Andova S Cremers C Gjøsteen K Mauw S Mjølsnes SF Radomirovic S A framework for compositional verification of security protocols Inf. Comput. 2008 206 2–4 425 459 2401799 10.1016/J.IC.2007.07.002
Baloglu, S., Bursuc, S., Mauw, S., Pang, J.: Election verifiability revisited: automated security proofs and attacks on Helios and Belenios. In: Proceedings of the 34th IEEE Computer Security Foundations Symposium, pp. 1–15. IEEE Computer Society (2021)
Baloglu, S., Bursuc, S., Mauw, S., Pang, J.: Election Verifiability in receipt-free voting protocols. In: Proceedings of the 36th IEEE Computer Security Foundations Symposium, pp. 63–78. IEEE Computer Society (2023)
Baloglu, S., Bursuc, S., Mauw, S., Pang, J.: Formal verification and solutions for Estonian e-voting. In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 728–742. ACM Press (2024)
Baloglu, S.: Formal verification of verifiability in E-Voting Protocols. Ph.D. thesis, University of Luxembourg, Luxembourg City, Luxembourg (2023). http://orbilu.uni.lu/handle/10993/55700
Bos, V., van Deursen, T., Kordy, P., Mauw, S.: A LaTeX macro package for Message Sequence Charts (2022). https://ctan.org/ctan-ann/pkg/msc
Buldas, A., Gadyatskaya, O., Lenin, A., Mauw, S., Trujillo-Rasua, R.: Attribute evaluation on attack trees with incomplete information. Comput. Secur. 88 (2020)
Cremers, C., Mauw, S.: Operational semantics of security protocols. In: Scenarios: Models, Transformations and Tools, International Workshop. Lecture Notes in Computer Science, vol. 3466, pp. 66–89. Springer (2003). https://doi.org/10.1007/11495628_4
Cremers, C., Mauw, S.: Operational Semantics and Verification of Security Protocols. Information Security and Cryptography, Springer (2012). https://doi.org/10.1007/978-3-540-78636-8
Cremers CJF Gupta A Malik S The ScyTher tool: verification, falsification, and analysis of security protocols Computer Aided Verification 2008 Heidelberg Springer 414 418 10.1007/978-3-540-70545-1_38 5123
van Deursen T Mauw S Radomirović S Onieva JA Sauveron D Chaumette S Gollmann D Markantonakis K Untraceability of RFID protocols Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks 2008 Heidelberg Springer 1 15 10.1007/978-3-540-79966-5_1 5019
van Deursen, T., Mauw, S., Radomirovic, S.: mcarve: carving attributed dump sets. In: 20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings. USENIX Association (2011). http://static.usenix.org/events/sec11/tech/full_papers/Deursen.pdf
van Deursen T Mauw S Radomirović S Vullers P Backes M Ning P Secure ownership and ownership transfer in RFID systems Computer Security – ESORICS 2009 2009 Heidelberg Springer 637 654 10.1007/978-3-642-04444-1_39 5789
Engels, A., Mauw, S.: Why men (and octopuses) cannot juggle a four ball cascade. Comput. Sci. Reports 9914, 10 (1999)
Engels, A., Mauw, S., Reniers, M.A.: A hierarchy of communication models for message sequence charts. In: Proceedings of Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE X) and Protocol Specification, Testing and Verification (PSTV XVII). IFIP Conference Proceedings, vol. 107, pp. 75–90. Chapman & Hall (1997)
Filimonov I Horne R Mauw S Smith Z Sako K Schneider S Ryan PYA Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity Computer Security – ESORICS 2019 2019 Cham Springer 577 594 10.1007/978-3-030-29959-0_28 11735
