GIL PONS, R., MAUW, S., & Trujillo-Rasua, R. (October 2023). On the optimal resistance against mafia and distance fraud in distance-bounding protocols. Computer Communications, 210, 69 - 78. doi:10.1016/j.comcom.2023.07.033 Peer Reviewed verified by ORBi |
HORNE, R. J., MAUW, S., MIZERA, A., Stemper, A., & THOEMEL, J. (2023). Anomaly Detection Using Deep Learning Respecting the Resources on Board a CubeSat. Journal of Aerospace Information Systems, 1-14. doi:10.2514/1.i011232 Peer reviewed |
BALOGLU, S., BURSUC, S., MAUW, S., & PANG, J. (2023). Election Verifiability in Receipt-Free Voting Protocols. In Proceedings of the 36th Computer Security Foundations Symposium (CSF 2023) (pp. 59-74). IEEE Computer Society. doi:10.1109/CSF57540.2023.00005 Peer reviewed |
HORNE, R. J., MAUW, S., MIZERA, A., STEMPER, A., & THOEMEL, J. (2022). Autonomous Trustworthy Monitoring and Diagnosis of CubeSat Health (AtMonSat). European Space Agency. https://orbilu.uni.lu/handle/10993/55702 |
HORNE, R. J., MAUW, S., & YURKOV, S. (10 August 2022). Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments [Paper presentation]. 35th IEEE Computer Security Foundations Symposium (CSF), Haifa, Israel. |
HOEHN, S., Lewandowska-Tomaszczyk, B., MAUW, S., & Gabbay, D. (01 July 2022). Understanding Content Bias: Qualitative research supports computational methods [Paper presentation]. 2nd International Conference 'Language in the Human-Machine Era', Jyväskylä, Finland. |
MAUW, S., RAMIREZ CRUZ, Y., & TRUJILLO RASUA, R. (27 February 2022). Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. Knowledge and Information Systems, 64, 1077-1100. doi:DOI:10.1007/s10115-022-01662-z Peer Reviewed verified by ORBi |
GIL PONS, R., HORNE, R. J., MAUW, S., Trujillo-Rasua, R., & Tiu, A. (2022). Is Eve nearby? Analysing protocols under the distant-attacker assumption. In IEEE Computer Security Foundations Symposium, August 7 - 10, 2022, Haifa, Israel. Peer reviewed |
HOEHN, S., MAUW, S., & Asher, N. (2022). BelElect: A New Dataset for Bias Research from a ”Dark” Platform. In Vol. 16 (2022): Proceedings of the Sixteenth International AAAI Conference on Web and Social Media. AAAI. Peer reviewed |
Hasan, C., HORNE, R. J., MAUW, S., & MIZERA, A. (2022). Cloud removal from satellite imagery using multispectral edge-filtered conditional generative adversarial networks. International Journal of Remote Sensing, 43 (5), 1881-1893. doi:10.1080/01431161.2022.2048915 Peer Reviewed verified by ORBi |
BURSUC, S., & MAUW, S. (2022). Contingent payments from two-party signing and verification for abelian groups. In Conference Proceedings 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (pp. 179-194). IEEE Computer Society. doi:10.1109/CSF54842.2022.9919674 Peer reviewed |
ACCLAVIO, M., HORNE, R. J., MAUW, S., & Straßburger, L. (2022). A Graphical Proof Theory of Logical Time. In A. P. Felty (Ed.), Proc. 7th International Conference on Formal Structures for Computation and Deduction (FSCD 2022) (pp. 22:1-22:25). Germany: Schloss Dagstuhl -- Leibniz-Zentrum fur Informatik. doi:10.4230/LIPIcs.FSCD.2022.22 Peer reviewed |
BALOGLU, S., BURSUC, S., MAUW, S., & PANG, J. (2021). Provably Improving Election Verifiability in Belenios. In Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (pp. 1-16). Switzerland: Springer. Peer reviewed |
BALOGLU, S., BURSUC, S., MAUW, S., & PANG, J. (2021). Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. In IEEE 34th Computer Security Foundations Symposium, Dubrovnik 21-25 June 2021. Los Alamitos, CA, United States: IEEE Computer Society. doi:10.1109/CSF51468.2021.00019 Peer reviewed |
