Sjouke Mauw
Orcid: 0000-0002-2818-4433Affiliations:
- University of Luxembourg
According to our database1,
Sjouke Mauw
authored at least 148 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
On the optimal resistance against mafia and distance fraud in distance-bounding protocols.
Comput. Commun., October, 2023
When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied <i>π</i>-calculus.
Theor. Comput. Sci., May, 2023
J. Aerosp. Inf. Syst., 2023
Dripping the Poison: The Instruments of Bias. A Qualitative Case Study of News Articles in Four Languages over Nine Years.
FLAP, 2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
Proceedings of the Chatbot Research and Design - 7th International Workshop, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation.
Knowl. Inf. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the 7th International Conference on Formal Structures for Computation and Deduction, 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
2021
Log. Methods Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Breaking and Fixing Unlinkability of the Key Agreement Protocol for 2nd Gen EMV Payments.
CoRR, 2021
Proceedings of the Disinformation in Open Online Media, 2021
Compositional Analysis of Protocol Equivalence in the Applied π-Calculus Using Quasi-open Bisimilarity.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2021, 2021
2020
ACM Trans. Softw. Eng. Methodol., 2020
Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee.
Proc. Priv. Enhancing Technol., 2020
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios.
IACR Cryptol. ePrint Arch., 2020
Comput. Secur., 2020
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Knowl. Inf. Syst., 2019
Proceedings of the Graphical Models for Security - 6th International Workshop, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Trans. Data Priv., 2018
Proceedings of the Security and Trust Management - 14th International Workshop, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement.
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018
Proceedings of the Computer Security, 2018
2017
Fundam. Informaticae, 2017
Rethinking (k, 𝓁)-anonymity in social graphs: (k, 𝓁)-adjacency anonymity and (k, 𝓁)-(adjacency) anonymous transformations.
CoRR, 2017
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Proceedings of the Security Protocols XXV, 2017
2016
Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016
2015
Comparing distance bounding protocols: A critical mission supported by decision theory.
Comput. Commun., 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
Proceedings of the FM 2014: Formal Methods, 2014
2013
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Comput. Sci. Rev., 2013
Proceedings of the Quantitative Evaluation of Systems - 10th International Conference, 2013
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Trans. Comp. Sys. Biology, 2012
J. Comput. Secur., 2012
Innov. Syst. Softw. Eng., 2012
Decis. Support Syst., 2012
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012
A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Seventh International Conference on Availability, 2012
Information Security and Cryptography, Springer, ISBN: 978-3-540-78636-8, 2012
2011
Proceedings of the Proceedings Third International Workshop on Computational Models for Cell Processes, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Proceedings of the Security Protocols XIX, 2011
Proceedings of the Security Protocols XIX, 2011
2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent.
Proceedings of the Decision and Game Theory for Security, 2010
2009
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009
Proceedings of the Computer Security, 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
Proceedings of the Seventh Australasian Information Security Conference, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Theor. Comput. Sci., 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, 2005
Proceedings of the Secure Data Management, 2005
Proceedings of the Information Security and Cryptology, 2005
2004
Proceedings of the 6th AMAST Workshop on Real-Time Systems, 2004
Proceedings of the System Analysis and Modeling, 4th International SDL and MSC Workshop, 2004
Proceedings of the Computer Security, 2004
2003
Proceedings of the Formal Approaches to Software Testing, 2003
Proceedings of the Scenarios: Models, 2003
2002
Sci. Comput. Program., 2002
Test Selection, Trace Distance and Heuristics.
Proceedings of the Testing of Communicating Systems XIV, Applications to Internet Technologies and Services, Proceedings of the IFIP 14th International Conference on Testing Communicating Systems, 2002
2001
Distributed Comput., 2001
Proceedings of the SDL 2001: Meeting UML, 2001
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001
Proceedings of the Handbook of Process Algebra, 2001
2000
Probabilities In The Torx Test Derivation Algorithm.
Proceedings of the SAM 2000, 2000
Proceedings of the 26th EUROMICRO 2000 Conference, 2000
1999
Proceedings of the Theoretical and Practical Aspects of SPIN Model Checking, 1999
MSC and data: dynamic variables.
Proceedings of the SDL '99 The Next Millennium, 1999
Formal Test Automation: A Simple Experiment.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999
1997
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1997
High-level message sequence charts.
Proceedings of the SDL '97 Time for Testing, 1997
1996
Distributed Comput., 1996
1995
Proceedings of the CONCUR '95: Concurrency Theory, 1995
1994
Delayed choice: an operator for joining Message Sequence Charts.
Proceedings of the Formal Description Techniques VII, 1994
1991
Int. J. Found. Comput. Sci., 1991
Proceedings of the Computer Aided Verification, 3rd International Workshop, 1991
1989
Proceedings of the TAPSOFT'89: Proceedings of the International Joint Conference on Theory and Practice of Software Development, 1989
Proceedings of the Algebraic Methods II: Theory, 1989
Proceedings of the Algebraic Methods II: Theory, 1989
1987
Proceedings of the Algebraic Methods: Theory, 1987