List of publications

photo

Last update: 04/04/24
journals conferences books miscellaneous

Journals

[1]
Reynaldo Gil-Pons, Sjouke Mauw, and Rolando Trujillo-Rasua. On the optimal resistance against mafia and distance fraud in distance-bounding protocols. Computer Communications, 210:69-78, 2023.

[2]
Ross Horne, Sjouke Mauw, Andrzej Mizera, André Stemper, and Jan Thoemel. Anomaly detection using deep learning respecting the resources on board a cubesat. Journal of Aerospace Information Systems, 20(12), 2023.

[3]
Sviatlana Hoehn, Barbara Lewandowska-Toszczyk, Sjouke Mauw, and Dov Gabbay. Dripping the poison: The instruments of bias -- A qualitative case study of news articles in four languages over nine years. Journal of applied logics, 10(4):555-585, 2023.

[4]
Ross Horne, Sjouke Mauw, and Semen Yurkov. When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied pi -calculus. Theoretical Computer Science, 959(113842), 2023.

[5]
Cengis Hasan, Ross Horne, Sjouke Mauw, and Andrzej Mizera. Cloud removal from satellite imagery using multispectral edge-filtered conditional generative adversarial networks. International Journal of Remote Sensing, 43(5):1881-1893, 2022.

[6]
Sjouke Mauw, Yunior Ramírez-Cruz, and Rolando Trujillo-Rasua. Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. Knowledge and Information Systems, 64:1077-1100, 2022.

[7]
Ross Horne and Sjouke Mauw. Discovering ePassport vulnerabilities using bisimilarity. Logical Methods in Computer Science, 17(2):24:1-24:52, 2021.

[8]
Xihui Chen, Sjouke Mauw, and Yunior Ramírez-Cruz. Publishing community-preserving attributed social graphs with a differential privacy guarantee. Proceedings on Privacy Enhancing Technologies, 4:131-152, 2020. Presented at the 20th Privacy Enhancing Technologies Symposium (PETS 2020).

[9]
Aleksandr Pilgun, Olga Gadyatskaya, Yury Zhauniarovich, Stanislav Dashevskyi, Artsiom Kushniarou, and Sjouke Mauw. Fine-grained code coverage measurement in automated black-box android testing. ACM Transactions on Software Engineering Methodology, 29(4):23:1-35, 2020.

[10]
Ahto Buldas, Olga Gadyatskaya, Aleksandr Lenin, Sjouke Mauw, and Rolando Trujillo-Rasua. Attribute evaluation on attack trees with incomplete information. Computers and Security, 88(101630), 2020.

[11]
Sjouke Mauw, Yunior Ramírez-Cruz, and Rolando Trujillo-Rasua. Robust active attacks on social graphs. Data Mining and Knowledge Discovery, 33(5):1357-1392, 2019. Presented at ECMLPKDD'19.

[12]
Sjouke Mauw, Yunior Ramírez-Cruz, and Rolando Trujillo-Rasua. Conditional adjacency anonymity in social graphs under active attacks. Knowledge and Information Systems, 61(1):485-511, 2019.

[13]
Sjouke Mauw, Yunior Ramírez-Cruz, and Rolando Trujillo-Rasua. Anonymising social graphs in the presence of active attackers. Transactions on Data Privacy, 11(2):169-198, 2018.

[14]
Ross Horne, Sjouke Mauw, and Alwen Tiu. Semantics for specialising attack trees based on linear logic. Fundamenta Informaticae, 153(1-2):57-86, 2017.

[15]
Gildas Avoine, Sjouke Mauw, and Rolando Trujillo-Rasua. Comparing distance bounding protocols: A critical mission supported by decision theory. Computer Communications, 67:92-102, 2015.

[16]
Gabriele Lenzini, Sjouke Mauw, and Samir Ouchani. Security analysis of socio-technical physical systems. Computers and Electrical Engineering, 47:258-274, 2015.

[17]
Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, and Patrick Schweitzer. Attack-Defense trees. Journal of Logic and Computation, 24(1):55-87, 2014.

[18]
H.L. Jonker, S. Mauw, and J. Pang. Privacy and verifiability in voting systems: Methods, developments and trends. Computer Science Review, 10:1-30, 2013.

[19]
Daniel Marnach, Sjouke Mauw, Miguel Martins, and Carlo Harpes. Detecting meaconing attacks by analysing the clock bias of GNSS receivers. Artificial Satellites, Journal of Planetary Geodesy, 48(2):63-84, 2013.

