References of "Mauw, Sjouke 50002343"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Journal of Computer Security (2012), 20(4), 437-459

Detailed reference viewed: 76 (6 UL)
Full Text
Peer Reviewed
See detailImplementation and Validation of a Localisation Assurance Service Provider
Chen, Xihui UL; Harpes, Carlo; Lenzini, Gabriele UL et al

in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with ... [more ▼]

Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with the integrity and authenticity of satellite signals: they can delay signals, or re-broadcast signals. Positioning is thus compromised and location-based services are at risk.This paper describes a solution to mitigate this risk. It is a trusted third-party Localisation Assurance service that informs location-based services providers up to which level a location claimed by client can be trusted. It runs several tests over the localisation data of client receivers and certifies the level of assurance of locations. An assurance level expresses the amount of trust the third-party has that a receiver's location is calculated from integral and authentic satellite signals. [less ▲]

Detailed reference viewed: 136 (6 UL)
Full Text
Peer Reviewed
See detailComparative analysis of clustering protocols with probabilistic model checking
Li, Qian UL; Schaffer, Peter UL; Pang, Jun UL et al

in Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (2012)

Detailed reference viewed: 95 (3 UL)
Full Text
Peer Reviewed
See detailA group signature based electronic toll pricing system
Chen, Xihui UL; Lenzini, Gabriele UL; Mauw, Sjouke UL et al

in Proc. 7th International Conference on Availability, Reliability and Security (2012)

Detailed reference viewed: 93 (2 UL)
Full Text
Peer Reviewed
See detailmCarve: Carving attributed dump sets
van Deursen, Ton UL; Mauw, Sjouke UL; Radomirovic, Sasa UL

in Abstract book of 20th USENIX Security Symposium (2011)

Detailed reference viewed: 22 (1 UL)
Full Text
Peer Reviewed
See detailSelective location blinding using hash chains (transcript of discussion)
Mauw, Sjouke UL

in In B. Christianson et al., editor, Proc. 19th Security Protocols Workshop (2011), 7114

Detailed reference viewed: 65 (0 UL)
Full Text
Peer Reviewed
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proc. 6th International Workshop on Security and Trust Management (2011)

Detailed reference viewed: 89 (1 UL)
Full Text
Peer Reviewed
See detailSelective location blinding using hash chains
Lenzini, Gabriele UL; Mauw, Sjouke UL; Pang, Jun UL

in Proc. 19th International Workshop on Security Protocols (2011)

Detailed reference viewed: 122 (5 UL)
Full Text
Peer Reviewed
See detailA study of the PDGF signaling pathway with PRISM
Yuan, Qixia UL; Pang, Jun UL; Mauw, Sjouke UL et al

in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67

Detailed reference viewed: 117 (11 UL)
Full Text
Peer Reviewed
See detailAttack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
Kordy, Barbara UL; Mauw, Sjouke UL; Melissen, Matthijs UL et al

in Proceedings of GameSec 2010 (2010)

Attack-defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack-defense trees and game theory is made explicit. We show ... [more ▼]

Attack-defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack-defense trees and game theory is made explicit. We show that attack-defense trees and binary zero-sum two-player extensive form game have equivalent expressive power when considering satisfiability, in the sense that they can be converted into each other while preserving their outcome and their internal structure. [less ▲]

Detailed reference viewed: 111 (8 UL)
Full Text
Peer Reviewed
See detailFoundations of Attack-Defense Trees
Kordy, Barbara UL; Mauw, Sjouke UL; Radomirovic, Sasa UL et al

in Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (2010)

We introduce and give formal definitions of attack–defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic ... [more ▼]

We introduce and give formal definitions of attack–defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical approaches. We present several semantics for attack–defense trees along with usage scenarios, and we show how to evaluate attributes. [less ▲]

Detailed reference viewed: 84 (3 UL)
Full Text
Peer Reviewed
See detailGame-based verification of multi-party contract signing protocols
Zhang, Ying UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)

Detailed reference viewed: 83 (3 UL)
Full Text
Peer Reviewed
See detailFair Exchange
Dashti, M. Torabi; Mauw, Sjouke UL

in Rosenberg, G. (Ed.) Handbook of Financial Cryptography and Security (2010)

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailSecurity protocols for Secret Santa
Mauw, Sjouke UL; Radomirovic, Sasa UL; Ryan, Peter UL

in Proc. 18th Security Protocols Workshop (2010)

Detailed reference viewed: 153 (5 UL)
Full Text
Peer Reviewed
See detailTowards a decision model based on trust and security risk management. In Ljiljana Brankovic and Willy Susilo
Alcalde, Baptiste UL; Dubois, Eric; Mauw, Sjouke UL et al

in Seventh Australasian Information Security Conference (AISC 2009) (2009)

Detailed reference viewed: 56 (0 UL)
Full Text
Peer Reviewed
See detailSecure ownership and ownership transfer in RFID systems
van Deursen, Ton UL; Mauw, Sjouke UL; Radomirovic, Sasa UL et al

in Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (2009)

Detailed reference viewed: 65 (0 UL)
Full Text
Peer Reviewed
See detailMinimal message complexity of asynchronous multi-party contract signing
Mauw, Sjouke UL; Radomirovic, Sasa UL; Dashti, M. Torabi

in Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09) (2009)

Detailed reference viewed: 67 (0 UL)
Full Text
Peer Reviewed
See detailA formal framework for quantifying voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Journal of Algorithms in Cognition, Informatics and Logic (2009)

Detailed reference viewed: 74 (2 UL)
Full Text
Peer Reviewed
See detailAn algebra for trust dilution and trust fusion
Alcalde, Baptiste UL; Mauw, Sjouke UL

in Proc. 7th Workshop on Formal Aspects in Security and Trust (2009)

Detailed reference viewed: 58 (0 UL)
Full Text
Peer Reviewed
See detailDiscovering the core security requirements of DRM systems by means of objective trees
Jonker, Hugo UL; Mauw, Sjouke UL

in Handbook of Research on Secure Multimedia Distribution (2009)

Detailed reference viewed: 57 (0 UL)