default search action
Sjouke Mauw
Person information
- affiliation: University of Luxembourg
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c103]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Formal Verification and Solutions for Estonian E-Voting. AsiaCCS 2024 - [c102]Sergiu Bursuc, Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua:
Software-Based Memory Erasure with Relaxed Isolation Requirements. CSF 2024: 1-16 - [c101]Christoph H.-J. Braun, Ross Horne, Tobias Käfer, Sjouke Mauw:
SSI, from Specifications to Protocol? Formally Verify Security! WWW 2024: 1620-1631 - [i26]Sergiu Bursuc, Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua:
Software-Based Memory Erasure with relaxed isolation requirements: Extended Version. CoRR abs/2401.06626 (2024) - 2023
- [j37]Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua:
On the optimal resistance against mafia and distance fraud in distance-bounding protocols. Comput. Commun. 210: 69-78 (2023) - [j36]Sviatlana Höhn, Barbara Lewandowska-Tomaszczyk, Sjouke Mauw, Dov M. Gabbay:
Dripping the Poison: The Instruments of Bias. A Qualitative Case Study of News Articles in Four Languages over Nine Years. FLAP 10(4): 555-585 (2023) - [j35]Ross Horne, Sjouke Mauw, Andrzej Mizera, André Stemper, Jan Thoemel:
Anomaly Detection Using Deep Learning Respecting the Resources on Board a CubeSat. J. Aerosp. Inf. Syst. 20(12): 859-872 (2023) - [j34]Ross Horne, Sjouke Mauw, Semen Yurkov:
When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus. Theor. Comput. Sci. 959: 113842 (2023) - [c100]Sergiu Bursuc, Ross Horne, Sjouke Mauw, Semen Yurkov:
Provably Unlinkable Smart Card-based Payments. CCS 2023: 1392-1406 - [c99]Sviatlana Höhn, Bettina Migge, Doris Dippold, Britta Schneider, Sjouke Mauw:
Language Ideology Bias in Conversational Technology. CONVERSATIONS 2023: 133-148 - [c98]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Election Verifiability in Receipt-Free Voting Protocols. CSF 2023: 59-74 - [i25]Sergiu Bursuc, Ross Horne, Sjouke Mauw, Semen Yurkov:
Provably Unlinkable Smart Card-based Payments. CoRR abs/2309.03128 (2023) - [i24]Olga Gadyatskaya, Sjouke Mauw, Rolando Trujillo-Rasua, Tim A. C. Willemse:
Automated generation of attack trees with optimal shape and labelling. CoRR abs/2311.13331 (2023) - 2022
- [j33]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. Knowl. Inf. Syst. 64(4): 1077-1100 (2022) - [c97]Reynaldo Gil Pons, Ross Horne, Sjouke Mauw, Alwen Tiu, Rolando Trujillo-Rasua:
Is Eve nearby? Analysing protocols under the distant-attacker assumption. CSF 2022: 17-32 - [c96]Sergiu Bursuc, Sjouke Mauw:
Contingent payments from two-party signing and verification for abelian groups. CSF 2022: 195-210 - [c95]Ross Horne, Sjouke Mauw, Semen Yurkov:
Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments. CSF 2022: 364-379 - [c94]Matteo Acclavio, Ross Horne, Sjouke Mauw, Lutz Straßburger:
A Graphical Proof Theory of Logical Time. FSCD 2022: 22:1-22:25 - [c93]Sviatlana Höhn, Sjouke Mauw, Nicholas Asher:
BelElect: A New Dataset for Bias Research from a "Dark" Platform. ICWSM 2022: 1268-1274 - [i23]Zach Smith, Hugo Jonker, Sjouke Mauw, Hyunwoo Lee:
Modelling Agent-Skipping Attacks in Message Forwarding Protocols. CoRR abs/2201.08686 (2022) - [i22]Sergiu Bursuc, Sjouke Mauw:
