Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sjouke Mauw
@article{DBLP:journals/corr/abs-2401-06626, author = {Sergiu Bursuc and Reynaldo Gil Pons and Sjouke Mauw and Rolando Trujillo{-}Rasua}, title = {Software-Based Memory Erasure with relaxed isolation requirements: Extended Version}, journal = {CoRR}, volume = {abs/2401.06626}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.06626}, doi = {10.48550/ARXIV.2401.06626}, eprinttype = {arXiv}, eprint = {2401.06626}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-06626.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PonsMT23, author = {Reynaldo Gil Pons and Sjouke Mauw and Rolando Trujillo{-}Rasua}, title = {On the optimal resistance against mafia and distance fraud in distance-bounding protocols}, journal = {Comput. Commun.}, volume = {210}, pages = {69--78}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.07.033}, doi = {10.1016/J.COMCOM.2023.07.033}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/PonsMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/flap/HohnLMG23, author = {Sviatlana H{\"{o}}hn and Barbara Lewandowska{-}Tomaszczyk and Sjouke Mauw and Dov M. Gabbay}, title = {Dripping the Poison: The Instruments of Bias. {A} Qualitative Case Study of News Articles in Four Languages over Nine Years}, journal = {{FLAP}}, volume = {10}, number = {4}, pages = {555--585}, year = {2023}, url = {https://www.collegepublications.co.uk/downloads/ifcolog00060.pdf}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/flap/HohnLMG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacic/HorneMMST23, author = {Ross Horne and Sjouke Mauw and Andrzej Mizera and Andr{\'{e}} Stemper and Jan Thoemel}, title = {Anomaly Detection Using Deep Learning Respecting the Resources on Board a CubeSat}, journal = {J. Aerosp. Inf. Syst.}, volume = {20}, number = {12}, pages = {859--872}, year = {2023}, url = {https://doi.org/10.2514/1.i011232}, doi = {10.2514/1.I011232}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacic/HorneMMST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/HorneMY23, author = {Ross Horne and Sjouke Mauw and Semen Yurkov}, title = {When privacy fails, a formula describes an attack: {A} complete and compositional verification method for the applied \emph{{\(\pi\)}}-calculus}, journal = {Theor. Comput. Sci.}, volume = {959}, pages = {113842}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2023.113842}, doi = {10.1016/J.TCS.2023.113842}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/HorneMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BursucHMY23, author = {Sergiu Bursuc and Ross Horne and Sjouke Mauw and Semen Yurkov}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Provably Unlinkable Smart Card-based Payments}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1392--1406}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623109}, doi = {10.1145/3576915.3623109}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BursucHMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conversations/HohnMDSM23, author = {Sviatlana H{\"{o}}hn and Bettina Migge and Doris Dippold and Britta Schneider and Sjouke Mauw}, editor = {Asbj{\o}rn F{\o}lstad and Theo B. Araujo and Symeon Papadopoulos and Effie L.{-}C. Law and Ewa Luger and Morten Goodwin and Sebastian Hobert and Petter Bae Brandtzaeg}, title = {Language Ideology Bias in Conversational Technology}, booktitle = {Chatbot Research and Design - 7th International Workshop, {CONVERSATIONS} 2023, Oslo, Norway, November 22-23, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14524}, pages = {133--148}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54975-5\_8}, doi = {10.1007/978-3-031-54975-5\_8}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/conversations/HohnMDSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BalogluBMP23, author = {Sevdenur Baloglu and Sergiu Bursuc and Sjouke Mauw and Jun Pang}, title = {Election Verifiability in Receipt-Free Voting Protocols}, booktitle = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik, Croatia, July 10-14, 2023}, pages = {59--74}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSF57540.2023.00005}, doi = {10.1109/CSF57540.2023.00005}, timestamp = {Tue, 05 Sep 2023 20:33:27 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BalogluBMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-03128, author = {Sergiu Bursuc and Ross Horne and Sjouke Mauw and Semen Yurkov}, title = {Provably Unlinkable Smart Card-based Payments}, journal = {CoRR}, volume = {abs/2309.03128}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.03128}, doi = {10.48550/ARXIV.2309.03128}, eprinttype = {arXiv}, eprint = {2309.03128}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-03128.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-13331, author = {Olga Gadyatskaya and Sjouke Mauw and Rolando Trujillo{-}Rasua and Tim A. C. Willemse}, title = {Automated generation of attack trees with optimal shape and labelling}, journal = {CoRR}, volume = {abs/2311.13331}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.13331}, doi = {10.48550/ARXIV.2311.13331}, eprinttype = {arXiv}, eprint = {2311.13331}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-13331.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/MauwRT22, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation}, journal = {Knowl. Inf. Syst.}, volume = {64}, number = {4}, pages = {1077--1100}, year = {2022}, url = {https://doi.org/10.1007/s10115-022-01662-z}, doi = {10.1007/S10115-022-01662-Z}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/MauwRT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/PonsHMTT22, author = {Reynaldo Gil Pons and Ross Horne and Sjouke Mauw and Alwen Tiu and Rolando Trujillo{-}Rasua}, title = {Is Eve nearby? Analysing protocols under the distant-attacker assumption}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {17--32}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919655}, doi = {10.1109/CSF54842.2022.9919655}, timestamp = {Fri, 11 Nov 2022 16:53:14 +0100}, biburl = {https://dblp.org/rec/conf/csfw/PonsHMTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BursucM22, author = {Sergiu Bursuc and Sjouke Mauw}, title = {Contingent payments from two-party signing and verification for abelian groups}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {195--210}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919674}, doi = {10.1109/CSF54842.2022.9919674}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BursucM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HorneMY22, author = {Ross Horne and Sjouke Mauw and Semen Yurkov}, title = {Unlinkability of an Improved Key Agreement Protocol for {EMV} 2nd Gen Payments}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {364--379}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919666}, doi = {10.1109/CSF54842.2022.9919666}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HorneMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fscd/AcclavioHMS22, author = {Matteo Acclavio and Ross Horne and Sjouke Mauw and Lutz Stra{\ss}burger}, editor = {Amy P. Felty}, title = {A Graphical Proof Theory of Logical Time}, booktitle = {7th International Conference on Formal Structures for Computation and Deduction, {FSCD} 2022, August 2-5, 2022, Haifa, Israel}, series = {LIPIcs}, volume = {228}, pages = {22:1--22:25}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.FSCD.2022.22}, doi = {10.4230/LIPICS.FSCD.2022.22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fscd/AcclavioHMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/HohnMA22, author = {Sviatlana H{\"{o}}hn and Sjouke Mauw and Nicholas Asher}, editor = {Ceren Budak and Meeyoung Cha and Daniele Quercia}, title = {BelElect: {A} New Dataset for Bias Research from a "Dark" Platform}, booktitle = {Proceedings of the Sixteenth International {AAAI} Conference on Web and Social Media, {ICWSM} 2022, Atlanta, Georgia, USA, June 6-9, 2022}, pages = {1268--1274}, publisher = {{AAAI} Press}, year = {2022}, url = {https://ojs.aaai.org/index.php/ICWSM/article/view/19378}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icwsm/HohnMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-08686, author = {Zach Smith and Hugo Jonker and Sjouke Mauw and Hyunwoo Lee}, title = {Modelling Agent-Skipping Attacks in Message Forwarding Protocols}, journal = {CoRR}, volume = {abs/2201.08686}, year = {2022}, url = {https://arxiv.org/abs/2201.08686}, eprinttype = {arXiv}, eprint = {2201.08686}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-08686.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BursucM22, author = {Sergiu Bursuc and Sjouke Mauw}, title = {Contingent payments from two-party signing and verification for abelian groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {719}, year = {2022}, url = {https://eprint.iacr.org/2022/719}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BursucM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmcs/HorneM21, author = {Ross Horne and Sjouke Mauw}, title = {Discovering ePassport Vulnerabilities using Bisimilarity}, journal = {Log. Methods Comput. Sci.