HOEHN, S., MAUW, S., & Asher, N. (2021). Examining Linguisic Biases with a Game Teoretic Analysis. In Proceedings of the 3rd Multidisciplinary International Symposium on Disinformation in Open Online Media. Springer. Peer reviewed |
HORNE, R. J., & MAUW, S. (2021). Discovering ePassport Vulnerabilities using Bisimilarity. Logical Methods in Computer Science, 17 (2), 24:1--24:52. doi:10.23638/LMCS-17(2:24)2021 Peer reviewed |
HORNE, R. J., MAUW, S., YURKOV, S., Cerone, A., & Ölveczky, P. C. (2021). Compositional Analysis of Protocol Equivalence in the Applied pi-Calculus Using Quasi-open Bisimilarity. In Theoretical Aspects of Computing -- ICTAC 2021 (pp. 235--255). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-85315-0_14 Peer reviewed |
CHEN, X., KEPUSKA, E., MAUW, S., & RAMIREZ CRUZ, Y. (2020). Active Re-identification Attacks on Periodically Released Dynamic Social Graphs. In L. Chen, N. Li, K. Liang, ... S. Schneider (Eds.), Computer Security - ESORICS 2020 (pp. 185-205). doi:10.1007/978-3-030-59013-0_10 Peer reviewed |
CHEN, X., MAUW, S., & RAMIREZ CRUZ, Y. (17 August 2020). Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee. Proceedings on Privacy Enhancing Technologies, 2020 (4), 131-152. doi:10.2478/popets-2020-0066 Peer Reviewed verified by ORBi |
PILGUN, A., GADYATSKAYA, O., Zhauniarovich, Y., DASHEVSKYI, S., KUSHNIAROU, A., & MAUW, S. (06 July 2020). Fine-grained Code Coverage Measurement in Automated Black-box Android Testing. ACM Transactions on Software Engineering and Methodology, 29 (4), 1-35. doi:10.1145/3395042 Peer Reviewed verified by ORBi |
GABBAY, D. M., HORNE, R. J., MAUW, S., & VAN DER TORRE, L. (2020). Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. In Graphical Models for Security - 7th International Workshop. doi:10.1007/978-3-030-62230-5_8 Peer reviewed |
Buldas, A., GADYATSKAYA, O., Lenin, A., MAUW, S., & TRUJILLO RASUA, R. (2020). Attribute evaluation on attack trees with incomplete information. Computers and Security, 88 (101630). doi:10.1016/j.cose.2019.101630 Peer Reviewed verified by ORBi |
GADYATSKAYA, O., & MAUW, S. (2020). Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. In Proc.\ 6th International Workshop on Graphical Models for Security (GraMSec'19) (pp. 7-19). Springer. Peer reviewed |
FERREIRA TORRES, C., STEICHEN, M., NORVILL, R., FIZ PONTIVEROS, B., Jonker, H., & MAUW, S. (2020). ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20), October 5–9, 2020, Taipei, Taiwan. Peer reviewed |
MAUW, S., SMITH, Z. D., TRUJILLO RASUA, R., & TORO POZO, J. L. (2019). Post-collusion security and distance bounding. In Post-collusion security and distance bounding. Peer reviewed |
HORNE, R. J., MAUW, S., SMITH, Z. D., & Filimonov, I. (Other coll.). (2019). Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity. In Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity (pp. 18). doi:10.1007/978-3-030-29959-0_28 Peer reviewed |
MAUW, S., RAMIREZ CRUZ, Y., & TRUJILLO RASUA, R. (September 2019). Robust active attacks on social graphs. Data Mining and Knowledge Discovery, 33 (5), 1357-1392. doi:10.1007/s10618-019-00631-5 Peer Reviewed verified by ORBi |
MAUW, S., & Conti, M. (Eds.). (2019). Proceedings of the 15th International Workshop on Security and Trust Management (STM 2019). Springer. |
MAUW, S., & Gadyatskaya, O. (2019). Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. In Proc. 6th International Workshop on Graphical Models for Security (GraMSec'19) (pp. 7-19). Springer. Peer reviewed |
JHAWAR, R., LOUNIS, K., MAUW, S., & RAMIREZ CRUZ, Y. (2018). Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library. In S. Katsikas & C. Alcaraz (Eds.), Security and Trust Management. STM 2018 (pp. 85-101). Springer. doi:10.1007/978-3-030-01141-3_6 Peer reviewed |
