BibTeX records: Sjouke Mauw

download as .bib file

@article{DBLP:journals/corr/abs-2401-06626,
  author       = {Sergiu Bursuc and
                  Reynaldo Gil Pons and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  title        = {Software-Based Memory Erasure with relaxed isolation requirements:
                  Extended Version},
  journal      = {CoRR},
  volume       = {abs/2401.06626},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.06626},
  doi          = {10.48550/ARXIV.2401.06626},
  eprinttype    = {arXiv},
  eprint       = {2401.06626},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-06626.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PonsMT23,
  author       = {Reynaldo Gil Pons and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  title        = {On the optimal resistance against mafia and distance fraud in distance-bounding
                  protocols},
  journal      = {Comput. Commun.},
  volume       = {210},
  pages        = {69--78},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2023.07.033},
  doi          = {10.1016/J.COMCOM.2023.07.033},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/PonsMT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/flap/HohnLMG23,
  author       = {Sviatlana H{\"{o}}hn and
                  Barbara Lewandowska{-}Tomaszczyk and
                  Sjouke Mauw and
                  Dov M. Gabbay},
  title        = {Dripping the Poison: The Instruments of Bias. {A} Qualitative Case
                  Study of News Articles in Four Languages over Nine Years},
  journal      = {{FLAP}},
  volume       = {10},
  number       = {4},
  pages        = {555--585},
  year         = {2023},
  url          = {https://www.collegepublications.co.uk/downloads/ifcolog00060.pdf},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/flap/HohnLMG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacic/HorneMMST23,
  author       = {Ross Horne and
                  Sjouke Mauw and
                  Andrzej Mizera and
                  Andr{\'{e}} Stemper and
                  Jan Thoemel},
  title        = {Anomaly Detection Using Deep Learning Respecting the Resources on
                  Board a CubeSat},
  journal      = {J. Aerosp. Inf. Syst.},
  volume       = {20},
  number       = {12},
  pages        = {859--872},
  year         = {2023},
  url          = {https://doi.org/10.2514/1.i011232},
  doi          = {10.2514/1.I011232},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacic/HorneMMST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/HorneMY23,
  author       = {Ross Horne and
                  Sjouke Mauw and
                  Semen Yurkov},
  title        = {When privacy fails, a formula describes an attack: {A} complete and
                  compositional verification method for the applied \emph{{\(\pi\)}}-calculus},
  journal      = {Theor. Comput. Sci.},
  volume       = {959},
  pages        = {113842},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.tcs.2023.113842},
  doi          = {10.1016/J.TCS.2023.113842},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/HorneMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BursucHMY23,
  author       = {Sergiu Bursuc and
                  Ross Horne and
                  Sjouke Mauw and
                  Semen Yurkov},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Provably Unlinkable Smart Card-based Payments},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1392--1406},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623109},
  doi          = {10.1145/3576915.3623109},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BursucHMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conversations/HohnMDSM23,
  author       = {Sviatlana H{\"{o}}hn and
                  Bettina Migge and
                  Doris Dippold and
                  Britta Schneider and
                  Sjouke Mauw},
  editor       = {Asbj{\o}rn F{\o}lstad and
                  Theo B. Araujo and
                  Symeon Papadopoulos and
                  Effie L.{-}C. Law and
                  Ewa Luger and
                  Morten Goodwin and
                  Sebastian Hobert and
                  Petter Bae Brandtzaeg},
  title        = {Language Ideology Bias in Conversational Technology},
  booktitle    = {Chatbot Research and Design - 7th International Workshop, {CONVERSATIONS}
                  2023, Oslo, Norway, November 22-23, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14524},
  pages        = {133--148},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54975-5\_8},
  doi          = {10.1007/978-3-031-54975-5\_8},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conversations/HohnMDSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BalogluBMP23,
  author       = {Sevdenur Baloglu and
                  Sergiu Bursuc and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Election Verifiability in Receipt-Free Voting Protocols},
  booktitle    = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik,
                  Croatia, July 10-14, 2023},
  pages        = {59--74},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSF57540.2023.00005},
  doi          = {10.1109/CSF57540.2023.00005},
  timestamp    = {Tue, 05 Sep 2023 20:33:27 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BalogluBMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-03128,
  author       = {Sergiu Bursuc and
                  Ross Horne and
                  Sjouke Mauw and
                  Semen Yurkov},
  title        = {Provably Unlinkable Smart Card-based Payments},
  journal      = {CoRR},
  volume       = {abs/2309.03128},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.03128},
  doi          = {10.48550/ARXIV.2309.03128},
  eprinttype    = {arXiv},
  eprint       = {2309.03128},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-03128.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-13331,
  author       = {Olga Gadyatskaya and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua and
                  Tim A. C. Willemse},
  title        = {Automated generation of attack trees with optimal shape and labelling},
  journal      = {CoRR},
  volume       = {abs/2311.13331},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.13331},
  doi          = {10.48550/ARXIV.2311.13331},
  eprinttype    = {arXiv},
  eprint       = {2311.13331},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-13331.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/MauwRT22,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Preventing active re-identification attacks on social graphs via sybil
                  subgraph obfuscation},
  journal      = {Knowl. Inf. Syst.},
  volume       = {64},
  number       = {4},
  pages        = {1077--1100},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10115-022-01662-z},
  doi          = {10.1007/S10115-022-01662-Z},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/MauwRT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PonsHMTT22,
  author       = {Reynaldo Gil Pons and
                  Ross Horne and
                  Sjouke Mauw and
                  Alwen Tiu and
                  Rolando Trujillo{-}Rasua},
  title        = {Is Eve nearby? Analysing protocols under the distant-attacker assumption},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {17--32},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919655},
  doi          = {10.1109/CSF54842.2022.9919655},
  timestamp    = {Fri, 11 Nov 2022 16:53:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/PonsHMTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BursucM22,
  author       = {Sergiu Bursuc and
                  Sjouke Mauw},
  title        = {Contingent payments from two-party signing and verification for abelian
                  groups},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {195--210},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919674},
  doi          = {10.1109/CSF54842.2022.9919674},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BursucM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HorneMY22,
  author       = {Ross Horne and
                  Sjouke Mauw and
                  Semen Yurkov},
  title        = {Unlinkability of an Improved Key Agreement Protocol for {EMV} 2nd
                  Gen Payments},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {364--379},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919666},
  doi          = {10.1109/CSF54842.2022.9919666},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HorneMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fscd/AcclavioHMS22,
  author       = {Matteo Acclavio and
                  Ross Horne and
                  Sjouke Mauw and
                  Lutz Stra{\ss}burger},
  editor       = {Amy P. Felty},
  title        = {A Graphical Proof Theory of Logical Time},
  booktitle    = {7th International Conference on Formal Structures for Computation
                  and Deduction, {FSCD} 2022, August 2-5, 2022, Haifa, Israel},
  series       = {LIPIcs},
  volume       = {228},
  pages        = {22:1--22:25},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.FSCD.2022.22},
  doi          = {10.4230/LIPICS.FSCD.2022.22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fscd/AcclavioHMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/HohnMA22,
  author       = {Sviatlana H{\"{o}}hn and
                  Sjouke Mauw and
                  Nicholas Asher},
  editor       = {Ceren Budak and
                  Meeyoung Cha and
                  Daniele Quercia},
  title        = {BelElect: {A} New Dataset for Bias Research from a "Dark"
                  Platform},
  booktitle    = {Proceedings of the Sixteenth International {AAAI} Conference on Web
                  and Social Media, {ICWSM} 2022, Atlanta, Georgia, USA, June 6-9, 2022},
  pages        = {1268--1274},
  publisher    = {{AAAI} Press},
  year         = {2022},
  url          = {https://ojs.aaai.org/index.php/ICWSM/article/view/19378},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icwsm/HohnMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-08686,
  author       = {Zach Smith and
                  Hugo Jonker and
                  Sjouke Mauw and
                  Hyunwoo Lee},
  title        = {Modelling Agent-Skipping Attacks in Message Forwarding Protocols},
  journal      = {CoRR},
  volume       = {abs/2201.08686},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.08686},
  eprinttype    = {arXiv},
  eprint       = {2201.08686},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-08686.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BursucM22,
  author       = {Sergiu Bursuc and
                  Sjouke Mauw},
  title        = {Contingent payments from two-party signing and verification for abelian
                  groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {719},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/719},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BursucM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmcs/HorneM21,
  author       = {Ross Horne and
                  Sjouke Mauw},
  title        = {Discovering ePassport Vulnerabilities using Bisimilarity},
  journal      = {Log. Methods Comput. Sci.},
  volume       = {17},
  number       = {2},
  pages        = {24},
  year         = {2021},
  url          = {https://doi.org/10.23638/LMCS-17(2:24)2021},
  doi          = {10.23638/LMCS-17(2:24)2021},
  timestamp    = {Tue, 23 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lmcs/HorneM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BalogluBM021,
  author       = {Sevdenur Baloglu and
                  Sergiu Bursuc and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Election Verifiability Revisited: Automated Security Proofs and Attacks
                  on Helios and Belenios},
  booktitle    = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik,
                  Croatia, June 21-25, 2021},
  pages        = {1--15},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSF51468.2021.00019},
  doi          = {10.1109/CSF51468.2021.00019},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BalogluBM021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/BalogluBM021,
  author       = {Sevdenur Baloglu and
                  Sergiu Bursuc and
                  Sjouke Mauw and
                  Jun Pang},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  David Duenas{-}Cid and
                  Oksana Kulyk and
                  Peter B. R{\o}nne and
                  Mihkel Solvak and
                  Micha Germann},
  title        = {Provably Improving Election Verifiability in Belenios},