[20]
Xihui Chen, Gabriele Lenzini, Sjouke Mauw, and Jun Pang. Design and formal analysis of a group signature based electronic toll pricing system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4(1):55-75, 2013.

[21]
Q. Yuan, P. Trairatphisan, J. Pang, S. Mauw, M. Wiesinger, and T. Sauter. Probabilistic model checking of the PDGF signaling pathway. Transactions on Computational Systems Biology, 7625:151-180, 2012.

[22]
Y. Sun, C. Zhang, J. Pang, B. Alcalde, and S. Mauw. A trust-augmented voting scheme for collaborative privacy management. Journal of Computer Security, 20(4):437-459, 2012.

[23]
Selwyn Piramuthu, Gaurav Kapoor, Wei Zhou, and Sjouke Mauw. Input online review data and related bias in recommender systems. Decision Support Systems, 53(3):418-424, 2012.

[24]
Ying Zhang, Chenyi Zhang, Jun Pang, and Sjouke Mauw. Game-based verification of contract signing protocols with minimal messages. Innovations in Systems and Software Engineering, 8(2):111-124, 2012.

[25]
Hugo Jonker, Sjouke Mauw, and Jun Pang. A formal framework for quantifying voter-controlled privacy. Journal of Algorithms in Cognition, Informatics and Logic, 64(2-3):89-105, 2009.

[26]
S. Andova, C.J.F. Cremers, K. Gjøsteen, S. Mauw, S.F. Mjølsnes, and S. Radomirovic. A framework for compositional verification of security protocols. Information and Computation, 206(2-4):425-459, February 2008.

[27]
C.J.F. Cremers, S. Mauw, and E.P. de Vink. Injective synchronisation: an extension of the authentication hierarchy. Theoretical Computer Science, 367(1-2):139-161, November 2006. Special issue on ARSPA'05, (P. Degano and L. Viganò, eds.).

[28]
S. Mauw, W.T. Wiersma, and T.A.C. Willemse. Language-driven system design. International Journal of Software Engineering and Knowledge Engineering, 14(6):625-664, December 2004.

[29]
Sem Borst, Onno Boxma, Jan Friso Groote, and Sjouke Mauw. Task allocation in a multi-server system. Journal of Scheduling, 6(5):423-436, 2003.

[30]
A.G. Engels, S. Mauw, and M.A. Reniers. A hierarchy of communication models for Message Sequence Charts. Science of Computer Programming, 44(3):253-292, September 2002.

[31]
A.G. Engels and S. Mauw. Why men (and octopuses) cannot juggle a four ball cascade. Journal of Recreational Mathematics, 31(2):117-126, 2002/2003.

[32]
Sjouke Mauw and Victor Bos. Drawing Message Sequence Charts with LaTeX . TUGBoat, 22(1-2):87-92, March/June 2001.

[33]
Marc Voorhoeve and Sjouke Mauw. Impossible futures and determinism. Information Processing Letters, 80(1):51-58, 2001.

[34]
J.F. Groote, W.H. Hesselink, S. Mauw, and R. Vermeulen. An algorithm for the asynchronous write-all problem based on process collision. Distributed Computing, 14:75-81, 2001.

[35]
S. Mauw and M.A. Reniers. Operational semantics for MSC'96. Computer Networks and ISDN Systems, 31(17):1785-1799, 1999.

[36]
S. Mauw. The formalization of Message Sequence Charts. Computer Networks and ISDN Systems, 28(12):1643-1657, 1996.

[37]
J.J. Brunekreef, J.-P. Katoen, R. Koymans, and S. Mauw. Design and analysis of dynamic leader election protocols in broadcast networks. Distributed Computing, 9(4):157-171, 1996. Full version: Department of Computer Science, Eindhoven University of Technology report 93/37.

[38]
S. Mauw and M.A. Reniers. An algebraic semantics of Basic Message Sequence Charts. The computer journal, 37(4):269-277, 1994.

[39]
S. Mauw and T. Winter. A prototype toolset for Interworkings. Philips Telecommunication Review, 51(3):41-45, December 1993.

[40]
J.A. Bergstra, S. Mauw, and F. Wiedijk. Uniform algebraic specifications of finite sets with equality. Int. J. of Foundations of Computer Science, 1(2):43-65, 1991.

[41]
S. Mauw and G.J. Veltink. A process specification formalism. Fundamenta Informaticae, XIII:85-139, 1990.

Conference and workshop proceedings

[1]
Yurong Hao, Xihui Chen, Xiaoting Lyu, Jiqiang Liu, Yongsheng Zhu, Zhiguo Wan, Sjouke Mauw, and Wei Wang. Not one less: Exploring interplay between user profiles and items in untargeted attacks against federated recommendation. In Proc. 31st ACM Conference on Computer and Communications Security (CCS'24). ACM Press, 2024. To appear.

