


default search action
Sjouke Mauw
Person information
- affiliation: University of Luxembourg
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c104]Sevdenur Baloglu
, Sergiu Bursuc
, Sjouke Mauw
, Jun Pang
:
Formal Verification and Solutions for Estonian E-Voting. AsiaCCS 2024 - [c103]Yurong Hao
, Xihui Chen
, Xiaoting Lyu
, Jiqiang Liu
, Yongsheng Zhu
, Zhiguo Wan
, Sjouke Mauw
, Wei Wang
:
Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation. CCS 2024: 2889-2903 - [c102]Sergiu Bursuc, Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua:
Software-Based Memory Erasure with Relaxed Isolation Requirements. CSF 2024: 1-16 - [c101]Christoph H.-J. Braun
, Ross Horne
, Tobias Käfer
, Sjouke Mauw
:
SSI, from Specifications to Protocol? Formally Verify Security! WWW 2024: 1620-1631 - [i26]Sergiu Bursuc, Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua:
Software-Based Memory Erasure with relaxed isolation requirements: Extended Version. CoRR abs/2401.06626 (2024) - 2023
- [j37]Reynaldo Gil Pons
, Sjouke Mauw, Rolando Trujillo-Rasua
:
On the optimal resistance against mafia and distance fraud in distance-bounding protocols. Comput. Commun. 210: 69-78 (2023) - [j36]Sviatlana Höhn, Barbara Lewandowska-Tomaszczyk, Sjouke Mauw, Dov M. Gabbay:
Dripping the Poison: The Instruments of Bias. A Qualitative Case Study of News Articles in Four Languages over Nine Years. FLAP 10(4): 555-585 (2023) - [j35]Ross Horne, Sjouke Mauw, Andrzej Mizera
, André Stemper, Jan Thoemel:
Anomaly Detection Using Deep Learning Respecting the Resources on Board a CubeSat. J. Aerosp. Inf. Syst. 20(12): 859-872 (2023) - [j34]Ross Horne
, Sjouke Mauw, Semen Yurkov
:
When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus. Theor. Comput. Sci. 959: 113842 (2023) - [c100]Sergiu Bursuc
, Ross Horne
, Sjouke Mauw
, Semen Yurkov
:
Provably Unlinkable Smart Card-based Payments. CCS 2023: 1392-1406 - [c99]Sviatlana Höhn
, Bettina Migge
, Doris Dippold
, Britta Schneider
, Sjouke Mauw
:
Language Ideology Bias in Conversational Technology. CONVERSATIONS 2023: 133-148 - [c98]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Election Verifiability in Receipt-Free Voting Protocols. CSF 2023: 59-74 - [i25]Sergiu Bursuc, Ross Horne, Sjouke Mauw, Semen Yurkov:
Provably Unlinkable Smart Card-based Payments. CoRR abs/2309.03128 (2023) - [i24]Olga Gadyatskaya, Sjouke Mauw, Rolando Trujillo-Rasua, Tim A. C. Willemse:
Automated generation of attack trees with optimal shape and labelling. CoRR abs/2311.13331 (2023) - 2022
- [j33]Sjouke Mauw, Yunior Ramírez-Cruz
, Rolando Trujillo-Rasua
:
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. Knowl. Inf. Syst. 64(4): 1077-1100 (2022) - [c97]Reynaldo Gil Pons, Ross Horne, Sjouke Mauw, Alwen Tiu, Rolando Trujillo-Rasua
:
Is Eve nearby? Analysing protocols under the distant-attacker assumption. CSF 2022: 17-32 - [c96]Sergiu Bursuc, Sjouke Mauw:
Contingent payments from two-party signing and verification for abelian groups. CSF 2022: 195-210 - [c95]Ross Horne, Sjouke Mauw, Semen Yurkov:
Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments. CSF 2022: 364-379 - [c94]Matteo Acclavio
, Ross Horne, Sjouke Mauw, Lutz Straßburger:
A Graphical Proof Theory of Logical Time. FSCD 2022: 22:1-22:25 - [c93]Sviatlana Höhn, Sjouke Mauw, Nicholas Asher:
BelElect: A New Dataset for Bias Research from a "Dark" Platform. ICWSM 2022: 1268-1274 - [i23]Zach Smith, Hugo Jonker, Sjouke Mauw, Hyunwoo Lee:
Modelling Agent-Skipping Attacks in Message Forwarding Protocols. CoRR abs/2201.08686 (2022) - [i22]Sergiu Bursuc, Sjouke Mauw:
Contingent payments from two-party signing and verification for abelian groups. IACR Cryptol. ePrint Arch. 2022: 719 (2022) - 2021
- [j32]Ross Horne, Sjouke Mauw:
Discovering ePassport Vulnerabilities using Bisimilarity. Log. Methods Comput. Sci. 17(2): 24 (2021) - [c92]Sevdenur Baloglu
, Sergiu Bursuc
, Sjouke Mauw, Jun Pang:
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. CSF 2021: 1-15 - [c91]Sevdenur Baloglu
, Sergiu Bursuc
, Sjouke Mauw
, Jun Pang
:
Provably Improving Election Verifiability in Belenios. E-VOTE-ID 2021: 1-16 - [c90]Ross Horne
, Sjouke Mauw
, Semen Yurkov
:
Compositional Analysis of Protocol Equivalence in the Applied π-Calculus Using Quasi-open Bisimilarity. ICTAC 2021: 235-255 - [c89]Sviatlana Höhn
, Nicholas Asher
, Sjouke Mauw
:
Examining Linguistic Biases in Telegram with a Game Theoretic Analysis. MISDOOM 2021: 16-32 - [i21]Ross Horne, Sjouke Mauw, Semen Yurkov:
Breaking and Fixing Unlinkability of the Key Agreement Protocol for 2nd Gen EMV Payments. CoRR abs/2105.02029 (2021) - [i20]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Provably Improving Election Verifiability in Belenios. IACR Cryptol. ePrint Arch. 2021: 1201 (2021) - 2020
- [j31]Ahto Buldas, Olga Gadyatskaya
, Aleksandr Lenin
, Sjouke Mauw, Rolando Trujillo-Rasua
:
Attribute evaluation on attack trees with incomplete information. Comput. Secur. 88 (2020) - [j30]Xihui Chen
, Sjouke Mauw
, Yunior Ramírez-Cruz
:
Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee. Proc. Priv. Enhancing Technol. 2020(4): 131-152 (2020) - [j29]Aleksandr Pilgun
, Olga Gadyatskaya, Yury Zhauniarovich, Stanislav Dashevskyi, Artsiom Kushniarou, Sjouke Mauw:
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing. ACM Trans. Softw. Eng. Methodol. 29(4): 23:1-23:35 (2020) - [c88]Christof Ferreira Torres
, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros
, Hugo Jonker
, Sjouke Mauw:
ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. AsiaCCS 2020: 584-597 - [c87]Xihui Chen, Ema Këpuska, Sjouke Mauw, Yunior Ramírez-Cruz
:
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs. ESORICS (2) 2020: 185-205 - [c86]Dov M. Gabbay, Ross Horne
, Sjouke Mauw, Leendert van der Torre
:
Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. GraMSec@CSF 2020: 143-165 - [i19]Ross Horne, Sjouke Mauw:
Discovering ePassport Vulnerabilities using Bisimilarity. CoRR abs/2002.07309 (2020) - [i18]Christof Ferreira Torres
, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros, Hugo Jonker, Sjouke Mauw:
ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. CoRR abs/2003.05987 (2020) - [i17]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. CoRR abs/2007.05312 (2020) - [i16]Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. IACR Cryptol. ePrint Arch. 2020: 982 (2020)
2010 – 2019
- 2019
- [j28]Sjouke Mauw, Yunior Ramírez-Cruz
, Rolando Trujillo-Rasua
:
Robust active attacks on social graphs. Data Min. Knowl. Discov. 33(5): 1357-1392 (2019) - [j27]Sjouke Mauw, Yunior Ramírez-Cruz
, Rolando Trujillo-Rasua
:
Conditional adjacency anonymity in social graphs under active attacks. Knowl. Inf. Syst. 61(1): 485-511 (2019) - [c85]Sjouke Mauw, Zach Smith, Jorge Toro-Pozo
, Rolando Trujillo-Rasua
:
Post-Collusion Security and Distance Bounding. CCS 2019: 941-958 - [c84]Ihor Filimonov, Ross Horne
, Sjouke Mauw, Zach Smith:
Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity. ESORICS (1) 2019: 577-594 - [c83]Olga Gadyatskaya, Sjouke Mauw
:
Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. GraMSec@CSF 2019: 7-19 - [e10]Sjouke Mauw, Mauro Conti:
Security and Trust Management - 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings. Lecture Notes in Computer Science 11738, Springer 2019, ISBN 978-3-030-31510-8 [contents] - [i15]Xihui Chen, Sjouke Mauw, Yunior Ramírez-Cruz:
Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee. CoRR abs/1909.00280 (2019) - [i14]Xihui Chen, Ema Këpuska, Sjouke Mauw, Yunior Ramírez-Cruz:
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs. CoRR abs/1911.09534 (2019) - 2018
- [j26]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Anonymising social graphs in the presence of active attackers. Trans. Data Priv. 11(2): 169-198 (2018) - [c82]Sjouke Mauw, Zach Smith, Jorge Toro-Pozo
, Rolando Trujillo-Rasua
:
Automated Identification of Desynchronisation Attacks on Shared Secrets. ESORICS (1) 2018: 406-426 - [c81]Ross Horne
, Sjouke Mauw, Alwen Tiu:
The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement. GraMSec@FLoC 2018: 90-110 - [c80]Sjouke Mauw, Zach Smith, Jorge Toro-Pozo
, Rolando Trujillo-Rasua
:
Distance-Bounding Protocols: Verification without Time and Location. IEEE Symposium on Security and Privacy 2018: 549-566 - [c79]Ravi Jhawar, Karim Lounis, Sjouke Mauw, Yunior Ramírez-Cruz
:
Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library. STM 2018: 85-101 - [e9]Peng Liu, Sjouke Mauw, Ketil Stølen:
Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10744, Springer 2018, ISBN 978-3-319-74859-7 [contents] - [i13]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Robust active attacks on social graphs. CoRR abs/1811.10915 (2018) - [i12]Ahto Buldas, Olga Gadyatskaya, Aleksandr Lenin
, Sjouke Mauw, Rolando Trujillo-Rasua:
Attribute Evaluation on Attack Trees with Incomplete Information. CoRR abs/1812.10754 (2018) - 2017
- [j25]Ross Horne
, Sjouke Mauw, Alwen Tiu:
Semantics for Specialising Attack Trees based on Linear Logic. Fundam. Informaticae 153(1-2): 57-86 (2017) - [c78]Hugo Jonker
, Sjouke Mauw
:
A Security Perspective on Publication Metrics. Security Protocols Workshop 2017: 186-200 - [c77]Olga Gadyatskaya, Ravi Jhawar, Sjouke Mauw, Rolando Trujillo-Rasua
, Tim A. C. Willemse:
Refinement-Aware Generation of Attack Trees. STM 2017: 164-179 - [c76]Hugo Jonker
, Sjouke Mauw, Tom Schmitz:
Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate Online Elections. E-VOTE-ID 2017: 183-197 - [i11]Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua:
Rethinking (k, 𝓁)-anonymity in social graphs: (k, 𝓁)-adjacency anonymity and (k, 𝓁)-(adjacency) anonymous transformations. CoRR abs/1704.07078 (2017) - 2016
- [c75]Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cédric Muller, Steve Muller:
Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees. GraMSec@CSF 2016: 80-93 - [c74]Sjouke Mauw, Rolando Trujillo-Rasua
, Bochuan Xuan:
Counteracting Active Attacks in Social Network Graphs. DBSec 2016: 233-248 - [c73]Sjouke Mauw, Jorge Toro-Pozo
, Rolando Trujillo-Rasua
:
A Class of Precomputation-Based Distance-Bounding Protocols. EuroS&P 2016: 97-111 - [c72]Olga Gadyatskaya, Ravi Jhawar, Piotr Kordy, Karim Lounis, Sjouke Mauw, Rolando Trujillo-Rasua
:
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0. QEST 2016: 159-162 - [c71]Sjouke Mauw, Jorge Toro-Pozo
, Rolando Trujillo-Rasua
:
Optimality Results on the Security of Lookup-Based Protocols. RFIDSec 2016: 137-150 - [c70]Hugo L. Jonker, Sjouke Mauw, Rolando Trujillo-Rasua
:
Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't. Security Protocols Workshop 2016: 19-25 - [c69]Ravi Jhawar, Karim Lounis, Sjouke Mauw:
A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. STM 2016: 138-153 - [c68]Gabriele Lenzini, Sjouke Mauw, Samir Ouchani
:
Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. STM 2016: 170-178 - [e8]Sjouke Mauw
, Barbara Kordy, Sushil Jajodia:
Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9390, Springer 2016, ISBN 978-3-319-29967-9 [contents] - [e7]Sheikh Mahbub Habib, Julita Vassileva, Sjouke Mauw, Max Mühlhäuser:
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings. IFIP Advances in Information and Communication Technology 473, Springer 2016, ISBN 978-3-319-41353-2 [contents] - 2015
- [j24]Gabriele Lenzini, Sjouke Mauw
, Samir Ouchani
:
Security analysis of socio-technical physical systems. Comput. Electr. Eng. 47: 258-274 (2015) - [j23]Gildas Avoine, Sjouke Mauw
, Rolando Trujillo-Rasua
:
Comparing distance bounding protocols: A critical mission supported by decision theory. Comput. Commun. 67: 92-102 (2015) - [c67]Christof Ferreira Torres
, Hugo L. Jonker
, Sjouke Mauw:
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting. ESORICS (2) 2015: 3-19 - [c66]Sjouke Mauw
, Sasa Radomirovic
:
Generalizing Multi-party Contract Signing. POST 2015: 156-175 - [c65]Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic
, Rolando Trujillo-Rasua
:
Attack Trees with Sequential Conjunction. SEC 2015: 339-353 - [c64]Hugo Jonker
, Sjouke Mauw, Sasa Radomirovic
:
Location-Private Interstellar Communication. Security Protocols Workshop 2015: 105-115 - [c63]Sjouke Mauw
:
Location-Private Interstellar Communication (Transcript of Discussion). Security Protocols Workshop 2015: 116-125 - [e6]Jun Pang, Yang Liu, Sjouke Mauw
:
Proceedings 4th International Workshop on Engineering Safety and Security Systems, ESSS 2015, Oslo, Norway, June 22, 2015. EPTCS 184, 2015 [contents] - [i10]Sjouke Mauw, Sasa Radomirovic:
Generalizing Multi-party Contract Signing. CoRR abs/1501.03868 (2015) - [i9]Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Rolando Trujillo-Rasua:
Attack Trees with Sequential Conjunction. CoRR abs/1503.02261 (2015) - [i8]Gildas Avoine, Sjouke Mauw, Rolando Trujillo-Rasua:
Comparing Distance Bounding Protocols: a Critical Mission Supported by Decision Theory. CoRR abs/1503.04593 (2015) - 2014
- [j22]Barbara Kordy, Sjouke Mauw
, Sasa Radomirovic
, Patrick Schweitzer:
Attack-defense trees. J. Log. Comput. 24(1): 55-87 (2014) - [c62]Piotr Kordy, Rom Langerak
, Sjouke Mauw, Jan Willem Polderman:
A Symbolic Algorithm for the Analysis of Robust Timed Automata. FM 2014: 351-366 - [c61]Tim Muller, Yang Liu
, Sjouke Mauw, Jie Zhang:
On Robustness of Trust Systems. IFIPTM 2014: 44-60 - [e5]Sjouke Mauw
, Christian Damsgaard Jensen
:
Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings. Lecture Notes in Computer Science 8743, Springer 2014, ISBN 978-3-319-11850-5 [contents] - [e4]Barbara Kordy, Sjouke Mauw
, Wolter Pieters:
Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014. EPTCS 148, 2014 [contents] - 2013
- [j21]Hugo Jonker, Sjouke Mauw
, Jun Pang:
Privacy and verifiability in voting systems: Methods, developments and trends. Comput. Sci. Rev. 10: 1-30 (2013) - [j20]Xihui Chen
, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(1): 55-75 (2013) - [c60]Xihui Chen, Carlo Harpes, Gabriele Lenzini, Miguel Martins, Sjouke Mauw
, Jun Pang:
Demonstrating a trust framework for evaluating GNSS signal integrity. CCS 2013: 1329-1332 - [c59]Xihui Chen, Gabriele Lenzini, Miguel Martins, Sjouke Mauw
, Jun Pang:
A Trust Framework for Evaluating GNSS Signal Integrity. CSF 2013: 179-192 - [c58]Jun Pang, Yang Liu
, Sjouke Mauw
:
Message from ESSS 2013 Workshop Co-chairs. ICST Workshops 2013: 1 - [c57]Barbara Kordy, Piotr Kordy, Sjouke Mauw
, Patrick Schweitzer:
ADTool: Security Analysis with Attack-Defense Trees. QEST 2013: 173-176 - [i7]Barbara Kordy, Piotr Kordy, Sjouke Mauw, Patrick Schweitzer:
ADTool: Security Analysis with Attack- Defense Trees (Extended Version). CoRR abs/1305.6829 (2013) - [i6]Xihui Chen, Carlo Harpes, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Location Assurance and Privacy in GNSS Navigation. ERCIM News 2013(94) (2013) - [i5]Hugo Jonker, Sjouke Mauw, Jun Pang:
Privacy and Verifiability in Voting Systems: Methods, Developments and Trends. IACR Cryptol. ePrint Arch. 2013: 615 (2013) - 2012
- [b1]Cas Cremers, Sjouke Mauw
:
Operational Semantics and Verification of Security Protocols. Information Security and Cryptography, Springer 2012, ISBN 978-3-540-78636-8, pp. 1-155 - [j19]Selwyn Piramuthu, Gaurav Kapoor, Wei Zhou
, Sjouke Mauw
:
Input online review data and related bias in recommender systems. Decis. Support Syst. 53(3): 418-424 (2012) - [j18]Ying Zhang, Chenyi Zhang
, Jun Pang, Sjouke Mauw
:
Game-based verification of contract signing protocols with minimal messages. Innov. Syst. Softw. Eng. 8(2): 111-124 (2012) - [j17]Yanjie Sun, Chenyi Zhang
, Jun Pang, Baptiste Alcalde, Sjouke Mauw
:
A trust-augmented voting scheme for collaborative privacy management. J. Comput. Secur. 20(4): 437-459 (2012) - [j16]Qixia Yuan, Panuwat Trairatphisan
, Jun Pang, Sjouke Mauw
, Monique Wiesinger, Thomas Sauter:
Probabilistic Model Checking of the PDGF Signaling Pathway. Trans. Comp. Sys. Biology 14: 151-180 (2012) - [c56]Xihui Chen, Gabriele Lenzini, Sjouke Mauw
, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. ARES 2012: 85-93 - [c55]Barbara Kordy, Sjouke Mauw
, Patrick Schweitzer:
Quantitative Questions on Attack-Defense Trees. ICISC 2012: 49-64 - [c54]Sjouke Mauw
, Selwyn Piramuthu:
A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items. STM 2012: 209-224 - [c53]Qian Li
, Péter Schaffer, Jun Pang, Sjouke Mauw
:
Comparative Analysis of Clustering Protocols with Probabilistic Model Checking. TASE 2012: 249-252 - [i4]Barbara Kordy, Sjouke Mauw, Patrick Schweitzer:
Quantitative Questions on Attack-Defense Trees. CoRR abs/1210.8092 (2012) - 2011
- [c52]Gabriele Lenzini, Sjouke Mauw
, Jun Pang:
Selective Location Blinding Using Hash Chains. Security Protocols Workshop 2011: 132-141 - [c51]Sjouke Mauw
:
Selective Location Blinding Using Hash Chains (Transcript of Discussion). Security Protocols Workshop 2011: 142-149 - [c50]Wojciech Jamroga
, Sjouke Mauw
, Matthijs Melissen:
Fairness in Non-Repudiation Protocols. STM 2011: 122-139 - [c49]Ton van Deursen, Sjouke Mauw, Sasa Radomirovic:
mCarve: Carving Attributed Dump Sets. USENIX Security Symposium 2011 - [c48]Qixia Yuan, Jun Pang, Sjouke Mauw, Panuwat Trairatphisan, Monique Wiesinger, Thomas Sauter:
A Study of the PDGF Signaling Pathway with PRISM. CompMod 2011: 65-81 - [i3]Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. CoRR abs/1108.0574 (2011) - 2010
- [c47]Barbara Kordy, Sjouke Mauw
, Matthijs Melissen, Patrick Schweitzer:
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. GameSec 2010: 245-256 - [c46]Barbara Kordy, Sjouke Mauw
, Sasa Radomirovic
, Patrick Schweitzer:
Foundations of Attack-Defense Trees. Formal Aspects in Security and Trust 2010: 80-95 - [c45]Sjouke Mauw, Sasa Radomirovic
, Peter Y. A. Ryan:
Security Protocols for Secret Santa. Security Protocols Workshop 2010: 175-184 - [c44]Sjouke Mauw
:
Security Protocols for Secret Santa (Transcript of Discussion). Security Protocols Workshop 2010: 185-190 - [c43]Yanjie Sun, Chenyi Zhang
, Jun Pang, Baptiste Alcalde, Sjouke Mauw
:
A Trust-Augmented Voting Scheme for Collaborative Privacy Management. STM 2010: 132-146 - [r1]Mohammad Torabi Dashti, Sjouke Mauw
:
Fair Exchange. Handbook of Financial Cryptography and Security 2010: 109-132 - [i2]Barbara Kordy, Sjouke Mauw, Matthijs Melissen, Patrick Schweitzer:
Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. CoRR abs/1006.2732 (2010)
2000 – 2009
- 2009
- [j15]Hugo L. Jonker, Sjouke Mauw
, Jun Pang:
A formal framework for quantifying voter-controlled privacy. J. Algorithms 64(2-3): 89-105 (2009) - [c42]Hugo L. Jonker, Sjouke Mauw
, Jun Pang:
Measuring Voter-Controlled Privacy. ARES 2009: 289-298 - [c41]Baptiste Alcalde, Eric Dubois, Sjouke Mauw, Nicolas Mayer, Sasa Radomirovic:
Towards a Decision Model Based on Trust and Security Risk Management. AISC 2009: 61-69 - [c40]