Profil

MAUW Sjouke

University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)

Main Referenced Co-authors
PANG, Jun  (23)
TRUJILLO RASUA, Rolando  (16)
RADOMIROVIC, Sasa  (13)
HORNE, Ross James  (12)
LENZINI, Gabriele  (9)
Main Referenced Keywords
Attack-Defense Trees (5); Attack Trees (4); Graphical Security Modeling (3); Attributes (2); bisimilarity (2);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Other (2)
Interdisciplinary Centre for Security, Reliability and Trust - SnT (1)
UL/CSC (1)
Main Referenced Disciplines
Computer science (115)
Aerospace & aeronautics engineering (2)

Publications (total 116)

The most downloaded
1498 downloads
Mjølsnes, S. F., Mauw, S., & Katsikas, S. K. (Eds.). (2008). Public Key Infrastructure. Springer. https://hdl.handle.net/10993/25909

The most cited

167 citations (Scopus®)

Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2010). Foundations of Attack-Defense Trees. In Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (pp. 80-95). Springer. https://hdl.handle.net/10993/11461

GIL PONS, R., MAUW, S., & Trujillo-Rasua, R. (October 2023). On the optimal resistance against mafia and distance fraud in distance-bounding protocols. Computer Communications, 210, 69 - 78. doi:10.1016/j.comcom.2023.07.033
Peer Reviewed verified by ORBi

HORNE, R. J., MAUW, S., MIZERA, A., Stemper, A., & THOEMEL, J. (2023). Anomaly Detection Using Deep Learning Respecting the Resources on Board a CubeSat. Journal of Aerospace Information Systems, 1-14. doi:10.2514/1.i011232
Peer reviewed

BALOGLU, S., BURSUC, S., MAUW, S., & PANG, J. (2023). Election Verifiability in Receipt-Free Voting Protocols. In Proceedings of the 36th Computer Security Foundations Symposium (CSF 2023) (pp. 59-74). IEEE Computer Society. doi:10.1109/CSF57540.2023.00005
Peer reviewed

Horne, R. J., Mauw, S., Mizera, A., Stemper, A., & Thoemel, J. (2022). Autonomous Trustworthy Monitoring and Diagnosis of CubeSat Health (AtMonSat). European Space Agency.

Horne, R. J., Mauw, S., & Yurkov, S. (10 August 2022). Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments [Paper presentation]. 35th IEEE Computer Security Foundations Symposium (CSF), Haifa, Israel.

Hoehn, S., Lewandowska-Tomaszczyk, B., Mauw, S., & Gabbay, D. (01 July 2022). Understanding Content Bias: Qualitative research supports computational methods [Paper presentation]. 2nd International Conference 'Language in the Human-Machine Era', Jyväskylä, Finland.

Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (27 February 2022). Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. Knowledge and Information Systems, 64, 1077-1100. doi:https://doi.org/10.1007/s10115-022-01662-z
Peer Reviewed verified by ORBi

Gil Pons, R., Horne, R. J., Mauw, S., Trujillo-Rasua, R., & Tiu, A. (2022). Is Eve nearby? Analysing protocols under the distant-attacker assumption. In IEEE Computer Security Foundations Symposium, August 7 - 10, 2022, Haifa, Israel.
Peer reviewed

Bursuc, S., & Mauw, S. (2022). Contingent payments from two-party signing and verification for abelian groups. In Conference Proceedings 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (pp. 179-194). IEEE Computer Society. doi:10.1109/CSF54842.2022.9919674
Peer reviewed

Hasan, C., Horne, R. J., Mauw, S., & Mizera, A. (2022). Cloud removal from satellite imagery using multispectral edge-filtered conditional generative adversarial networks. International Journal of Remote Sensing, 43 (5), 1881-1893. doi:10.1080/01431161.2022.2048915
Peer Reviewed verified by ORBi

Hoehn, S., Mauw, S., & Asher, N. (2022). BelElect: A New Dataset for Bias Research from a ”Dark” Platform. In Vol. 16 (2022): Proceedings of the Sixteenth International AAAI Conference on Web and Social Media. AAAI.
Peer reviewed

