Sjouke Mauw

According to our database1, Sjouke Mauw authored at least 118 papers between 1987 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Attribute evaluation on attack trees with incomplete information.
Comput. Secur., 2020

2019
Conditional adjacency anonymity in social graphs under active attacks.
Knowl. Inf. Syst., 2019

Robust active attacks on social graphs.
Data Min. Knowl. Discov., 2019

Active Re-identification Attacks on Periodically Released Dynamic Social Graphs.
CoRR, 2019

Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee.
CoRR, 2019

Attack-Tree Series: A Case for Dynamic Attack Tree Analysis.
Proceedings of the Graphical Models for Security - 6th International Workshop, 2019

Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity.
Proceedings of the Computer Security - ESORICS 2019, 2019

Post-Collusion Security and Distance Bounding.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Anonymising social graphs in the presence of active attackers.
Transactions on Data Privacy, 2018

Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library.
Proceedings of the Security and Trust Management - 14th International Workshop, 2018

Distance-Bounding Protocols: Verification without Time and Location.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement.
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018

Automated Identification of Desynchronisation Attacks on Shared Secrets.
Proceedings of the Computer Security, 2018

2017
Semantics for Specialising Attack Trees based on Linear Logic.
Fundam. Inform., 2017

Rethinking (k, 𝓁)-anonymity in social graphs: (k, 𝓁)-adjacency anonymity and (k, 𝓁)-(adjacency) anonymous transformations.
CoRR, 2017

Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate Online Elections.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Refinement-Aware Generation of Attack Trees.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

A Security Perspective on Publication Metrics.
Proceedings of the Security Protocols XXV, 2017

2016
Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't.
Proceedings of the Security Protocols XXIV, 2016

Optimality Results on the Security of Lookup-Based Protocols.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016

A Class of Precomputation-Based Distance-Bounding Protocols.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Counteracting Active Attacks in Social Network Graphs.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016

2015
Comparing distance bounding protocols: A critical mission supported by decision theory.
Comput. Commun., 2015

Security analysis of socio-technical physical systems.
Comput. Electr. Eng., 2015

Location-Private Interstellar Communication (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Location-Private Interstellar Communication.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Attack Trees with Sequential Conjunction.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Generalizing Multi-party Contract Signing.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Attack-defense trees.
J. Log. Comput., 2014

On Robustness of Trust Systems.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

A Symbolic Algorithm for the Analysis of Robust Timed Automata.
Proceedings of the FM 2014: Formal Methods, 2014

2013
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System.
JoWUA, 2013

Location Assurance and Privacy in GNSS Navigation.
ERCIM News, 2013

Privacy and verifiability in voting systems: Methods, developments and trends.
Comput. Sci. Rev., 2013

ADTool: Security Analysis with Attack- Defense Trees (Extended Version)
CoRR, 2013

ADTool: Security Analysis with Attack-Defense Trees.
Proceedings of the Quantitative Evaluation of Systems - 10th International Conference, 2013

Message from ESSS 2013 Workshop Co-chairs.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

A Trust Framework for Evaluating GNSS Signal Integrity.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

Demonstrating a trust framework for evaluating GNSS signal integrity.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Probabilistic Model Checking of the PDGF Signaling Pathway.
Trans. Computational Systems Biology, 2012

A trust-augmented voting scheme for collaborative privacy management.
Journal of Computer Security, 2012

Game-based verification of contract signing protocols with minimal messages.
ISSE, 2012

Input online review data and related bias in recommender systems.
Decis. Support Syst., 2012

Comparative Analysis of Clustering Protocols with Probabilistic Model Checking.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Quantitative Questions on Attack-Defense Trees.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

A Group Signature Based Electronic Toll Pricing System.
Proceedings of the Seventh International Conference on Availability, 2012

Operational Semantics and Verification of Security Protocols
Information Security and Cryptography, Springer, ISBN: 978-3-540-78636-8, 2012

2011
A Study of the PDGF Signaling Pathway with PRISM
Proceedings of the Proceedings Third International Workshop on Computational Models for Cell Processes, 2011

mCarve: Carving Attributed Dump Sets.
Proceedings of the 20th USENIX Security Symposium, 2011

Fairness in Non-Repudiation Protocols.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Selective Location Blinding Using Hash Chains (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

Selective Location Blinding Using Hash Chains.
Proceedings of the Security Protocols XIX, 2011

2010
Fair Exchange.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Security Protocols for Secret Santa.
Proceedings of the Security Protocols XVIII, 2010

Security Protocols for Secret Santa (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Foundations of Attack-Defense Trees.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent.
Proceedings of the Decision and Game Theory for Security, 2010

2009
A formal framework for quantifying voter-controlled privacy.
J. Algorithms, 2009

Game-Based Verification of Multi-Party Contract Signing Protocols.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

An Algebra for Trust Dilution and Trust Fusion.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

Secure Ownership and Ownership Transfer in RFID Systems.
Proceedings of the Computer Security, 2009