}, volume = {17}, number = {2}, pages = {24}, year = {2021}, url = {https://doi.org/10.23638/LMCS-17(2:24)2021}, doi = {10.23638/LMCS-17(2:24)2021}, timestamp = {Tue, 23 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lmcs/HorneM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BalogluBM021, author = {Sevdenur Baloglu and Sergiu Bursuc and Sjouke Mauw and Jun Pang}, title = {Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios}, booktitle = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik, Croatia, June 21-25, 2021}, pages = {1--15}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSF51468.2021.00019}, doi = {10.1109/CSF51468.2021.00019}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BalogluBM021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/BalogluBM021, author = {Sevdenur Baloglu and Sergiu Bursuc and Sjouke Mauw and Jun Pang}, editor = {Robert Krimmer and Melanie Volkamer and David Duenas{-}Cid and Oksana Kulyk and Peter B. R{\o}nne and Mihkel Solvak and Micha Germann}, title = {Provably Improving Election Verifiability in Belenios}, booktitle = {Electronic Voting - 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12900}, pages = {1--16}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86942-7\_1}, doi = {10.1007/978-3-030-86942-7\_1}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/BalogluBM021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictac/HorneMY21, author = {Ross Horne and Sjouke Mauw and Semen Yurkov}, editor = {Antonio Cerone and Peter Csaba {\"{O}}lveczky}, title = {Compositional Analysis of Protocol Equivalence in the Applied {\(\pi\)}-Calculus Using Quasi-open Bisimilarity}, booktitle = {Theoretical Aspects of Computing - {ICTAC} 2021 - 18th International Colloquium, Virtual Event, Nur-Sultan, Kazakhstan, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12819}, pages = {235--255}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85315-0\_14}, doi = {10.1007/978-3-030-85315-0\_14}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictac/HorneMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/misdoom/HohnAM21, author = {Sviatlana H{\"{o}}hn and Nicholas Asher and Sjouke Mauw}, editor = {Jonathan Bright and Anastasia Giachanou and Viktoria Spaiser and Francesca Spezzano and Anna George and Alexandra Pavliuc}, title = {Examining Linguistic Biases in Telegram with a Game Theoretic Analysis}, booktitle = {Disinformation in Open Online Media - Third Multidisciplinary International Symposium, {MISDOOM} 2021, Virtual Event, September 21-22, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12887}, pages = {16--32}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-87031-7\_2}, doi = {10.1007/978-3-030-87031-7\_2}, timestamp = {Sat, 09 Apr 2022 12:39:48 +0200}, biburl = {https://dblp.org/rec/conf/misdoom/HohnAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-02029, author = {Ross Horne and Sjouke Mauw and Semen Yurkov}, title = {Breaking and Fixing Unlinkability of the Key Agreement Protocol for 2nd Gen {EMV} Payments}, journal = {CoRR}, volume = {abs/2105.02029}, year = {2021}, url = {https://arxiv.org/abs/2105.02029}, eprinttype = {arXiv}, eprint = {2105.02029}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-02029.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalogluBMP21, author = {Sevdenur Baloglu and Sergiu Bursuc and Sjouke Mauw and Jun Pang}, title = {Provably Improving Election Verifiability in Belenios}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1201}, year = {2021}, url = {https://eprint.iacr.org/2021/1201}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalogluBMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BuldasGLMT20, author = {Ahto Buldas and Olga Gadyatskaya and Aleksandr Lenin and Sjouke Mauw and Rolando Trujillo{-}Rasua}, title = {Attribute evaluation on attack trees with incomplete information}, journal = {Comput. Secur.}, volume = {88}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101630}, doi = {10.1016/J.COSE.2019.101630}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BuldasGLMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/ChenMR20, author = {Xihui Chen and Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz}, title = {Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {4}, pages = {131--152}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0066}, doi = {10.2478/POPETS-2020-0066}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/ChenMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/PilgunGZDKM20, author = {Aleksandr Pilgun and Olga Gadyatskaya and Yury Zhauniarovich and Stanislav Dashevskyi and Artsiom Kushniarou and Sjouke Mauw}, title = {Fine-grained Code Coverage Measurement in Automated Black-box Android Testing}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {29}, number = {4}, pages = {23:1--23:35}, year = {2020}, url = {https://doi.org/10.1145/3395042}, doi = {10.1145/3395042}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/PilgunGZDKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TorresBNPJM20, author = {Christof Ferreira Torres and Mathis Baden and Robert Norvill and Beltran Borja Fiz Pontiveros and Hugo Jonker and Sjouke Mauw}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {{\AE}GIS: Shielding Vulnerable Smart Contracts Against Attacks}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {584--597}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384756}, doi = {10.1145/3320269.3384756}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TorresBNPJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChenKMR20, author = {Xihui Chen and Ema K{\"{e}}puska and Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Active Re-identification Attacks on Periodically Released Dynamic Social Graphs}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {185--205}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_10}, doi = {10.1007/978-3-030-59013-0\_10}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChenKMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/GabbayHMT20, author = {Dov M. Gabbay and Ross Horne and Sjouke Mauw and Leendert van der Torre}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {143--165}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_8}, doi = {10.1007/978-3-030-62230-5\_8}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/GabbayHMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-07309, author = {Ross Horne and Sjouke Mauw}, title = {Discovering ePassport Vulnerabilities using Bisimilarity}, journal = {CoRR}, volume = {abs/2002.07309}, year = {2020}, url = {https://arxiv.org/abs/2002.07309}, eprinttype = {arXiv}, eprint = {2002.07309}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-07309.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-05987, author = {Christof Ferreira Torres and Mathis Baden and Robert Norvill and Beltran Borja Fiz Pontiveros and Hugo Jonker and Sjouke Mauw}, title = {{\AE}GIS: Shielding Vulnerable Smart Contracts Against Attacks}, journal = {CoRR}, volume = {abs/2003.05987}, year = {2020}, url = {https://arxiv.org/abs/2003.05987}, eprinttype = {arXiv}, eprint = {2003.05987}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-05987.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-05312, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation}, journal = {CoRR}, volume = {abs/2007.05312}, year = {2020}, url = {https://arxiv.org/abs/2007.05312}, eprinttype = {arXiv}, eprint = {2007.05312}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-05312.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalogluBMP20, author = {Sevdenur Baloglu and Sergiu Bursuc and Sjouke Mauw and Jun Pang}, title = {Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {982}, year = {2020}, url = {https://eprint.iacr.org/2020/982}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalogluBMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/datamine/MauwRT19, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Robust active attacks on social graphs}, journal = {Data Min. Knowl. Discov.}, volume = {33}, number = {5}, pages = {1357--1392}, year = {2019}, url = {https://doi.org/10.1007/s10618-019-00631-5}, doi = {10.1007/S10618-019-00631-5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/datamine/MauwRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/MauwRT19, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Conditional adjacency anonymity in social graphs under active attacks}, journal = {Knowl. Inf. Syst.}, volume = {61}, number = {1}, pages = {485--511}, year = {2019}, url = {https://doi.org/10.1007/s10115-018-1283-x}, doi = {10.1007/S10115-018-1283-X}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kais/MauwRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MauwSTT19, author = {Sjouke Mauw and Zach Smith and Jorge Toro{-}Pozo and Rolando Trujillo{-}Rasua}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Post-Collusion Security and Distance Bounding}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {941--958}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3345651}, doi = {10.1145/3319535.3345651}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MauwSTT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FilimonovHMS19, author = {Ihor Filimonov and Ross Horne and Sjouke Mauw and Zach Smith}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Breaking Unlinkability of the {ICAO} 9303 Standard for e-Passports Using Bisimilarity}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {577--594}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_28}, doi = {10.1007/978-3-030-29959-0\_28}, timestamp = {Fri, 07 Aug 2020 17:57:31 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FilimonovHMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/GadyatskayaM19, author = {Olga Gadyatskaya and Sjouke Mauw}, editor = {Massimiliano Albanese and Ross Horne and Christian W. Probst}, title = {Attack-Tree Series: {A} Case for Dynamic Attack Tree Analysis}, booktitle = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {11720}, pages = {7--19}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36537-0\_2}, doi = {10.1007/978-3-030-36537-0\_2}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/GadyatskayaM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2019, editor = {Sjouke Mauw and Mauro Conti}, title = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5}, doi = {10.1007/978-3-030-31511-5}, isbn = {978-3-030-31510-8}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-00280, author = {Xihui Chen and Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz}, title = {Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee}, journal = {CoRR}, volume = {abs/1909.00280}, year = {2019}, url = {http://arxiv.org/abs/1909.00280}, eprinttype = {arXiv}, eprint = {1909.00280}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-00280.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-09534, author = {Xihui Chen and Ema K{\"{e}}puska and Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz}, title = {Active Re-identification Attacks on Periodically Released Dynamic Social Graphs}, journal = {CoRR}, volume = {abs/1911.09534}, year = {2019}, url = {http://arxiv.org/abs/1911.09534}, eprinttype = {arXiv}, eprint = {1911.09534}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-09534.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdp/MauwRT18, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Anonymising social graphs in the presence of active attackers}, journal = {Trans. Data Priv.