MAUW, S., SMITH, Z. D., TORO POZO, J. L., & TRUJILLO RASUA, R. (2018). Automated Identification of Desynchronisation Attacks on Shared Secrets. In Automated Identification of Desynchronisation Attacks on Shared Secrets. Springer. doi:10.1007/978-3-319-99073-6_20 Peer reviewed |
MAUW, S., RAMIREZ CRUZ, Y., & TRUJILLO RASUA, R. (August 2018). Anonymising social graphs in the presence of active attackers. Transactions on Data Privacy, 11 (2), 169-198. Peer reviewed |
HORNE, R. J., MAUW, S., & Tiu, A. (2018). The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement. In Proc.\ 5th International Workshop on Graphical Models for Security (GraMSec'18). Peer reviewed |
Liu, P., MAUW, S., & Stolen, K. (Eds.). (2018). Proceedings of the Fourth International Workshop on Graphical Models for Security (GraMSec 2017). Springer. doi:10.1007/978-3-319-74860-3 |
MAUW, S., RAMIREZ CRUZ, Y., & TRUJILLO RASUA, R. (2018). Conditional adjacency anonymity in social graphs under active attacks. Knowledge and Information Systems. doi:10.1007/s10115-018-1283-x Peer reviewed |
MAUW, S., SMITH, Z. D., TORO POZO, J. L., & TRUJILLO RASUA, R. (2018). Distance-Bounding Protocols: Verification without Time and Location. In Proceedings of IEEE Symposium on Security and Privacy (SP), San Francisco 21-23 May 2018. United States - New York: IEEE Computer Society. doi:10.1109/SP.2018.00001 Peer reviewed |
GADYATSKAYA, O., Ravi, J., MAUW, S., TRUJILLO RASUA, R., & Tim, A. C. W. (2017). Refinement-Aware Generation of Attack Trees. In G. Livraga & C. J. Mitchell, Security and Trust Management - 13th International Workshop (pp. 164-179). Springer. Peer reviewed |
Jonker, H., & MAUW, S. (2017). A security perspective on publication metrics. In F. Stajano (Ed.), Proc. 25th Security Protocols Workshop (pp. 186-200). Springer. Peer reviewed |
Jonker, H., MAUW, S., & SCHMITZ, T. (2017). Reverse Bayesian poisoning: How to use spam filters to manipulate online elections. In L. Krimmer (Ed.), Proc. 2nd International Joint Conference on Electronic Voting (pp. 183-197). Springer. Peer reviewed |
HORNE, R. J., MAUW, S., & Tiu, A. (2017). Semantics for specialising attack trees based on linear logic. Fundamenta Informaticae, 153 (1-2), 57-86. doi:10.3233/FI-2017-1531 Peer Reviewed verified by ORBi |
JHAWAR, R., & MAUW, S. (2017). Model-driven situational awareness for moving target defense. In M. Scanlon & N.-A. Le-Khac (Eds.), Proc. 16th European Conference on Cyber Warfare and Security (pp. 184-192). ACPI. Peer reviewed |
MAUW, S., TORO POZO, J. L., & TRUJILLO RASUA, R. (2016). Optimality Results on the Security of Lookup-Based Protocols. In G. P. Hancke & K. Markantonakis (Eds.), Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (pp. 137-150). Springer. doi:10.1007/978-3-319-62024-4_10 Peer reviewed |
MAUW, S., TORO POZO, J. L., & TRUJILLO RASUA, R. (16 March 2016). A class of precomputation-based distance-bounding protocols [Paper presentation]. Grande Region Security and Reliability Day 2016, Nancy, France. |
JHAWAR, R., LOUNIS, K., & MAUW, S. (2016). A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. In 12th International Workshop on Security and Trust Management. doi:10.1007/978-3-319-46598-2_10 Peer reviewed |
Habib, S. M., Vassileva, J., MAUW, S., & Mühlhäuser, M. (Eds.). (2016). Proceedings of the 10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016). Springer. doi:10.1007/978-3-319-41354-9 |
MAUW, S., TRUJILLO RASUA, R., & Xuan, B. (2016). Counteracting active attacks in social network graphs. In Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (Lecture Notes in Computer Science, pp. 233--248). Springer. Peer reviewed |
MAUW, S., TORO POZO, J. L., & TRUJILLO RASUA, R. (2016). A Class of Precomputation-based Distance-bounding Protocols. In Proceedings of the 1st IEEE European Symposium on Security and Privacy. doi:10.1109/EuroS&P.2016.19 Peer reviewed |
GADYATSKAYA, O., Harpes, C., MAUW, S., Muller, C., & Muller, S. (2016). Bridging two worlds: Reconciling practical risk assessment methodologies with theory of attack trees. In Proc. of GraMSec. Springer. doi:10.1007/978-3-319-46263-9_5 Peer reviewed |
GADYATSKAYA, O., JHAWAR, R., KORDY, P., LOUNIS, K., MAUW, S., & TRUJILLO RASUA, R. (2016). Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. In Quantitative Evaluation of Systems - 13th International Conference (Lecture Notes in Computer Science, pp. 159--162). Quebec, Canada: Springer. doi:10.1007/978-3-319-43425-4_10 Peer reviewed |
LENZINI, G., MAUW, S., & OUCHANI, S. (2016). Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. In G. Barthe & E. Markatos (Eds.), Security and Trust Management - STM 2016. Springer-Verlag. doi:10.1007/978-3-319-46598-2_12 Peer reviewed |
LENZINI, G., MAUW, S., & OUCHANI, S. (2015). Security analysis of socio-technical physical systems. Computers electrical engineering. doi:10.1016/j.compeleceng.2015.02.019 Peer reviewed |
Avoine, G., MAUW, S., & TRUJILLO RASUA, R. (2015). Comparing distance bounding protocols: A critical mission supported by decision theory. Computer Communications, 67, 92–102. doi:10.1016/j.comcom.2015.06.007 Peer Reviewed verified by ORBi |
MAUW, S. (2015). Location-private interstellar communication (Transcript of Discussion). In Proc.\ 23rd Security Protocols Workshop. Cambridge, United Kingdom, Unknown/unspecified: Springer-Verlag. Peer reviewed |
MAUW, S., & RADOMIROVIC, S. (2015). Generalizing multi-party contract signing. In Proc. 4th Conference on Principles of Security and Trust (POST'15). London, UK, Unknown/unspecified: Springer Verlag. Peer reviewed |
MAUW, S., & Piramuthu, S. (2015). PUF-based authentication protocol to address ticket-switching of RFID-tagged items. In Proc. 8th Workshop on Security and Trust Management, Pisa, Italy, September 13-14 2012. Springer-Verlag. Peer reviewed |
PANG, J., Liu, Y., & MAUW, S. (Eds.). (2015). Proceedings 4th International Workshop on Engineering Safety and Security Systems. (184). EPTCS. |
JHAWAR, R., Kordy, B., MAUW, S., Radomirovic, S., & TRUJILLO RASUA, R. (2015). Attack Trees with Sequential Conjunction. In Proceedings of the 30th IFIP TC 11 International Conference ICT Systems Security and Privacy Protection (SEC 2015) (pp. 339--353). Springer. Peer reviewed |
JONKER, H., MAUW, S., & RADOMIROVIC, S. (2015). Location-private interstellar communication. In 23rd Security Protocols Workshop. Springer-Verlag. doi:10.1007/978-3-319-26096-9_11 Peer reviewed |
FERREIRA TORRES, C., Jonker, H., & MAUW, S. (2015). FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting. In G. Pernul, P. Y A Ryan, ... E. Weippl (Eds.), Computer Security -- ESORICS 2015 (pp. 3-19). Springer International Publishing. doi:10.1007/978-3-319-24177-7_1 Peer reviewed |
KORDY, P., Langerak, R., MAUW, S., & Polderman, J. (2014). A symbolic algorithm for the analysis of robust timed automata. In 19th International Symposium on Formal Methods (FM'14), 12-16 May 2014 (pp. 351-366). Peer reviewed |
ZHANG, J., Yang, L., MAUW, S., & MULLER, T. (2014). On Robustness of Trust Systems. In 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014. Peer reviewed |
ZHANG, J., Yang, L., MAUW, S., & MULLER, T. (2014). On Robustness of Trust Systems. In 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014. Peer reviewed |
KORDY, B., MAUW, S., & Pieters, P. (2014). Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014. In First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014. Springer. doi:10.4204/EPTCS.148 Peer reviewed |
MAUW, S., & Jensen, C. D. (Eds.). (2014). Proceedings of the 10th International Workshop on Security and Trust Management (STM 2014). Springer. doi:10.1007/978-3-319-11851-2 |
Paredaens, J., Bijlsma, L., Boot, P., De Bosschere, K., van den Herik, J., MAUW, S., Mullender, S., Preneel, B., Van Petegem, W., & Verbij, R. (2014). Informaticaonderwijs aan Nederlandse Universiteiten in 2013 - State of the Art. https://orbilu.uni.lu/handle/10993/25903 |
CHEN, X., Harpes, C., LENZINI, G., Martins, M., MAUW, S., & PANG, J. (2013). DEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity. In Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (pp. 1329-1332). ACM. Peer reviewed |
PANG, J., Liu, Y., & MAUW, S. (2013). Message from ESSS 2013 Workshop Co-chairs. In 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (pp. 1). IEEE Computer Society. doi:10.1109/ICSTW.2013.63 |
Chen, X., Harpes, C., LENZINI, G., MAUW, S., & PANG, J. (2013). Location Assurance and Privacy in GNSS Navigation. ERCIM News, 2013 (94). Peer reviewed |
JONKER, H., MAUW, S., & PANG, J. (2013). Privacy and verifiability in voting systems: Methods, developments and trends. Computer Science Review. doi:10.1016/j.cosrev.2013.08.002 Peer reviewed |
CHEN, X., LENZINI, G., Martins, M., MAUW, S., & PANG, J. (2013). A trust framework for evaluating GNSS signal integrity. In Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (pp. 179-192). IEEE CS. Peer reviewed |
CHEN, X., LENZINI, G., MAUW, S., & PANG, J. (2013). Design and formal analysis of a group signature based electronic toll pricing system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (1), 55-75. Peer reviewed |
KORDY, B., KORDY, P., MAUW, S., & SCHWEITZER, P. (2013). ADTool: Security Analysis with Attack-Defense Trees (Tool Demonstration Paper). In 10th International Conference on Quantitative Evaluation of SysTems (pp. 173-176). Springer. Peer reviewed |
KORDY, B., MAUW, S., RADOMIROVIC, S., & SCHWEITZER, P. (2012). Attack-Defense Trees. Journal of Logic and Computation. doi:10.1093/logcom/exs029 Peer reviewed |
JONKER, H., MAUW, S., & PANG, J. (2012). Location-Based Services: Privacy, Security and Assurance. In Digital Enlightenment Yearbook 2012 (pp. 235-244). IOS Press. doi:10.3233/978-1-61499-057-4-235 |
KORDY, B., MAUW, S., & SCHWEITZER, P. (2012). Quantitative Questions on Attack-Defense Trees. In Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers (pp. 49-64). Springer. Peer reviewed |
KORDY, B., MAUW, S., & SCHWEITZER, P. (2012). Quantitative Questions on Attack-Defense Trees. https://orbilu.uni.lu/handle/10993/25973 |
Piramuthu, S., Kapoor, G., Zhou, W., & MAUW, S. (2012). Input online review data and related bias in recommender systems. Decision Support Systems, 53 (3), 418-424. doi:10.1016/j.dss.2012.02.006 Peer reviewed |
Marnach, D., MAUW, S., Martins, M., & Harpes, C. (2012). Detecting meaconing attacks by analysing the clock bias of GNSS receivers. European Navigation Conference (ENC 2012), 1-19. Peer reviewed |
Cremers, C., & MAUW, S. (2012). Operational semantics and verification of security protocols. Springer-Verlag. doi:10.1007/978-3-540-78636-8 |
SUN, Y., ZHANG, C., PANG, J., ALCALDE, B., & MAUW, S. (2012). A trust-augmented voting scheme for collaborative privacy management. Journal of Computer Security, 20 (4), 437-459. doi:10.3233/JCS-2012-0453 Peer Reviewed verified by ORBi |
ZHANG, Y., ZHANG, C., PANG, J., & MAUW, S. (2012). Game-based verification of contract signing protocols with minimal messages. Innovations in Systems and Software Engineering, 8, 111-124. doi:10.1007/s11334-012-0180-9 Peer reviewed |
