formal definitions of attack–defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical approaches. We present several semantics for attack–defense trees along with usage scenarios, and we show how to evaluate attributes. [less ▲]

Detailed reference viewed: 72 (3 UL)
Full Text
Peer Reviewed
See detailSecurity protocols for Secret Santa
Mauw, Sjouke UL; Radomirovic, Sasa UL; Ryan, Peter UL

in Proc. 18th Security Protocols Workshop (2010)

Detailed reference viewed: 132 (4 UL)
Full Text
Peer Reviewed
See detailAttack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
Kordy, Barbara UL; Mauw, Sjouke UL; Melissen, Matthijs UL et al

in Proceedings of GameSec 2010 (2010)

Attack-defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack-defense trees and game theory is made explicit. We show ... [more ▼]

Attack-defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack-defense trees and game theory is made explicit. We show that attack-defense trees and binary zero-sum two-player extensive form game have equivalent expressive power when considering satisfiability, in the sense that they can be converted into each other while preserving their outcome and their internal structure. [less ▲]

Detailed reference viewed: 94 (8 UL)
Full Text
Peer Reviewed
See detailSecure ownership and ownership transfer in RFID systems
van Deursen, Ton UL; Mauw, Sjouke UL; Radomirovic, Sasa UL et al

in Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (2009)

Detailed reference viewed: 56 (0 UL)
Full Text
Peer Reviewed
See detailAn algebra for trust dilution and trust fusion
Alcalde, Baptiste UL; Mauw, Sjouke UL

in Proc. 7th Workshop on Formal Aspects in Security and Trust (2009)

Detailed reference viewed: 49 (0 UL)
Full Text
Peer Reviewed
See detailMeasuring voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)

Detailed reference viewed: 61 (2 UL)
Full Text
Peer Reviewed
See detailA formal framework for quantifying voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Journal of Algorithms in Cognition, Informatics and Logic (2009)

Detailed reference viewed: 62 (2 UL)
Full Text
Peer Reviewed
See detailDiscovering the core security requirements of DRM systems by means of objective trees
Jonker, Hugo UL; Mauw, Sjouke UL

in Handbook of Research on Secure Multimedia Distribution (2009)

Detailed reference viewed: 46 (0 UL)
Full Text
Peer Reviewed
See detailTowards a decision model based on trust and security risk management. In Ljiljana Brankovic and Willy Susilo
Alcalde, Baptiste UL; Dubois, Eric; Mauw, Sjouke UL et al

in Seventh Australasian Information Security Conference (AISC 2009) (2009)

Detailed reference viewed: 51 (0 UL)
Full Text
Peer Reviewed
See detailTowards a Decision Model Based on Trust and Security Risk Management
Alcalde, Baptiste UL; Dubois, E.; Mauw, Sjouke UL et al

in Proc. 7th Australasian Information Security Conference - AISC'09 (2009)

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailMinimal message complexity of asynchronous multi-party contract signing
Mauw, Sjouke UL; Radomirovic, Sasa UL; Dashti, M. Torabi

in Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09) (2009)

Detailed reference viewed: 55 (0 UL)
Full Text
Peer Reviewed
See detailUntraceability of RFID Protocols
van Deursen, Ton UL; Mauw, Sjouke UL; Radomirovic, Sasa UL

in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (2008)

Detailed reference viewed: 66 (0 UL)
Full Text
Peer Reviewed
See detailChosen-name attacks: An overlooked class of type-flaw attacks
Ceelen, Pieter UL; Mauw, Sjouke UL; Radomirovic, Sasa UL

in Electronic Notes in Theoretical Computer Science (2008), 197(2), 31-43

In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all ... [more ▼]

In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all significant protocol verification frameworks based on formal methods. We identify and classify new type-flaw attacks arising from this capability. Several examples of protocols that are vulnerable to this type of attack are given, including Lowe’s modification of KSL. The consequences for automatic verification tools are discussed. [less ▲]

Detailed reference viewed: 75 (0 UL)
Peer Reviewed
See detailSpecial issue on Security and Trust
Mauw, Sjouke UL; Massacci, F.; Piessens, F.

in Science of Computer Programming (2008), 74(1-2), 164

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailRights Management for Role-Based Access Control
Bouwman, B.; Mauw, Sjouke UL; Petkovic, M.

in Fifth Annual IEEE Consumer Communications & Networking Conference 2008 (CCNC'08) (2008)

Detailed reference viewed: 72 (0 UL)