}, volume = {11}, number = {2}, pages = {169--198}, year = {2018}, url = {http://www.tdp.cat/issues16/tdp.a285a17.pdf}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdp/MauwRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MauwSTT18, author = {Sjouke Mauw and Zach Smith and Jorge Toro{-}Pozo and Rolando Trujillo{-}Rasua}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Automated Identification of Desynchronisation Attacks on Shared Secrets}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {406--426}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_20}, doi = {10.1007/978-3-319-99073-6\_20}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MauwSTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/HorneMT18, author = {Ross Horne and Sjouke Mauw and Alwen Tiu}, editor = {George Cybenko and David J. Pym and Barbara Fila}, title = {The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement}, booktitle = {5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11086}, pages = {90--110}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15465-3\_6}, doi = {10.1007/978-3-030-15465-3\_6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/HorneMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MauwSTT18, author = {Sjouke Mauw and Zach Smith and Jorge Toro{-}Pozo and Rolando Trujillo{-}Rasua}, title = {Distance-Bounding Protocols: Verification without Time and Location}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {549--566}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00001}, doi = {10.1109/SP.2018.00001}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MauwSTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/JhawarLMR18, author = {Ravi Jhawar and Karim Lounis and Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library}, booktitle = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, pages = {85--101}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3\_6}, doi = {10.1007/978-3-030-01141-3\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/JhawarLMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2017gramsec, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-74860-3}, doi = {10.1007/978-3-319-74860-3}, isbn = {978-3-319-74859-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2017gramsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-10915, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Robust active attacks on social graphs}, journal = {CoRR}, volume = {abs/1811.10915}, year = {2018}, url = {http://arxiv.org/abs/1811.10915}, eprinttype = {arXiv}, eprint = {1811.10915}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-10915.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-10754, author = {Ahto Buldas and Olga Gadyatskaya and Aleksandr Lenin and Sjouke Mauw and Rolando Trujillo{-}Rasua}, title = {Attribute Evaluation on Attack Trees with Incomplete Information}, journal = {CoRR}, volume = {abs/1812.10754}, year = {2018}, url = {http://arxiv.org/abs/1812.10754}, eprinttype = {arXiv}, eprint = {1812.10754}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-10754.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/HorneMT17, author = {Ross Horne and Sjouke Mauw and Alwen Tiu}, title = {Semantics for Specialising Attack Trees based on Linear Logic}, journal = {Fundam. Informaticae}, volume = {153}, number = {1-2}, pages = {57--86}, year = {2017}, url = {https://doi.org/10.3233/FI-2017-1531}, doi = {10.3233/FI-2017-1531}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/HorneMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerM17, author = {Hugo Jonker and Sjouke Mauw}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {A Security Perspective on Publication Metrics}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {186--200}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_21}, doi = {10.1007/978-3-319-71075-4\_21}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/JonkerM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GadyatskayaJMTW17, author = {Olga Gadyatskaya and Ravi Jhawar and Sjouke Mauw and Rolando Trujillo{-}Rasua and Tim A. C. Willemse}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Refinement-Aware Generation of Attack Trees}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {164--179}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_11}, doi = {10.1007/978-3-319-68063-7\_11}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/stm/GadyatskayaJMTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/JonkerMS17, author = {Hugo Jonker and Sjouke Mauw and Tom Schmitz}, editor = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann}, title = {Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate Online Elections}, booktitle = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10615}, pages = {183--197}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68687-5\_11}, doi = {10.1007/978-3-319-68687-5\_11}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/JonkerMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MauwRT17, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Rethinking (k, {\unicode{120001}})-anonymity in social graphs: (k, {\unicode{120001}})-adjacency anonymity and (k, {\unicode{120001}})-(adjacency) anonymous transformations}, journal = {CoRR}, volume = {abs/1704.07078}, year = {2017}, url = {http://arxiv.org/abs/1704.07078}, eprinttype = {arXiv}, eprint = {1704.07078}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MauwRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GadyatskayaHMMM16, author = {Olga Gadyatskaya and Carlo Harpes and Sjouke Mauw and C{\'{e}}dric Muller and Steve Muller}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {80--93}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_5}, doi = {10.1007/978-3-319-46263-9\_5}, timestamp = {Wed, 17 Feb 2021 14:43:58 +0100}, biburl = {https://dblp.org/rec/conf/csfw/GadyatskayaHMMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MauwTX16, author = {Sjouke Mauw and Rolando Trujillo{-}Rasua and Bochuan Xuan}, editor = {Silvio Ranise and Vipin Swarup}, title = {Counteracting Active Attacks in Social Network Graphs}, booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP} {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9766}, pages = {233--248}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41483-6\_17}, doi = {10.1007/978-3-319-41483-6\_17}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MauwTX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/MauwTT16, author = {Sjouke Mauw and Jorge Toro{-}Pozo and Rolando Trujillo{-}Rasua}, title = {A Class of Precomputation-Based Distance-Bounding Protocols}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {97--111}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.19}, doi = {10.1109/EUROSP.2016.19}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/MauwTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/GadyatskayaJKLM16, author = {Olga Gadyatskaya and Ravi Jhawar and Piotr Kordy and Karim Lounis and Sjouke Mauw and Rolando Trujillo{-}Rasua}, editor = {Gul Agha and Benny Van Houdt}, title = {Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0}, booktitle = {Quantitative Evaluation of Systems - 13th International Conference, {QEST} 2016, Quebec City, QC, Canada, August 23-25, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9826}, pages = {159--162}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43425-4\_10}, doi = {10.1007/978-3-319-43425-4\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/qest/GadyatskayaJKLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/MauwTT16, author = {Sjouke Mauw and Jorge Toro{-}Pozo and Rolando Trujillo{-}Rasua}, editor = {Gerhard P. Hancke and Konstantinos Markantonakis}, title = {Optimality Results on the Security of Lookup-Based Protocols}, booktitle = {Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10155}, pages = {137--150}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62024-4\_10}, doi = {10.1007/978-3-319-62024-4\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/MauwTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerMT16, author = {Hugo L. Jonker and Sjouke Mauw and Rolando Trujillo{-}Rasua}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {19--25}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_3}, doi = {10.1007/978-3-319-62033-6\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/JonkerMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/JhawarLM16, author = {Ravi Jhawar and Karim Lounis and Sjouke Mauw}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {138--153}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_10}, doi = {10.1007/978-3-319-46598-2\_10}, timestamp = {Sat, 19 Oct 2019 20:20:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/JhawarLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/LenziniMO16, author = {Gabriele Lenzini and Sjouke Mauw and Samir Ouchani}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {170--178}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_12}, doi = {10.1007/978-3-319-46598-2\_12}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/LenziniMO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2015gramsec, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29968-6}, doi = {10.1007/978-3-319-29968-6}, isbn = {978-3-319-29967-9}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2015gramsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifiptm/2016, editor = {Sheikh Mahbub Habib and Julita Vassileva and Sjouke Mauw and Max M{\"{u}}hlh{\"{a}}user}, title = {Trust Management {X} - 10th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {473}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41354-9}, doi = {10.1007/978-3-319-41354-9}, isbn = {978-3-319-41353-2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LenziniMO15, author = {Gabriele Lenzini and Sjouke Mauw and Samir Ouchani}, title = {Security analysis of socio-technical physical systems}, journal = {Comput. Electr. Eng.}, volume = {47}, pages = {258--274}, year = {2015}, url = {https://doi.org/10.1016/j.compeleceng.2015.02.019}, doi = {10.1016/J.COMPELECENG.2015.02.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/LenziniMO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/AvoineMT15, author = {Gildas Avoine and Sjouke Mauw and Rolando Trujillo{-}Rasua}, title = {Comparing distance bounding protocols: {A} critical mission supported by decision theory}, journal = {Comput. Commun.}, volume = {67}, pages = {92--102}, year = {2015}, url = {https://doi.org/10.1016/j.comcom.2015.06.007}, doi = {10.1016/J.COMCOM.2015.06.