Contingent payments from two-party signing and verification for abelian groups. IACR Cryptol. ePrint Arch. 2022: 719 (2022) - 2021
- [j32]Ross Horne, Sjouke Mauw:
Discovering ePassport Vulnerabilities using Bisimilarity. Log. Methods Comput. Sci. 17(2): 24 (2021) - [c92]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. CSF 2021: 1-15 - [c91]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Provably Improving Election Verifiability in Belenios. E-VOTE-ID 2021: 1-16 - [c90]Ross Horne, Sjouke Mauw, Semen Yurkov:
Compositional Analysis of Protocol Equivalence in the Applied π-Calculus Using Quasi-open Bisimilarity. ICTAC 2021: 235-255 - [c89]Sviatlana Höhn, Nicholas Asher, Sjouke Mauw:
Examining Linguistic Biases in Telegram with a Game Theoretic Analysis. MISDOOM 2021: 16-32 - [i21]Ross Horne, Sjouke Mauw, Semen Yurkov:
Breaking and Fixing Unlinkability of the Key Agreement Protocol for 2nd Gen EMV Payments. CoRR abs/2105.02029 (2021) - [i20]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Provably Improving Election Verifiability in Belenios. IACR Cryptol. ePrint Arch. 2021: 1201 (2021) - 2020
- [j31]Ahto Buldas, Olga Gadyatskaya, Aleksandr Lenin, Sjouke Mauw, Rolando Trujillo-Rasua:
Attribute evaluation on attack trees with incomplete information. Comput. Secur. 88 (2020) - [j30]Xihui Chen, Sjouke Mauw, Yunior Ramírez-Cruz:
Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee. Proc. Priv. Enhancing Technol. 2020(4): 131-152 (2020) - [j29]Aleksandr Pilgun, Olga Gadyatskaya, Yury Zhauniarovich, Stanislav Dashevskyi, Artsiom Kushniarou, Sjouke Mauw:
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing. ACM Trans. Softw. Eng. Methodol. 29(4): 23:1-23:35 (2020) - [c88]Christof Ferreira Torres, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros, Hugo Jonker, Sjouke Mauw:
ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. AsiaCCS 2020: 584-597 - [c87]Xihui Chen, Ema Këpuska, Sjouke Mauw, Yunior Ramírez-Cruz:
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs. ESORICS (2) 2020: 185-205 - [c86]Dov M. Gabbay, Ross Horne, Sjouke Mauw, Leendert van der Torre:
Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. GraMSec@CSF 2020: 143-165 - [i19]Ross Horne, Sjouke Mauw:
Discovering ePassport Vulnerabilities using Bisimilarity. CoRR abs/2002.07309 (2020) - [i18]Christof Ferreira Torres, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros, Hugo Jonker, Sjouke Mauw:
ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. CoRR abs/2003.05987 (2020) - [i17]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. CoRR abs/2007.05312 (2020) - [i16]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. IACR Cryptol. ePrint Arch. 2020: 982 (2020)
2010 – 2019
- 2019
- [j28]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Robust active attacks on social graphs. Data Min. Knowl. Discov. 33(5): 1357-1392 (2019) - [j27]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Conditional adjacency anonymity in social graphs under active attacks. Knowl. Inf. Syst. 61(1): 485-511 (2019) - [c85]Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
Post-Collusion Security and Distance Bounding. CCS 2019: 941-958 - [c84]Ihor Filimonov, Ross Horne, Sjouke Mauw, Zach Smith:
Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity. ESORICS (1) 2019: 577-594 - [c83]Olga Gadyatskaya, Sjouke Mauw:
Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. GraMSec@CSF 2019: 7-19 - [e10]Sjouke Mauw, Mauro Conti:
Security and Trust Management - 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings. Lecture Notes in Computer Science 11738, Springer 2019, ISBN 978-3-030-31510-8 [contents] - [i15]Xihui Chen, Sjouke Mauw, Yunior Ramírez-Cruz:
Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee. CoRR abs/1909.00280 (2019) - [i14]Xihui Chen, Ema Këpuska, Sjouke Mauw, Yunior Ramírez-Cruz:
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs. CoRR abs/1911.09534 (2019) - 2018
- [j26]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Anonymising social graphs in the presence of active attackers. Trans. Data Priv. 11(2): 169-198 (2018) - [c82]Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
Automated Identification of Desynchronisation Attacks on Shared Secrets. ESORICS (1) 2018: 406-426 - [c81]Ross Horne, Sjouke Mauw, Alwen Tiu:
The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement. GraMSec@FLoC 2018: 90-110 - [c80]Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
Distance-Bounding Protocols: Verification without Time and Location. IEEE Symposium on Security and Privacy 2018: 549-566 - [c79]Ravi Jhawar, Karim Lounis, Sjouke Mauw, Yunior Ramírez-Cruz:
Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library. STM 2018: 85-101 - [e9]Peng Liu, Sjouke Mauw, Ketil Stølen:
Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10744, Springer 2018, ISBN 978-3-319-74859-7 [contents] - [i13]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Robust active attacks on social graphs. CoRR abs/1811.10915 (2018) - [i12]Ahto Buldas, Olga Gadyatskaya, Aleksandr Lenin, Sjouke Mauw, Rolando Trujillo-Rasua:
Attribute Evaluation on Attack Trees with Incomplete Information. CoRR abs/1812.10754 (2018) - 2017
- [j25]Ross Horne, Sjouke Mauw, Alwen Tiu:
Semantics for Specialising Attack Trees based on Linear Logic. Fundam. Informaticae 153(1-2): 57-86 (2017) - [c78]Hugo Jonker, Sjouke Mauw:
A Security Perspective on Publication Metrics. Security Protocols Workshop 2017: 186-200 - [c77]Olga Gadyatskaya, Ravi Jhawar, Sjouke Mauw, Rolando Trujillo-Rasua, Tim A. C. Willemse:
Refinement-Aware Generation of Attack Trees. STM 2017: 164-179 - [c76]Hugo Jonker, Sjouke Mauw, Tom Schmitz:
Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate Online Elections. E-VOTE-ID 2017: 183-197 - [i11]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Rethinking (k, 𝓁)-anonymity in social graphs: (k, 𝓁)-adjacency anonymity and (k, 𝓁)-(adjacency) anonymous transformations. CoRR abs/1704.07078 (2017) - 2016
- [c75]Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cédric Muller, Steve Muller:
Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees. GraMSec@CSF 2016: 80-93 - [c74]Sjouke Mauw, Rolando Trujillo-Rasua, Bochuan Xuan:
Counteracting Active Attacks in Social Network Graphs. DBSec 2016: 233-248 - [c73]Sjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
A Class of Precomputation-Based Distance-Bounding Protocols. EuroS&P 2016: 97-111 - [c72]Olga Gadyatskaya, Ravi Jhawar, Piotr Kordy, Karim Lounis, Sjouke Mauw, Rolando Trujillo-Rasua:
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0. QEST 2016: 159-162 - [c71]Sjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