Minimal Message Complexity of Asynchronous Multi-party Contract Signing.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Towards a Decision Model Based on Trust and Security Risk Management.
Proceedings of the Seventh Australasian Information Security Conference, 2009

Measuring Voter-Controlled Privacy.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Preface.
Sci. Comput. Program., 2008

A framework for compositional verification of security protocols.
Inf. Comput., 2008

Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks.
Electron. Notes Theor. Comput. Sci., 2008

Untraceability of RFID Protocols.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

2007
Data Anonymity in the FOO Voting Scheme.
Electron. Notes Theor. Comput. Sci., 2007

A Certified Email Protocol Using Key Chains.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Injective synchronisation: An extension of the authentication hierarchy.
Theor. Comput. Sci., 2006

Preface.
Electron. Notes Theor. Comput. Sci., 2006

Forward Secure Communication in Wireless Sensor Networks.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

2005
A Syntactic Criterion for Injectivity of Authentication Protocols.
Electron. Notes Theor. Comput. Sci., 2005

Analysing the BKE-security Protocol with µCRL.
Electron. Notes Theor. Comput. Sci., 2005

XML Security in the Next Generation Optical Disc Context.
Proceedings of the Secure Data Management, 2005

Foundations of Attack Trees.
Proceedings of the Information Security and Cryptology, 2005

2004
Language-Driven System Design.
International Journal of Software Engineering and Knowledge Engineering, 2004

Checking Secrecy by Means of Partial Order Reduction.
Proceedings of the System Analysis and Modeling, 4th International SDL and MSC Workshop, 2004

A Formalization of Anonymity and Onion Routing.
Proceedings of the Computer Security, 2004

2003
Task Allocation in a Multi-Server System.
J. Scheduling, 2003

Automatic Conformance Testing of Internet Applications.
Proceedings of the Formal Approaches to Software Testing, 2003

Operational Semantics of Security Protocols.
Proceedings of the Scenarios: Models, 2003

2002
A hierarchy of communication models for Message Sequence Charts.
Sci. Comput. Program., 2002

Test Selection, Trace Distance and Heuristics.
Proceedings of the Testing of Communicating Systems XIV, Applications to Internet Technologies and Services, Proceedings of the IFIP 14th International Conference on Testing Communicating Systems, 2002

2001
Impossible futures and determinism.
Inf. Process. Lett., 2001

An algorithm for the asynchronous Write-All problem based on process collision.
Distributed Computing, 2001

Introduction by the guest editor.
Comput. Lang., 2001

An MSC Based Representation of DiCons.
Proceedings of the SDL 2001: Meeting UML, 2001

Specifying internet applications with DiCons.
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001

A Process Algebra for Interworkings.
Proceedings of the Handbook of Process Algebra, 2001

2000
Probabilities In The Torx Test Derivation Algorithm.
Proceedings of the SAM 2000, 2000

IC Design Validation Using Message Sequence Charts.
Proceedings of the 26th EUROMICRO 2000 Conference, 2000

1999
Operational Semantics for MSC'96.
Comput. Networks, 1999

Model Checking for Managers.
Proceedings of the Theoretical and Practical Aspects of SPIN Model Checking, 1999

MSC and data: dynamic variables.
Proceedings of the SDL '99 The Next Millennium, 1999

Formal Test Automation: A Simple Experiment.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999

1997
Test Generation for Intelligent Networks Using Model Checking.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1997

High-level message sequence charts.
Proceedings of the SDL '97 Time for Testing, 1997

1996
Design and Analysis of Dynamic Leader Election Protocols in Broadcast Networks.
Distributed Computing, 1996

The Formalization of Message Sequence Charts.
Computer Networks and ISDN Systems, 1996

Refinement in Interworkings.
Proceedings of the CONCUR '96, 1996

1995
Delayed choice for process algebra with abstraction.
Proceedings of the CONCUR '95: Concurrency Theory, 1995

1994
An Algebraic Semantics of Basic Message Sequence Charts.
Comput. J., 1994

Delayed choice: an operator for joining Message Sequence Charts.
Proceedings of the Formal Description Techniques VII, 1994

Regularity of BPA-Systems is Decidable.
Proceedings of the CONCUR '94, 1994

1991
Uniform Algebraic Specifications of Finite Sets with Equality.
Int. J. Found. Comput. Sci., 1991

A Proof Assistant for PSF.
Proceedings of the Computer Aided Verification, 3rd International Workshop, 1991

1989
An Introduction to PSFd.
Proceedings of the TAPSOFT'89: Proceedings of the International Joint Conference on Theory and Practice of Software Development, 1989

Specification of the Transit Node in PSFd.
Proceedings of the Algebraic Methods II: Theory, 1989

A Process Specification Formalism Based on Static COLD.
Proceedings of the Algebraic Methods II: Theory, 1989

1987
An Algebraic Specification of Process Algebra, Including Two Examples.
Proceedings of the Algebraic Methods: Theory, 1987


  Loading...