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/AvoineMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TorresJM15, author = {Christof Ferreira Torres and Hugo L. Jonker and Sjouke Mauw}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {3--19}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_1}, doi = {10.1007/978-3-319-24177-7\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/TorresJM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/MauwR15, author = {Sjouke Mauw and Sasa Radomirovic}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Generalizing Multi-party Contract Signing}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {156--175}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_9}, doi = {10.1007/978-3-662-46666-7\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/MauwR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/JhawarKMRT15, author = {Ravi Jhawar and Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Rolando Trujillo{-}Rasua}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Attack Trees with Sequential Conjunction}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {339--353}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_23}, doi = {10.1007/978-3-319-18467-8\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/JhawarKMRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerMR15, author = {Hugo Jonker and Sjouke Mauw and Sasa Radomirovic}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Location-Private Interstellar Communication}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {105--115}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_11}, doi = {10.1007/978-3-319-26096-9\_11}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/JonkerMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mauw15, author = {Sjouke Mauw}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Location-Private Interstellar Communication (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {116--125}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_12}, doi = {10.1007/978-3-319-26096-9\_12}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mauw15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/corr/PangLM15, editor = {Jun Pang and Yang Liu and Sjouke Mauw}, title = {Proceedings 4th International Workshop on Engineering Safety and Security Systems, {ESSS} 2015, Oslo, Norway, June 22, 2015}, series = {{EPTCS}}, volume = {184}, year = {2015}, url = {https://doi.org/10.4204/EPTCS.184}, doi = {10.4204/EPTCS.184}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PangLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MauwR15, author = {Sjouke Mauw and Sasa Radomirovic}, title = {Generalizing Multi-party Contract Signing}, journal = {CoRR}, volume = {abs/1501.03868}, year = {2015}, url = {http://arxiv.org/abs/1501.03868}, eprinttype = {arXiv}, eprint = {1501.03868}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MauwR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JhawarKMRT15, author = {Ravi Jhawar and Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Rolando Trujillo{-}Rasua}, title = {Attack Trees with Sequential Conjunction}, journal = {CoRR}, volume = {abs/1503.02261}, year = {2015}, url = {http://arxiv.org/abs/1503.02261}, eprinttype = {arXiv}, eprint = {1503.02261}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JhawarKMRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AvoineMT15, author = {Gildas Avoine and Sjouke Mauw and Rolando Trujillo{-}Rasua}, title = {Comparing Distance Bounding Protocols: a Critical Mission Supported by Decision Theory}, journal = {CoRR}, volume = {abs/1503.04593}, year = {2015}, url = {http://arxiv.org/abs/1503.04593}, eprinttype = {arXiv}, eprint = {1503.04593}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AvoineMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/KordyMRS14, author = {Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Patrick Schweitzer}, title = {Attack-defense trees}, journal = {J. Log. Comput.}, volume = {24}, number = {1}, pages = {55--87}, year = {2014}, url = {https://doi.org/10.1093/logcom/exs029}, doi = {10.1093/LOGCOM/EXS029}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/logcom/KordyMRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/KordyLMP14, author = {Piotr Kordy and Rom Langerak and Sjouke Mauw and Jan Willem Polderman}, editor = {Cliff B. Jones and Pekka Pihlajasaari and Jun Sun}, title = {A Symbolic Algorithm for the Analysis of Robust Timed Automata}, booktitle = {{FM} 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8442}, pages = {351--366}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06410-9\_25}, doi = {10.1007/978-3-319-06410-9\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fm/KordyLMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/MullerLMZ14, author = {Tim Muller and Yang Liu and Sjouke Mauw and Jie Zhang}, editor = {Jianying Zhou and Nurit Gal{-}Oz and Jie Zhang and Ehud Gudes}, title = {On Robustness of Trust Systems}, booktitle = {Trust Management {VIII} - 8th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2014, Singapore, July 7-10, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {430}, pages = {44--60}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43813-8\_4}, doi = {10.1007/978-3-662-43813-8\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/MullerLMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2014, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2}, doi = {10.1007/978-3-319-11851-2}, isbn = {978-3-319-11850-5}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/corr/KordyMP14, editor = {Barbara Kordy and Sjouke Mauw and Wolter Pieters}, title = {Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014}, series = {{EPTCS}}, volume = {148}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.148}, doi = {10.4204/EPTCS.148}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KordyMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/JonkerMP13, author = {Hugo Jonker and Sjouke Mauw and Jun Pang}, title = {Privacy and verifiability in voting systems: Methods, developments and trends}, journal = {Comput. Sci. Rev.}, volume = {10}, pages = {1--30}, year = {2013}, url = {https://doi.org/10.1016/j.cosrev.2013.08.002}, doi = {10.1016/J.COSREV.2013.08.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csr/JonkerMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChenLMP13, author = {Xihui Chen and Gabriele Lenzini and Sjouke Mauw and Jun Pang}, title = {Design and Formal Analysis of {A} Group Signature Based Electronic Toll Pricing System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {55--75}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.055}, doi = {10.22667/JOWUA.2013.03.31.055}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChenLMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenHLMMP13, author = {Xihui Chen and Carlo Harpes and Gabriele Lenzini and Miguel Martins and Sjouke Mauw and Jun Pang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Demonstrating a trust framework for evaluating {GNSS} signal integrity}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1329--1332}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512492}, doi = {10.1145/2508859.2512492}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenHLMMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChenLMMP13, author = {Xihui Chen and Gabriele Lenzini and Miguel Martins and Sjouke Mauw and Jun Pang}, title = {A Trust Framework for Evaluating {GNSS} Signal Integrity}, booktitle = {2013 {IEEE} 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013}, pages = {179--192}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSF.2013.19}, doi = {10.1109/CSF.2013.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChenLMMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/PangLM13, author = {Jun Pang and Yang Liu and Sjouke Mauw}, title = {Message from {ESSS} 2013 Workshop Co-chairs}, booktitle = {Sixth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2013 Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013}, pages = {1}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICSTW.2013.63}, doi = {10.1109/ICSTW.2013.63}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icst/PangLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/KordyKMS13, author = {Barbara Kordy and Piotr Kordy and Sjouke Mauw and Patrick Schweitzer}, editor = {Kaustubh R. Joshi and Markus Siegle and Mari{\"{e}}lle Stoelinga and Pedro R. D'Argenio}, title = {ADTool: Security Analysis with Attack-Defense Trees}, booktitle = {Quantitative Evaluation of Systems - 10th International Conference, {QEST} 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8054}, pages = {173--176}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40196-1\_15}, doi = {10.1007/978-3-642-40196-1\_15}, timestamp = {Sat, 30 Sep 2023 09:55:03 +0200}, biburl = {https://dblp.org/rec/conf/qest/KordyKMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1305-6829, author = {Barbara Kordy and Piotr Kordy and Sjouke Mauw and Patrick Schweitzer}, title = {ADTool: Security Analysis with Attack- Defense Trees (Extended Version)}, journal = {CoRR}, volume = {abs/1305.6829}, year = {2013}, url = {http://arxiv.org/abs/1305.6829}, eprinttype = {arXiv}, eprint = {1305.6829}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1305-6829.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/ChenHLMP14, author = {Xihui Chen and Carlo Harpes and Gabriele Lenzini and Sjouke Mauw and Jun Pang}, title = {Location Assurance and Privacy in {GNSS} Navigation}, journal = {{ERCIM} News}, volume = {2013}, number = {94}, year = {2013}, url = {http://ercim-news.ercim.eu/en94/special/location-assurance-and-privacy-in-gnss-navigation}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/ChenHLMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JonkerMP13, author = {Hugo Jonker and Sjouke Mauw and Jun Pang}, title = {Privacy and Verifiability in Voting Systems: Methods, Developments and Trends}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2013}, url = {http://eprint.iacr.org/2013/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JonkerMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Cremers12, author = {Cas Cremers and Sjouke Mauw}, title = {Operational Semantics and Verification of Security Protocols}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-540-78636-8}, doi = {10.1007/978-3-540-78636-8}, isbn = {978-3-540-78636-8}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Cremers12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/PiramuthuKZM12, author = {Selwyn Piramuthu and Gaurav Kapoor and Wei Zhou and Sjouke Mauw}, title = {Input online review data and related bias in recommender systems}, journal = {Decis. Support Syst.