Ton van Deursen

According to our database1, Ton van Deursen authored at least 18 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Corrigendum to 'A ZigBee intrusion detection system for IoT using secure and efficient data collection' Internet of Things, Volume 12, December 2020, 100, 306.
Internet Things, 2022

2020
A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection.
Internet Things, 2020

2011
mCarve: Carving Attributed Dump Sets.
Proceedings of the 20th USENIX Security Symposium, 2011

Insider Attacks and Privacy of RFID Protocols.
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

2010
EC-RAC: Enriching a Capacious RFID Attack Collection.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

50 Ways to Break RFID Privacy.
Proceedings of the Privacy and Identity Management for Life, 2010

2009
On a new formal proof model for RFID location privacy.
Inf. Process. Lett., 2009

Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC.
IACR Cryptol. ePrint Arch., 2009

Algebraic Attacks on RFID Protocols.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

Improving Automatic Verification of Security Protocols with XOR.
Proceedings of the Formal Methods and Software Engineering, 2009

Secure Ownership and Ownership Transfer in RFID Systems.
Proceedings of the Computer Security, 2009

2008
On a New Formal Proof Model for RFID Location Privacy (Extended Version).
IACR Cryptol. ePrint Arch., 2008

Attacks on RFID Protocols.
IACR Cryptol. ePrint Arch., 2008

Security of RFID Protocols - A Case Study.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

Untraceability of RFID Protocols.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Reliable Personal Health Records.
Proceedings of the eHealth Beyond the Horizon, 2008

Security of an RFID Protocol for Supply Chains.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

2007
Hedaquin: A Reputation-based Health Data Quality Indicator.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007


  Loading...