Acclavio, M., Horne, R. J., Mauw, S., & Straßburger, L. (2022). A Graphical Proof Theory of Logical Time. In A. P. Felty (Ed.), Proc. 7th International Conference on Formal Structures for Computation and Deduction (FSCD 2022) (pp. 22:1-22:25). Germany: Schloss Dagstuhl -- Leibniz-Zentrum fur Informatik. doi:10.4230/LIPIcs.FSCD.2022.22
Peer reviewed

Baloglu, S., Bursuc, S., Mauw, S., & Pang, J. (2021). Provably Improving Election Verifiability in Belenios. In Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (pp. 1-16). Switzerland: Springer.
Peer reviewed

Baloglu, S., Bursuc, S., Mauw, S., & Pang, J. (2021). Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. In IEEE 34th Computer Security Foundations Symposium, Dubrovnik 21-25 June 2021. Los Alamitos, CA, United States: IEEE Computer Society. doi:10.1109/CSF51468.2021.00019
Peer reviewed

Hoehn, S., Mauw, S., & Asher, N. (2021). Examining Linguisic Biases with a Game Teoretic Analysis. In Proceedings of the 3rd Multidisciplinary International Symposium on Disinformation in Open Online Media. Springer.
Peer reviewed

Horne, R. J., & Mauw, S. (2021). Discovering ePassport Vulnerabilities using Bisimilarity. Logical Methods in Computer Science, 17 (2), 24:1--24:52. doi:10.23638/LMCS-17(2:24)2021
Peer reviewed

Horne, R. J., Mauw, S., Yurkov, S., Cerone, A., & Ölveczky, P. C. (2021). Compositional Analysis of Protocol Equivalence in the Applied pi-Calculus Using Quasi-open Bisimilarity. In Theoretical Aspects of Computing -- ICTAC 2021 (pp. 235--255). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-85315-0_14
Peer reviewed

CHEN, X., Kepuska, E., Mauw, S., & Ramirez Cruz, Y. (2020). Active Re-identification Attacks on Periodically Released Dynamic Social Graphs. In L. Chen, N. Li, K. Liang, ... S. Schneider (Eds.), Computer Security - ESORICS 2020 (pp. 185-205). doi:10.1007/978-3-030-59013-0_10
Peer reviewed

CHEN, X., Mauw, S., & Ramirez Cruz, Y. (17 August 2020). Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee. Proceedings on Privacy Enhancing Technologies, 2020 (4), 131-152. doi:10.2478/popets-2020-0066
Peer Reviewed verified by ORBi

Pilgun, A., Gadyatskaya, O., Zhauniarovich, Y., Dashevskyi, S., Kushniarou, A., & Mauw, S. (06 July 2020). Fine-grained Code Coverage Measurement in Automated Black-box Android Testing. ACM Transactions on Software Engineering and Methodology, 29 (4), 1-35. doi:10.1145/3395042
Peer Reviewed verified by ORBi

Buldas, A., Gadyatskaya, O., Lenin, A., Mauw, S., & Trujillo Rasua, R. (2020). Attribute evaluation on attack trees with incomplete information. Computers and Security, 88 (101630). doi:10.1016/j.cose.2019.101630
Peer Reviewed verified by ORBi

Gadyatskaya, O., & Mauw, S. (2020). Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. In Proc.\ 6th International Workshop on Graphical Models for Security (GraMSec'19) (pp. 7-19). Springer.
Peer reviewed

Ferreira Torres, C., Steichen, M., Norvill, R., Fiz Pontiveros, B., Jonker, H., & Mauw, S. (2020). ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20), October 5–9, 2020, Taipei, Taiwan.
Peer reviewed

Gabbay, D. M., Horne, R. J., Mauw, S., & van der Torre, L. (2020). Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. In Graphical Models for Security - 7th International Workshop. doi:10.1007/978-3-030-62230-5_8
Peer reviewed

Mauw, S., Smith, Z. D., Trujillo Rasua, R., & Toro Pozo, J. L. (2019). Post-collusion security and distance bounding. In Post-collusion security and distance bounding.
Peer reviewed

Horne, R. J., Mauw, S., Smith, Z. D., & Filimonov, I. (Other coll.). (2019). Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity. In Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity (pp. 18). doi:10.1007/978-3-030-29959-0_28
Peer reviewed

Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (September 2019). Robust active attacks on social graphs. Data Mining and Knowledge Discovery, 33 (5), 1357-1392. doi:10.1007/s10618-019-00631-5
Peer Reviewed verified by ORBi

Mauw, S., & Conti, M. (Eds.). (2019). Proceedings of the 15th International Workshop on Security and Trust Management (STM 2019). Springer.

