Bart De Decker
According to our database1,
Bart De Decker
authored at least 88 papers
between 1991 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations.
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
Proceedings of the IEEE International Conference on Trust, 2022
2021
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021
2020
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020
2017
Proceedings of the Computer Network Security, 2017
Security Evaluation of Cyber-Physical Systems Using Automatically Generated Attack Trees.
Proceedings of the Critical Information Infrastructures Security, 2017
2016
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices.
Secur. Commun. Networks, 2016
J. Inf. Commun. Ethics Soc., 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016
2015
Int. J. Inf. Secur. Priv., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the Business Information Systems Workshops, 2015
2014
Proceedings of the 2014 IEEE World Congress on Services, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014
Proceedings of the Communications and Multimedia Security, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services.
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013
Proceedings of the Communications and Multimedia Security, 2013
2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012
Proceedings of the Communications and Multimedia Security, 2012
Proceedings of the Communications and Multimedia Security, 2012
2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the Communications and Multimedia Security, 2011
A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning.
Proceedings of the Communications and Multimedia Security, 2011
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Privacy and Identity Management for Life, 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
Proceedings of the Electronic Healthcare - Third International Conference, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
conf/cse/NigusseDN09 conf/dbsec/VerslypeDNNLV08 Girma Nigusse = Girma Enideg Nigusse Privacy Codes of Practice for the Social Web: The Analysis of Existing Privacy Codes and Emerging Social-Centric Privacy Risks.
Proceedings of the Intelligent Information Privacy Management, 2010
2009
Service and Timeframe Dependent Unlinkable One-time Pseudonyms.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009
Proceedings of the Software Services for e-Business and e-Society, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Public Key Infrastructure, 2008
Proceedings of the Data and Applications Security XXII, 2008
2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Communications and Multimedia Security, 2006
Proceedings of the Communications and Multimedia Security, 2006
2005
Accountable Anonymous E-Mail.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Communications and Multimedia Security, 2005
2003
Secure Vickrey Auctions without a Trusted Third Party.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
2002
How aspect-oriented programming can help to build secure software.
Informatica (Slovenia), 2002
2001
Developing secure software. A survey and classification of common software vulnerabilities.
Proceedings of the Integrity, 2001
On Securely Scheduling a Meeting.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the Advances in Network and Distributed Systems Security, 2001
Proceedings of the Advances in Network and Distributed Systems Security, 2001
Proceedings of the New Developments in Distributed Applications and Interoperable Systems, 2001
2000
A Security Architecture for Electronic Commerce Applications.
Proceedings of the Information Security for Global Information Infrastructures, 2000
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Mobile Agents for Telecommunication Applications, 2000
1997
Management of Events in a multi-agent system.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997
Proceedings of the State of the Art in Applied Cryptography, 1997
1996
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996
Proceedings of the 8th Annual Workshop of the Psychology of Programming Interest Group, 1996
Proceedings of the Computer Aided Learning and Instruction in Science and Engineering, 1996
1993
Interconnecting domains with heterogeneous key distribution and authentication protocols.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
1991
Proceedings of the Computer Security and Industrial Cryptography, 1991