}, volume = {53}, number = {3}, pages = {418--424}, year = {2012}, url = {https://doi.org/10.1016/j.dss.2012.02.006}, doi = {10.1016/J.DSS.2012.02.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/PiramuthuKZM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isse/ZhangZPM12, author = {Ying Zhang and Chenyi Zhang and Jun Pang and Sjouke Mauw}, title = {Game-based verification of contract signing protocols with minimal messages}, journal = {Innov. Syst. Softw. Eng.}, volume = {8}, number = {2}, pages = {111--124}, year = {2012}, url = {https://doi.org/10.1007/s11334-012-0180-9}, doi = {10.1007/S11334-012-0180-9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isse/ZhangZPM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SunZPAM12, author = {Yanjie Sun and Chenyi Zhang and Jun Pang and Baptiste Alcalde and Sjouke Mauw}, title = {A trust-augmented voting scheme for collaborative privacy management}, journal = {J. Comput. Secur.}, volume = {20}, number = {4}, pages = {437--459}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0453}, doi = {10.3233/JCS-2012-0453}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SunZPAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsb/YuanTPMWS12, author = {Qixia Yuan and Panuwat Trairatphisan and Jun Pang and Sjouke Mauw and Monique Wiesinger and Thomas Sauter}, title = {Probabilistic Model Checking of the {PDGF} Signaling Pathway}, journal = {Trans. Comp. Sys. Biology}, volume = {14}, pages = {151--180}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35524-0\_7}, doi = {10.1007/978-3-642-35524-0\_7}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsb/YuanTPMWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ChenLMP12, author = {Xihui Chen and Gabriele Lenzini and Sjouke Mauw and Jun Pang}, title = {A Group Signature Based Electronic Toll Pricing System}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {85--93}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.67}, doi = {10.1109/ARES.2012.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ChenLMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KordyMS12, author = {Barbara Kordy and Sjouke Mauw and Patrick Schweitzer}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Quantitative Questions on Attack-Defense Trees}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {49--64}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_5}, doi = {10.1007/978-3-642-37682-5\_5}, timestamp = {Thu, 12 Nov 2020 16:27:41 +0100}, biburl = {https://dblp.org/rec/conf/icisc/KordyMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MauwP12, author = {Sjouke Mauw and Selwyn Piramuthu}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {209--224}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_14}, doi = {10.1007/978-3-642-38004-4\_14}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/stm/MauwP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tase/LiSPM12, author = {Qian Li and P{\'{e}}ter Schaffer and Jun Pang and Sjouke Mauw}, editor = {Tiziana Margaria and Zongyan Qiu and Hongli Yang}, title = {Comparative Analysis of Clustering Protocols with Probabilistic Model Checking}, booktitle = {Sixth International Symposium on Theoretical Aspects of Software Engineering, {TASE} 2012, 4-6 July 2012, Beijing, China}, pages = {249--252}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TASE.2012.28}, doi = {10.1109/TASE.2012.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tase/LiSPM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-8092, author = {Barbara Kordy and Sjouke Mauw and Patrick Schweitzer}, title = {Quantitative Questions on Attack-Defense Trees}, journal = {CoRR}, volume = {abs/1210.8092}, year = {2012}, url = {http://arxiv.org/abs/1210.8092}, eprinttype = {arXiv}, eprint = {1210.8092}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-8092.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LenziniMP11, author = {Gabriele Lenzini and Sjouke Mauw and Jun Pang}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Selective Location Blinding Using Hash Chains}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {132--141}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_12}, doi = {10.1007/978-3-642-25867-1\_12}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LenziniMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mauw11, author = {Sjouke Mauw}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Selective Location Blinding Using Hash Chains (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {142--149}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_13}, doi = {10.1007/978-3-642-25867-1\_13}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mauw11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/JamrogaMM11, author = {Wojciech Jamroga and Sjouke Mauw and Matthijs Melissen}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Fairness in Non-Repudiation Protocols}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {122--139}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_10}, doi = {10.1007/978-3-642-29963-6\_10}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/stm/JamrogaMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DeursenMR11, author = {Ton van Deursen and Sjouke Mauw and Sasa Radomirovic}, title = {mCarve: Carving Attributed Dump Sets}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Deursen.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DeursenMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-1109-1367, author = {Qixia Yuan and Jun Pang and Sjouke Mauw and Panuwat Trairatphisan and Monique Wiesinger and Thomas Sauter}, editor = {Ion Petre and Erik P. de Vink}, title = {A Study of the {PDGF} Signaling Pathway with {PRISM}}, booktitle = {Proceedings Third International Workshop on Computational Models for Cell Processes, CompMod 2011, Aachen, Germany, September 10, 2011}, series = {{EPTCS}}, volume = {67}, pages = {65--81}, year = {2011}, url = {https://doi.org/10.4204/EPTCS.67.7}, doi = {10.4204/EPTCS.67.7}, timestamp = {Tue, 21 Mar 2023 21:05:31 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1109-1367.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1108-0574, author = {Xihui Chen and Gabriele Lenzini and Sjouke Mauw and Jun Pang}, title = {A Group Signature Based Electronic Toll Pricing System}, journal = {CoRR}, volume = {abs/1108.0574}, year = {2011}, url = {http://arxiv.org/abs/1108.0574}, eprinttype = {arXiv}, eprint = {1108.0574}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1108-0574.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KordyMMS10, author = {Barbara Kordy and Sjouke Mauw and Matthijs Melissen and Patrick Schweitzer}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {245--256}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_17}, doi = {10.1007/978-3-642-17197-0\_17}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KordyMMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/KordyMRS10, author = {Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Patrick Schweitzer}, editor = {Pierpaolo Degano and Sandro Etalle and Joshua D. Guttman}, title = {Foundations of Attack-Defense Trees}, booktitle = {Formal Aspects of Security and Trust - 7th International Workshop, {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6561}, pages = {80--95}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19751-2\_6}, doi = {10.1007/978-3-642-19751-2\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/KordyMRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MauwRR10, author = {Sjouke Mauw and Sasa Radomirovic and Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Protocols for Secret Santa}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {175--184}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_26}, doi = {10.1007/978-3-662-45921-8\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/MauwRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mauw10, author = {Sjouke Mauw}, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Protocols for Secret Santa (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {185--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_27}, doi = {10.1007/978-3-662-45921-8\_27}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mauw10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SunZPAM10, author = {Yanjie Sun and Chenyi Zhang and Jun Pang and Baptiste Alcalde and Sjouke Mauw}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner}, title = {A Trust-Augmented Voting Scheme for Collaborative Privacy Management}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {132--146}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_9}, doi = {10.1007/978-3-642-22444-7\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SunZPAM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/DashtiM10, author = {Mohammad Torabi Dashti and Sjouke Mauw}, editor = {Burton Rosenberg}, title = {Fair Exchange}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {109--132}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c5}, doi = {10.1201/9781420059823-C5}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/DashtiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1006-2732, author = {Barbara Kordy and Sjouke Mauw and Matthijs Melissen and Patrick Schweitzer}, title = {Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent}, journal = {CoRR}, volume = {abs/1006.2732}, year = {2010}, url = {http://arxiv.org/abs/1006.2732}, eprinttype = {arXiv}, eprint = {1006.2732}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1006-2732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/JonkerMP09, author = {Hugo L. Jonker and Sjouke Mauw and Jun Pang}, title = {A formal framework for quantifying voter-controlled privacy}, journal = {J. Algorithms}, volume = {64}, number = {2-3}, pages = {89--105}, year = {2009}, url = {https://doi.org/10.1016/j.jalgor.2009.02.007}, doi = {10.1016/J.JALGOR.2009.02.007}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jal/JonkerMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/JonkerMP09, author = {Hugo L. Jonker and Sjouke Mauw and Jun Pang}, title = {Measuring Voter-Controlled Privacy}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {289--298}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.81}, doi = {10.1109/ARES.2009.81}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/JonkerMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Alcalde0MMR09, author = {Baptiste Alcalde and Eric Dubois and Sjouke Mauw and Nicolas Mayer and Sasa Radomirovic}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Towards a Decision Model Based on Trust and Security Risk Management}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {61--69}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Alcalde.