Mauw, S., & Gadyatskaya, O. (2019). Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. In Proc. 6th International Workshop on Graphical Models for Security (GraMSec'19) (pp. 7-19). Springer.
Peer reviewed

Jhawar, R., Lounis, K., Mauw, S., & Ramirez Cruz, Y. (2018). Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library. In S. Katsikas & C. Alcaraz (Eds.), Security and Trust Management. STM 2018 (pp. 85-101). Springer. doi:10.1007/978-3-030-01141-3_6
Peer reviewed

Mauw, S., Smith, Z. D., Toro Pozo, J. L., & Trujillo Rasua, R. (2018). Automated Identification of Desynchronisation Attacks on Shared Secrets. In Automated Identification of Desynchronisation Attacks on Shared Secrets. Springer. doi:10.1007/978-3-319-99073-6_20
Peer reviewed

Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (August 2018). Anonymising social graphs in the presence of active attackers. Transactions on Data Privacy, 11 (2), 169-198.
Peer reviewed

Mauw, S., Ramirez Cruz, Y., & Trujillo Rasua, R. (2018). Conditional adjacency anonymity in social graphs under active attacks. Knowledge and Information Systems. doi:10.1007/s10115-018-1283-x
Peer reviewed

Mauw, S., Smith, Z. D., Toro Pozo, J. L., & Trujillo Rasua, R. (2018). Distance-Bounding Protocols: Verification without Time and Location. In Proceedings of IEEE Symposium on Security and Privacy (SP), San Francisco 21-23 May 2018. United States - New York: IEEE Computer Society. doi:10.1109/SP.2018.00001
Peer reviewed

Liu, P., Mauw, S., & Stolen, K. (Eds.). (2018). Proceedings of the Fourth International Workshop on Graphical Models for Security (GraMSec 2017). Springer. doi:10.1007/978-3-319-74860-3

Horne, R. J., Mauw, S., & Tiu, A. (2018). The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement. In Proc.\ 5th International Workshop on Graphical Models for Security (GraMSec'18).
Peer reviewed

Gadyatskaya, O., Ravi, J., Mauw, S., Trujillo Rasua, R., & Tim, A. C. W. (2017). Refinement-Aware Generation of Attack Trees. In G. Livraga & C. J. Mitchell, Security and Trust Management - 13th International Workshop (pp. 164-179). Springer.
Peer reviewed

Jonker, H., & Mauw, S. (2017). A security perspective on publication metrics. In F. Stajano (Ed.), Proc. 25th Security Protocols Workshop (pp. 186-200). Springer.
Peer reviewed

Jonker, H., Mauw, S., & Schmitz, T. (2017). Reverse Bayesian poisoning: How to use spam filters to manipulate online elections. In L. Krimmer (Ed.), Proc. 2nd International Joint Conference on Electronic Voting (pp. 183-197). Springer.
Peer reviewed

Jhawar, R., & Mauw, S. (2017). Model-driven situational awareness for moving target defense. In M. Scanlon & N.-A. Le-Khac (Eds.), Proc. 16th European Conference on Cyber Warfare and Security (pp. 184-192). ACPI.
Peer reviewed

Horne, R. J., Mauw, S., & Tiu, A. (2017). Semantics for specialising attack trees based on linear logic. Fundamenta Informaticae, 153 (1-2), 57-86. doi:10.3233/FI-2017-1531
Peer Reviewed verified by ORBi

Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (2016). Optimality Results on the Security of Lookup-Based Protocols. In G. P. Hancke & K. Markantonakis (Eds.), Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (pp. 137-150). Springer. doi:10.1007/978-3-319-62024-4_10
Peer reviewed

Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (16 March 2016). A class of precomputation-based distance-bounding protocols [Paper presentation]. Grande Region Security and Reliability Day 2016, Nancy, France.