Gadyatskaya O Jhawar R Kordy P Lounis K Mauw S Trujillo-Rasua R Agha G Van Houdt B Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0 Quantitative Evaluation of Systems 2016 Cham Springer 159 162 10.1007/978-3-319-43425-4_10 9826
Horne R Mauw S Tiu A Semantics for specialising attack trees based on linear logic Fund. Inform. 2017 153 1–2 57 86 3668751
Jonker HL Mauw S Pang J Privacy and verifiability in voting systems: methods, developments and trends Comput. Sci. Rev. 2013 10 1 30 10.1016/j.cosrev.2013.08.002
Jonker, H.L.: Security Matters: Privacy in Voting and Fairness in Digital Exchange. Ph.D. thesis, University of Eindhoven and University of Luxembourg (2009)
Kordy B Kordy P Mauw S Schweitzer P Joshi K Siegle M Stoelinga M D’Argenio PR ADTool: security analysis with attack–defense trees Quantitative Evaluation of Systems 2013 Heidelberg Springer 173 176 10.1007/978-3-642-40196-1_15 8054
Kordy B Mauw S Radomirović S Schweitzer P Degano P Etalle S Guttman J Foundations of attack–defense trees Formal Aspects of Security and Trust 2011 Heidelberg Springer 80 95 10.1007/978-3-642-19751-2_6 6561
Kordy B Mauw S Radomirovic S Schweitzer P Attack-defense trees J. Log. Comput. 2014 24 1 55 87 3159372 10.1093/LOGCOM/EXS029
Mauw S Veltink GJ A process specification formalism Fund. Inform. 1990 13 2 85 139
Mauw, S., van Wijk, M., Winter, T.: A formal semantics of synchronous Interworkings. In: Færgemand, O., Sarma, A. (eds.) SDL’93 - Using Objects, Proceedings of the Sixth SDL Forum, pp. 167–178. Amsterdam, North-Holland (1993)
Mauw S Winter T A prototype toolset for Interworkings Philips Telecommun. Rev. 1993 51 3 41 45
Mauw, S.: PSF - A Process Specification Formalistm. Ph.D. thesis, University of Amsterdam (1991)
Mauw S Oostdijk M Won DH Kim S Foundations of attack trees Information Security and Cryptology - ICISC 2005 2006 Heidelberg Springer 186 198 10.1007/11734727_17 3935
Mauw S Reniers MA An algebraic semantics of basic message sequence charts Comput. J. 1994 37 4 269 278 10.1093/COMJNL/37.4.269
Mauw S Reniers MA Operational semantics for MSC’96 Comput. Netw. 1999 31 17 1785 1799 10.1016/S1389-1286(99)00060-2
Mauw, S., Smith, Z., Toro-Pozo, J., Trujillo-Rasua, R.: Distance-bounding protocols: verification without time and location. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 549–566. IEEE Computer Society (2018). https://doi.org/10.1109/SP.2018.00001
Mauw, S., Smith, Z., Toro-Pozo, J., Trujillo-Rasua, R.: Post-collusion security and distance bounding. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 941–958. ACM (2019). https://doi.org/10.1145/3319535.3345651
Mauw, S., Toro-Pozo, J., Trujillo-Rasua, R.: A class of precomputation-based distance-bounding protocols. In: Proceedings of the IEEE European Symposium on Security and Privacy, pp. 97–111. IEEE (2016). https://doi.org/10.1109/EUROSP.2016.19
Pons, R.G., Horne, R., Mauw, S., Stutz, F., Yurkov, S.: Security protocols and threat models - security and privacy via the applied π -calculus. Information Security and Cryptography, Springer (2026). https://doi.org/10.1007/978-3-032-08249-7
Reniers, M.A.: Message sequence chart: Syntax and semantics. Ph.D. thesis, Eindhoven University of Technology (Jun 1999). https://doi.org/10.6100/IR524323
Schneier, B.: Attack Trees. Dr. Dobb’s Journal (1999)
Schweitzer, P.: Attack-defense trees. Ph.D. thesis, University of Luxembourg (2013). http://eprints.eemcs.utwente.nl/27479/