References of "Mauw, Sjouke 50002343"
     in
Bookmark and Share    
Full Text
See detailPublic Key Infrastructure
Mjølsnes, Stig Fr.; Mauw, Sjouke UL; Katsikas, Sokratis K.

Book published by Springer (2008)

Detailed reference viewed: 60 (0 UL)
Full Text
Peer Reviewed
See detailA framework for compositional verification of security protocols
Andova, S.; Cremers, C. J. F.; Gjøsteen, K. et al

in Information & Computation (2008), 206(2-4), 425-459

Detailed reference viewed: 56 (0 UL)
Full Text
Peer Reviewed
See detailA Certified Email Protocol Using Key Chains
Cederquist, J.; Dashti, M. Torabi; Mauw, Sjouke UL

in Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01 (AINAW'07) (2007)

Detailed reference viewed: 70 (0 UL)
Full Text
Peer Reviewed
See detailData anonymity in the FOO voting scheme
Mauw, Sjouke UL; Verschuren, J. H. S.; Vink, E. P. De

in Electronic Notes in Theoretical Computer Science (2007), 168

Detailed reference viewed: 67 (0 UL)
Full Text
Peer Reviewed
See detailInjective Synchronisation: an extension of the authentication hierarchy
Cremers, C. J. F.; Mauw, Sjouke UL; Vink, E. P. De

in Theoretical Computer Science (2006), 367(1-2), 139-161

Detailed reference viewed: 75 (0 UL)
Full Text
Peer Reviewed
See detailOperational semantics for MSC'96
Mauw, Sjouke UL; Reniers, M. A.

in Computer Networks & ISDN Systems (1999), 31(17), 1785-1799

Detailed reference viewed: 78 (3 UL)
Full Text
Peer Reviewed
See detailDesign and analysis of dynamic leader election protocols in broadcast networks
Brunekreef, J. J.; Katoen, J.-P.; Koymans, R. et al

in Distributed Computing (1996), 9(4), 157-171

Detailed reference viewed: 54 (0 UL)
Full Text
Peer Reviewed
See detailA process specification formalism
Mauw, Sjouke UL; Veltink, G. J.

in Fundamenta Informaticae (1990), XIII

Detailed reference viewed: 34 (0 UL)