Pieter H. Hartel
Orcid: 0000-0002-0411-0421Affiliations:
- University of Twente, Enschede, Netherlands
According to our database1,
Pieter H. Hartel
authored at least 158 papers
between 1983 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2023
Understanding Online Privacy - A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines.
ACM Comput. Surv., 2023
2021
Privacy Rating: A User-Centered Approach for Visualizing Data Handling Practices of Online Services.
IEEE Trans. Prof. Commun., 2021
Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases.
CoRR, 2021
Investigating sentence severity with judicial open data - A case study on sentencing high-tech crime in the Dutch criminal justice system.
CoRR, 2021
2020
Proceedings of the Tests and Proofs - 14th International Conference, 2020
HeadPrint: detecting anomalous communications through header-based application fingerprinting.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020
2019
Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources.
Telematics Informatics, 2019
Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of \"Thinking Like a Thief\".
IEEE Secur. Priv., 2019
CoRR, 2019
IEEE Access, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
J. Comput. Sci. Technol., 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the IEEE International Conference on Acoustics, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013
Proceedings of the Sicherheit 2014: Sicherheit, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013
2012
Proceedings of the Information Security - 15th International Conference, 2012
Privacy-preserving collaborative filtering based on horizontally partitioned dataset.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
Proceedings of the Complexity in Engineering, 2012
2011
Softw. Syst. Model., 2011
KALwEN: a new practical and interoperable key management scheme for body sensor networks.
Secur. Commun. Networks, 2011
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011
Proceedings of the Information Security Practice and Experience, 2011
MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
ACM Trans. Storage, 2010
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records.
Int. J. Comput. Model. Algorithms Medicine, 2010
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010
Effectiveness of Physical, Social and Digital Mechanisms against Laptop Theft in Open Organizations.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
Laptop theft: a case study on the effectiveness of security mechanisms in open organizations.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
ACM Trans. Sens. Networks, 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Progress in Cryptology, 2009
2008
Int. J. Parallel Emergent Distributed Syst., 2008
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008
On the Inability of Existing Security Models to Cope with Data Mobility in Dynamic Organizations.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow.
Proceedings of the Formal Methods in Computer-Aided Design, 2008
Proceedings of the 6th USENIX Conference on File and Storage Technologies, 2008
Proceedings of the 2008 16th European Signal Processing Conference, 2008
Proceedings of the 8th ACM & IEEE International conference on Embedded software, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the 2008 International Conference on Compilers, 2008
2007
Proceedings of the Advances in Biometrics, International Conference, 2007
Proceedings of the 2007 5th Workshop on Embedded Systems for Real-Time Multimedia, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
ACM Trans. Sens. Networks, 2006
Ann. des Télécommunications, 2006
Proceedings of the LCN 2006, 2006
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006
A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, International Conference, 2006
2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
Proceedings of the 12th International Symposium on Temporal Representation and Reasoning (TIME 2005), 2005
StreamTo: Streaming Content using a Tamper-Resistant Token.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Service Brokerage in Prolog.
Proceedings of the ICEIS 2005, 2005
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004
Proceedings of the Construction and Analysis of Safe, 2004
2003
Proceedings of the International Workshop on Software Verification and Validation, 2003
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003
Assessing Security in Energy-Efficient Sensor Networks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Secure Audit Logging with Tamper-Resistant Hardware.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003
2002
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002
Proceedings of the Protocols and Systems for Interactive Distributed Multimedia, 2002
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002
The State of WG 8.8.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002
2001
ACM Comput. Surv., 2001
Proceedings of the Tenth International World Wide Web Conference, 2001
Proceedings of the FME 2001: Formal Methods for Increasing Software Productivity, 2001
iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric.
Proceedings of the Smart Card Programming and Security, 2001
2000
Future Gener. Comput. Syst., 2000
A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations.
Proceedings of the Java on Smart Cards: Programming and Security, 2000
Pressure Sequence - A Novel Method of Protecting Smart Cards.
Proceedings of the Smart Card Research and Advanced Applications, 2000
Formalising Java Safety - An overview.
Proceedings of the Smart Card Research and Advanced Applications, 2000
1999
ACM Trans. Program. Lang. Syst., 1999
Softw. Pract. Exp., 1999
Proceedings of the Formal Syntax and Semantics of Java, 1999
1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
1997
Elementary Standard ML by Greg Michaelson, University College London Press, UK, 1995, ISBN 1-85728-398-8 PB, pp 306.
Knowl. Eng. Rev., 1997
Future Gener. Comput. Syst., 1997
Functional C.
Addison-Wesley-Longman, ISBN: 978-0-201-41950-4, 1997
1996
The Resource Constrained Shortest Path Problem Implemented in a Lazy Functional Language.
J. Funct. Program., 1996
Benchmarking Implementations of Functional Languages with 'Pseudoknot', a Float-Intensive Benchmark.
J. Funct. Program., 1996
Introduction to CARDIS 1996.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996
Structuring and Visualising an IC-card Security Standard.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996
1995
ACM SIGCSE Bull., 1995
J. Funct. Program., 1995
Special Issue on State-of-the-Art Applications of Pure Functional Programming Languages.
J. Funct. Program., 1995
Thunk Lifting: Reducing Heap Usage in an Implementation of a Lazy Functional Language.
J. Funct. Log. Program., 1995
Proceedings of the Programming Languages: Implementations, 1995
Proceedings of the Functional Programming Languages in Education, 1995
1994
Softw. Pract. Exp., 1994
Comput. Lang., 1994
1993
Future Gener. Comput. Syst., 1993
Proceedings of the conference on Functional programming languages and computer architecture, 1993
Experiments with destructive updates in a lazy functional language (extended abstract).
Proceedings of the 1993 Glasgow Workshop on Functional Programming, 1993
1992
Proceedings of the Compiler Construction, 1992
1991
1990
A Comparison of Three Garbage Collection Algorithms.
Struct. Program., 1990
1988
Proceedings of the Graph-Theoretic Concepts in Computer Science, 1988
1987
1983
IEEE Trans. Software Eng., 1983