  booktitle    = {Electronic Voting - 6th International Joint Conference, E-Vote-ID
                  2021, Virtual Event, October 5-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12900},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86942-7\_1},
  doi          = {10.1007/978-3-030-86942-7\_1},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/BalogluBM021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictac/HorneMY21,
  author       = {Ross Horne and
                  Sjouke Mauw and
                  Semen Yurkov},
  editor       = {Antonio Cerone and
                  Peter Csaba {\"{O}}lveczky},
  title        = {Compositional Analysis of Protocol Equivalence in the Applied {\(\pi\)}-Calculus
                  Using Quasi-open Bisimilarity},
  booktitle    = {Theoretical Aspects of Computing - {ICTAC} 2021 - 18th International
                  Colloquium, Virtual Event, Nur-Sultan, Kazakhstan, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12819},
  pages        = {235--255},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85315-0\_14},
  doi          = {10.1007/978-3-030-85315-0\_14},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ictac/HorneMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/misdoom/HohnAM21,
  author       = {Sviatlana H{\"{o}}hn and
                  Nicholas Asher and
                  Sjouke Mauw},
  editor       = {Jonathan Bright and
                  Anastasia Giachanou and
                  Viktoria Spaiser and
                  Francesca Spezzano and
                  Anna George and
                  Alexandra Pavliuc},
  title        = {Examining Linguistic Biases in Telegram with a Game Theoretic Analysis},
  booktitle    = {Disinformation in Open Online Media - Third Multidisciplinary International
                  Symposium, {MISDOOM} 2021, Virtual Event, September 21-22, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12887},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-87031-7\_2},
  doi          = {10.1007/978-3-030-87031-7\_2},
  timestamp    = {Sat, 09 Apr 2022 12:39:48 +0200},
  biburl       = {https://dblp.org/rec/conf/misdoom/HohnAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-02029,
  author       = {Ross Horne and
                  Sjouke Mauw and
                  Semen Yurkov},
  title        = {Breaking and Fixing Unlinkability of the Key Agreement Protocol for
                  2nd Gen {EMV} Payments},
  journal      = {CoRR},
  volume       = {abs/2105.02029},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.02029},
  eprinttype    = {arXiv},
  eprint       = {2105.02029},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-02029.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalogluBMP21,
  author       = {Sevdenur Baloglu and
                  Sergiu Bursuc and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Provably Improving Election Verifiability in Belenios},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1201},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1201},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalogluBMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BuldasGLMT20,
  author       = {Ahto Buldas and
                  Olga Gadyatskaya and
                  Aleksandr Lenin and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  title        = {Attribute evaluation on attack trees with incomplete information},
  journal      = {Comput. Secur.},
  volume       = {88},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101630},
  doi          = {10.1016/J.COSE.2019.101630},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BuldasGLMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ChenMR20,
  author       = {Xihui Chen and
                  Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz},
  title        = {Publishing Community-Preserving Attributed Social Graphs with a Differential
                  Privacy Guarantee},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {4},
  pages        = {131--152},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0066},
  doi          = {10.2478/POPETS-2020-0066},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/ChenMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/PilgunGZDKM20,
  author       = {Aleksandr Pilgun and
                  Olga Gadyatskaya and
                  Yury Zhauniarovich and
                  Stanislav Dashevskyi and
                  Artsiom Kushniarou and
                  Sjouke Mauw},
  title        = {Fine-grained Code Coverage Measurement in Automated Black-box Android
                  Testing},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {29},
  number       = {4},
  pages        = {23:1--23:35},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395042},
  doi          = {10.1145/3395042},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/PilgunGZDKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TorresBNPJM20,
  author       = {Christof Ferreira Torres and
                  Mathis Baden and
                  Robert Norvill and
                  Beltran Borja Fiz Pontiveros and
                  Hugo Jonker and
                  Sjouke Mauw},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {{\AE}GIS: Shielding Vulnerable Smart Contracts Against Attacks},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {584--597},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384756},
  doi          = {10.1145/3320269.3384756},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TorresBNPJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChenKMR20,
  author       = {Xihui Chen and
                  Ema K{\"{e}}puska and
                  Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Active Re-identification Attacks on Periodically Released Dynamic
                  Social Graphs},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {185--205},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_10},
  doi          = {10.1007/978-3-030-59013-0\_10},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChenKMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/GabbayHMT20,
  author       = {Dov M. Gabbay and
                  Ross Horne and
                  Sjouke Mauw and
                  Leendert van der Torre},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence
                  Trees},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {143--165},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_8},
  doi          = {10.1007/978-3-030-62230-5\_8},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/GabbayHMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-07309,
  author       = {Ross Horne and
                  Sjouke Mauw},
  title        = {Discovering ePassport Vulnerabilities using Bisimilarity},
  journal      = {CoRR},
  volume       = {abs/2002.07309},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.07309},
  eprinttype    = {arXiv},
  eprint       = {2002.07309},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-07309.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-05987,
  author       = {Christof Ferreira Torres and
                  Mathis Baden and
                  Robert Norvill and
                  Beltran Borja Fiz Pontiveros and
                  Hugo Jonker and
                  Sjouke Mauw},
  title        = {{\AE}GIS: Shielding Vulnerable Smart Contracts Against Attacks},
  journal      = {CoRR},
  volume       = {abs/2003.05987},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.05987},
  eprinttype    = {arXiv},
  eprint       = {2003.05987},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-05987.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-05312,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Preventing active re-identification attacks on social graphs via sybil
                  subgraph obfuscation},
  journal      = {CoRR},
  volume       = {abs/2007.05312},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.05312},
  eprinttype    = {arXiv},
  eprint       = {2007.05312},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-05312.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalogluBMP20,
  author       = {Sevdenur Baloglu and
                  Sergiu Bursuc and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Election Verifiability Revisited: Automated Security Proofs and Attacks
                  on Helios and Belenios},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {982},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/982},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalogluBMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/datamine/MauwRT19,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Robust active attacks on social graphs},
  journal      = {Data Min. Knowl. Discov.},
  volume       = {33},
  number       = {5},
  pages        = {1357--1392},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10618-019-00631-5},
  doi          = {10.1007/S10618-019-00631-5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/datamine/MauwRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/MauwRT19,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Conditional adjacency anonymity in social graphs under active attacks},
  journal      = {Knowl. Inf. Syst.},
  volume       = {61},
  number       = {1},
  pages        = {485--511},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10115-018-1283-x},
  doi          = {10.1007/S10115-018-1283-X},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kais/MauwRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MauwSTT19,
  author       = {Sjouke Mauw and
                  Zach Smith and
                  Jorge Toro{-}Pozo and
                  Rolando Trujillo{-}Rasua},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Post-Collusion Security and Distance Bounding},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {941--958},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3345651},
  doi          = {10.1145/3319535.3345651},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MauwSTT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FilimonovHMS19,
  author       = {Ihor Filimonov and
                  Ross Horne and
                  Sjouke Mauw and
                  Zach Smith},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Breaking Unlinkability of the {ICAO} 9303 Standard for e-Passports
                  Using Bisimilarity},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {577--594},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_28},
  doi          = {10.1007/978-3-030-29959-0\_28},
  timestamp    = {Fri, 07 Aug 2020 17:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FilimonovHMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/GadyatskayaM19,
  author       = {Olga Gadyatskaya and
                  Sjouke Mauw},
  editor       = {Massimiliano Albanese and
                  Ross Horne and
                  Christian W. Probst},
  title        = {Attack-Tree Series: {A} Case for Dynamic Attack Tree Analysis},
  booktitle    = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF
                  2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11720},
  pages        = {7--19},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36537-0\_2},
  doi          = {10.1007/978-3-030-36537-0\_2},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/GadyatskayaM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2019,
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5},
  doi          = {10.1007/978-3-030-31511-5},
  isbn         = {978-3-030-31510-8},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-00280,
  author       = {Xihui Chen and
                  Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz},
  title        = {Publishing Community-Preserving Attributed Social Graphs with a Differential
                  Privacy Guarantee},
  journal      = {CoRR},
  volume       = {abs/1909.00280},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.00280},
  eprinttype    = {arXiv},
  eprint       = {1909.00280},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-00280.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-09534,
  author       = {Xihui Chen and
                  Ema K{\"{e}}puska and
                  Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz},
  title        = {Active Re-identification Attacks on Periodically Released Dynamic
                  Social Graphs},
  journal      = {CoRR},
  volume       = {abs/1911.09534},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.09534},
  eprinttype    = {arXiv},