Mauw, S., Trujillo Rasua, R., & Xuan, B. (2016). Counteracting active attacks in social network graphs. In Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (Lecture Notes in Computer Science, pp. 233--248). Springer.
Peer reviewed

Habib, S. M., Vassileva, J., Mauw, S., & Mühlhäuser, M. (Eds.). (2016). Proceedings of the 10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016). Springer. doi:10.1007/978-3-319-41354-9

Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (2016). A Class of Precomputation-based Distance-bounding Protocols. In Proceedings of the 1st IEEE European Symposium on Security and Privacy. doi:10.1109/EuroS&P.2016.19
Peer reviewed

Lenzini, G., Mauw, S., & Ouchani, S. (2016). Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. In G. Barthe & E. Markatos (Eds.), Security and Trust Management - STM 2016. Springer-Verlag. doi:10.1007/978-3-319-46598-2_12
Peer reviewed

Gadyatskaya, O., Harpes, C., Mauw, S., Muller, C., & Muller, S. (2016). Bridging two worlds: Reconciling practical risk assessment methodologies with theory of attack trees. In Proc. of GraMSec. Springer. doi:10.1007/978-3-319-46263-9_5
Peer reviewed

Gadyatskaya, O., Jhawar, R., Kordy, P., Lounis, K., Mauw, S., & Trujillo Rasua, R. (2016). Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. In Quantitative Evaluation of Systems - 13th International Conference (Lecture Notes in Computer Science, pp. 159--162). Quebec, Canada: Springer. doi:10.1007/978-3-319-43425-4_10
Peer reviewed

Jhawar, R., Lounis, K., & Mauw, S. (2016). A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. In 12th International Workshop on Security and Trust Management. doi:10.1007/978-3-319-46598-2_10
Peer reviewed

Lenzini, G., Mauw, S., & Ouchani, S. (2015). Security analysis of socio-technical physical systems. Computers electrical engineering. doi:10.1016/j.compeleceng.2015.02.019
Peer reviewed

Pang, J., Liu, Y., & Mauw, S. (Eds.). (2015). Proceedings 4th International Workshop on Engineering Safety and Security Systems. (184). EPTCS.

Avoine, G., Mauw, S., & Trujillo Rasua, R. (2015). Comparing distance bounding protocols: A critical mission supported by decision theory. Computer Communications, 67, 92–102. doi:10.1016/j.comcom.2015.06.007
Peer Reviewed verified by ORBi

Mauw, S., & Radomirovic, S. (2015). Generalizing multi-party contract signing. In Proc. 4th Conference on Principles of Security and Trust (POST'15). London, UK, Unknown/unspecified: Springer Verlag.
Peer reviewed

Mauw, S., & Piramuthu, S. (2015). PUF-based authentication protocol to address ticket-switching of RFID-tagged items. In Proc. 8th Workshop on Security and Trust Management, Pisa, Italy, September 13-14 2012. Springer-Verlag.
Peer reviewed

Mauw, S. (2015). Location-private interstellar communication (Transcript of Discussion). In Proc.\ 23rd Security Protocols Workshop. Cambridge, United Kingdom, Unknown/unspecified: Springer-Verlag.
Peer reviewed

Jhawar, R., Kordy, B., Mauw, S., Radomirovic, S., & Trujillo Rasua, R. (2015). Attack Trees with Sequential Conjunction. In Proceedings of the 30th IFIP TC 11 International Conference ICT Systems Security and Privacy Protection (SEC 2015) (pp. 339--353). Springer.
Peer reviewed

Jonker, H., Mauw, S., & Radomirovic, S. (2015). Location-private interstellar communication. In 23rd Security Protocols Workshop. Springer-Verlag. doi:10.1007/978-3-319-26096-9_11
Peer reviewed

Ferreira Torres, C., Jonker, H., & Mauw, S. (2015). FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting. In G. Pernul, P. Y A Ryan, ... E. Weippl (Eds.), Computer Security -- ESORICS 2015 (pp. 3-19). Springer International Publishing. doi:10.1007/978-3-319-24177-7_1
Peer reviewed

Kordy, P., Langerak, R., Mauw, S., & Polderman, J. (2014). A symbolic algorithm for the analysis of robust timed automata. In 19th International Symposium on Formal Methods (FM'14), 12-16 May 2014 (pp. 351-366).
Peer reviewed

