Profil

VAN DEURSEN Ton

Main Referenced Co-authors
RADOMIROVIC, Sasa  (9)
MAUW, Sjouke  (3)
Koster, Paul (2)
CHEN, Xihui  (1)
PANG, Jun  (1)
Main Referenced Keywords
Carving (1); Formal verification (1); RFID (1); Security protocols (1);
Main Referenced Disciplines
Computer science (14)

Publications (total 14)

The most downloaded
140 downloads
van Deursen, T., Mauw, S., & Radomirovic, S. (2008). Untraceability of RFID Protocols. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (pp. 1–15). Springer. doi:10.1080/09500690802287155 https://hdl.handle.net/10993/25874

The most cited

70 citations (WOS)

van Deursen, T., Mauw, S., & Radomirovic, S. (2008). Untraceability of RFID Protocols. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (pp. 1–15). Springer. doi:10.1080/09500690802287155 https://hdl.handle.net/10993/25874

van Deursen, T., & Radomirovic, S. (2012). Insider Attacks and Privacy of RFID Protocols. In EuroPKI 2011 (pp. 91-105). Springer.
Peer reviewed

Van Deursen, T. (2011). Security of RFID protocols [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/15489

van Deursen, T. (2011). 50 Ways to Break RFID Privacy. Privacy and Identity Management for Life, 352, 192-205.
Peer reviewed

van Deursen, T., Mauw, S., & Radomirovic, S. (2011). mCarve: Carving attributed dump sets. Abstract book of 20th USENIX Security Symposium, 107-121.
Peer reviewed

van Deursen, T., & Radomirovic, S. (2010). EC-RAC: Enriching a Capacious RFID Attack Collection. In 6th Workshop on RFID Security (RFIDSec 2010) (pp. 75–90). Springer.
Peer reviewed

van Deursen, T., & Radomirovic, S. (2009). Algebraic attacks on RFID protocols. In Third IFIP WG 11.2 International Workshop (pp. 38-51). Springer.
Peer reviewed

van Deursen, T., & Radomirovic, S. (2009). Security of RFID protocols - A case study. Electronic Notes in Theoretical Computer Science, 244, 41-52. doi:10.1016/j.entcs.2009.07.037
Peer reviewed

van Deursen, T., Mauw, S., Radomirovic, S., & Vullers, P. (2009). Secure ownership and ownership transfer in RFID systems. In Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (pp. 637-654). Springer.
Peer reviewed

van Deursen, T., & Radomirovic, S. (2009). On a new formal proof model for RFID location privacy. Information Processing Letters, 110 (2), 57-61. doi:10.1016/j.ipl.2009.10.007
Peer Reviewed verified by ORBi

CHEN, X., van Deursen, T., & Pang, J. (2009). Improving automatic verification of security protocols with XOR. In Proc. 11th International Conference on Formal Engineering Methods (pp. 107-126). Springer.
Peer reviewed

van Deursen, T., Koster, P., & Petković, M. (2008). Reliable Personal Health Records. In eHealth Beyond the Horizon – Get IT There – Proceedings of MIE2008 – The XXIst International Congress on the European Federation for Medical Informatics (pp. 484–489). IOS Press.
Peer reviewed

van Deursen, T., Mauw, S., & Radomirovic, S. (2008). Untraceability of RFID Protocols. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (pp. 1–15). Springer. doi:10.1080/09500690802287155
Peer reviewed

van Deursen, T., & Radomirovic, S. (2008). Security of an RFID Protocol for Supply Chains. Proceedings of the 1st Workshop on Advances in RFID, AIR'08, 568–573. doi:10.1109/ICEBE.2008.44
Peer reviewed

van Deursen, T., Koster, P., & Petkovic, M. (2008). Hedaquin: A reputation-based health data quality indicator. Electronic Notes in Theoretical Computer Science, 1997 (2), 159-167. doi:10.1016/j.entcs.2007.12.025
Peer reviewed

Contact ORBilu