  eprint       = {1911.09534},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-09534.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MauwRT18,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Anonymising social graphs in the presence of active attackers},
  journal      = {Trans. Data Priv.},
  volume       = {11},
  number       = {2},
  pages        = {169--198},
  year         = {2018},
  url          = {http://www.tdp.cat/issues16/tdp.a285a17.pdf},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdp/MauwRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MauwSTT18,
  author       = {Sjouke Mauw and
                  Zach Smith and
                  Jorge Toro{-}Pozo and
                  Rolando Trujillo{-}Rasua},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Automated Identification of Desynchronisation Attacks on Shared Secrets},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {406--426},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_20},
  doi          = {10.1007/978-3-319-99073-6\_20},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MauwSTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/HorneMT18,
  author       = {Ross Horne and
                  Sjouke Mauw and
                  Alwen Tiu},
  editor       = {George Cybenko and
                  David J. Pym and
                  Barbara Fila},
  title        = {The Attacker Does not Always Hold the Initiative: Attack Trees with
                  External Refinement},
  booktitle    = {5th International Workshop on Graphical Models for Security, held
                  in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC
                  2018, Oxford, UK, July 8, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11086},
  pages        = {90--110},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15465-3\_6},
  doi          = {10.1007/978-3-030-15465-3\_6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/HorneMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MauwSTT18,
  author       = {Sjouke Mauw and
                  Zach Smith and
                  Jorge Toro{-}Pozo and
                  Rolando Trujillo{-}Rasua},
  title        = {Distance-Bounding Protocols: Verification without Time and Location},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {549--566},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00001},
  doi          = {10.1109/SP.2018.00001},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MauwSTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/JhawarLMR18,
  author       = {Ravi Jhawar and
                  Karim Lounis and
                  Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {Semi-automatically Augmenting Attack Trees Using an Annotated Attack
                  Tree Library},
  booktitle    = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  pages        = {85--101},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3\_6},
  doi          = {10.1007/978-3-030-01141-3\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/JhawarLMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2017gramsec,
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-74860-3},
  doi          = {10.1007/978-3-319-74860-3},
  isbn         = {978-3-319-74859-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2017gramsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-10915,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Robust active attacks on social graphs},
  journal      = {CoRR},
  volume       = {abs/1811.10915},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.10915},
  eprinttype    = {arXiv},
  eprint       = {1811.10915},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-10915.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-10754,
  author       = {Ahto Buldas and
                  Olga Gadyatskaya and
                  Aleksandr Lenin and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  title        = {Attribute Evaluation on Attack Trees with Incomplete Information},
  journal      = {CoRR},
  volume       = {abs/1812.10754},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.10754},
  eprinttype    = {arXiv},
  eprint       = {1812.10754},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-10754.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/HorneMT17,
  author       = {Ross Horne and
                  Sjouke Mauw and
                  Alwen Tiu},
  title        = {Semantics for Specialising Attack Trees based on Linear Logic},
  journal      = {Fundam. Informaticae},
  volume       = {153},
  number       = {1-2},
  pages        = {57--86},
  year         = {2017},
  url          = {https://doi.org/10.3233/FI-2017-1531},
  doi          = {10.3233/FI-2017-1531},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/HorneMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JonkerM17,
  author       = {Hugo Jonker and
                  Sjouke Mauw},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {A Security Perspective on Publication Metrics},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_21},
  doi          = {10.1007/978-3-319-71075-4\_21},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/JonkerM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GadyatskayaJMTW17,
  author       = {Olga Gadyatskaya and
                  Ravi Jhawar and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua and
                  Tim A. C. Willemse},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Refinement-Aware Generation of Attack Trees},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {164--179},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_11},
  doi          = {10.1007/978-3-319-68063-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GadyatskayaJMTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/JonkerMS17,
  author       = {Hugo Jonker and
                  Sjouke Mauw and
                  Tom Schmitz},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Nadja Braun Binder and
                  Norbert Kersting and
                  Olivier Pereira and
                  Carsten Sch{\"{u}}rmann},
  title        = {Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate
                  Online Elections},
  booktitle    = {Electronic Voting - Second International Joint Conference, E-Vote-ID
                  2017, Bregenz, Austria, October 24-27, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10615},
  pages        = {183--197},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68687-5\_11},
  doi          = {10.1007/978-3-319-68687-5\_11},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/JonkerMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MauwRT17,
  author       = {Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz and
                  Rolando Trujillo{-}Rasua},
  title        = {Rethinking (k, {\unicode{120001}})-anonymity in social graphs: (k,
                  {\unicode{120001}})-adjacency anonymity and (k, {\unicode{120001}})-(adjacency)
                  anonymous transformations},
  journal      = {CoRR},
  volume       = {abs/1704.07078},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.07078},
  eprinttype    = {arXiv},
  eprint       = {1704.07078},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MauwRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GadyatskayaHMMM16,
  author       = {Olga Gadyatskaya and
                  Carlo Harpes and
                  Sjouke Mauw and
                  C{\'{e}}dric Muller and
                  Steve Muller},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies
                  with Theory of Attack Trees},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {80--93},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_5},
  doi          = {10.1007/978-3-319-46263-9\_5},
  timestamp    = {Wed, 17 Feb 2021 14:43:58 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GadyatskayaHMMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MauwTX16,
  author       = {Sjouke Mauw and
                  Rolando Trujillo{-}Rasua and
                  Bochuan Xuan},
  editor       = {Silvio Ranise and
                  Vipin Swarup},
  title        = {Counteracting Active Attacks in Social Network Graphs},
  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9766},
  pages        = {233--248},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41483-6\_17},
  doi          = {10.1007/978-3-319-41483-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MauwTX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/MauwTT16,
  author       = {Sjouke Mauw and
                  Jorge Toro{-}Pozo and
                  Rolando Trujillo{-}Rasua},
  title        = {A Class of Precomputation-Based Distance-Bounding Protocols},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {97--111},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.19},
  doi          = {10.1109/EUROSP.2016.19},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/MauwTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/GadyatskayaJKLM16,
  author       = {Olga Gadyatskaya and
                  Ravi Jhawar and
                  Piotr Kordy and
                  Karim Lounis and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  editor       = {Gul Agha and
                  Benny Van Houdt},
  title        = {Attack Trees for Practical Security Assessment: Ranking of Attack
                  Scenarios with ADTool 2.0},
  booktitle    = {Quantitative Evaluation of Systems - 13th International Conference,
                  {QEST} 2016, Quebec City, QC, Canada, August 23-25, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9826},
  pages        = {159--162},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43425-4\_10},
  doi          = {10.1007/978-3-319-43425-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/qest/GadyatskayaJKLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/MauwTT16,
  author       = {Sjouke Mauw and
                  Jorge Toro{-}Pozo and
                  Rolando Trujillo{-}Rasua},
  editor       = {Gerhard P. Hancke and
                  Konstantinos Markantonakis},
  title        = {Optimality Results on the Security of Lookup-Based Protocols},
  booktitle    = {Radio Frequency Identification and IoT Security - 12th International
                  Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2,
                  2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10155},
  pages        = {137--150},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62024-4\_10},
  doi          = {10.1007/978-3-319-62024-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/MauwTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JonkerMT16,
  author       = {Hugo L. Jonker and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {19--25},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_3},
  doi          = {10.1007/978-3-319-62033-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JonkerMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/JhawarLM16,
  author       = {Ravi Jhawar and
                  Karim Lounis and
                  Sjouke Mauw},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {A Stochastic Framework for Quantitative Analysis of Attack-Defense
                  Trees},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {138--153},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_10},
  doi          = {10.1007/978-3-319-46598-2\_10},
  timestamp    = {Sat, 19 Oct 2019 20:20:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/JhawarLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/LenziniMO16,
  author       = {Gabriele Lenzini and
                  Sjouke Mauw and
                  Samir Ouchani},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical
                  Systems},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {170--178},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_12},
  doi          = {10.1007/978-3-319-46598-2\_12},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/LenziniMO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2015gramsec,
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29968-6},
  doi          = {10.1007/978-3-319-29968-6},
  isbn         = {978-3-319-29967-9},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2015gramsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifiptm/2016,
  editor       = {Sheikh Mahbub Habib and
                  Julita Vassileva and
                  Sjouke Mauw and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Trust Management {X} - 10th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {473},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41354-9},
  doi          = {10.1007/978-3-319-41354-9},