Mauw, S., & Jensen, C. D. (Eds.). (2014). Proceedings of the 10th International Workshop on Security and Trust Management (STM 2014). Springer. doi:10.1007/978-3-319-11851-2

Zhang, J., Yang, L., Mauw, S., & Muller, T. (2014). On Robustness of Trust Systems. In 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014.
Peer reviewed

Kordy, B., Mauw, S., & Pieters, P. (2014). Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014. In First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014. Springer. doi:10.4204/EPTCS.148
Peer reviewed

Paredaens, J., Bijlsma, L., Boot, P., De Bosschere, K., van den Herik, J., Mauw, S., Mullender, S., Preneel, B., Van Petegem, W., & Verbij, R. (2014). Informaticaonderwijs aan Nederlandse Universiteiten in 2013 - State of the Art.

Zhang, J., Yang, L., Mauw, S., & Muller, T. (2014). On Robustness of Trust Systems. In 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014.
Peer reviewed

CHEN, X., Harpes, C., Lenzini, G., Martins, M., Mauw, S., & Pang, J. (2013). DEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity. In Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (pp. 1329-1332). ACM.
Peer reviewed

Pang, J., Liu, Y., & Mauw, S. (2013). Message from ESSS 2013 Workshop Co-chairs. In 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (pp. 1). IEEE Computer Society. doi:10.1109/ICSTW.2013.63

Chen, X., Harpes, C., Lenzini, G., Mauw, S., & Pang, J. (2013). Location Assurance and Privacy in GNSS Navigation. ERCIM News, 2013 (94).
Peer reviewed

CHEN, X., Lenzini, G., Martins, M., Mauw, S., & Pang, J. (2013). A trust framework for evaluating GNSS signal integrity. In Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (pp. 179-192). IEEE CS.
Peer reviewed

CHEN, X., Lenzini, G., Mauw, S., & Pang, J. (2013). Design and formal analysis of a group signature based electronic toll pricing system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (1), 55-75.
Peer reviewed

Jonker, H., Mauw, S., & Pang, J. (2013). Privacy and verifiability in voting systems: Methods, developments and trends. Computer Science Review. doi:10.1016/j.cosrev.2013.08.002
Peer reviewed

Kordy, B., Kordy, P., Mauw, S., & Schweitzer, P. (2013). ADTool: Security Analysis with Attack-Defense Trees (Tool Demonstration Paper). In 10th International Conference on Quantitative Evaluation of SysTems (pp. 173-176). Springer.
Peer reviewed

Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2012). Attack-Defense Trees. Journal of Logic and Computation. doi:10.1093/logcom/exs029
Peer reviewed

Jonker, H., Mauw, S., & Pang, J. (2012). Location-Based Services: Privacy, Security and Assurance. In Digital Enlightenment Yearbook 2012 (pp. 235-244). IOS Press. doi:10.3233/978-1-61499-057-4-235

Kordy, B., Mauw, S., & Schweitzer, P. (2012). Quantitative Questions on Attack-Defense Trees. In Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers (pp. 49-64). Springer.
Peer reviewed

Kordy, B., Mauw, S., & Schweitzer, P. (2012). Quantitative Questions on Attack-Defense Trees.

Piramuthu, S., Kapoor, G., Zhou, W., & Mauw, S. (2012). Input online review data and related bias in recommender systems. Decision Support Systems, 53 (3), 418-424. doi:10.1016/j.dss.2012.02.006
Peer reviewed

Marnach, D., Mauw, S., Martins, M., & Harpes, C. (2012). Detecting meaconing attacks by analysing the clock bias of GNSS receivers. European Navigation Conference (ENC 2012), 1-19.
Peer reviewed

Cremers, C., & Mauw, S. (2012). Operational semantics and verification of security protocols. Springer-Verlag. doi:10.1007/978-3-540-78636-8

Sun, Y., Zhang, C., Pang, J., Alcalde, B., & Mauw, S. (2012). A trust-augmented voting scheme for collaborative privacy management. Journal of Computer Security, 20 (4), 437-459. doi:10.3233/JCS-2012-0453
Peer Reviewed verified by ORBi

Zhang, Y., Zhang, C., Pang, J., & Mauw, S. (2012). Game-based verification of contract signing protocols with minimal messages. Innovations in Systems and Software Engineering, 8, 111-124. doi:10.1007/s11334-012-0180-9
Peer reviewed