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Alcalde0MMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MauwRD09, author = {Sjouke Mauw and Sasa Radomirovic and Mohammad Torabi Dashti}, title = {Minimal Message Complexity of Asynchronous Multi-party Contract Signing}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {13--25}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.15}, doi = {10.1109/CSF.2009.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/MauwRD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DeursenMRV09, author = {Ton van Deursen and Sjouke Mauw and Sasa Radomirovic and Pim Vullers}, editor = {Michael Backes and Peng Ning}, title = {Secure Ownership and Ownership Transfer in {RFID} Systems}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {637--654}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_39}, doi = {10.1007/978-3-642-04444-1\_39}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DeursenMRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/AlcaldeM09, author = {Baptiste Alcalde and Sjouke Mauw}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {An Algebra for Trust Dilution and Trust Fusion}, booktitle = {Formal Aspects in Security and Trust, 6th International Workshop, {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5983}, pages = {4--20}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-12459-4\_2}, doi = {10.1007/978-3-642-12459-4\_2}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/AlcaldeM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/ZhangZPM09, author = {Ying Zhang and Chenyi Zhang and Jun Pang and Sjouke Mauw}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Game-Based Verification of Multi-Party Contract Signing Protocols}, booktitle = {Formal Aspects in Security and Trust, 6th International Workshop, {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5983}, pages = {186--200}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-12459-4\_14}, doi = {10.1007/978-3-642-12459-4\_14}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/ZhangZPM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/AndovaCGMMR08, author = {Suzana Andova and Cas Cremers and Kristian Gj{\o}steen and Sjouke Mauw and Stig Fr. Mj{\o}lsnes and Sasa Radomirovic}, title = {A framework for compositional verification of security protocols}, journal = {Inf. Comput.}, volume = {206}, number = {2-4}, pages = {425--459}, year = {2008}, url = {https://doi.org/10.1016/j.ic.2007.07.002}, doi = {10.1016/J.IC.2007.07.002}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/AndovaCGMMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/MassacciPM08, author = {Fabio Massacci and Frank Piessens and Sjouke Mauw}, title = {Preface}, journal = {Sci. Comput. Program.}, volume = {74}, number = {1-2}, pages = {1}, year = {2008}, url = {https://doi.org/10.1016/j.scico.2008.09.002}, doi = {10.1016/J.SCICO.2008.09.002}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/MassacciPM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/BouwmanMP08, author = {Bart Bouwman and Sjouke Mauw and Milan Petkovic}, title = {Rights Management for Role-Based Access Control}, booktitle = {5th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2008, Las Vegas, NV, USA, January 10-12, 2008}, pages = {1085--1090}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ccnc08.2007.246}, doi = {10.1109/CCNC08.2007.246}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/BouwmanMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DeursenMR08, author = {Ton van Deursen and Sjouke Mauw and Sasa Radomirovic}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {Untraceability of {RFID} Protocols}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {1--15}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_1}, doi = {10.1007/978-3-540-79966-5\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/DeursenMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/europki/2008, editor = {Stig Fr. Mj{\o}lsnes and Sjouke Mauw and Sokratis K. Katsikas}, title = {Public Key Infrastructure, 5th European {PKI} Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5057}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69485-4}, doi = {10.1007/978-3-540-69485-4}, isbn = {978-3-540-69484-7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CederquistDM07, author = {Jan Cederquist and Muhammad Torabi Dashti and Sjouke Mauw}, title = {A Certified Email Protocol Using Key Chains}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada}, pages = {525--530}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINAW.2007.10}, doi = {10.1109/AINAW.2007.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/CederquistDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CeelenMR08, author = {Pieter Ceelen and Sjouke Mauw and Sasa Radomirovic}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {31--43}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.015}, doi = {10.1016/J.ENTCS.2007.12.015}, timestamp = {Mon, 13 Feb 2023 09:13:20 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CeelenMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/CremersMV06, author = {Cas J. F. Cremers and Sjouke Mauw and Erik P. de Vink}, title = {Injective synchronisation: An extension of the authentication hierarchy}, journal = {Theor. Comput. Sci.}, volume = {367}, number = {1-2}, pages = {139--161}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2006.08.034}, doi = {10.1016/J.TCS.2006.08.034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/CremersMV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/MauwVB06, author = {Sjouke Mauw and Ivo van Vessem and Bert Bos}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Forward Secure Communication in Wireless Sensor Networks}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {32--42}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_4}, doi = {10.1007/11734666\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/MauwVB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MauwVV07, author = {Sjouke Mauw and Jan Verschuren and Erik P. de Vink}, editor = {Maurice H. ter Beek and Fabio Gadducci}, title = {Data Anonymity in the {FOO} Voting Scheme}, booktitle = {Proceedings of the Second International Workshop on Views on Designing Complex Architectures, VODCA@FOSAD 2006, Bertinoro, Italy, September 16-17, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {168}, pages = {5--28}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.11.001}, doi = {10.1016/J.ENTCS.2006.11.001}, timestamp = {Tue, 24 Jan 2023 11:14:31 +0100}, biburl = {https://dblp.org/rec/journals/entcs/MauwVV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2005, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, publisher = {Elsevier}, year = {2006}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/157/issue/3}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0611062, author = {Suzana Andova and Cas Cremers and Kristian Gj{\o}steen and Sjouke Mauw and Stig Fr. Mj{\o}lsnes and Sasa Radomirovic}, title = {A framework for compositional verification of security protocols}, journal = {CoRR}, volume = {abs/cs/0611062}, year = {2006}, url = {http://arxiv.org/abs/cs/0611062}, eprinttype = {arXiv}, eprint = {cs/0611062}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0611062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MauwO05, author = {Sjouke Mauw and Martijn Oostdijk}, editor = {Dongho Won and Seungjoo Kim}, title = {Foundations of Attack Trees}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {186--198}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_17}, doi = {10.1007/11734727\_17}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MauwO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/NairGMM05, author = {Gopakumar Nair and Ajeesh Gopalakrishnan and Sjouke Mauw and Erik Moll}, editor = {Willem Jonker and Milan Petkovic}, title = {{XML} Security in the Next Generation Optical Disc Context}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {217--233}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_15}, doi = {10.1007/11552338\_15}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/NairGMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MauwIC06, author = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Preface}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {1--2}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.045}, doi = {10.1016/J.ENTCS.2005.09.045}, timestamp = {Fri, 20 Jan 2023 11:50:26 +0100}, biburl = {https://dblp.org/rec/journals/entcs/MauwIC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CremersMV05, author = {Cas J. F. Cremers and Sjouke Mauw and Erik P. de Vink}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {A Syntactic Criterion for Injectivity of Authentication Protocols}, booktitle = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, pages = {23--38}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.06.006}, doi = {10.1016/J.ENTCS.2005.06.006}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/CremersMV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/MauwWW04, author = {Sjouke Mauw and Wouter T. Wiersma and Tim A. C. Willemse}, title = {Language-Driven System Design}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {14}, number = {6}, pages = {625--663}, year = {2004}, url = {https://doi.org/10.1142/S0218194004001828}, doi = {10.1142/S0218194004001828}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/MauwWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MauwVV04, author = {Sjouke Mauw and Jan Verschuren and Erik P. de Vink}, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, title = {A Formalization of Anonymity and Onion Routing}, booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3193}, pages = {109--124}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30108-0\_7}, doi = {10.1007/978-3-540-30108-0\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MauwVV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sam/CremersM04, author = {Cas J. F. Cremers and Sjouke Mauw}, editor = {Daniel Amyot and Alan W. Williams}, title = {Checking Secrecy by Means of Partial Order Reduction}, booktitle = {System Analysis and Modeling, 4th International {SDL} and {MSC} Workshop, {SAM} 2004, Ottawa, Canada, June 1-4, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3319}, pages = {171--188}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31810-1\_12}, doi = {10.1007/978-3-540-31810-1\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/sam/CremersM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BlomGMS05, author = {Stefan Blom and Jan Friso Groote and Sjouke Mauw and Alexander Serebrenik}, editor = {Irek Ulidowski}, title = {Analysing the BKE-security Protocol with \emph{{\(\mathrm{\mu}\)}}CRL}, booktitle = {Proceedings of the 6th {AMAST} Workshop on Real-Time Systems, {ARTS} 2004, Stirling, UK, July 12, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {139}, number = {1}, pages = {49--90}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2005.09.005}, doi = {10.1016/J.ENTCS.2005.09.