[2]
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, and Jun Pang. Formal verification and solutions for Estonian e-voting. In Proc. 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS'24), Singapore, 2024. ACM Press. To appear.

[3]
Christoph H.-J. Braun, Ross Horne, Tobias Käfer, and Sjouke Mauw. SSI, from specifications to protocol? Formally verify security! In Proc. The 2024 Web Conference (WWW'24), Singapore, 2024. ACM. To appear.

[4]
Sergiu Bursuc, Sjouke Mauw, Reynaldo Gil Pons, and Rolando Trujillo Rasua. Software-based memory erasure with relaxed isolation requirements. In Proc. 37th IEEE Computer Security Foundations Symposium (CSF'24), Enschede, The Netherlands, 2024. IEEE Computer Society. To appear.

[5]
Sviatlana Höhn, Bettina Migge, Britta Schneider, Doris Dippold, and Sjouke Mauw. Language ideology bias in conversational technology. In Proc. 7th International Workshop on Chatbot Research and Design (CONVERSATIONS'23), volume 14524 of LNCS, pages 133-148, Oslo, Norway, 2023. Springer-Verlag.

[6]
Sergui Bursuc, Ross Horne, Sjouke Mauw, and Semen Yurkov. Provably unlinkable smart card-based payments. In Proc. 30th ACM Conference on Computer and Communications Security (CCS'23), pages 1392-1406. ACM Press, 2023.

[7]
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, and Jun Pang. Election verifiability in receipt-free voting protocols. In Proc. 36th IEEE Computer Security Foundations Symposium (CSF'23), pages 59-74, Dubrovnik, Croatia, 2023. IEEE Computer Society.

[8]
Matteo Acclavio, Ross Horne, Sjouke Mauw, and Lutz Straßburger. A graphical proof theory of logical time. In Proc. 7th International Conference on Formal Structures for Computation and Deduction (FSCD'22), volume 228 of LIPICS, pages 22:1-22:25, Haifa, Israel, 2022. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik.

[9]
Sergiu Bursuc and Sjouke Mauw. Contingent payments from two-party signing and verification for abelian groups. In Proc. 35th IEEE Computer Security Foundations Symposium (CSF'22), pages 179-194, Haifa, Israel, 2022. IEEE Computer Society.

[10]
Sviatlana Höhn, Nicholas Asher, and Sjouke Mauw. Belelect: a new dataset for bias research from a ``dark'' platform. In Proc. 16th International Conference on web and social media (AAAI ICWSM'22), volume 16(1), pages 1268-1274, Atlanta, Georgia, 2022. AAAI Press.

[11]
Reynaldo Gil-Pons, Ross Horne, Sjouke Mauw, Alwen Tiu, and Rolando Trujillo-Rasua. Is Eve nearby? Analysing protocols under the distant-attacker assumption. In Proc. 35th IEEE Computer Security Foundations Symposium (CSF'22), pages 17-32, Haifa, Israel, 2022. IEEE Computer Society.

[12]
Ross Horne, Sjouke Mauw, and Semen Yurkov. Unlinkability of an improved key agreement protocol for EMV 2nd Gen payments. In Proc. 35th IEEE Computer Security Foundations Symposium (CSF'22), pages 348-363, Haifa, Israel, 2022. IEEE Computer Society.

[13]
Sviatlana Höhn, Nicholas Asher, and Sjouke Mauw. Examining linguistic biases in Telegram with a game theoretic analysis. In Proc. 3rd Multidisciplinary International Symposium on Disinformation in Open Online Media (MISDOOM'21), volume 12887 of LNCS, pages 16-32, Oxford, UK, 2021. Springer-Verlag.

[14]
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, and Jun Pang. Provably improving election verifiability in Belenios. In Proc. 6th International Joint Conference on Electronic Voting (E-Vote-ID'21), volume 12900 of LNCS, pages 1-16. Springer-Verlag, 2021.

[15]
Ross Horne, Sjouke Mauw, and Semen Yurkov. Compositional analysis of protocol equivalence in the applied pi -calculus using quasi-open bisimilarity. In Proc. 18th International Colloquium on Theoretical Aspects of Computing (ICTAC'21), volume 12819 of LNCS, pages 235-255, Nur-Sultan, Kazakhstan, 2021. Springer-Verlag.

