Search

Your search keyword '"Mauw, Sjouke"' showing total 763 results

Search Constraints

Start Over You searched for: Author "Mauw, Sjouke" Remove constraint Author: "Mauw, Sjouke"
763 results on '"Mauw, Sjouke"'

Search Results

1. Software-Based Memory Erasure with relaxed isolation requirements: Extended Version

2. Automated generation of attack trees with optimal shape and labelling

3. Provably Unlinkable Smart Card-based Payments

4. Language Ideology Bias in Conversational Technology

5. Modelling Agent-Skipping Attacks in Message Forwarding Protocols

7. Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments

8. Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation

9. {\AE}GIS: Shielding Vulnerable Smart Contracts Against Attacks

10. Discovering ePassport Vulnerabilities using Bisimilarity

12. Active Re-identification Attacks on Periodically Released Dynamic Social Graphs

13. Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee

15. Attribute Evaluation on Attack Trees with Incomplete Information

16. Robust active attacks on social graphs

17. Rethinking $(k,\ell)$-anonymity in social graphs: $(k,\ell)$-adjacency anonymity and $(k,\ell)$-(adjacency) anonymous transformations

19. Provably Improving Election Verifiability in Belenios

20. Examining Linguistic Biases in Telegram with a Game Theoretic Analysis

21. Compositional Analysis of Protocol Equivalence in the Applied -Calculus Using Quasi-open Bisimilarity

22. Proceedings 4th International Workshop on Engineering Safety and Security Systems

23. Comparing Distance Bounding Protocols: a Critical Mission Supported by Decision Theory

24. Attack Trees with Sequential Conjunction

25. Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees

26. Generalizing Multi-party Contract Signing

28. Proceedings First International Workshop on Graphical Models for Security

30. Attack-Tree Series: A Case for Dynamic Attack Tree Analysis

31. Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity

32. The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement

33. ADTool: Security Analysis with Attack-Defense Trees (Extended Version)

34. Quantitative Questions on Attack-Defense Trees

35. A Study of the PDGF Signaling Pathway with PRISM

36. A Group Signature Based Electronic Toll Pricing System

37. Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent - Technical Report with Proofs

41. Automated Identification of Desynchronisation Attacks on Shared Secrets

42. Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library

43. A framework for compositional verification of security protocols

44. A Security Perspective on Publication Metrics

45. Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate Online Elections

46. Refinement-Aware Generation of Attack Trees

47. Man-in-the-Middle Attacks Evolved... but Our Security Models Didn’t

48. Optimality Results on the Security of Lookup-Based Protocols

Catalog

Books, media, physical & digital resources