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/BlomGMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scheduling/BorstBGM03, author = {Sem C. Borst and Onno J. Boxma and Jan Friso Groote and Sjouke Mauw}, title = {Task Allocation in a Multi-Server System}, journal = {J. Sched.}, volume = {6}, number = {5}, pages = {423--436}, year = {2003}, url = {https://doi.org/10.1023/A:1024840405535}, doi = {10.1023/A:1024840405535}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scheduling/BorstBGM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/CremersM03, author = {Cas Cremers and Sjouke Mauw}, editor = {Stefan Leue and Tarja Syst{\"{a}}}, title = {Operational Semantics of Security Protocols}, booktitle = {Scenarios: Models, Transformations and Tools, International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3466}, pages = {66--89}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11495628\_4}, doi = {10.1007/11495628\_4}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/CremersM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fates/BeekM03, author = {Harm M. A. van Beek and Sjouke Mauw}, editor = {Alexandre Petrenko and Andreas Ulrich}, title = {Automatic Conformance Testing of Internet Applications}, booktitle = {Formal Approaches to Software Testing, Third International Workshop on Formal Approaches to Testing of Software, {FATES} 2003, Montreal, Quebec, Canada, October 6th, 2003}, series = {Lecture Notes in Computer Science}, volume = {2931}, pages = {205--222}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24617-6\_15}, doi = {10.1007/978-3-540-24617-6\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fates/BeekM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/EngelsMR02, author = {Andr{\'{e}} Engels and Sjouke Mauw and Michel A. Reniers}, title = {A hierarchy of communication models for Message Sequence Charts}, journal = {Sci. Comput. Program.}, volume = {44}, number = {3}, pages = {253--292}, year = {2002}, url = {https://doi.org/10.1016/S0167-6423(02)00022-9}, doi = {10.1016/S0167-6423(02)00022-9}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/EngelsMR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/MauwWW02, author = {Sjouke Mauw and Wouter T. Wiersma and Tim A. C. Willemse}, title = {Language Driven System Design}, booktitle = {35th Hawaii International Conference on System Sciences {(HICSS-35} 2002), {CD-ROM} / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, {USA}}, pages = {280}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/HICSS.2002.994488}, doi = {10.1109/HICSS.2002.994488}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/MauwWW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pts/FeijsGMT02, author = {Loe M. G. Feijs and Nicolae Goga and Sjouke Mauw and Jan Tretmans}, editor = {Ina Schieferdecker and Hartmut K{\"{o}}nig and Adam Wolisz}, title = {Test Selection, Trace Distance and Heuristics}, booktitle = {Testing of Communicating Systems XIV, Applications to Internet Technologies and Services, Proceedings of the {IFIP} 14th International Conference on Testing Communicating Systems - TestCom 2002, Berlin, Germany, March 19-22, 2002}, series = {{IFIP} Conference Proceedings}, volume = {210}, pages = {267--282}, publisher = {Kluwer}, year = {2002}, timestamp = {Mon, 22 Jul 2002 15:00:50 +0200}, biburl = {https://dblp.org/rec/conf/pts/FeijsGMT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cl/Mauw01, author = {Sjouke Mauw}, title = {Introduction by the guest editor}, journal = {Comput. Lang.}, volume = {27}, number = {1/3}, pages = {1--2}, year = {2001}, url = {https://doi.org/10.1016/S0096-0551(01)00012-1}, doi = {10.1016/S0096-0551(01)00012-1}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cl/Mauw01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/GrooteHMV01, author = {Jan Friso Groote and Wim H. Hesselink and Sjouke Mauw and Rogier Vermeulen}, title = {An algorithm for the asynchronous Write-All problem based on process collision}, journal = {Distributed Comput.}, volume = {14}, number = {2}, pages = {75--81}, year = {2001}, url = {https://doi.org/10.1007/PL00008930}, doi = {10.1007/PL00008930}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/GrooteHMV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/VoorhoeveM01, author = {Marc Voorhoeve and Sjouke Mauw}, title = {Impossible futures and determinism}, journal = {Inf. Process. Lett.}, volume = {80}, number = {1}, pages = {51--58}, year = {2001}, url = {https://doi.org/10.1016/S0020-0190(01)00217-4}, doi = {10.1016/S0020-0190(01)00217-4}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/VoorhoeveM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BaetenBM01, author = {Jos C. M. Baeten and Harm M. A. van Beek and Sjouke Mauw}, editor = {Gary B. Lamont}, title = {Specifying internet applications with DiCons}, booktitle = {Proceedings of the 2001 {ACM} Symposium on Applied Computing (SAC), March 11-14, 2001, Las Vegas, NV, {USA}}, pages = {576--584}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/372202.372466}, doi = {10.1145/372202.372466}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BaetenBM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdl/BaetenBM01, author = {Jos C. M. Baeten and Harm M. A. van Beek and Sjouke Mauw}, editor = {Rick Reed and Jeanne Reed}, title = {An {MSC} Based Representation of DiCons}, booktitle = {{SDL} 2001: Meeting UML, 10th International {SDL} Forum Copenhagen, Denmark, June 27-29, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2078}, pages = {328--347}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-48213-X\_21}, doi = {10.1007/3-540-48213-X\_21}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdl/BaetenBM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/01/MauwR01, author = {Sjouke Mauw and Michel A. Reniers}, editor = {Jan A. Bergstra and Alban Ponse and Scott A. Smolka}, title = {A Process Algebra for Interworkings}, booktitle = {Handbook of Process Algebra}, pages = {1269--1327}, publisher = {North-Holland / Elsevier}, year = {2001}, url = {https://doi.org/10.1016/b978-044482830-9/50037-0}, doi = {10.1016/B978-044482830-9/50037-0}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/01/MauwR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euromicro/VrankenGMF00, author = {Harald P. E. Vranken and Tom{\'{a}}s Garci{\'{a}} Garci{\'{a}} and Sjouke Mauw and Loe M. G. Feijs}, title = {{IC} Design Validation Using Message Sequence Charts}, booktitle = {26th {EUROMICRO} 2000 Conference, Informatics: Inventing the Future, 5-7 September 2000, Maastricht, The Netherlands}, pages = {1122}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/EURMIC.2000.874624}, doi = {10.1109/EURMIC.2000.874624}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euromicro/VrankenGMF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sam/FeijsGM00, author = {Loe M. G. Feijs and Nicolae Goga and Sjouke Mauw}, editor = {Edel Sherratt}, title = {Probabilities In The Torx Test Derivation Algorithm}, booktitle = {{SAM} 2000, 2nd Workshop on {SDL} and MSC, Col de Porte, Grenoble, France, June 26-28, 2000}, pages = {173--188}, publisher = {VERIMAG, IRISA, {SDL} Forum}, year = {2000}, timestamp = {Thu, 16 Oct 2003 15:31:41 +0200}, biburl = {https://dblp.org/rec/conf/sam/FeijsGM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MauwR99, author = {Sjouke Mauw and Michel A. Reniers}, title = {Operational Semantics for MSC'96}, journal = {Comput. Networks}, volume = {31}, number = {17}, pages = {1785--1799}, year = {1999}, url = {https://doi.org/10.1016/S1389-1286(99)00060-2}, doi = {10.1016/S1389-1286(99)00060-2}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MauwR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pts/BelinfanteFVTGFMH99, author = {Axel Belinfante and Jan Feenstra and Ren{\'{e}} G. de Vries and Jan Tretmans and Nicolae Goga and Loe M. G. Feijs and Sjouke Mauw and Lex Heerink}, editor = {Gyula Csopaki and Sarolta Dibuz and Katalin Tarnay}, title = {Formal Test Automation: {A} Simple Experiment}, booktitle = {Testing of Communicating Systems: Method and Applications, {IFIP} {TC6} 12\({}^{\mbox{th}}\) International Workshop on Testing Communicating Systems, September 1-3, 1999, Budapest, Hungary}, series = {{IFIP} Conference Proceedings}, volume = {147}, pages = {179--196}, publisher = {Kluwer}, year = {1999}, timestamp = {Thu, 17 Oct 2002 11:13:46 +0200}, biburl = {https://dblp.org/rec/conf/pts/BelinfanteFVTGFMH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdl/EngelsFM99, author = {Andr{\'{e}} Engels and Loe M. G. Feijs and Sjouke Mauw}, editor = {Rachida Dssouli and Gregor von Bochmann and Yair Lahav}, title = {{MSC} and data: dynamic variables}, booktitle = {{SDL} '99 The Next Millennium, 9th International {SDL} Forum, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, 21-25 June, 1999, Proceedings}, pages = {105}, publisher = {Elsevier}, year = {1999}, timestamp = {Sat, 