CHEN, X., LENZINI, G., MAUW, S., & PANG, J. (2012). A group signature based electronic toll pricing system. In Proc. 7th International Conference on Availability, Reliability and Security (pp. 85-93). IEEE Computer Society. doi:10.1109/ARES.2012.67 Peer reviewed |
CHEN, X., Harpes, C., LENZINI, G., Martins, M., MAUW, S., & PANG, J. (2012). Implementation and Validation of a Localisation Assurance Service Provider. In Proc. 6th ESA Workshop on Satellite Navigation Technologies (pp. 1-7). doi:10.1109/NAVITEC.2012.6423097 Peer reviewed |
LI, Q., SCHAFFER, P., PANG, J., & MAUW, S. (2012). Comparative analysis of clustering protocols with probabilistic model checking. In Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (pp. 249-252). IEEE Computer Society. doi:10.1109/TASE.2012.28 Peer reviewed |
JAMROGA, W., MAUW, S., & MELISSEN, M. (2012). Fairness in Non-repudiation Protocols. In Proceedings of STM 2011 (pp. 122-139). Springer. Peer reviewed |
YUAN, Q., TRAIRATPHISAN, P., PANG, J., MAUW, S., WIESINGER, M., & SAUTER, T. (2012). Probabilistic model checking of the PDGF signaling pathway. Transactions on Computational Systems Biology, XIV, 151-180. Peer reviewed |
VAN DEURSEN, T., MAUW, S., & RADOMIROVIC, S. (2011). mCarve: Carving attributed dump sets. Abstract book of 20th USENIX Security Symposium, 107-121. Peer reviewed |
SUN, Y., ZHANG, C., PANG, J., ALCALDE, B., & MAUW, S. (2011). A trust-augmented voting scheme for collaborative privacy management. In Proc. 6th International Workshop on Security and Trust Management (pp. 132-146). Peer reviewed |
LENZINI, G., MAUW, S., & PANG, J. (2011). Selective location blinding using hash chains. In Proc. 19th International Workshop on Security Protocols (pp. 132-141). Springer-Verlag. Peer reviewed |
YUAN, Q., PANG, J., MAUW, S., TRAIRATPHISAN, P., WIESINGER, M., & SAUTER, T. (2011). A study of the PDGF signaling pathway with PRISM. Proceedings of the 3rd Workshop on Computational Models for Cell Processes, EPTCS 67, 65-81. Peer reviewed |
MAUW, S. (2011). Selective location blinding using hash chains (transcript of discussion). Proceedings of 19th Security Protocols Workshop, 7114, 142-149. Peer reviewed |
KORDY, B., MAUW, S., MELISSEN, M., & SCHWEITZER, P. (2010). Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. In Proceedings of GameSec 2010 (pp. 245-256). Springer. doi:10.1007/978-3-642-17197-0_17 Peer reviewed |
KORDY, B., MAUW, S., RADOMIROVIC, S., & SCHWEITZER, P. (2010). Foundations of Attack-Defense Trees. In Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (pp. 80-95). Springer. Peer reviewed |
Dashti, M. T., & MAUW, S. (2010). Fair Exchange. In G. Rosenberg (Ed.), Handbook of Financial Cryptography and Security (pp. 109–132). Chapmand and Hall/CRC. doi:10.1201/9781420059823 Peer reviewed |
MAUW, S., RADOMIROVIC, S., & RYAN, P. (2010). Security protocols for Secret Santa. In Proc. 18th Security Protocols Workshop. Springer-Verlag. Peer reviewed |
ZHANG, Y., ZHANG, C., PANG, J., & MAUW, S. (2010). Game-based verification of multi-party contract signing protocols. In Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (pp. 186-200). Springer-Verlag. Peer reviewed |
JONKER, H., & MAUW, S. (2009). Discovering the core security requirements of DRM systems by means of objective trees. In Handbook of Research on Secure Multimedia Distribution (pp. 71-85). IGI Global. doi:10.4018/978-1-60566-262-6.ch005 Peer reviewed |
JONKER, H., MAUW, S., & PANG, J. (2009). A formal framework for quantifying voter-controlled privacy. Journal of Algorithms in Cognition, Informatics and Logic, 89-105. doi:10.1016/j.jalgor.2009.02.007 Peer reviewed |
MAUW, S., RADOMIROVIC, S., & Dashti, M. T. (2009). Minimal message complexity of asynchronous multi-party contract signing. Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09), 13–25. doi:10.1109/CSF.2009.15 Peer reviewed |
VAN DEURSEN, T., MAUW, S., RADOMIROVIC, S., & Vullers, P. (2009). Secure ownership and ownership transfer in RFID systems. In Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (pp. 637-654). Springer. Peer reviewed |
ALCALDE, B., & MAUW, S. (2009). An algebra for trust dilution and trust fusion. In Proc. 7th Workshop on Formal Aspects in Security and Trust. Springer-Verlag. Peer reviewed |
ALCALDE, B., Dubois, E., MAUW, S., Mayer, N., & RADOMIROVIC, S. (2009). Towards a Decision Model Based on Trust and Security Risk Management. In Proc. 7th Australasian Information Security Conference - AISC'09 (pp. 61–69). Australian Computer Society. Peer reviewed |
ALCALDE, B., Dubois, E., MAUW, S., Mayer, N., & RADOMIROVIC, S. (2009). Towards a decision model based on trust and security risk management. In Ljiljana Brankovic and Willy Susilo. In Seventh Australasian Information Security Conference (AISC 2009) (pp. 61-69). Peer reviewed |
JONKER, H., MAUW, S., & PANG, J. (2009). Measuring voter-controlled privacy. In Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (pp. 289-298). IEEE Computer Society. doi:10.1109/ARES.2009.81 Peer reviewed |
VAN DEURSEN, T., MAUW, S., & RADOMIROVIC, S. (2008). Untraceability of RFID Protocols. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (pp. 1–15). Springer. doi:10.1080/09500690802287155 Peer reviewed |
CEELEN, P., MAUW, S., & RADOMIROVIC, S. (2008). Chosen-name attacks: An overlooked class of type-flaw attacks. Electronic Notes in Theoretical Computer Science, 197 (2), 31-43. doi:10.1016/j.entcs.2007.12.015 Peer reviewed |
MAUW, S., Massacci, F., & Piessens, F. (2008). Special issue on Security and Trust. Science of Computer Programming, 74 (1-2), 1–64. doi:10.1016/j.scico.2008.09.002 Peer Reviewed verified by ORBi |
Mjølsnes, S. F., MAUW, S., & Katsikas, S. K. (Eds.). (2008). Public Key Infrastructure. Springer. |
Bouwman, B., MAUW, S., & Petkovic, M. (2008). Rights Management for Role-Based Access Control. Fifth Annual IEEE Consumer Communications & Networking Conference 2008 (CCNC'08). doi:10.1109/ccnc08.2007.246 Peer reviewed |
Andova, S., Cremers, C. J. F., Gjøsteen, K., MAUW, S., Mjølsnes, S. F., & RADOMIROVIC, S. (2008). A framework for compositional verification of security protocols. Information and Computation, 206 (2-4), 425-459. doi:10.1016/j.ic.2007.07.002 Peer reviewed |
MAUW, S., Verschuren, J. H. S., & Vink, E. P. D. (2007). Data anonymity in the FOO voting scheme. Electronic Notes in Theoretical Computer Science, 168, 5-28. doi:10.1016/j.entcs.2006.11.001 Peer reviewed |
Cederquist, J., Dashti, M. T., & MAUW, S. (2007). A Certified Email Protocol Using Key Chains. Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01 (AINAW'07), 525-530. doi:10.1109/AINAW.2007.10 Peer reviewed |
Cremers, C. J. F., MAUW, S., & Vink, E. P. D. (2006). Injective Synchronisation: an extension of the authentication hierarchy. Theoretical Computer Science, 367 (1-2), 139-161. doi:10.1016/j.tcs.2006.08.034 Peer Reviewed verified by ORBi |
MAUW, S., & Reniers, M. A. (1999). Operational semantics for MSC'96. Computer Networks & ISDN Systems, 31 (17), 1785-1799. Peer reviewed |
Brunekreef, J. J., Katoen, J.-P., Koymans, R., & MAUW, S. (1996). Design and analysis of dynamic leader election protocols in broadcast networks. Distributed Computing, 9 (4), 157-171. doi:10.1007/s004460050017 Peer reviewed |
MAUW, S., & Veltink, G. J. (1990). A process specification formalism. Fundamenta Informaticae, XIII, 85-139. Peer Reviewed verified by ORBi |