  isbn         = {978-3-319-41353-2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LenziniMO15,
  author       = {Gabriele Lenzini and
                  Sjouke Mauw and
                  Samir Ouchani},
  title        = {Security analysis of socio-technical physical systems},
  journal      = {Comput. Electr. Eng.},
  volume       = {47},
  pages        = {258--274},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.compeleceng.2015.02.019},
  doi          = {10.1016/J.COMPELECENG.2015.02.019},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/LenziniMO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/AvoineMT15,
  author       = {Gildas Avoine and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  title        = {Comparing distance bounding protocols: {A} critical mission supported
                  by decision theory},
  journal      = {Comput. Commun.},
  volume       = {67},
  pages        = {92--102},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comcom.2015.06.007},
  doi          = {10.1016/J.COMCOM.2015.06.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/AvoineMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TorresJM15,
  author       = {Christof Ferreira Torres and
                  Hugo L. Jonker and
                  Sjouke Mauw},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_1},
  doi          = {10.1007/978-3-319-24177-7\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/TorresJM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/MauwR15,
  author       = {Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Generalizing Multi-party Contract Signing},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {156--175},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_9},
  doi          = {10.1007/978-3-662-46666-7\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/MauwR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/JhawarKMRT15,
  author       = {Ravi Jhawar and
                  Barbara Kordy and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Rolando Trujillo{-}Rasua},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Attack Trees with Sequential Conjunction},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_23},
  doi          = {10.1007/978-3-319-18467-8\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/JhawarKMRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JonkerMR15,
  author       = {Hugo Jonker and
                  Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Location-Private Interstellar Communication},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {105--115},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_11},
  doi          = {10.1007/978-3-319-26096-9\_11},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/JonkerMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mauw15,
  author       = {Sjouke Mauw},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Location-Private Interstellar Communication (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {116--125},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_12},
  doi          = {10.1007/978-3-319-26096-9\_12},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mauw15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/corr/PangLM15,
  editor       = {Jun Pang and
                  Yang Liu and
                  Sjouke Mauw},
  title        = {Proceedings 4th International Workshop on Engineering Safety and Security
                  Systems, {ESSS} 2015, Oslo, Norway, June 22, 2015},
  series       = {{EPTCS}},
  volume       = {184},
  year         = {2015},
  url          = {https://doi.org/10.4204/EPTCS.184},
  doi          = {10.4204/EPTCS.184},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PangLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MauwR15,
  author       = {Sjouke Mauw and
                  Sasa Radomirovic},
  title        = {Generalizing Multi-party Contract Signing},
  journal      = {CoRR},
  volume       = {abs/1501.03868},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.03868},
  eprinttype    = {arXiv},
  eprint       = {1501.03868},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MauwR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JhawarKMRT15,
  author       = {Ravi Jhawar and
                  Barbara Kordy and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Rolando Trujillo{-}Rasua},
  title        = {Attack Trees with Sequential Conjunction},
  journal      = {CoRR},
  volume       = {abs/1503.02261},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.02261},
  eprinttype    = {arXiv},
  eprint       = {1503.02261},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JhawarKMRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AvoineMT15,
  author       = {Gildas Avoine and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  title        = {Comparing Distance Bounding Protocols: a Critical Mission Supported
                  by Decision Theory},
  journal      = {CoRR},
  volume       = {abs/1503.04593},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.04593},
  eprinttype    = {arXiv},
  eprint       = {1503.04593},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AvoineMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/KordyMRS14,
  author       = {Barbara Kordy and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Patrick Schweitzer},
  title        = {Attack-defense trees},
  journal      = {J. Log. Comput.},
  volume       = {24},
  number       = {1},
  pages        = {55--87},
  year         = {2014},
  url          = {https://doi.org/10.1093/logcom/exs029},
  doi          = {10.1093/LOGCOM/EXS029},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/logcom/KordyMRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/KordyLMP14,
  author       = {Piotr Kordy and
                  Rom Langerak and
                  Sjouke Mauw and
                  Jan Willem Polderman},
  editor       = {Cliff B. Jones and
                  Pekka Pihlajasaari and
                  Jun Sun},
  title        = {A Symbolic Algorithm for the Analysis of Robust Timed Automata},
  booktitle    = {{FM} 2014: Formal Methods - 19th International Symposium, Singapore,
                  May 12-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8442},
  pages        = {351--366},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06410-9\_25},
  doi          = {10.1007/978-3-319-06410-9\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/KordyLMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/MullerLMZ14,
  author       = {Tim Muller and
                  Yang Liu and
                  Sjouke Mauw and
                  Jie Zhang},
  editor       = {Jianying Zhou and
                  Nurit Gal{-}Oz and
                  Jie Zhang and
                  Ehud Gudes},
  title        = {On Robustness of Trust Systems},
  booktitle    = {Trust Management {VIII} - 8th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2014, Singapore, July 7-10, 2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {430},
  pages        = {44--60},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43813-8\_4},
  doi          = {10.1007/978-3-662-43813-8\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/MullerLMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2014,
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2},
  doi          = {10.1007/978-3-319-11851-2},
  isbn         = {978-3-319-11850-5},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/corr/KordyMP14,
  editor       = {Barbara Kordy and
                  Sjouke Mauw and
                  Wolter Pieters},
  title        = {Proceedings First International Workshop on Graphical Models for Security,
                  GraMSec 2014, Grenoble, France, April 12, 2014},
  series       = {{EPTCS}},
  volume       = {148},
  year         = {2014},
  url          = {https://doi.org/10.4204/EPTCS.148},
  doi          = {10.4204/EPTCS.148},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KordyMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csr/JonkerMP13,
  author       = {Hugo Jonker and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Privacy and verifiability in voting systems: Methods, developments
                  and trends},
  journal      = {Comput. Sci. Rev.},
  volume       = {10},
  pages        = {1--30},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cosrev.2013.08.002},
  doi          = {10.1016/J.COSREV.2013.08.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csr/JonkerMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChenLMP13,
  author       = {Xihui Chen and
                  Gabriele Lenzini and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Design and Formal Analysis of {A} Group Signature Based Electronic
                  Toll Pricing System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {55--75},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.055},
  doi          = {10.22667/JOWUA.2013.03.31.055},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChenLMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenHLMMP13,
  author       = {Xihui Chen and
                  Carlo Harpes and
                  Gabriele Lenzini and
                  Miguel Martins and
                  Sjouke Mauw and
                  Jun Pang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Demonstrating a trust framework for evaluating {GNSS} signal integrity},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1329--1332},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2512492},
  doi          = {10.1145/2508859.2512492},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenHLMMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChenLMMP13,
  author       = {Xihui Chen and
                  Gabriele Lenzini and
                  Miguel Martins and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {A Trust Framework for Evaluating {GNSS} Signal Integrity},
  booktitle    = {2013 {IEEE} 26th Computer Security Foundations Symposium, New Orleans,
                  LA, USA, June 26-28, 2013},
  pages        = {179--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CSF.2013.19},
  doi          = {10.1109/CSF.2013.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChenLMMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/PangLM13,
  author       = {Jun Pang and
                  Yang Liu and
                  Sjouke Mauw},
  title        = {Message from {ESSS} 2013 Workshop Co-chairs},
  booktitle    = {Sixth {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2013 Workshops Proceedings, Luxembourg, Luxembourg,
                  March 18-22, 2013},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICSTW.2013.63},
  doi          = {10.1109/ICSTW.2013.63},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icst/PangLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/KordyKMS13,
  author       = {Barbara Kordy and
                  Piotr Kordy and
                  Sjouke Mauw and
                  Patrick Schweitzer},
  editor       = {Kaustubh R. Joshi and
                  Markus Siegle and
                  Mari{\"{e}}lle Stoelinga and
                  Pedro R. D'Argenio},
  title        = {ADTool: Security Analysis with Attack-Defense Trees},
  booktitle    = {Quantitative Evaluation of Systems - 10th International Conference,
                  {QEST} 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8054},
  pages        = {173--176},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40196-1\_15},
  doi          = {10.1007/978-3-642-40196-1\_15},
  timestamp    = {Sat, 30 Sep 2023 09:55:03 +0200},
  biburl       = {https://dblp.org/rec/conf/qest/KordyKMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1305-6829,
  author       = {Barbara Kordy and
                  Piotr Kordy and
                  Sjouke Mauw and
                  Patrick Schweitzer},
  title        = {ADTool: Security Analysis with Attack- Defense Trees (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/1305.6829},
  year         = {2013},
  url          = {http://arxiv.org/abs/1305.6829},
  eprinttype    = {arXiv},
  eprint       = {1305.6829},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1305-6829.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/ChenHLMP14,
  author       = {Xihui Chen and
                  Carlo Harpes and
                  Gabriele Lenzini and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Location Assurance and Privacy in {GNSS} Navigation},
  journal      = {{ERCIM} News},
  volume       = {2013},
  number       = {94},
  year         = {2013},