07 Sep 2019 11:59:23 +0200}, biburl = {https://dblp.org/rec/conf/sdl/EngelsFM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spin/JanssenMMFS99, author = {Wil Janssen and Radu Mateescu and Sjouke Mauw and Peter Fennema and Petra van der Stappen}, editor = {Dennis Dams and Rob Gerth and Stefan Leue and Mieke Massink}, title = {Model Checking for Managers}, booktitle = {Theoretical and Practical Aspects of {SPIN} Model Checking, 5th and 6th International {SPIN} Workshops, Trento, Italy, July 5, 1999, Toulouse, France, September 21 and 24 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1680}, pages = {92--107}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48234-2\_7}, doi = {10.1007/3-540-48234-2\_7}, timestamp = {Mon, 15 Jun 2020 17:08:41 +0200}, biburl = {https://dblp.org/rec/conf/spin/JanssenMMFS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/concur/1999, editor = {Jos C. M. Baeten and Sjouke Mauw}, title = {{CONCUR} '99: Concurrency Theory, 10th International Conference, Eindhoven, The Netherlands, August 24-27, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1664}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48320-9}, doi = {10.1007/3-540-48320-9}, isbn = {3-540-66425-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/EngelsMR97, author = {Andr{\'{e}} Engels and Sjouke Mauw and Michel A. Reniers}, editor = {Atsushi Togashi and Tadanori Mizuno and Norio Shiratori and Teruo Higashino}, title = {A Hierarchy of Communication Models for Message Sequence Charts}, booktitle = {Formal Description Techniques and Protocol Specification, Testing and Verification, {FORTE} {X} / {PSTV} XVII'97, {IFIP} {TC6} {WG6.1} Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols {(FORTE} {X)} and Protocol Specification, Testing and Verification {(PSTV} XVII), 18-21 November, 1997, Osaka, Japan}, series = {{IFIP} Conference Proceedings}, volume = {107}, pages = {75--90}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Wed, 12 Feb 2003 15:40:21 +0100}, biburl = {https://dblp.org/rec/conf/forte/EngelsMR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdl/MauwR97, author = {Sjouke Mauw and Michel A. Reniers}, editor = {Ana R. Cavalli and Amardeo Sarma}, title = {High-level message sequence charts}, booktitle = {{SDL} '97 Time for Testing, SDL, {MSC} and Trends - 8th International {SDL} Forum, Evry, France, 23-29 September 1997, Proceedings}, pages = {291--306}, publisher = {Elsevier}, year = {1997}, timestamp = {Thu, 16 Oct 2003 14:16:32 +0200}, biburl = {https://dblp.org/rec/conf/sdl/MauwR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/EngelsFM97, author = {Andr{\'{e}} Engels and Loe M. G. Feijs and Sjouke Mauw}, editor = {Ed Brinksma}, title = {Test Generation for Intelligent Networks Using Model Checking}, booktitle = {Tools and Algorithms for Construction and Analysis of Systems, Third International Workshop, {TACAS} '97, Enschede, The Netherlands, April 2-4, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1217}, pages = {384--398}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0035401}, doi = {10.1007/BFB0035401}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/EngelsFM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Mauw96, author = {Sjouke Mauw}, title = {The Formalization of Message Sequence Charts}, journal = {Comput. Networks {ISDN} Syst.}, volume = {28}, number = {12}, pages = {1643--1657}, year = {1996}, url = {https://doi.org/10.1016/0169-7552(95)00123-9}, doi = {10.1016/0169-7552(95)00123-9}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Mauw96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/BrunekreefKKM96, author = {Jacob Brunekreef and Joost{-}Pieter Katoen and Ron Koymans and Sjouke Mauw}, title = {Design and Analysis of Dynamic Leader Election Protocols in Broadcast Networks}, journal = {Distributed Comput.}, volume = {9}, number = {4}, pages = {157--171}, year = {1996}, url = {https://doi.org/10.1007/s004460050017}, doi = {10.1007/S004460050017}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/BrunekreefKKM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/MauwR96, author = {Sjouke Mauw and Michel A. Reniers}, editor = {Ugo Montanari and Vladimiro Sassone}, title = {Refinement in Interworkings}, booktitle = {{CONCUR} '96, Concurrency Theory, 7th International Conference, Pisa, Italy, August 26-29, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1119}, pages = {671--686}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61604-7\_83}, doi = {10.1007/3-540-61604-7\_83}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/MauwR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/DArgenioM95, author = {Pedro R. D'Argenio and Sjouke Mauw}, editor = {Insup Lee and Scott A. Smolka}, title = {Delayed choice for process algebra with abstraction}, booktitle = {{CONCUR} '95: Concurrency Theory, 6th International Conference, Philadelphia, PA, USA, August 21-24, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {962}, pages = {501--515}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60218-6\_38}, doi = {10.1007/3-540-60218-6\_38}, timestamp = {Thu, 26 Jan 2023 14:05:52 +0100}, biburl = {https://dblp.org/rec/conf/concur/DArgenioM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MauwR94, author = {Sjouke Mauw and Michel A. Reniers}, title = {An Algebraic Semantics of Basic Message Sequence Charts}, journal = {Comput. J.}, volume = {37}, number = {4}, pages = {269--278}, year = {1994}, url = {https://doi.org/10.1093/comjnl/37.4.269}, doi = {10.1093/COMJNL/37.4.269}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MauwR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/MauwM94, author = {Sjouke Mauw and Hans Mulder}, editor = {Bengt Jonsson and Joachim Parrow}, title = {Regularity of BPA-Systems is Decidable}, booktitle = {{CONCUR} '94, Concurrency Theory, 5th International Conference, Uppsala, Sweden, August 22-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {836}, pages = {34--47}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/978-3-540-48654-1\_4}, doi = {10.1007/978-3-540-48654-1\_4}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/MauwM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/BaetenM94, author = {Jos C. M. Baeten and Sjouke Mauw}, editor = {Dieter Hogrefe and Stefan Leue}, title = {Delayed choice: an operator for joining Message Sequence Charts}, booktitle = {Formal Description Techniques VII, Proceedings of the 7th {IFIP} {WG6.1} International Conference on Formal Description Techniques, Berne, Switzerland, 1994}, series = {{IFIP} Conference Proceedings}, volume = {6}, pages = {340--354}, publisher = {Chapman {\&} Hall}, year = {1994}, timestamp = {Thu, 03 Jan 2002 11:58:39 +0100}, biburl = {https://dblp.org/rec/conf/forte/BaetenM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/BergstraMW91, author = {Jan A. Bergstra and Sjouke Mauw and Freek Wiedijk}, title = {Uniform Algebraic Specifications of Finite Sets with Equality}, journal = {Int. J. Found. Comput. Sci.}, volume = {2}, number = {1}, pages = {43--65}, year = {1991}, url = {https://doi.org/10.1142/S0129054191000042}, doi = {10.1142/S0129054191000042}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/BergstraMW91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/MauwV91, author = {Sjouke Mauw and Gert J. Veltink}, editor = {Kim Guldstrand Larsen and Arne Skou}, title = {A Proof Assistant for {PSF}}, booktitle = {Computer Aided Verification, 3rd International Workshop, {CAV} '91, Aalborg, Denmark, July, 1-4, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {575}, pages = {158--168}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-55179-4\_16}, doi = {10.1007/3-540-55179-4\_16}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/MauwV91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/am/BaetenBMV89, author = {Jos C. M. Baeten and Jan A. Bergstra and Sjouke Mauw and Gert J. Veltink}, editor = {Jan A. Bergstra and Loe M. G. Feijs}, title = {A Process Specification Formalism Based on Static {COLD}}, booktitle = {Algebraic Methods {II:} Theory, Tools and Applications [papers from a workshop in Mierlo, The Netherlands, September 1989]}, series = {Lecture Notes in Computer Science}, volume = {490}, pages = {303--335}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-53912-3\_27}, doi = {10.1007/3-540-53912-3\_27}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/am/BaetenBMV89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/am/MauwW89, author = {Sjouke Mauw and Freek Wiedijk}, editor = {Jan A. Bergstra and Loe M. G. Feijs}, title = {Specification of the Transit Node in PSF\({}_{\mbox{d}}\)}, booktitle = {Algebraic Methods {II:} Theory, Tools and Applications [papers from a workshop in Mierlo, The Netherlands, September 1989]}, series = {Lecture Notes in Computer Science}, volume = {490}, pages = {341--361}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-53912-3\_28}, doi = {10.1007/3-540-53912-3\_28}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/am/MauwW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapsoft/MauwV89, author = {Sjouke Mauw and Gert J. Veltink}, editor = {Josep D{\'{\i}}az and Fernando Orejas}, title = {An Introduction to PSFd}, booktitle = {TAPSOFT'89: Proceedings of the International Joint Conference on Theory and Practice of Software Development, Barcelona, Spain, March 13-17, 1989, Volume 2: Advanced Seminar on Foundations of Innovative Software Development {II} and Colloquium on Current Issues in Programming Languages {(CCIPL)}}, series = {Lecture Notes in Computer Science}, volume = {352}, pages = {272--285}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-50940-2\_41}, doi = {10.1007/3-540-50940-2\_41}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tapsoft/MauwV89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/am/Mauw87, author = {Sjouke Mauw}, editor = {Martin Wirsing and Jan A. Bergstra}, title = {An Algebraic Specification of Process Algebra, Including Two Examples}, booktitle = {Algebraic Methods: Theory, Tools and Applications [papers from a workshop in Passau, Germany, June 9-11, 1987]}, series = {Lecture Notes in Computer Science}, volume = {394}, pages = {507--554}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/BFb0015050}, doi = {10.1007/BFB0015050}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/am/Mauw87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.