CHEN, X., Harpes, C., Lenzini, G., Martins, M., Mauw, S., & Pang, J. (2012). Implementation and Validation of a Localisation Assurance Service Provider. In Proc. 6th ESA Workshop on Satellite Navigation Technologies (pp. 1-7). doi:10.1109/NAVITEC.2012.6423097
Peer reviewed

CHEN, X., Lenzini, G., Mauw, S., & Pang, J. (2012). A group signature based electronic toll pricing system. In Proc. 7th International Conference on Availability, Reliability and Security (pp. 85-93). IEEE Computer Society. doi:10.1109/ARES.2012.67
Peer reviewed

Li, Q., Schaffer, P., Pang, J., & Mauw, S. (2012). Comparative analysis of clustering protocols with probabilistic model checking. In Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (pp. 249-252). IEEE Computer Society. doi:10.1109/TASE.2012.28
Peer reviewed

Jamroga, W., Mauw, S., & Melissen, M. (2012). Fairness in Non-repudiation Protocols. In Proceedings of STM 2011 (pp. 122-139). Springer.
Peer reviewed

Yuan, Q., Trairatphisan, P., Pang, J., Mauw, S., Wiesinger, M., & Sauter, T. (2012). Probabilistic model checking of the PDGF signaling pathway. Transactions on Computational Systems Biology, XIV, 151-180.
Peer reviewed

van Deursen, T., Mauw, S., & Radomirovic, S. (2011). mCarve: Carving attributed dump sets. Abstract book of 20th USENIX Security Symposium, 107-121.
Peer reviewed

Sun, Y., Zhang, C., Pang, J., Alcalde, B., & Mauw, S. (2011). A trust-augmented voting scheme for collaborative privacy management. In Proc. 6th International Workshop on Security and Trust Management (pp. 132-146).
Peer reviewed

Lenzini, G., Mauw, S., & Pang, J. (2011). Selective location blinding using hash chains. In Proc. 19th International Workshop on Security Protocols (pp. 132-141). Springer-Verlag.
Peer reviewed

Yuan, Q., Pang, J., Mauw, S., Trairatphisan, P., Wiesinger, M., & Sauter, T. (2011). A study of the PDGF signaling pathway with PRISM. Proceedings of the 3rd Workshop on Computational Models for Cell Processes, EPTCS 67, 65-81.
Peer reviewed

Mauw, S. (2011). Selective location blinding using hash chains (transcript of discussion). Proceedings of 19th Security Protocols Workshop, 7114, 142-149.
Peer reviewed

Kordy, B., Mauw, S., Melissen, M., & Schweitzer, P. (2010). Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. In Proceedings of GameSec 2010 (pp. 245-256). Springer. doi:10.1007/978-3-642-17197-0_17
Peer reviewed

Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2010). Foundations of Attack-Defense Trees. In Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (pp. 80-95). Springer.
Peer reviewed

Dashti, M. T., & Mauw, S. (2010). Fair Exchange. In G. Rosenberg (Ed.), Handbook of Financial Cryptography and Security (pp. 109–132). Chapmand and Hall/CRC. doi:10.1201/9781420059823
Peer reviewed

Mauw, S., Radomirovic, S., & Ryan, P. (2010). Security protocols for Secret Santa. In Proc. 18th Security Protocols Workshop. Springer-Verlag.
Peer reviewed

Zhang, Y., Zhang, C., Pang, J., & Mauw, S. (2010). Game-based verification of multi-party contract signing protocols. In Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (pp. 186-200). Springer-Verlag.
Peer reviewed

Jonker, H., Mauw, S., & Pang, J. (2009). A formal framework for quantifying voter-controlled privacy. Journal of Algorithms in Cognition, Informatics and Logic, 89-105. doi:10.1016/j.jalgor.2009.02.007
Peer reviewed

Jonker, H., & Mauw, S. (2009). Discovering the core security requirements of DRM systems by means of objective trees. In Handbook of Research on Secure Multimedia Distribution (pp. 71-85). IGI Global. doi:10.4018/978-1-60566-262-6.ch005
Peer reviewed

