MAUW, S., & RADOMIROVIC, S. (2015). Generalizing multi-party contract signing. In Proc. 4th Conference on Principles of Security and Trust (POST'15). London, UK, Unknown/unspecified: Springer Verlag. Peer reviewed |
JONKER, H., MAUW, S., & RADOMIROVIC, S. (2015). Location-private interstellar communication. In 23rd Security Protocols Workshop. Springer-Verlag. doi:10.1007/978-3-319-26096-9_11 Peer reviewed |
KORDY, B., MAUW, S., RADOMIROVIC, S., & SCHWEITZER, P. (2012). Attack-Defense Trees. Journal of Logic and Computation. doi:10.1093/logcom/exs029 Peer reviewed |
KORDY, B., & RADOMIROVIC, S. (2012). Constructing Optimistic Multi-party Contract Signing Protocols. In Computer Security Foundations (CSF 2012) (pp. 215-229). IEEE. Peer reviewed |
VAN DEURSEN, T., & RADOMIROVIC, S. (2012). Insider Attacks and Privacy of RFID Protocols. In EuroPKI 2011 (pp. 91-105). Springer. Peer reviewed |
VAN DEURSEN, T., MAUW, S., & RADOMIROVIC, S. (2011). mCarve: Carving attributed dump sets. Abstract book of 20th USENIX Security Symposium, 107-121. Peer reviewed |
Buhan, I., LENZINI, G., & RADOMIROVIC, S. (2010). Contextual biometric-based authentication for ubiquitous services. In Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (pp. 680-693). Springer. doi:10.1007/978-3-642-16355-5_51 Peer reviewed |
KORDY, B., MAUW, S., RADOMIROVIC, S., & SCHWEITZER, P. (2010). Foundations of Attack-Defense Trees. In Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (pp. 80-95). Springer. Peer reviewed |
MAUW, S., RADOMIROVIC, S., & RYAN, P. (2010). Security protocols for Secret Santa. In Proc. 18th Security Protocols Workshop. Springer-Verlag. Peer reviewed |
VAN DEURSEN, T., & RADOMIROVIC, S. (2010). EC-RAC: Enriching a Capacious RFID Attack Collection. In 6th Workshop on RFID Security (RFIDSec 2010) (pp. 75–90). Springer. Peer reviewed |
MAUW, S., RADOMIROVIC, S., & Dashti, M. T. (2009). Minimal message complexity of asynchronous multi-party contract signing. Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09), 13–25. doi:10.1109/CSF.2009.15 Peer reviewed |
VAN DEURSEN, T., MAUW, S., RADOMIROVIC, S., & Vullers, P. (2009). Secure ownership and ownership transfer in RFID systems. In Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (pp. 637-654). Springer. Peer reviewed |
ALCALDE, B., Dubois, E., MAUW, S., Mayer, N., & RADOMIROVIC, S. (2009). Towards a Decision Model Based on Trust and Security Risk Management. In Proc. 7th Australasian Information Security Conference - AISC'09 (pp. 61–69). Australian Computer Society. Peer reviewed |
ALCALDE, B., Dubois, E., MAUW, S., Mayer, N., & RADOMIROVIC, S. (2009). Towards a decision model based on trust and security risk management. In Ljiljana Brankovic and Willy Susilo. In Seventh Australasian Information Security Conference (AISC 2009) (pp. 61-69). Peer reviewed |
VAN DEURSEN, T., & RADOMIROVIC, S. (2009). Algebraic attacks on RFID protocols. In Third IFIP WG 11.2 International Workshop (pp. 38-51). Springer. Peer reviewed |
VAN DEURSEN, T., & RADOMIROVIC, S. (2009). Security of RFID protocols - A case study. Electronic Notes in Theoretical Computer Science, 244, 41-52. doi:10.1016/j.entcs.2009.07.037 Peer reviewed |
VAN DEURSEN, T., & RADOMIROVIC, S. (2009). On a new formal proof model for RFID location privacy. Information Processing Letters, 110 (2), 57-61. doi:10.1016/j.ipl.2009.10.007 Peer Reviewed verified by ORBi |
VAN DEURSEN, T., MAUW, S., & RADOMIROVIC, S. (2008). Untraceability of RFID Protocols. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (pp. 1–15). Springer. doi:10.1080/09500690802287155 Peer reviewed |
CEELEN, P., MAUW, S., & RADOMIROVIC, S. (2008). Chosen-name attacks: An overlooked class of type-flaw attacks. Electronic Notes in Theoretical Computer Science, 197 (2), 31-43. doi:10.1016/j.entcs.2007.12.015 Peer reviewed |
VAN DEURSEN, T., & RADOMIROVIC, S. (2008). Security of an RFID Protocol for Supply Chains. Proceedings of the 1st Workshop on Advances in RFID, AIR'08, 568–573. doi:10.1109/ICEBE.2008.44 Peer reviewed |
Andova, S., Cremers, C. J. F., Gjøsteen, K., MAUW, S., Mjølsnes, S. F., & RADOMIROVIC, S. (2008). A framework for compositional verification of security protocols. Information and Computation, 206 (2-4), 425-459. doi:10.1016/j.ic.2007.07.002 Peer reviewed |