  url          = {http://ercim-news.ercim.eu/en94/special/location-assurance-and-privacy-in-gnss-navigation},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/ChenHLMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JonkerMP13,
  author       = {Hugo Jonker and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Privacy and Verifiability in Voting Systems: Methods, Developments
                  and Trends},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JonkerMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Cremers12,
  author       = {Cas Cremers and
                  Sjouke Mauw},
  title        = {Operational Semantics and Verification of Security Protocols},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-540-78636-8},
  doi          = {10.1007/978-3-540-78636-8},
  isbn         = {978-3-540-78636-8},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Cremers12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/PiramuthuKZM12,
  author       = {Selwyn Piramuthu and
                  Gaurav Kapoor and
                  Wei Zhou and
                  Sjouke Mauw},
  title        = {Input online review data and related bias in recommender systems},
  journal      = {Decis. Support Syst.},
  volume       = {53},
  number       = {3},
  pages        = {418--424},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.dss.2012.02.006},
  doi          = {10.1016/J.DSS.2012.02.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/PiramuthuKZM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isse/ZhangZPM12,
  author       = {Ying Zhang and
                  Chenyi Zhang and
                  Jun Pang and
                  Sjouke Mauw},
  title        = {Game-based verification of contract signing protocols with minimal
                  messages},
  journal      = {Innov. Syst. Softw. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {111--124},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11334-012-0180-9},
  doi          = {10.1007/S11334-012-0180-9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isse/ZhangZPM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SunZPAM12,
  author       = {Yanjie Sun and
                  Chenyi Zhang and
                  Jun Pang and
                  Baptiste Alcalde and
                  Sjouke Mauw},
  title        = {A trust-augmented voting scheme for collaborative privacy management},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {437--459},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0453},
  doi          = {10.3233/JCS-2012-0453},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SunZPAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsb/YuanTPMWS12,
  author       = {Qixia Yuan and
                  Panuwat Trairatphisan and
                  Jun Pang and
                  Sjouke Mauw and
                  Monique Wiesinger and
                  Thomas Sauter},
  title        = {Probabilistic Model Checking of the {PDGF} Signaling Pathway},
  journal      = {Trans. Comp. Sys. Biology},
  volume       = {14},
  pages        = {151--180},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35524-0\_7},
  doi          = {10.1007/978-3-642-35524-0\_7},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsb/YuanTPMWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChenLMP12,
  author       = {Xihui Chen and
                  Gabriele Lenzini and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {A Group Signature Based Electronic Toll Pricing System},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {85--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.67},
  doi          = {10.1109/ARES.2012.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChenLMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KordyMS12,
  author       = {Barbara Kordy and
                  Sjouke Mauw and
                  Patrick Schweitzer},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Quantitative Questions on Attack-Defense Trees},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_5},
  doi          = {10.1007/978-3-642-37682-5\_5},
  timestamp    = {Thu, 12 Nov 2020 16:27:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KordyMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MauwP12,
  author       = {Sjouke Mauw and
                  Selwyn Piramuthu},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {A PUF-Based Authentication Protocol to Address Ticket-Switching of
                  RFID-Tagged Items},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {209--224},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_14},
  doi          = {10.1007/978-3-642-38004-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MauwP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/LiSPM12,
  author       = {Qian Li and
                  P{\'{e}}ter Schaffer and
                  Jun Pang and
                  Sjouke Mauw},
  editor       = {Tiziana Margaria and
                  Zongyan Qiu and
                  Hongli Yang},
  title        = {Comparative Analysis of Clustering Protocols with Probabilistic Model
                  Checking},
  booktitle    = {Sixth International Symposium on Theoretical Aspects of Software Engineering,
                  {TASE} 2012, 4-6 July 2012, Beijing, China},
  pages        = {249--252},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TASE.2012.28},
  doi          = {10.1109/TASE.2012.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tase/LiSPM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-8092,
  author       = {Barbara Kordy and
                  Sjouke Mauw and
                  Patrick Schweitzer},
  title        = {Quantitative Questions on Attack-Defense Trees},
  journal      = {CoRR},
  volume       = {abs/1210.8092},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.8092},
  eprinttype    = {arXiv},
  eprint       = {1210.8092},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-8092.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LenziniMP11,
  author       = {Gabriele Lenzini and
                  Sjouke Mauw and
                  Jun Pang},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Selective Location Blinding Using Hash Chains},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {132--141},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_12},
  doi          = {10.1007/978-3-642-25867-1\_12},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LenziniMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mauw11,
  author       = {Sjouke Mauw},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Selective Location Blinding Using Hash Chains (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {142--149},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_13},
  doi          = {10.1007/978-3-642-25867-1\_13},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mauw11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/JamrogaMM11,
  author       = {Wojciech Jamroga and
                  Sjouke Mauw and
                  Matthijs Melissen},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Fairness in Non-Repudiation Protocols},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {122--139},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_10},
  doi          = {10.1007/978-3-642-29963-6\_10},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/JamrogaMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DeursenMR11,
  author       = {Ton van Deursen and
                  Sjouke Mauw and
                  Sasa Radomirovic},
  title        = {mCarve: Carving Attributed Dump Sets},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Deursen.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DeursenMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/abs-1109-1367,
  author       = {Qixia Yuan and
                  Jun Pang and
                  Sjouke Mauw and
                  Panuwat Trairatphisan and
                  Monique Wiesinger and
                  Thomas Sauter},
  editor       = {Ion Petre and
                  Erik P. de Vink},
  title        = {A Study of the {PDGF} Signaling Pathway with {PRISM}},
  booktitle    = {Proceedings Third International Workshop on Computational Models for
                  Cell Processes, CompMod 2011, Aachen, Germany, September 10, 2011},
  series       = {{EPTCS}},
  volume       = {67},
  pages        = {65--81},
  year         = {2011},
  url          = {https://doi.org/10.4204/EPTCS.67.7},
  doi          = {10.4204/EPTCS.67.7},
  timestamp    = {Tue, 21 Mar 2023 21:05:31 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1109-1367.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1108-0574,
  author       = {Xihui Chen and
                  Gabriele Lenzini and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {A Group Signature Based Electronic Toll Pricing System},
  journal      = {CoRR},
  volume       = {abs/1108.0574},
  year         = {2011},
  url          = {http://arxiv.org/abs/1108.0574},
  eprinttype    = {arXiv},
  eprint       = {1108.0574},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1108-0574.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KordyMMS10,
  author       = {Barbara Kordy and
                  Sjouke Mauw and
                  Matthijs Melissen and
                  Patrick Schweitzer},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form
                  Games Are Equivalent},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {245--256},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_17},
  doi          = {10.1007/978-3-642-17197-0\_17},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KordyMMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/KordyMRS10,
  author       = {Barbara Kordy and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Patrick Schweitzer},
  editor       = {Pierpaolo Degano and
                  Sandro Etalle and
                  Joshua D. Guttman},
  title        = {Foundations of Attack-Defense Trees},
  booktitle    = {Formal Aspects of Security and Trust - 7th International Workshop,
                  {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6561},
  pages        = {80--95},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19751-2\_6},
  doi          = {10.1007/978-3-642-19751-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/KordyMRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MauwRR10,
  author       = {Sjouke Mauw and
                  Sasa Radomirovic and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Protocols for Secret Santa},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {175--184},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_26},
  doi          = {10.1007/978-3-662-45921-8\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MauwRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mauw10,
  author       = {Sjouke Mauw},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Protocols for Secret Santa (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {185--190},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_27},
  doi          = {10.1007/978-3-662-45921-8\_27},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mauw10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SunZPAM10,
  author       = {Yanjie Sun and
                  Chenyi Zhang and
                  Jun Pang and
                  Baptiste Alcalde and
                  Sjouke Mauw},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner},
  title        = {A Trust-Augmented Voting Scheme for Collaborative Privacy Management},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {132--146},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_9},
  doi          = {10.1007/978-3-642-22444-7\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SunZPAM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/DashtiM10,
  author       = {Mohammad Torabi Dashti and
                  Sjouke Mauw},
  editor       = {Burton Rosenberg},
  title        = {Fair Exchange},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {109--132},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c5},
  doi          = {10.1201/9781420059823-C5},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/DashtiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1006-2732,
  author       = {Barbara Kordy and
                  Sjouke Mauw and
                  Matthijs Melissen and
                  Patrick Schweitzer},
  title        = {Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form
                  Games Are Equivalent},
  journal      = {CoRR},
  volume       = {abs/1006.2732},
  year         = {2010},
  url          = {http://arxiv.org/abs/1006.2732},
  eprinttype    = {arXiv},
  eprint       = {1006.2732},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1006-2732.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jal/JonkerMP09,
  author       = {Hugo L. Jonker and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {A formal framework for quantifying voter-controlled privacy},
  journal      = {J. Algorithms},
  volume       = {64},
  number       = {2-3},
  pages        = {89--105},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jalgor.2009.02.007},
  doi          = {10.1016/J.JALGOR.2009.02.007},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jal/JonkerMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JonkerMP09,
  author       = {Hugo L. Jonker and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Measuring Voter-Controlled Privacy},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {289--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.81},
  doi          = {10.1109/ARES.2009.81},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JonkerMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Alcalde0MMR09,
  author       = {Baptiste Alcalde and
                  Eric Dubois and
                  Sjouke Mauw and
                  Nicolas Mayer and
                  Sasa Radomirovic},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Towards a Decision Model Based on Trust and Security Risk Management},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {61--69},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Alcalde.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Alcalde0MMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MauwRD09,
  author       = {Sjouke Mauw and
                  Sasa Radomirovic and
                  Mohammad Torabi Dashti},
  title        = {Minimal Message Complexity of Asynchronous Multi-party Contract Signing},
  booktitle    = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages        = {13--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSF.2009.15},
  doi          = {10.1109/CSF.2009.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MauwRD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DeursenMRV09,
  author       = {Ton van Deursen and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Pim Vullers},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Secure Ownership and Ownership Transfer in {RFID} Systems},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {637--654},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_39},
  doi          = {10.1007/978-3-642-04444-1\_39},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DeursenMRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/AlcaldeM09,
  author       = {Baptiste Alcalde and
                  Sjouke Mauw},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {An Algebra for Trust Dilution and Trust Fusion},
  booktitle    = {Formal Aspects in Security and Trust, 6th International Workshop,
                  {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5983},
  pages        = {4--20},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-12459-4\_2},
  doi          = {10.1007/978-3-642-12459-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/AlcaldeM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/ZhangZPM09,
  author       = {Ying Zhang and
                  Chenyi Zhang and
                  Jun Pang and
                  Sjouke Mauw},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Game-Based Verification of Multi-Party Contract Signing Protocols},
  booktitle    = {Formal Aspects in Security and Trust, 6th International Workshop,
                  {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5983},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-12459-4\_14},
  doi          = {10.1007/978-3-642-12459-4\_14},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/ZhangZPM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/AndovaCGMMR08,
  author       = {Suzana Andova and
                  Cas Cremers and
                  Kristian Gj{\o}steen and
                  Sjouke Mauw and
                  Stig Fr. Mj{\o}lsnes and
                  Sasa Radomirovic},
  title        = {A framework for compositional verification of security protocols},
  journal      = {Inf. Comput.},
  volume       = {206},
  number       = {2-4},
  pages        = {425--459},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ic.2007.07.002},
  doi          = {10.1016/J.IC.2007.07.002},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/AndovaCGMMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/MassacciPM08,
  author       = {Fabio Massacci and
                  Frank Piessens and
                  Sjouke Mauw},
  title        = {Preface},
  journal      = {Sci. Comput. Program.},
  volume       = {74},
  number       = {1-2},
  pages        = {1},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.scico.2008.09.002},
  doi          = {10.1016/J.SCICO.2008.09.002},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/MassacciPM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/BouwmanMP08,
  author       = {Bart Bouwman and
                  Sjouke Mauw and
                  Milan Petkovic},
  title        = {Rights Management for Role-Based Access Control},
  booktitle    = {5th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2008, Las Vegas, NV, USA, January 10-12, 2008},
  pages        = {1085--1090},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ccnc08.2007.246},
  doi          = {10.1109/CCNC08.2007.246},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/BouwmanMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DeursenMR08,
  author       = {Ton van Deursen and
                  Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {Untraceability of {RFID} Protocols},
  booktitle    = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5\_1},
  doi          = {10.1007/978-3-540-79966-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/DeursenMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2008,
  editor       = {Stig Fr. Mj{\o}lsnes and
                  Sjouke Mauw and
                  Sokratis K. Katsikas},
  title        = {Public Key Infrastructure, 5th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5057},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69485-4},
  doi          = {10.1007/978-3-540-69485-4},
  isbn         = {978-3-540-69484-7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/CederquistDM07,
  author       = {Jan Cederquist and
                  Muhammad Torabi Dashti and
                  Sjouke Mauw},
  title        = {A Certified Email Protocol Using Key Chains},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {525--530},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.10},
  doi          = {10.1109/AINAW.2007.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/CederquistDM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CeelenMR08,
  author       = {Pieter Ceelen and
                  Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {31--43},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.015},
  doi          = {10.1016/J.ENTCS.2007.12.015},
  timestamp    = {Mon, 13 Feb 2023 09:13:20 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CeelenMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/CremersMV06,
  author       = {Cas J. F. Cremers and
                  Sjouke Mauw and
                  Erik P. de Vink},
  title        = {Injective synchronisation: An extension of the authentication hierarchy},
  journal      = {Theor. Comput. Sci.},
  volume       = {367},
  number       = {1-2},
  pages        = {139--161},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2006.08.034},
  doi          = {10.1016/J.TCS.2006.08.034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/CremersMV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/MauwVB06,
  author       = {Sjouke Mauw and
                  Ivo van Vessem and
                  Bert Bos},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Forward Secure Communication in Wireless Sensor Networks},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {32--42},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_4},
  doi          = {10.1007/11734666\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/MauwVB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MauwVV07,
  author       = {Sjouke Mauw and
                  Jan Verschuren and
                  Erik P. de Vink},
  editor       = {Maurice H. ter Beek and
                  Fabio Gadducci},
  title        = {Data Anonymity in the {FOO} Voting Scheme},
  booktitle    = {Proceedings of the Second International Workshop on Views on Designing
                  Complex Architectures, VODCA@FOSAD 2006, Bertinoro, Italy, September
                  16-17, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {168},
  pages        = {5--28},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.11.001},
  doi          = {10.1016/J.ENTCS.2006.11.001},
  timestamp    = {Tue, 24 Jan 2023 11:14:31 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/MauwVV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2005,
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/157/issue/3},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0611062,
  author       = {Suzana Andova and
                  Cas Cremers and
                  Kristian Gj{\o}steen and
                  Sjouke Mauw and
                  Stig Fr. Mj{\o}lsnes and
                  Sasa Radomirovic},
  title        = {A framework for compositional verification of security protocols},
  journal      = {CoRR},
  volume       = {abs/cs/0611062},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0611062},
  eprinttype    = {arXiv},
  eprint       = {cs/0611062},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0611062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MauwO05,
  author       = {Sjouke Mauw and
                  Martijn Oostdijk},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Foundations of Attack Trees},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {186--198},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_17},
  doi          = {10.1007/11734727\_17},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MauwO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/NairGMM05,
  author       = {Gopakumar Nair and
                  Ajeesh Gopalakrishnan and
                  Sjouke Mauw and
                  Erik Moll},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {{XML} Security in the Next Generation Optical Disc Context},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {217--233},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_15},
  doi          = {10.1007/11552338\_15},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/NairGMM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MauwIC06,
  author       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Preface},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.045},
  doi          = {10.1016/J.ENTCS.2005.09.045},
  timestamp    = {Fri, 20 Jan 2023 11:50:26 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/MauwIC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CremersMV05,
  author       = {Cas J. F. Cremers and
                  Sjouke Mauw and
                  Erik P. de Vink},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {A Syntactic Criterion for Injectivity of Authentication Protocols},
  booktitle    = {Proceedings of the Second Workshop on Automated Reasoning for Security
                  Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {135},
  number       = {1},
  pages        = {23--38},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.06.006},
  doi          = {10.1016/J.ENTCS.2005.06.006},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/CremersMV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/MauwWW04,
  author       = {Sjouke Mauw and
                  Wouter T. Wiersma and
                  Tim A. C. Willemse},
  title        = {Language-Driven System Design},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {14},
  number       = {6},
  pages        = {625--663},
  year         = {2004},
  url          = {https://doi.org/10.1142/S0218194004001828},
  doi          = {10.1142/S0218194004001828},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/MauwWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MauwVV04,
  author       = {Sjouke Mauw and
                  Jan Verschuren and
                  Erik P. de Vink},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {A Formalization of Anonymity and Onion Routing},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_7},
  doi          = {10.1007/978-3-540-30108-0\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MauwVV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sam/CremersM04,
  author       = {Cas J. F. Cremers and
                  Sjouke Mauw},
  editor       = {Daniel Amyot and
                  Alan W. Williams},
  title        = {Checking Secrecy by Means of Partial Order Reduction},
  booktitle    = {System Analysis and Modeling, 4th International {SDL} and {MSC} Workshop,
                  {SAM} 2004, Ottawa, Canada, June 1-4, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3319},
  pages        = {171--188},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31810-1\_12},
  doi          = {10.1007/978-3-540-31810-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sam/CremersM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BlomGMS05,
  author       = {Stefan Blom and
                  Jan Friso Groote and
                  Sjouke Mauw and
                  Alexander Serebrenik},
  editor       = {Irek Ulidowski},
  title        = {Analysing the BKE-security Protocol with \emph{{\(\mathrm{\mu}\)}}CRL},
  booktitle    = {Proceedings of the 6th {AMAST} Workshop on Real-Time Systems, {ARTS}
                  2004, Stirling, UK, July 12, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {139},
  number       = {1},
  pages        = {49--90},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.005},
  doi          = {10.1016/J.ENTCS.2005.09.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/BlomGMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scheduling/BorstBGM03,
  author       = {Sem C. Borst and
                  Onno J. Boxma and
                  Jan Friso Groote and
                  Sjouke Mauw},
  title        = {Task Allocation in a Multi-Server System},
  journal      = {J. Sched.},
  volume       = {6},
  number       = {5},
  pages        = {423--436},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1024840405535},
  doi          = {10.1023/A:1024840405535},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scheduling/BorstBGM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/CremersM03,
  author       = {Cas Cremers and
                  Sjouke Mauw},
  editor       = {Stefan Leue and
                  Tarja Syst{\"{a}}},
  title        = {Operational Semantics of Security Protocols},
  booktitle    = {Scenarios: Models, Transformations and Tools, International Workshop,
                  Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3466},
  pages        = {66--89},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11495628\_4},
  doi          = {10.1007/11495628\_4},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/CremersM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fates/BeekM03,
  author       = {Harm M. A. van Beek and
                  Sjouke Mauw},
  editor       = {Alexandre Petrenko and
                  Andreas Ulrich},
  title        = {Automatic Conformance Testing of Internet Applications},
  booktitle    = {Formal Approaches to Software Testing, Third International Workshop
                  on Formal Approaches to Testing of Software, {FATES} 2003, Montreal,
                  Quebec, Canada, October 6th, 2003},
  series       = {Lecture Notes in Computer Science},
  volume       = {2931},
  pages        = {205--222},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24617-6\_15},
  doi          = {10.1007/978-3-540-24617-6\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fates/BeekM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/EngelsMR02,
  author       = {Andr{\'{e}} Engels and
                  Sjouke Mauw and
                  Michel A. Reniers},
  title        = {A hierarchy of communication models for Message Sequence Charts},
  journal      = {Sci. Comput. Program.},
  volume       = {44},
  number       = {3},
  pages        = {253--292},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0167-6423(02)00022-9},
  doi          = {10.1016/S0167-6423(02)00022-9},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/EngelsMR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/MauwWW02,
  author       = {Sjouke Mauw and
                  Wouter T. Wiersma and
                  Tim A. C. Willemse},
  title        = {Language Driven System Design},
  booktitle    = {35th Hawaii International Conference on System Sciences {(HICSS-35}
                  2002), {CD-ROM} / Abstracts Proceedings, 7-10 January 2002, Big Island,
                  HI, {USA}},
  pages        = {280},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/HICSS.2002.994488},
  doi          = {10.1109/HICSS.2002.994488},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/MauwWW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pts/FeijsGMT02,
  author       = {Loe M. G. Feijs and
                  Nicolae Goga and
                  Sjouke Mauw and
                  Jan Tretmans},
  editor       = {Ina Schieferdecker and
                  Hartmut K{\"{o}}nig and
                  Adam Wolisz},
  title        = {Test Selection, Trace Distance and Heuristics},
  booktitle    = {Testing of Communicating Systems XIV, Applications to Internet Technologies
                  and Services, Proceedings of the {IFIP} 14th International Conference
                  on Testing Communicating Systems - TestCom 2002, Berlin, Germany,
                  March 19-22, 2002},
  series       = {{IFIP} Conference Proceedings},
  volume       = {210},
  pages        = {267--282},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Mon, 22 Jul 2002 15:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pts/FeijsGMT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cl/Mauw01,
  author       = {Sjouke Mauw},
  title        = {Introduction by the guest editor},
  journal      = {Comput. Lang.},
  volume       = {27},
  number       = {1/3},
  pages        = {1--2},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0096-0551(01)00012-1},
  doi          = {10.1016/S0096-0551(01)00012-1},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cl/Mauw01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/GrooteHMV01,
  author       = {Jan Friso Groote and
                  Wim H. Hesselink and
                  Sjouke Mauw and
                  Rogier Vermeulen},
  title        = {An algorithm for the asynchronous Write-All problem based on process
                  collision},
  journal      = {Distributed Comput.},
  volume       = {14},
  number       = {2},
  pages        = {75--81},
  year         = {2001},
  url          = {https://doi.org/10.1007/PL00008930},
  doi          = {10.1007/PL00008930},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/GrooteHMV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/VoorhoeveM01,
  author       = {Marc Voorhoeve and
                  Sjouke Mauw},
  title        = {Impossible futures and determinism},
  journal      = {Inf. Process. Lett.},
  volume       = {80},
  number       = {1},
  pages        = {51--58},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0020-0190(01)00217-4},
  doi          = {10.1016/S0020-0190(01)00217-4},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/VoorhoeveM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BaetenBM01,
  author       = {Jos C. M. Baeten and
                  Harm M. A. van Beek and
                  Sjouke Mauw},
  editor       = {Gary B. Lamont},
  title        = {Specifying internet applications with DiCons},
  booktitle    = {Proceedings of the 2001 {ACM} Symposium on Applied Computing (SAC),
                  March 11-14, 2001, Las Vegas, NV, {USA}},
  pages        = {576--584},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/372202.372466},
  doi          = {10.1145/372202.372466},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BaetenBM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdl/BaetenBM01,
  author       = {Jos C. M. Baeten and
                  Harm M. A. van Beek and
                  Sjouke Mauw},
  editor       = {Rick Reed and
                  Jeanne Reed},
  title        = {An {MSC} Based Representation of DiCons},
  booktitle    = {{SDL} 2001: Meeting UML, 10th International {SDL} Forum Copenhagen,
                  Denmark, June 27-29, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2078},
  pages        = {328--347},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-48213-X\_21},
  doi          = {10.1007/3-540-48213-X\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdl/BaetenBM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/01/MauwR01,
  author       = {Sjouke Mauw and
                  Michel A. Reniers},
  editor       = {Jan A. Bergstra and
                  Alban Ponse and
                  Scott A. Smolka},
  title        = {A Process Algebra for Interworkings},
  booktitle    = {Handbook of Process Algebra},
  pages        = {1269--1327},
  publisher    = {North-Holland / Elsevier},
  year         = {2001},
  url          = {https://doi.org/10.1016/b978-044482830-9/50037-0},
  doi          = {10.1016/B978-044482830-9/50037-0},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/01/MauwR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euromicro/VrankenGMF00,
  author       = {Harald P. E. Vranken and
                  Tom{\'{a}}s Garci{\'{a}} Garci{\'{a}} and
                  Sjouke Mauw and
                  Loe M. G. Feijs},
  title        = {{IC} Design Validation Using Message Sequence Charts},
  booktitle    = {26th {EUROMICRO} 2000 Conference, Informatics: Inventing the Future,
                  5-7 September 2000, Maastricht, The Netherlands},
  pages        = {1122},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/EURMIC.2000.874624},
  doi          = {10.1109/EURMIC.2000.874624},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euromicro/VrankenGMF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sam/FeijsGM00,
  author       = {Loe M. G. Feijs and
                  Nicolae Goga and
                  Sjouke Mauw},
  editor       = {Edel Sherratt},
  title        = {Probabilities In The Torx Test Derivation Algorithm},
  booktitle    = {{SAM} 2000, 2nd Workshop on {SDL} and MSC, Col de Porte, Grenoble,
                  France, June 26-28, 2000},
  pages        = {173--188},
  publisher    = {VERIMAG, IRISA, {SDL} Forum},
  year         = {2000},
  timestamp    = {Thu, 16 Oct 2003 15:31:41 +0200},
  biburl       = {https://dblp.org/rec/conf/sam/FeijsGM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MauwR99,
  author       = {Sjouke Mauw and
                  Michel A. Reniers},
  title        = {Operational Semantics for MSC'96},
  journal      = {Comput. Networks},
  volume       = {31},
  number       = {17},
  pages        = {1785--1799},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1389-1286(99)00060-2},
  doi          = {10.1016/S1389-1286(99)00060-2},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MauwR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pts/BelinfanteFVTGFMH99,
  author       = {Axel Belinfante and
                  Jan Feenstra and
                  Ren{\'{e}} G. de Vries and
                  Jan Tretmans and
                  Nicolae Goga and
                  Loe M. G. Feijs and
                  Sjouke Mauw and
                  Lex Heerink},
  editor       = {Gyula Csopaki and
                  Sarolta Dibuz and
                  Katalin Tarnay},
  title        = {Formal Test Automation: {A} Simple Experiment},
  booktitle    = {Testing of Communicating Systems: Method and Applications, {IFIP}
                  {TC6} 12\({}^{\mbox{th}}\) International Workshop on Testing Communicating
                  Systems, September 1-3, 1999, Budapest, Hungary},
  series       = {{IFIP} Conference Proceedings},
  volume       = {147},
  pages        = {179--196},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Thu, 17 Oct 2002 11:13:46 +0200},
  biburl       = {https://dblp.org/rec/conf/pts/BelinfanteFVTGFMH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdl/EngelsFM99,
  author       = {Andr{\'{e}} Engels and
                  Loe M. G. Feijs and
                  Sjouke Mauw},
  editor       = {Rachida Dssouli and
                  Gregor von Bochmann and
                  Yair Lahav},
  title        = {{MSC} and data: dynamic variables},
  booktitle    = {{SDL} '99 The Next Millennium, 9th International {SDL} Forum, Montr{\'{e}}al,
                  Qu{\'{e}}bec, Canada, 21-25 June, 1999, Proceedings},
  pages        = {105},
  publisher    = {Elsevier},
  year         = {1999},
  timestamp    = {Sat, 07 Sep 2019 11:59:23 +0200},
  biburl       = {https://dblp.org/rec/conf/sdl/EngelsFM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spin/JanssenMMFS99,
  author       = {Wil Janssen and
                  Radu Mateescu and
                  Sjouke Mauw and
                  Peter Fennema and
                  Petra van der Stappen},
  editor       = {Dennis Dams and
                  Rob Gerth and
                  Stefan Leue and
                  Mieke Massink},
  title        = {Model Checking for Managers},
  booktitle    = {Theoretical and Practical Aspects of {SPIN} Model Checking, 5th and
                  6th International {SPIN} Workshops, Trento, Italy, July 5, 1999, Toulouse,
                  France, September 21 and 24 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1680},
  pages        = {92--107},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48234-2\_7},
  doi          = {10.1007/3-540-48234-2\_7},
  timestamp    = {Mon, 15 Jun 2020 17:08:41 +0200},
  biburl       = {https://dblp.org/rec/conf/spin/JanssenMMFS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/concur/1999,
  editor       = {Jos C. M. Baeten and
                  Sjouke Mauw},
  title        = {{CONCUR} '99: Concurrency Theory, 10th International Conference, Eindhoven,
                  The Netherlands, August 24-27, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1664},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48320-9},
  doi          = {10.1007/3-540-48320-9},
  isbn         = {3-540-66425-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/EngelsMR97,
  author       = {Andr{\'{e}} Engels and
                  Sjouke Mauw and
                  Michel A. Reniers},
  editor       = {Atsushi Togashi and
                  Tadanori Mizuno and
                  Norio Shiratori and
                  Teruo Higashino},
  title        = {A Hierarchy of Communication Models for Message Sequence Charts},
  booktitle    = {Formal Description Techniques and Protocol Specification, Testing
                  and Verification, {FORTE} {X} / {PSTV} XVII'97, {IFIP} {TC6} {WG6.1}
                  Joint International Conference on Formal Description Techniques for
                  Distributed Systems and Communication Protocols {(FORTE} {X)} and
                  Protocol Specification, Testing and Verification {(PSTV} XVII), 18-21
                  November, 1997, Osaka, Japan},
  series       = {{IFIP} Conference Proceedings},
  volume       = {107},
  pages        = {75--90},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Wed, 12 Feb 2003 15:40:21 +0100},
  biburl       = {https://dblp.org/rec/conf/forte/EngelsMR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdl/MauwR97,
  author       = {Sjouke Mauw and
                  Michel A. Reniers},
  editor       = {Ana R. Cavalli and
                  Amardeo Sarma},
  title        = {High-level message sequence charts},
  booktitle    = {{SDL} '97 Time for Testing, SDL, {MSC} and Trends - 8th International
                  {SDL} Forum, Evry, France, 23-29 September 1997, Proceedings},
  pages        = {291--306},
  publisher    = {Elsevier},
  year         = {1997},
  timestamp    = {Thu, 16 Oct 2003 14:16:32 +0200},
  biburl       = {https://dblp.org/rec/conf/sdl/MauwR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/EngelsFM97,
  author       = {Andr{\'{e}} Engels and
                  Loe M. G. Feijs and
                  Sjouke Mauw},
  editor       = {Ed Brinksma},
  title        = {Test Generation for Intelligent Networks Using Model Checking},
  booktitle    = {Tools and Algorithms for Construction and Analysis of Systems, Third
                  International Workshop, {TACAS} '97, Enschede, The Netherlands, April
                  2-4, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1217},
  pages        = {384--398},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0035401},
  doi          = {10.1007/BFB0035401},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/EngelsFM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Mauw96,
  author       = {Sjouke Mauw},
  title        = {The Formalization of Message Sequence Charts},
  journal      = {Comput. Networks {ISDN} Syst.},
  volume       = {28},
  number       = {12},
  pages        = {1643--1657},
  year         = {1996},
  url          = {https://doi.org/10.1016/0169-7552(95)00123-9},
  doi          = {10.1016/0169-7552(95)00123-9},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/Mauw96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/BrunekreefKKM96,
  author       = {Jacob Brunekreef and
                  Joost{-}Pieter Katoen and
                  Ron Koymans and
                  Sjouke Mauw},
  title        = {Design and Analysis of Dynamic Leader Election Protocols in Broadcast
                  Networks},
  journal      = {Distributed Comput.},
  volume       = {9},
  number       = {4},
  pages        = {157--171},
  year         = {1996},
  url          = {https://doi.org/10.1007/s004460050017},
  doi          = {10.1007/S004460050017},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/BrunekreefKKM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/MauwR96,
  author       = {Sjouke Mauw and
                  Michel A. Reniers},
  editor       = {Ugo Montanari and
                  Vladimiro Sassone},
  title        = {Refinement in Interworkings},
  booktitle    = {{CONCUR} '96, Concurrency Theory, 7th International Conference, Pisa,
                  Italy, August 26-29, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1119},
  pages        = {671--686},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61604-7\_83},
  doi          = {10.1007/3-540-61604-7\_83},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/MauwR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/DArgenioM95,
  author       = {Pedro R. D'Argenio and
                  Sjouke Mauw},
  editor       = {Insup Lee and
                  Scott A. Smolka},
  title        = {Delayed choice for process algebra with abstraction},
  booktitle    = {{CONCUR} '95: Concurrency Theory, 6th International Conference, Philadelphia,
                  PA, USA, August 21-24, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {962},
  pages        = {501--515},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60218-6\_38},
  doi          = {10.1007/3-540-60218-6\_38},
  timestamp    = {Thu, 26 Jan 2023 14:05:52 +0100},
  biburl       = {https://dblp.org/rec/conf/concur/DArgenioM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/MauwR94,
  author       = {Sjouke Mauw and
                  Michel A. Reniers},
  title        = {An Algebraic Semantics of Basic Message Sequence Charts},
  journal      = {Comput. J.},
  volume       = {37},
  number       = {4},
  pages        = {269--278},
  year         = {1994},
  url          = {https://doi.org/10.1093/comjnl/37.4.269},
  doi          = {10.1093/COMJNL/37.4.269},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/MauwR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/MauwM94,
  author       = {Sjouke Mauw and
                  Hans Mulder},
  editor       = {Bengt Jonsson and
                  Joachim Parrow},
  title        = {Regularity of BPA-Systems is Decidable},
  booktitle    = {{CONCUR} '94, Concurrency Theory, 5th International Conference, Uppsala,
                  Sweden, August 22-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {836},
  pages        = {34--47},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/978-3-540-48654-1\_4},
  doi          = {10.1007/978-3-540-48654-1\_4},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/MauwM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/BaetenM94,
  author       = {Jos C. M. Baeten and
                  Sjouke Mauw},
  editor       = {Dieter Hogrefe and
                  Stefan Leue},
  title        = {Delayed choice: an operator for joining Message Sequence Charts},
  booktitle    = {Formal Description Techniques VII, Proceedings of the 7th {IFIP} {WG6.1}
                  International Conference on Formal Description Techniques, Berne,
                  Switzerland, 1994},
  series       = {{IFIP} Conference Proceedings},
  volume       = {6},
  pages        = {340--354},
  publisher    = {Chapman {\&} Hall},
  year         = {1994},
  timestamp    = {Thu, 03 Jan 2002 11:58:39 +0100},
  biburl       = {https://dblp.org/rec/conf/forte/BaetenM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/BergstraMW91,
  author       = {Jan A. Bergstra and
                  Sjouke Mauw and
                  Freek Wiedijk},
  title        = {Uniform Algebraic Specifications of Finite Sets with Equality},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {2},
  number       = {1},
  pages        = {43--65},
  year         = {1991},
  url          = {https://doi.org/10.1142/S0129054191000042},
  doi          = {10.1142/S0129054191000042},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/BergstraMW91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/MauwV91,
  author       = {Sjouke Mauw and
                  Gert J. Veltink},
  editor       = {Kim Guldstrand Larsen and
                  Arne Skou},
  title        = {A Proof Assistant for {PSF}},
  booktitle    = {Computer Aided Verification, 3rd International Workshop, {CAV} '91,
                  Aalborg, Denmark, July, 1-4, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {575},
  pages        = {158--168},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-55179-4\_16},
  doi          = {10.1007/3-540-55179-4\_16},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/MauwV91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/am/BaetenBMV89,
  author       = {Jos C. M. Baeten and
                  Jan A. Bergstra and
                  Sjouke Mauw and
                  Gert J. Veltink},
  editor       = {Jan A. Bergstra and
                  Loe M. G. Feijs},
  title        = {A Process Specification Formalism Based on Static {COLD}},
  booktitle    = {Algebraic Methods {II:} Theory, Tools and Applications [papers from
                  a workshop in Mierlo, The Netherlands, September 1989]},
  series       = {Lecture Notes in Computer Science},
  volume       = {490},
  pages        = {303--335},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-53912-3\_27},
  doi          = {10.1007/3-540-53912-3\_27},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/am/BaetenBMV89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/am/MauwW89,
  author       = {Sjouke Mauw and
                  Freek Wiedijk},
  editor       = {Jan A. Bergstra and
                  Loe M. G. Feijs},
  title        = {Specification of the Transit Node in PSF\({}_{\mbox{d}}\)},
  booktitle    = {Algebraic Methods {II:} Theory, Tools and Applications [papers from
                  a workshop in Mierlo, The Netherlands, September 1989]},
  series       = {Lecture Notes in Computer Science},
  volume       = {490},
  pages        = {341--361},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-53912-3\_28},
  doi          = {10.1007/3-540-53912-3\_28},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/am/MauwW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapsoft/MauwV89,
  author       = {Sjouke Mauw and
                  Gert J. Veltink},
  editor       = {Josep D{\'{\i}}az and
                  Fernando Orejas},
  title        = {An Introduction to PSFd},
  booktitle    = {TAPSOFT'89: Proceedings of the International Joint Conference on Theory
                  and Practice of Software Development, Barcelona, Spain, March 13-17,
                  1989, Volume 2: Advanced Seminar on Foundations of Innovative Software
                  Development {II} and Colloquium on Current Issues in Programming Languages
                  {(CCIPL)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {352},
  pages        = {272--285},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-50940-2\_41},
  doi          = {10.1007/3-540-50940-2\_41},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tapsoft/MauwV89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/am/Mauw87,
  author       = {Sjouke Mauw},
  editor       = {Martin Wirsing and
                  Jan A. Bergstra},
  title        = {An Algebraic Specification of Process Algebra, Including Two Examples},
  booktitle    = {Algebraic Methods: Theory, Tools and Applications [papers from a workshop
                  in Passau, Germany, June 9-11, 1987]},
  series       = {Lecture Notes in Computer Science},
  volume       = {394},
  pages        = {507--554},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/BFb0015050},
  doi          = {10.1007/BFB0015050},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/am/Mauw87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics