References of "Mauw, Sjouke 50002343"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailTowards a Decision Model Based on Trust and Security Risk Management
Alcalde, Baptiste UL; Dubois, E.; Mauw, Sjouke UL et al

in Proc. 7th Australasian Information Security Conference - AISC'09 (2009)

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailMeasuring voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)

Detailed reference viewed: 78 (2 UL)
Full Text
Peer Reviewed
See detailUntraceability of RFID Protocols
van Deursen, Ton UL; Mauw, Sjouke UL; Radomirovic, Sasa UL

in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (2008)

Detailed reference viewed: 77 (0 UL)
Full Text
Peer Reviewed
See detailRights Management for Role-Based Access Control
Bouwman, B.; Mauw, Sjouke UL; Petkovic, M.

in Fifth Annual IEEE Consumer Communications & Networking Conference 2008 (CCNC'08) (2008)

Detailed reference viewed: 81 (0 UL)
Peer Reviewed
See detailSpecial issue on Security and Trust
Mauw, Sjouke UL; Massacci, F.; Piessens, F.

in Science of Computer Programming (2008), 74(1-2), 164

Detailed reference viewed: 37 (1 UL)
Full Text
Peer Reviewed
See detailA framework for compositional verification of security protocols
Andova, S.; Cremers, C. J. F.; Gjøsteen, K. et al

in Information & Computation (2008), 206(2-4), 425-459

Detailed reference viewed: 64 (0 UL)
Full Text
See detailPublic Key Infrastructure
Mjølsnes, Stig Fr.; Mauw, Sjouke UL; Katsikas, Sokratis K.

Book published by Springer (2008)

Detailed reference viewed: 75 (0 UL)
Full Text
Peer Reviewed
See detailChosen-name attacks: An overlooked class of type-flaw attacks
Ceelen, Pieter UL; Mauw, Sjouke UL; Radomirovic, Sasa UL

in Electronic Notes in Theoretical Computer Science (2008), 197(2), 31-43

In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all ... [more ▼]

In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all significant protocol verification frameworks based on formal methods. We identify and classify new type-flaw attacks arising from this capability. Several examples of protocols that are vulnerable to this type of attack are given, including Lowe’s modification of KSL. The consequences for automatic verification tools are discussed. [less ▲]

Detailed reference viewed: 87 (0 UL)
Full Text
Peer Reviewed
See detailA Certified Email Protocol Using Key Chains
Cederquist, J.; Dashti, M. Torabi; Mauw, Sjouke UL

in Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01 (AINAW'07) (2007)

Detailed reference viewed: 81 (0 UL)
Full Text
Peer Reviewed
See detailData anonymity in the FOO voting scheme
Mauw, Sjouke UL; Verschuren, J. H. S.; Vink, E. P. De

in Electronic Notes in Theoretical Computer Science (2007), 168

Detailed reference viewed: 80 (0 UL)
Full Text
Peer Reviewed
See detailInjective Synchronisation: an extension of the authentication hierarchy
Cremers, C. J. F.; Mauw, Sjouke UL; Vink, E. P. De

in Theoretical Computer Science (2006), 367(1-2), 139-161

Detailed reference viewed: 88 (0 UL)
Full Text
Peer Reviewed
See detailOperational semantics for MSC'96
Mauw, Sjouke UL; Reniers, M. A.

in Computer Networks & ISDN Systems (1999), 31(17), 1785-1799

Detailed reference viewed: 89 (3 UL)
Full Text
Peer Reviewed
See detailDesign and analysis of dynamic leader election protocols in broadcast networks
Brunekreef, J. J.; Katoen, J.-P.; Koymans, R. et al

in Distributed Computing (1996), 9(4), 157-171

Detailed reference viewed: 66 (0 UL)
Full Text
Peer Reviewed
See detailA process specification formalism
Mauw, Sjouke UL; Veltink, G. J.

in Fundamenta Informaticae (1990), XIII

Detailed reference viewed: 38 (0 UL)