Mauw, S., Radomirovic, S., & Dashti, M. T. (2009). Minimal message complexity of asynchronous multi-party contract signing. Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09), 13–25. doi:10.1109/CSF.2009.15
Peer reviewed

van Deursen, T., Mauw, S., Radomirovic, S., & Vullers, P. (2009). Secure ownership and ownership transfer in RFID systems. In Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (pp. 637-654). Springer.
Peer reviewed

Alcalde, B., & Mauw, S. (2009). An algebra for trust dilution and trust fusion. In Proc. 7th Workshop on Formal Aspects in Security and Trust. Springer-Verlag.
Peer reviewed

Alcalde, B., Dubois, E., Mauw, S., Mayer, N., & Radomirovic, S. (2009). Towards a Decision Model Based on Trust and Security Risk Management. In Proc. 7th Australasian Information Security Conference - AISC'09 (pp. 61–69). Australian Computer Society.
Peer reviewed

Alcalde, B., Dubois, E., Mauw, S., Mayer, N., & Radomirovic, S. (2009). Towards a decision model based on trust and security risk management. In Ljiljana Brankovic and Willy Susilo. In Seventh Australasian Information Security Conference (AISC 2009) (pp. 61-69).
Peer reviewed

Jonker, H., Mauw, S., & Pang, J. (2009). Measuring voter-controlled privacy. In Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (pp. 289-298). IEEE Computer Society. doi:10.1109/ARES.2009.81
Peer reviewed

Mjølsnes, S. F., Mauw, S., & Katsikas, S. K. (Eds.). (2008). Public Key Infrastructure. Springer.

Ceelen, P., Mauw, S., & Radomirovic, S. (2008). Chosen-name attacks: An overlooked class of type-flaw attacks. Electronic Notes in Theoretical Computer Science, 197 (2), 31-43. doi:10.1016/j.entcs.2007.12.015
Peer reviewed

van Deursen, T., Mauw, S., & Radomirovic, S. (2008). Untraceability of RFID Protocols. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (pp. 1–15). Springer. doi:10.1080/09500690802287155
Peer reviewed

Mauw, S., Massacci, F., & Piessens, F. (2008). Special issue on Security and Trust. Science of Computer Programming, 74 (1-2), 1–64. doi:10.1016/j.scico.2008.09.002
Peer Reviewed verified by ORBi

Andova, S., Cremers, C. J. F., Gjøsteen, K., Mauw, S., Mjølsnes, S. F., & Radomirovic, S. (2008). A framework for compositional verification of security protocols. Information and Computation, 206 (2-4), 425-459. doi:10.1016/j.ic.2007.07.002
Peer reviewed

Bouwman, B., Mauw, S., & Petkovic, M. (2008). Rights Management for Role-Based Access Control. Fifth Annual IEEE Consumer Communications & Networking Conference 2008 (CCNC'08). doi:10.1109/ccnc08.2007.246
Peer reviewed

Cederquist, J., Dashti, M. T., & Mauw, S. (2007). A Certified Email Protocol Using Key Chains. Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01 (AINAW'07), 525-530. doi:10.1109/AINAW.2007.10
Peer reviewed

Mauw, S., Verschuren, J. H. S., & Vink, E. P. D. (2007). Data anonymity in the FOO voting scheme. Electronic Notes in Theoretical Computer Science, 168, 5-28. doi:10.1016/j.entcs.2006.11.001
Peer reviewed

Cremers, C. J. F., Mauw, S., & Vink, E. P. D. (2006). Injective Synchronisation: an extension of the authentication hierarchy. Theoretical Computer Science, 367 (1-2), 139-161. doi:10.1016/j.tcs.2006.08.034
Peer Reviewed verified by ORBi

Mauw, S., & Reniers, M. A. (1999). Operational semantics for MSC'96. Computer Networks & ISDN Systems, 31 (17), 1785-1799.
Peer reviewed

Brunekreef, J. J., Katoen, J.-P., Koymans, R., & Mauw, S. (1996). Design and analysis of dynamic leader election protocols in broadcast networks. Distributed Computing, 9 (4), 157-171. doi:10.1007/s004460050017
Peer reviewed

Mauw, S., & Veltink, G. J. (1990). A process specification formalism. Fundamenta Informaticae, XIII, 85-139.
Peer Reviewed verified by ORBi

Contact ORBilu