Optimality Results on the Security of Lookup-Based Protocols. RFIDSec 2016: 137-150 - [c70]Hugo L. Jonker, Sjouke Mauw, Rolando Trujillo-Rasua:
Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't. Security Protocols Workshop 2016: 19-25 - [c69]Ravi Jhawar, Karim Lounis, Sjouke Mauw:
A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. STM 2016: 138-153 - [c68]Gabriele Lenzini, Sjouke Mauw, Samir Ouchani:
Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. STM 2016: 170-178 - [e8]Sjouke Mauw, Barbara Kordy, Sushil Jajodia:
Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9390, Springer 2016, ISBN 978-3-319-29967-9 [contents] - [e7]Sheikh Mahbub Habib, Julita Vassileva, Sjouke Mauw, Max Mühlhäuser:
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings. IFIP Advances in Information and Communication Technology 473, Springer 2016, ISBN 978-3-319-41353-2 [contents] - 2015
- [j24]Gabriele Lenzini, Sjouke Mauw, Samir Ouchani:
Security analysis of socio-technical physical systems. Comput. Electr. Eng. 47: 258-274 (2015) - [j23]Gildas Avoine, Sjouke Mauw, Rolando Trujillo-Rasua:
Comparing distance bounding protocols: A critical mission supported by decision theory. Comput. Commun. 67: 92-102 (2015) - [c67]Christof Ferreira Torres, Hugo L. Jonker, Sjouke Mauw:
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting. ESORICS (2) 2015: 3-19 - [c66]Sjouke Mauw, Sasa Radomirovic:
Generalizing Multi-party Contract Signing. POST 2015: 156-175 - [c65]Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Rolando Trujillo-Rasua:
Attack Trees with Sequential Conjunction. SEC 2015: 339-353 - [c64]Hugo Jonker, Sjouke Mauw, Sasa Radomirovic:
Location-Private Interstellar Communication. Security Protocols Workshop 2015: 105-115 - [c63]Sjouke Mauw:
Location-Private Interstellar Communication (Transcript of Discussion). Security Protocols Workshop 2015: 116-125 - [e6]Jun Pang, Yang Liu, Sjouke Mauw:
Proceedings 4th International Workshop on Engineering Safety and Security Systems, ESSS 2015, Oslo, Norway, June 22, 2015. EPTCS 184, 2015 [contents] - [i10]Sjouke Mauw, Sasa Radomirovic:
Generalizing Multi-party Contract Signing. CoRR abs/1501.03868 (2015) - [i9]Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Rolando Trujillo-Rasua:
Attack Trees with Sequential Conjunction. CoRR abs/1503.02261 (2015) - [i8]Gildas Avoine, Sjouke Mauw, Rolando Trujillo-Rasua:
Comparing Distance Bounding Protocols: a Critical Mission Supported by Decision Theory. CoRR abs/1503.04593 (2015) - 2014
- [j22]Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Patrick Schweitzer:
Attack-defense trees. J. Log. Comput. 24(1): 55-87 (2014) - [c62]Piotr Kordy, Rom Langerak, Sjouke Mauw, Jan Willem Polderman:
A Symbolic Algorithm for the Analysis of Robust Timed Automata. FM 2014: 351-366 - [c61]Tim Muller, Yang Liu, Sjouke Mauw, Jie Zhang:
On Robustness of Trust Systems. IFIPTM 2014: 44-60 - [e5]Sjouke Mauw, Christian Damsgaard Jensen:
Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings. Lecture Notes in Computer Science 8743, Springer 2014, ISBN 978-3-319-11850-5 [contents] - [e4]Barbara Kordy, Sjouke Mauw, Wolter Pieters:
Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014. EPTCS 148, 2014 [contents] - 2013
- [j21]Hugo Jonker, Sjouke Mauw, Jun Pang:
Privacy and verifiability in voting systems: Methods, developments and trends. Comput. Sci. Rev. 10: 1-30 (2013) - [j20]Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(1): 55-75 (2013) - [c60]Xihui Chen, Carlo Harpes, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang:
Demonstrating a trust framework for evaluating GNSS signal integrity. CCS 2013: 1329-1332 - [c59]Xihui Chen, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang:
A Trust Framework for Evaluating GNSS Signal Integrity. CSF 2013: 179-192 - [c58]Jun Pang, Yang Liu, Sjouke Mauw:
Message from ESSS 2013 Workshop Co-chairs. ICST Workshops 2013: 1 - [c57]Barbara Kordy, Piotr Kordy, Sjouke Mauw, Patrick Schweitzer:
ADTool: Security Analysis with Attack-Defense Trees. QEST 2013: 173-176 - [i7]Barbara Kordy, Piotr Kordy, Sjouke Mauw, Patrick Schweitzer:
ADTool: Security Analysis with Attack- Defense Trees (Extended Version). CoRR abs/1305.6829 (2013) - [i6]Xihui Chen, Carlo Harpes, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Location Assurance and Privacy in GNSS Navigation. ERCIM News 2013(94) (2013) - [i5]Hugo Jonker, Sjouke Mauw, Jun Pang:
Privacy and Verifiability in Voting Systems: Methods, Developments and Trends. IACR Cryptol. ePrint Arch. 2013: 615 (2013) - 2012
- [b1]Cas Cremers, Sjouke Mauw:
Operational Semantics and Verification of Security Protocols. Information Security and Cryptography, Springer 2012, ISBN 978-3-540-78636-8, pp. 1-155 - [j19]Selwyn Piramuthu, Gaurav Kapoor, Wei Zhou, Sjouke Mauw:
Input online review data and related bias in recommender systems. Decis. Support Syst. 53(3): 418-424 (2012) - [j18]Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw:
Game-based verification of contract signing protocols with minimal messages. Innov. Syst. Softw. Eng. 8(2): 111-124 (2012) - [j17]Yanjie Sun, Chenyi Zhang, Jun Pang, Baptiste Alcalde, Sjouke Mauw:
A trust-augmented voting scheme for collaborative privacy management. J. Comput. Secur. 20(4): 437-459 (2012) - [j16]Qixia Yuan, Panuwat Trairatphisan, Jun Pang, Sjouke Mauw, Monique Wiesinger, Thomas Sauter:
Probabilistic Model Checking of the PDGF Signaling Pathway. Trans. Comp. Sys. Biology 14: 151-180 (2012) - [c56]Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. ARES 2012: 85-93 - [c55]Barbara Kordy, Sjouke Mauw, Patrick Schweitzer:
Quantitative Questions on Attack-Defense Trees. ICISC 2012: 49-64 - [c54]Sjouke Mauw, Selwyn Piramuthu:
A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items. STM 2012: 209-224 - [c53]Qian Li, Péter Schaffer, Jun Pang, Sjouke Mauw:
Comparative Analysis of Clustering Protocols with Probabilistic Model Checking. TASE 2012: 249-252 - [i4]Barbara Kordy, Sjouke Mauw, Patrick Schweitzer:
Quantitative Questions on Attack-Defense Trees. CoRR abs/1210.8092 (2012) - 2011
- [c52]Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Selective Location Blinding Using Hash Chains. Security Protocols Workshop 2011: 132-141 - [c51]Sjouke Mauw:
Selective Location Blinding Using Hash Chains (Transcript of Discussion). Security Protocols Workshop 2011: 142-149 - [c50]Wojciech Jamroga, Sjouke Mauw, Matthijs Melissen:
Fairness in Non-Repudiation Protocols. STM 2011: 122-139 - [c49]Ton van Deursen, Sjouke Mauw, Sasa Radomirovic:
mCarve: Carving Attributed Dump Sets. USENIX Security Symposium 2011 - [c48]Qixia Yuan, Jun Pang, Sjouke Mauw, Panuwat Trairatphisan, Monique Wiesinger, Thomas Sauter:
A Study of the PDGF Signaling Pathway with PRISM. CompMod 2011: 65-81 - [i3]Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. CoRR abs/1108.0574 (2011) - 2010
- [c47]Barbara Kordy, Sjouke Mauw, Matthijs Melissen, Patrick Schweitzer:
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. GameSec 2010: 245-256 - [c46]Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Patrick Schweitzer:
Foundations of Attack-Defense Trees. Formal Aspects in Security and Trust 2010: 80-95 - [c45]Sjouke Mauw, Sasa Radomirovic, Peter Y. A. Ryan:
Security Protocols for Secret Santa. Security Protocols Workshop 2010: 175-184 - [c44]Sjouke Mauw:
Security Protocols for Secret Santa (Transcript of Discussion). Security Protocols Workshop 2010: 185-190 - [c43]Yanjie Sun, Chenyi Zhang, Jun Pang, Baptiste Alcalde, Sjouke Mauw:
A Trust-Augmented Voting Scheme for Collaborative Privacy Management. STM 2010: 132-146 - [r1]Mohammad Torabi Dashti, Sjouke Mauw:
Fair Exchange. Handbook of Financial Cryptography and Security 2010: 109-132 - [i2]Barbara Kordy, Sjouke Mauw, Matthijs Melissen, Patrick Schweitzer:
Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. CoRR abs/1006.2732 (2010)
2000 – 2009
- 2009
- [j15]Hugo L. Jonker, Sjouke Mauw, Jun Pang:
A formal framework for quantifying voter-controlled privacy. J. Algorithms 64(2-3): 89-105 (2009) - [c42]Hugo L. Jonker, Sjouke Mauw, Jun Pang:
Measuring Voter-Controlled Privacy. ARES 2009: 289-298 - [c41]Baptiste Alcalde, Eric Dubois, Sjouke Mauw, Nicolas Mayer, Sasa Radomirovic:
Towards a Decision Model Based on Trust and Security Risk Management. AISC 2009: 61-69 - [c40]Sjouke Mauw, Sasa Radomirovic, Mohammad Torabi Dashti:
Minimal Message Complexity of Asynchronous Multi-party Contract Signing. CSF 2009: 13-25 - [c39]Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, Pim Vullers:
Secure Ownership and Ownership Transfer in RFID Systems. ESORICS 2009: 637-654 - [c38]Baptiste Alcalde, Sjouke Mauw:
An Algebra for Trust Dilution and Trust Fusion. Formal Aspects in Security and Trust 2009: 4-20 - [c37]Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw:
Game-Based Verification of Multi-Party Contract Signing Protocols. Formal Aspects in Security and Trust 2009: 186-200 - 2008
- [j14]Suzana Andova, Cas Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic:
A framework for compositional verification of security protocols. Inf. Comput. 206(2-4): 425-459 (2008) - [j13]Fabio Massacci, Frank Piessens, Sjouke Mauw:
Preface. Sci. Comput. Program. 74(1-2): 1 (2008) - [c36]Bart Bouwman, Sjouke Mauw, Milan Petkovic:
Rights Management for Role-Based Access Control. CCNC 2008: 1085-1090 - [c35]Ton van Deursen, Sjouke Mauw, Sasa Radomirovic:
Untraceability of RFID Protocols. WISTP 2008: 1-15 - [e3]Stig Fr. Mjølsnes, Sjouke Mauw, Sokratis K. Katsikas:
Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings. Lecture Notes in Computer Science 5057, Springer 2008, ISBN 978-3-540-69484-7 [contents] - 2007
- [c34]Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mauw:
A Certified Email Protocol Using Key Chains. AINA Workshops (1) 2007: 525-530 - [c33]Pieter Ceelen, Sjouke Mauw, Sasa Radomirovic:
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks. STM@ESORICS 2007: 31-43 - 2006
- [j12]Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink:
Injective synchronisation: An extension of the authentication hierarchy. Theor. Comput. Sci. 367(1-2): 139-161 (2006) - [c32]Sjouke Mauw, Ivo van Vessem, Bert Bos:
Forward Secure Communication in Wireless Sensor Networks. SPC 2006: 32-42 - [c31]Sjouke Mauw, Jan Verschuren, Erik P. de Vink:
Data Anonymity in the FOO Voting Scheme. VODCA@FOSAD 2006: 5-28 - [e2]Sjouke Mauw, Valérie Issarny, Cas Cremers:
Proceedings of the First International Workshop on Security and Trust Management, STM 2005, Milan, Italy, September 15, 2005. Electronic Notes in Theoretical Computer Science 157(3), Elsevier 2006 [contents] - [i1]Suzana Andova, Cas Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic:
A framework for compositional verification of security protocols. CoRR abs/cs/0611062 (2006) - 2005
- [c30]Sjouke Mauw, Martijn Oostdijk:
Foundations of Attack Trees. ICISC 2005: 186-198 - [c29]Gopakumar Nair, Ajeesh Gopalakrishnan, Sjouke Mauw, Erik Moll:
XML Security in the Next Generation Optical Disc Context. Secure Data Management 2005: 217-233 - [c28]Sjouke Mauw, Valérie Issarny, Cas Cremers:
Preface. STM 2005: 1-2 - [c27]Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink:
A Syntactic Criterion for Injectivity of Authentication Protocols. ARSPA@ICALP 2005: 23-38 - 2004
- [j11]Sjouke Mauw, Wouter T. Wiersma, Tim A. C. Willemse:
Language-Driven System Design. Int. J. Softw. Eng. Knowl. Eng. 14(6): 625-663 (2004) - [c26]Sjouke Mauw, Jan Verschuren, Erik P. de Vink:
A Formalization of Anonymity and Onion Routing. ESORICS 2004: 109-124 - [c25]Cas J. F. Cremers, Sjouke Mauw:
Checking Secrecy by Means of Partial Order Reduction. SAM 2004: 171-188 - [c24]Stefan Blom, Jan Friso Groote, Sjouke Mauw, Alexander Serebrenik:
Analysing the BKE-security Protocol with µCRL. ARTS 2004: 49-90 - 2003
- [j10]Sem C. Borst, Onno J. Boxma, Jan Friso Groote, Sjouke Mauw:
Task Allocation in a Multi-Server System. J. Sched. 6(5): 423-436 (2003) - [c23]Cas Cremers, Sjouke Mauw:
Operational Semantics of Security Protocols. Scenarios: Models, Transformations and Tools 2003: 66-89 - [c22]Harm M. A. van Beek, Sjouke Mauw:
Automatic Conformance Testing of Internet Applications. FATES 2003: 205-222 - 2002
- [j9]André Engels, Sjouke Mauw, Michel A. Reniers:
A hierarchy of communication models for Message Sequence Charts. Sci. Comput. Program. 44(3): 253-292 (2002) - [c21]Sjouke Mauw, Wouter T. Wiersma, Tim A. C. Willemse:
Language Driven System Design. HICSS 2002: 280 - [c20]Loe M. G. Feijs, Nicolae Goga, Sjouke Mauw, Jan Tretmans:
Test Selection, Trace Distance and Heuristics. TestCom 2002: 267-282 - 2001
- [j8]Sjouke Mauw:
Introduction by the guest editor. Comput. Lang. 27(1/3): 1-2 (2001) - [j7]Jan Friso Groote, Wim H. Hesselink, Sjouke Mauw, Rogier Vermeulen:
An algorithm for the asynchronous Write-All problem based on process collision. Distributed Comput. 14(2): 75-81 (2001) - [j6]Marc Voorhoeve, Sjouke Mauw:
Impossible futures and determinism. Inf. Process. Lett. 80(1): 51-58 (2001) - [c19]Jos C. M. Baeten, Harm M. A. van Beek, Sjouke Mauw:
Specifying internet applications with DiCons. SAC 2001: 576-584 - [c18]Jos C. M. Baeten, Harm M. A. van Beek, Sjouke Mauw:
An MSC Based Representation of DiCons. SDL Forum 2001: 328-347 - [p1]Sjouke Mauw, Michel A. Reniers:
A Process Algebra for Interworkings. Handbook of Process Algebra 2001: 1269-1327 - 2000
- [c17]Harald P. E. Vranken, Tomás Garciá Garciá, Sjouke Mauw, Loe M. G. Feijs:
IC Design Validation Using Message Sequence Charts. EUROMICRO 2000: 1122- - [c16]Loe M. G. Feijs, Nicolae Goga, Sjouke Mauw:
Probabilities In The Torx Test Derivation Algorithm. SAM 2000: 173-188
1990 – 1999
- 1999
- [j5]Sjouke Mauw, Michel A. Reniers:
Operational Semantics for MSC'96. Comput. Networks 31(17): 1785-1799 (1999) - [c15]Axel Belinfante, Jan Feenstra, René G. de Vries, Jan Tretmans, Nicolae Goga, Loe M. G. Feijs, Sjouke Mauw, Lex Heerink:
Formal Test Automation: A Simple Experiment. IWTCS 1999: 179-196 - [c14]André Engels, Loe M. G. Feijs, Sjouke Mauw:
MSC and data: dynamic variables. SDL Forum 1999: 105- - [c13]Wil Janssen, Radu Mateescu, Sjouke Mauw, Peter Fennema, Petra van der Stappen:
Model Checking for Managers. SPIN 1999: 92-107 - [e1]Jos C. M. Baeten, Sjouke Mauw:
CONCUR '99: Concurrency Theory, 10th International Conference, Eindhoven, The Netherlands, August 24-27, 1999, Proceedings. Lecture Notes in Computer Science 1664, Springer 1999, ISBN 3-540-66425-4 [contents] - 1997
- [c12]André Engels, Sjouke Mauw, Michel A. Reniers:
A Hierarchy of Communication Models for Message Sequence Charts. FORTE 1997: 75-90 - [c11]Sjouke Mauw, Michel A. Reniers:
High-level message sequence charts. SDL Forum 1997: 291-306 - [c10]André Engels, Loe M. G. Feijs, Sjouke Mauw:
Test Generation for Intelligent Networks Using Model Checking. TACAS 1997: 384-398 - 1996
- [j4]Sjouke Mauw:
The Formalization of Message Sequence Charts. Comput. Networks ISDN Syst. 28(12): 1643-1657 (1996) - [j3]Jacob Brunekreef, Joost-Pieter Katoen, Ron Koymans, Sjouke Mauw:
Design and Analysis of Dynamic Leader Election Protocols in Broadcast Networks. Distributed Comput. 9(4): 157-171 (1996) - [c9]Sjouke Mauw, Michel A. Reniers:
Refinement in Interworkings. CONCUR 1996: 671-686 - 1995
- [c8]Pedro R. D'Argenio, Sjouke Mauw:
Delayed choice for process algebra with abstraction. CONCUR 1995: 501-515 - 1994
- [j2]Sjouke Mauw, Michel A. Reniers:
An Algebraic Semantics of Basic Message Sequence Charts. Comput. J. 37(4): 269-278 (1994) - [c7]Sjouke Mauw, Hans Mulder:
Regularity of BPA-Systems is Decidable. CONCUR 1994: 34-47 - [c6]Jos C. M. Baeten, Sjouke Mauw:
Delayed choice: an operator for joining Message Sequence Charts. FORTE 1994: 340-354 - 1991
- [j1]Jan A. Bergstra, Sjouke Mauw, Freek Wiedijk:
Uniform Algebraic Specifications of Finite Sets with Equality. Int. J. Found. Comput. Sci. 2(1): 43-65 (1991) - [c5]Sjouke Mauw, Gert J. Veltink:
A Proof Assistant for PSF. CAV 1991: 158-168
1980 – 1989
- 1989
- [c4]Jos C. M. Baeten, Jan A. Bergstra, Sjouke Mauw, Gert J. Veltink:
A Process Specification Formalism Based on Static COLD. Algebraic Methods 1989: 303-335 - [c3]Sjouke Mauw, Freek Wiedijk:
Specification of the Transit Node in PSFd. Algebraic Methods 1989: 341-361 - [c2]Sjouke Mauw, Gert J. Veltink:
An Introduction to PSFd. TAPSOFT, Vol.2 1989: 272-285 - 1987
- [c1]Sjouke Mauw:
An Algebraic Specification of Process Algebra, Including Two Examples. Algebraic Methods 1987: 507-554
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint