Pieter H. Hartel

Orcid: 0000-0002-0411-0421

Affiliations:
  • University of Twente, Enschede, Netherlands


According to our database1, Pieter H. Hartel authored at least 158 papers between 1983 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Understanding Online Privacy - A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines.
ACM Comput. Surv., 2023

DarkDiff: Explainable web page similarity of TOR onion sites.
CoRR, 2023

2021
Privacy Rating: A User-Centered Approach for Visualizing Data Handling Practices of Online Services.
IEEE Trans. Prof. Commun., 2021

Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases.
CoRR, 2021

Investigating sentence severity with judicial open data - A case study on sentencing high-tech crime in the Dutch criminal justice system.
CoRR, 2021

2020
Mutation Testing of Smart Contracts at Scale.
Proceedings of the Tests and Proofs - 14th International Conference, 2020

HeadPrint: detecting anomalous communications through header-based application fingerprinting.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets.
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020

2019
Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources.
Telematics Informatics, 2019

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of \"Thinking Like a Thief\".
IEEE Secur. Priv., 2019

Gas limit aware mutation testing of smart contracts at scale.
CoRR, 2019

Truffle tests for free - Replaying Ethereum smart contracts for transparency.
CoRR, 2019

An Empirical Study Into the Success of Listed Smart Contracts in Ethereum.
IEEE Access, 2019

Victim-Aware Adaptive Covert Channels.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
Rethinking Blockchain Security: Position Paper.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2017
Spear phishing in organisations explained.
Inf. Comput. Secur., 2017

How Effective is Anti-Phishing Training for Children?
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Reliably determining data leakage in the presence of strong attackers.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Regression Nodes: Extending Attack Trees with Data from Social Sciences.
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015

Publicly Verifiable Private Aggregation of Time-Series Data.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks.
J. Comput. Sci. Technol., 2014

A Survey of Provably Secure Searchable Encryption.
ACM Comput. Surv., 2014

Distributed Searchable Symmetric Encryption.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

SOFIR: Securely outsourced Forensic image recognition.
Proceedings of the IEEE International Conference on Acoustics, 2014

Through the eye of the PLC: semantic security monitoring for industrial processes.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Privacy in Recommender Systems.
Proceedings of the Social Media Retrieval, 2013

Applying the Lost-Letter Technique to Assess IT Risk Behaviour.
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

Privacy-Preserving Verification of Clinical Research.
Proceedings of the Sicherheit 2014: Sicherheit, 2013

Efficient Privacy-Enhanced Familiarity-Based Recommender System.
Proceedings of the Computer Security - ESORICS 2013, 2013

How "Digital" is Traditional Crime?
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

2012
Simple algebraic data types for C.
Softw. Pract. Exp., 2012

A log mining approach for process monitoring in SCADA.
Int. J. Inf. Sec., 2012

Selective Document Retrieval from Encrypted Database.
Proceedings of the Information Security - 15th International Conference, 2012

Privacy-preserving collaborative filtering based on horizontally partitioned dataset.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

Challenges and opportunities in securing industrial control systems.
Proceedings of the Complexity in Engineering, 2012

2011
Model-based qualitative risk assessment for availability of IT infrastructures.
Softw. Syst. Model., 2011

KALwEN: a new practical and interoperable key management scheme for body sensor networks.
Secur. Commun. Networks, 2011

Training students to steal: a practical assignment in computer security education.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011

Conjunctive Wildcard Search over Encrypted Data.
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011

Privacy Enhanced Access Control by Means of Policy Blinding.
Proceedings of the Information Security Practice and Experience, 2011

MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

Poster: privacy-preserving profile similarity computation in online social networks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Privacy-preserving profile matching using the social graph.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

Public-Key Encryption with Delegated Search.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Energy-Efficient Streaming Using Non-volatile Memory.
J. Signal Process. Syst., 2010

Optimizing MEMS-based storage devices for mobile battery-powered systems.
ACM Trans. Storage, 2010

Embedding renewable cryptographic keys into noisy data.
Int. J. Inf. Sec., 2010

Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records.
Int. J. Comput. Model. Algorithms Medicine, 2010

Computationally Efficient Searchable Symmetric Encryption.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

Searching Keywords with Wildcards on Encrypted Data.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Effectiveness of Physical, Social and Digital Mechanisms against Laptop Theft in Open Organizations.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Laptop theft: a case study on the effectiveness of security mechanisms in open organizations.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Two methodologies for physical penetration testing using social engineering.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
ACM Trans. Sens. Networks, 2009

Secure pairing with biometrics.
Int. J. Secur. Networks, 2009

Fuzzy extractors for continuous distributions.
IACR Cryptol. ePrint Arch., 2009

Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Policies for probe-wear leveling in MEMS-based storage devices.
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes.
Proceedings of the Information Security Practice and Experience, 2009

Towards Secure and Practical MACs for Body Sensor Networks.
Proceedings of the Progress in Cryptology, 2009

2008
Cluster-based service discovery for heterogeneous wireless sensor networks.
Int. J. Parallel Emergent Distributed Syst., 2008

A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

On the Inability of Existing Security Models to Cope with Data Mobility in Dynamic Organizations.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Towards an Information Theoretic Analysis of Searchable Encryption.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Embedding Renewable Cryptographic Keys into Continuous Noisy Data.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow.
Proceedings of the Formal Methods in Computer-Aided Design, 2008

Towards Tamper-evident Storage on Patterned Media.
Proceedings of the 6th USENIX Conference on File and Storage Technologies, 2008

Controlling leakage of biometric information using dithering.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

Workload-based configuration of MEMS-based storage devices for mobile systems.
Proceedings of the 8th ACM & IEEE International conference on Embedded software, 2008

Inter-domain Identity-Based Proxy Re-encryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Power management of MEMS-based storage devices for mobile systems.
Proceedings of the 2008 International Conference on Compilers, 2008

2007
Timed analysis of security protocols.
J. Comput. Secur., 2007

Feeling Is Believing: A Secure Template Exchange Protocol.
Proceedings of the Advances in Biometrics, International Conference, 2007

Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads.
Proceedings of the 2007 5th Workshop on Embedded Systems for Real-Time Multimedia, 2007

Fuzzy extractors for continuous distributions.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Survey and benchmark of block ciphers for wireless sensor networks.
ACM Trans. Sens. Networks, 2006

LicenseScript: a logical language for digital rights management.
Ann. des Télécommunications, 2006

Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks.
Proceedings of the LCN 2006, 2006

POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

On consistency maintenance in service discovery.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, International Conference, 2006

2005
Nonmonotonic Trust Management for P2P Applications.
Proceedings of the First International Workshop on Security and Trust Management, 2005

Poseidon: a 2-tier Anomaly-based Intrusion Detection System
CoRR, 2005

A Trace Semantics for Positive Core XPath.
Proceedings of the 12th International Symposium on Temporal Representation and Reasoning (TIME 2005), 2005

StreamTo: Streaming Content using a Tamper-Resistant Token.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Functional Principles of Registry-based Service Discovery.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Service Brokerage in Prolog.
Proceedings of the ICEIS 2005, 2005

Link-layer jamming attacks on S-MAC.
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005

2004
Music2Share - Copyright-Compliant Music Sharing in P2P Systems.
Proc. IEEE, 2004

The Functional "C" experience.
J. Funct. Program., 2004

Efficient Tree Search in Encrypted Data.
Inf. Secur. J. A Glob. Perspect., 2004

License Protection with a Tamper-Resistant Token.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Biometric verification based on grip-pattern recognition.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Benchmarking block ciphers for wireless sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

Timed model checking of security protocols.
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004

Modelling Mobility Aspects of Security Policies.
Proceedings of the Construction and Analysis of Safe, 2004

2003
A Trace Logic for Local Security Properties.
Proceedings of the International Workshop on Software Verification and Validation, 2003

LicenseScript: a novel digital rights language and its semantics.
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003

Assessing Security in Energy-Efficient Sensor Networks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Secure Audit Logging with Tamper-Resistant Hardware.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Comparing Logic-Based and XML-Based Rights Expression Languages.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

Approximating Fair Use in LicenseScript.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003

2002
Multimedia QoS in Low-Cost Home Networks.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

Security Attributes Based Digital Rights Management.
Proceedings of the Protocols and Systems for Interactive Distributed Multimedia, 2002

A Java Reference Model of Transacted Memory for Smart Cards.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

The State of WG 8.8.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

2001
Formalizing the safety of Java, the Java virtual machine, and Java card.
ACM Comput. Surv., 2001

Current directions in smart cards.
Comput. Networks, 2001

Personal DJ, an architecture for personalised content delivery.
Proceedings of the Tenth International World Wide Web Conference, 2001

Transacted Memory for Smart Cards.
Proceedings of the FME 2001: Formal Methods for Increasing Software Productivity, 2001

iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric.
Proceedings of the Smart Card Programming and Security, 2001

2000
Abstract machines for programming language implementation.
Future Gener. Comput. Syst., 2000

Principles of abstract machines.
Future Gener. Comput. Syst., 2000

Programming by Numbers: A Programming Method for Novices.
Comput. J., 2000

A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations.
Proceedings of the Java on Smart Cards: Programming and Security, 2000

Pressure Sequence - A Novel Method of Protecting Smart Cards.
Proceedings of the Smart Card Research and Advanced Applications, 2000

Formalising Java Safety - An overview.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1999
Reasoning about Grover's quantum search algorithm using probabilistic <i>wp</i>.
ACM Trans. Program. Lang. Syst., 1999

LETOS - a lightweight execution tool for operational semantics.
Softw. Pract. Exp., 1999

Declarative solutions to partitioned-grid problems.
Softw. Pract. Exp., 1999

The Operational Semantics of a Java Secure Processor.
Proceedings of the Formal Syntax and Semantics of Java, 1999

1998
An Operational Model of QuickPay - Extended Abstract.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1997
Elementary Standard ML by Greg Michaelson, University College London Press, UK, 1995, ISBN 1-85728-398-8 PB, pp 306.
Knowl. Eng. Rev., 1997

FGCS special issue on smart cards.
Future Gener. Comput. Syst., 1997

Using formal methods to cultivate trust in smart card operating systems.
Future Gener. Comput. Syst., 1997

Functional C.
Addison-Wesley-Longman, ISBN: 978-0-201-41950-4, 1997

1996
The Resource Constrained Shortest Path Problem Implemented in a Lazy Functional Language.
J. Funct. Program., 1996

Benchmarking Implementations of Functional Languages with 'Pseudoknot', a Float-Intensive Benchmark.
J. Funct. Program., 1996

Introduction to CARDIS 1996.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996

Structuring and Visualising an IC-card Security Standard.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996

1995
Paradigms and laboratories in the core computer science curriculum: an overview.
ACM SIGCSE Bull., 1995

Communication Lifting: Fixed Point Computation for Parallelism.
J. Funct. Program., 1995

Special Issue on State-of-the-Art Applications of Pure Functional Programming Languages.
J. Funct. Program., 1995

Thunk Lifting: Reducing Heap Usage in an Implementation of a Lazy Functional Language.
J. Funct. Log. Program., 1995

A toolkit for parallel functional programming.
Concurr. Pract. Exp., 1995

Local Linear Logic for Locality Consciousness in Multiset Transformation
Proceedings of the Programming Languages: Implementations, 1995

Basic Proof Skills of Computer Science Students.
Proceedings of the Functional Programming Languages in Education, 1995

1994
Compilation of Functional Languages using Flow Graph Analysis.
Softw. Pract. Exp., 1994

Experiments wiht Destructive Updates in a Lazy Functional Language.
Comput. Lang., 1994

1993
Experience with a clustered parallel reduction machine.
Future Gener. Comput. Syst., 1993

Benchmarking Implementations of Lazy Functional Languages.
Proceedings of the conference on Functional programming languages and computer architecture, 1993

Experiments with destructive updates in a lazy functional language (extended abstract).
Proceedings of the 1993 Glasgow Workshop on Functional Programming, 1993

1992
FCG: A Code Generator for Lazy Functional Languages.
Proceedings of the Compiler Construction, 1992

1991
Performance of Lazy Combinator Graph Reduction.
Softw. Pract. Exp., 1991

1990
A Comparison of Three Garbage Collection Algorithms.
Struct. Program., 1990

1988
Statistics on Graph Reduction of SASL Programs.
Softw. Pract. Exp., 1988

The Average Size of Ordered Binary Subgraphs.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 1988

1987
The Dutch parallel reduction machine project.
Future Gener. Comput. Syst., 1987

1983
Input-Output Tools: A Language Facility for Interactive and Real-Time Systems.
IEEE Trans. Software Eng., 1983


  Loading...