[16]
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, and Jun Pang. Election verifiability revisited: automated security proofs and attacks on Helios and Belenios. In Proc. 34th IEEE Computer Security Foundations Symposium (CSF'21), pages 1-15, Dubrovnik, Croatia, 2021. IEEE Computer Society.

[17]
Dov M. Gabbay, Ross Horne, Sjouke Mauw, and Leendert van der Torre. Attack-Defence Frameworks: Argumentation-based semantics for Attack-Defence Trees. In Harley Eades III and Olga Gadyatskaya, editors, Proc. 7th International Workshop on Graphical Models for Security (GraMSec'20), volume 12419 of LNCS, pages 143-165. Springer Verlag, 2020.

[18]
Xihui Chen, Ema Këpuska, Sjouke Mauw, and Yunior Ramírez-Cruz. Active re-identification attacks on periodically released dynamic social graphs. In Liqun Chen, Ninghui Li, Kaitai Liang, and Steve Schneider, editors, Proc. 25th European Symposium On Research In Computer Security (ESORICS'20), Part II, volume 12309 of Lecture Notes in Computer Science, pages 185-205, Guildford, UK, September 14-18 2020. Springer-Verlag.

[19]
Christof Ferreira Torres, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros, Hugo Jonker, and Sjouke Mauw. AEGIS: Shielding vulnerable smart contracts against attacks. In Proc. 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS'20), pages 584-597, Taipei, Taiwan, 2020. ACM Press.

[20]
Olga Gadyatskaya and Sjouke Mauw. Attack-tree series: A case for dynamic attack tree analysis. In Massimiliano Albanese, Ross Horne, and Christian W. Probst, editors, Proc. 6th International Workshop on Graphical Models for Security (GraMSec'19), volume 11720 of LNCS, pages 7-19, Hoboken, USA, 2019. Springer Verlag.

[21]
Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, and Rolando Trujillo-Rasua. Post-collusion security and distance bounding. In Proc. 26th ACM Conference on Computer and Communications Security (CCS'19), pages 941-958. ACM Press, 2019.

[22]
Ihor Filimonov, Ross Horne, Sjouke Mauw, and Zach Smith. Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity. In Kazue Sako, Steve Schneider, and Peter Y. A. Ryan, editors, Proc. 24th European Symposium On Research In Computer Security (ESORICS'19), volume 11735 of Lecture Notes in Computer Science, pages 577-594, Luxembourg, September 23-27 2019. Springer-Verlag.

[23]
Ravi Jhawar, Karim Lounis, Sjouke Mauw, and Yunior Ramírez-Cruz. Semi-automatically augmenting Attack Trees using an annotated Attack Tree library. In S.K. Katsikas and C. Alcaraz, editors, Proc. 14th Workshop on Security and Trust Management (STM'18), volume 11091 of Lecture Notes in Computer Science, pages 85-101, Barcelona, Spain, September 6-7 2018. Springer-Verlag.

[24]
Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, and Rolando Trujillo-Rasua. Automated identification of desynchronisation attacks on shared secrets. In J. Lopez, J. Zhou, and M. Soriano, editors, Proc. 23th European Symposium On Research In Computer Security (ESORICS'18), volume 11098 of Lecture Notes in Computer Science, pages 406-426, Barcelona, Spain, September 3-7 2018. Springer-Verlag.

[25]
Ross Horne, Sjouke Mauw, and Alwen Tiu. The attacker does not always hold the initiative: attack trees with external refinement. In George Cybenko, David Pym, and Barbara Fila, editors, Proc. 5th International Workshop on Graphical Models for Security (GraMSec'18), volume 11086 of LNCS, pages 90-110, Oxford, UK, 2018. Springer Verlag.

[26]
Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, and Rolando Trujillo-Rasua. Distance-bounding protocols: Verification without time and location. In Proc. 39th IEEE Symposium on Security and Privacy (S&P'18), pages 549-566, San Francisco, USA, May 21-23 2018. IEEE.

[27]
Hugo Jonker, Sjouke Mauw, and Tom Schmitz. Reverse Bayesian poisoning: How to use spam filters to manipulate online elections. In R. Krimmer et al., editor, Proc. 2nd International Joint Conference on Electronic Voting (E-Vote-ID'17), volume 10615 of Lecture Notes in Computer Science, pages 183-197, Bregenz, Austria, October 24-27 2017. Springer-Verlag.

[28]
Olga Gadyatskaya, Ravi Jhawar, Sjouke Mauw, Rolando Trujillo-Rasua, and Tim Willemse. Refinement-aware generation of attack trees. In G. Livraga and C. Mitchell, editors, Proc. 13th Workshop on Security and Trust Management (STM'17), volume 10547 of Lecture Notes in Computer Science, pages 164-179, Oslo, Norway, September 14-15 2017. Springer-Verlag.

[29]
Ravi Jhawar and Sjouke Mauw. Model-driven situational awareness for moving target defense. In Marc Scanlon and Nhien-An Le-Khac, editors, Proc. 16th European Conference on Cyber Warfare and Security (ECCWS'17), pages 184-192, Dublin, Ireland, June 29-30 2017. ACPI.

[30]
Hugo Jonker and Sjouke Mauw. A security perspective on publication metrics. In F. Stajano et al., editor, Proc. 25th Security Protocols Workshop, volume 10476 of LNCS, pages 186-200, Cambridge, United Kingdom, March 20-22 2017. Springer-Verlag.

[31]
Sjouke Mauw, Jorge Toro-Pozo, and Rolando Trujillo-Rasua. Optimality results on the security of lookup-based protocols. In G. Hancke and K. Markantonakis, editors, Proc. 12th Workshop on RFID and IoT Security (RFIDSec'16), volume 10155 of Lecture Notes in Computer Science, pages 137-150, Hong Kong, November 30-December 2 2016. Springer-Verlag.

[32]
Gabriele Lenzini, Sjouke Mauw, and Samir Ouchani. Analysing the efficacy of security policies in cyber-physical socio-technical systems. In G. Barthe, E. Markatos, and P. Samarati, editors, Proc. 12th Workshop on Security and Trust Management (STM'16), volume 9871 of Lecture Notes in Computer Science, pages 170-178, Heraklion, Greece, September 26-27 2016. Springer-Verlag.

[33]
Ravi Jhawar, Karim Lounis, and Sjouke Mauw. A stochastic framework for quantitative analysis of attack-defense trees. In G. Barthe, E. Markatos, and P. Samarati, editors, Proc. 12th Workshop on Security and Trust Management (STM'16), volume 9871 of Lecture Notes in Computer Science, pages 138-153, Heraklion, Greece, September 26-27 2016. Springer-Verlag.

[34]
Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cédric Muller, and Steve Muller. Bridging two worlds: Reconciling practical risk assessment methodologies with theory of attack trees. In Barbara Kordy, Mathias Ekstedt, and Dong Seong Kim, editors, Proc. 3rd International Workshop on Graphical Models for Security (GraMSec'16), volume 9987 of LNCS, pages 80-93, Lisbon, Portugal, 2016. Springer Verlag.

[35]
Olga Gadyatskaya, Ravi Jhawar, Piotr Kordy, Karim Lounis, Sjouke Mauw, and Rolando Trujillo-Rasua. Attack trees for practical security assessment: Ranking of attack scenarios with ADTool 2.0. In Gul Agha and Benny Van Houdt, editors, Proc. 13th International Conference on Quantitative Evaluation of SysTems (QEST'16), volume 9826 of LNCS, pages 159-162, Québec city, Canada, August 23-25 2016. Springer Verlag.

[36]
Sjouke Mauw, Rolando Trujillo-Rasua, and Bochuan Xuan. Counteracting active attacks in social network graphs. In Silvio Ranise and Vipin Swarup, editors, Proc. 13th Annual IFIP WGII.3 Working Conference on Data and Applications Security and Privacy (DBSec'16), volume 9766 of LNCS, pages 233-248, Trento, Italy, July 18-21 2016. Springer-Verlag.

[37]
Ravi Jhawar, Sjouke Mauw, and Irfan Zakiuddin. Automating cyber defence responses using attack-defense trees and game theory. In Robert Koch and Gabi Rodosek, editors, Proc. 15th European Conference on Cyber Warfare and Security (ECCWS'16), pages 163-172, Munich, Germany, July 7-8 2016. ACPI.

[38]
Hugo Jonker, Sjouke Mauw, and Rolando Trujillo-Rasua. Man-in-the-middle attacks evolved... but our security models didn't. In J. Anderson, V. Matyás, B. Christianson, and F. Stajano, editors, Proc. 24th Security Protocols Workshop, volume 10368 of LNCS, pages 19-25, Brno, Czech Republic, April 7-8 2016. Springer-Verlag.

[39]
Sjouke Mauw, Jorge Toro-Pozo, and Rolando Trujillo-Rasua. A class of precomputation-based distance-bounding protocols. In Proc. 1st IEEE European Symposium on Security and Privacy (EuroS&P'16), pages 97-111, Saarbrücken, Germany, March 21-24 2016. IEEE.

[40]
Christof Ferreira Torres, Hugo Jonker, and Sjouke Mauw. FP-Block: usable web privacy by controlling browser fingerprinting. In Günther Pernul, Peter Y.A. Ryan, and Edgar Weippl, editors, Proc. 20th European Symposium On Research In Computer Security (ESORICS'15), Part II, volume 9327 of Lecture Notes in Computer Science, pages 3-19, Vienna, Austria, September 23-25 2015. Springer-Verlag.

[41]
Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, and Rolando Trujillo-Rasua. Attack trees with sequential conjunction. In H. Federrath and D. Gollmann, editors, Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIPSec'15), volume 455 of IFIP AICT, pages 339-353, Hamburg, Germany, May 31-28 2015. Springer-Verlag.

[42]
Hugo Jonker, Sjouke Mauw, and Sasa Radomirovic. Location-private interstellar communication. In B. Christianson et al., editor, Proc. 23rd Security Protocols Workshop, volume 9379 of LNCS, pages 105-115, Cambridge, United Kingdom, March 31-April 2 2015. Springer-Verlag.

[43]
Sjouke Mauw. Location-private interstellar communication (Transcript of Discussion). In B. Christianson et al., editor, Proc. 23rd Security Protocols Workshop, volume 9379 of LNCS, pages 116-125, Cambridge, United Kingdom, March 31-April 2 2015. Springer-Verlag.

[44]
S. Mauw and S. Radomirovic. Generalizing multi-party contract signing. In R. Focardi and A. Myers, editors, Proc. 4th Conference on Principles of Security and Trust (POST'15), volume 9036 of LNCS, pages 156-175, London, UK, April 11-18 2015. Springer Verlag.

[45]
Zhang Jie, Yang Liu, Sjouke Mauw, and Tim Muller. On robustness of trust systems. In Proc. 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), pages 44-60, Singapore, July 7-10 2014. IFIP.

[46]
Piotr Kordy, Rom Langerak, Sjouke Mauw, and Jan Willem Polderman. A symbolic algorithm for the analysis of robust timed automata. In Cliff Jones, Pekka Pihlajasaari, and Jun Sun, editors, Proc. 19th International Symposium on Formal Methods (FM'14), volume 8442 of LNCS, pages 351-366, Singapore, May 12-16 2014. Springer Verlag.

[47]
X. Chen, C. Harpes, G. Lenzini, M. Martins, S. Mauw, and J. Pang. Demo: Demonstrating a trust framework for evaluating GNSS signal integrity. In Proc. 20th ACM Conference on Computer and Communications Security (CCS'13), pages 1329-1332. ACM Press, 2013.

[48]
Barbara Kordy, Piotr Kordy, Sjouke Mauw, and Patrick Schweitzer. ADTool: Security analysis with attack-defense trees. In Proc. 10th International Conference on Quantitative Evaluation of SysTems (QEST'13), volume 8054 of LNCS, pages 173-176, Buenos Aires, Argentina, 2013. Springer Verlag.

[49]
X. Chen, G. Lenzini, M. Martins, S. Mauw, and J. Pang. A trust framework for evaluating GNSS signal integrity. In Proc. 26th IEEE Computer Security Foundations Symposium (CSF'13), pages 179-192, New Orleans, USA, 2013. IEEE Computer Society.

[50]
B. Kordy, S. Mauw, and P. Schweitzer. Quantitative questions on attack-defense trees. In Taekyoung Kwon, Mun-Kyu Lee, and Daesung Kwon, editors, Proc. 15th Annual International Conference on Information Security and Cryptology (ICISC'12), volume 7839 of Lecture Notes in Computer Science, pages 49-64, Seoul, South Korea, November 28-30 2013. Springer-Verlag.

[51]
S. Mauw and S. Piramuthu. PUF-based authentication protocol to address ticket-switching of RFID-tagged items. In A. Jøsang, P. Samarati, and M. Petrocchi, editors, Proc. 8th Workshop on Security and Trust Management (STM'12), volume 7783 of Lecture Notes in Computer Science, pages 209-224, Pisa, Italy, September 13-14 2012. Springer-Verlag.

[52]
C. Harpes, M. Martins, X. Chen, G. Lenzini, S. Mauw, and J. Pang. Implementation and validation of a localisation assurance service provider. In Proc. 6th ESA Workshop on Satellite Navigation Technologies (NAVITEC'12), pages 1-8, Noordwijk, The Netherlands, December 5-7 2012. IEEE.

[53]
X. Chen, G. Lenzini, S. Mauw, and J. Pang. A group signature based electronic toll pricing system. In International Conference on Availability, Reliability and Security (ARES'12), pages 85-93, Prague, Czech Republic, August 20-24 2012. IEEE Computer Society.

[54]
Q. Li, P. Schaffer, J. Pang, and S. Mauw. Comparative analysis of clustering protocols with probabilistic model checking. In T. Margaria, Z. Qiu, and H. Yang, editors, Sixth IEEE International Symposium on Theoretical Aspects of Software Engineering (TASE'12), pages 249-252, Beijing, China, July 4-6 2012. IEEE Computer Society.

[55]
D. Marnach, S. Mauw, M. Martins, and C. Harpes. Detecting meaconing attacks by analysing the clock bias of GNSS receivers. In European Navigation Conference (ENC 2012), Gdansk, Poland, April 25-27 2012.

[56]
Q. Yuan, J. Pang, S. Mauw, P. Trairatphisan, M. Wiesinger, and T. Sauter. A study of the PDGF signaling pathway with PRISM. In 3rd International Workshop on Computational Models for Cell Processes (CompMod 2011), volume 67 of Electronic Proceedings in Theoretical Computer Science, pages 65-81, Aachen, Germany, September 10 2011.

[57]
W. Jamroga, S. Mauw, and M. Melissen. Fairness in non-repudiation protocols. In C. Meadows and C. Fernandez-Gago, editors, Proc. 7th Workshop on Security and Trust Management (STM'11), volume 7170 of Lecture Notes in Computer Science, pages 122-139, Copenhagen, Denmark, June 27-28 2012. Springer-Verlag.

[58]
T. van Deursen, S. Mauw, and S. Radomirovic. mCarve: Carving attributed dump sets. In Proc. 20th USENIX Security Symposium, pages 107-121, San Francisco, USA, August 8-12 2011. USENIX Association.

[59]
G. Lenzini, S. Mauw, and J. Pang. Selective location blinding using hash chains. In B. Christianson et al., editor, Proc. 19th Security Protocols Workshop, volume 7114 of LNCS, pages 132-141, Cambridge, United Kingdom, March 28-30 2011. Springer-Verlag.

[60]
S. Mauw. Selective location blinding using hash chains (Transcript of Discussion). In B. Christianson et al., editor, Proc. 19th Security Protocols Workshop, volume 7114 of LNCS, pages 142-149, Cambridge, United Kingdom, March 28-30 2011. Springer-Verlag.

[61]
B. Kordy, S. Mauw, M. Melissen, and P. Schweitzer. Attack-defense trees and two-player binary zero-sum extensive form games are equivalent. In Proc. 1st Conference on Decision and Game Theory for Security (GameSec 2010), volume 6442 of Lecture Notes in Computer Science, pages 245-256, Berlin, Germany, November 22-23 2010. Springer-Verlag.

[62]
Y. Sun, C. Zhang, J. Pang, B. Alcalde, and S. Mauw. A trust-augmented voting scheme for collaborative privacy management. In J. Cuellar, J. Lopez, G. Barthe, and A. Pretschner, editors, Proc. 6th Workshop on Security and Trust Management (STM'10), volume 6710 of Lecture Notes in Computer Science, pages 132-146, Athens, Greece, September 23-24 2011. Springer-Verlag.

[63]
B. Kordy, S. Mauw, S. Radomirovic, and P. Schweitzer. Foundations of attack-defense trees. In Pierpaolo Degano, Sandro Etalle, and Joshua Guttman, editors, Proc. 7th Workshop on Formal Aspects in Security and Trust (FAST'10), volume 6561 of Lecture Notes in Computer Science, pages 80-95, Pisa, Italy, September 13-18 2010. Springer-Verlag.

[64]
S. Mauw, S. Radomirovic, and P.Y. Ryan. Security protocols for Secret Santa. In Bruce Christianson and James Malcolm, editors, Proc. 18th Security Protocols Workshop, volume 7601 of Lecture Notes in Computer Science, pages 175-184, Cambridge, United Kingdom, March 24-26 2010. Springer-Verlag.

[65]
S. Mauw. Security protocols for Secret Santa (Transcript of Discussion). In Bruce Christianson and James Malcolm, editors, Proc. 18th Security Protocols Workshop, volume 7601 of Lecture Notes in Computer Science, pages 185-190, Cambridge, United Kingdom, March 24-26 2010. Springer-Verlag.

[66]
B. Alcalde and S. Mauw. An algebra for trust dilution and trust fusion. In Pierpaolo Degano and Joshua Guttman, editors, Proc. 6th Workshop on Formal Aspects in Security and Trust (FAST'09), volume 5983 of Lecture Notes in Computer Science, pages 4-20, Eindhoven, The Netherlands, November 5-6 2009. Springer-Verlag.

[67]
Y. Zhang, C. Zhang, J. Pang, and S. Mauw. Game-based verification of multi-party contract signing protocols. In Pierpaolo Degano and Joshua Guttman, editors, Proc. 7th Workshop on Formal Aspects in Security and Trust (FAST'09), volume 5983 of Lecture Notes in Computer Science, pages 186-200, Eindhoven, The Netherlands, November 5-6 2009. Springer-Verlag.

[68]
T. van Deursen, S. Mauw, S. Radomirovic, and P. Vullers. Secure ownership and ownership transfer in RFID systems. In Michael Backes and Peng Ning, editors, Proc. 14th European Symposium On Research In Computer Security (ESORICS'09), volume 5789 of Lecture Notes in Computer Science, pages 637-654, Saint-Malo, France, September 21-23 2009. Springer-Verlag.

[69]
S. Mauw, S. Radomirovic, and M. Torabi Dashti. Minimal message complexity of asynchronous multi-party contract signing. In Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09), pages 13-25, Port Jefferson, USA, July 8-10 2009. IEEE Computer Society.

[70]
Hugo Jonker, Sjouke Mauw, and Jun Pang. Measuring voter-controlled privacy. In Proc. 4th Conference on Availability, Reliability and Security - ARES'09, pages 289-298. IEEE Computer Society, 2009.

[71]
Baptiste Alcalde, Eric Dubois, Sjouke Mauw, Nicolas Mayer, and Sasa Radomirovic. Towards a decision model based on trust and security risk management. In Ljiljana Brankovic and Willy Susilo, editors, Proc. 7th Australasian Information Security Conference - AISC'09, volume 98 of Conferences in Research and Practice in Information Technology (CRPIT), pages 61-69, New Zealand, Wellington, January 20-23 2009. Australian Computer Society.

[72]
T. van Deursen, S. Mauw, and S. Radomirovic. Untraceability of RFID protocols. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, volume 5019 of LNCS, pages 1-15, Seville, Spain, 2008. Springer.

[73]
J. Cederquist, M. Torabi Dashti, and S. Mauw. A certified email protocol using key chains. In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01 (AINAW'07), pages 525-530, Los Alamitos, CA, USA, 2007. IEEE Computer Society.

[74]
B. Bouwman, S. Mauw, and M. Petkovic. Rights management for role-based access control. In Fifth Annual IEEE Consumer Communications & Networking Conference 2008 (CCNC'08), pages 1085-1090, Las Vegas, USA, January 2008. IEEE.

[75]
P. Ceelen, S. Mauw, and S. Radomirovic. Chosen-name attacks: An overlooked class of type-flaw attacks. In 3rd International Workshop on Security and Trust Management (STM'07), volume 197 of ENTCS, pages 31-43, Dresden, Germany, February 2008.

[76]
S. Mauw, J.H.S. Verschuren, and E.P. de Vink. Data anonymity in the FOO voting scheme. In M. ter Beek and F. Gadducci, editors, Second International Workshop on Views On Designing Complex Architectures (VODCA 2006), volume 168 of ENTCS, pages 5-28, Bertinoro, Italy, Feb 2007.

[77]
C.J.F. Cremers and S. Mauw. A family of multi-party authentication protocols - extended abstract. In 1st Benelux Workshop on Information and System Security -- WISSEC'06, Antwerpen, Belgium, November 2006.

[78]
S. Mauw, I. van Vessem, and B. Bos. Forward secure communication in wireless sensor networks. In John A. Clark, Richard F. Paige, Fiona Polack, and Phillip J. Brooke, editors, Third International Conference Security in Pervasive Computing (SPC'06), LNCS 3934, pages 32-42, York, UK, April 2006. Springer-Verlag, Berlin.

[79]
Sjouke Mauw and Martijn Oostdijk. Foundations of attack trees. In Dongho Won and Seungjoo Kim, editors, Proc. 8th International Conference on Information Security and Cryptology (ICISC'05), volume 3935 of Lecture Notes in Computer Science, pages 186-198, Seoul, South Korea, 2006. Springer-Verlag.

[80]
Gopakumar G Nair, Ajeesh Gopalakrishnan, Sjouke Mauw, and Erik Moll. XML security in the next generation optical disc context. In W. Jonker and M. Petkovic, editors, Second workshop on Secure Data Management, SDM'05, LNCS 3674, pages 217-233, Trondheim, Norway, September 2005. Springer-Verlag, Berlin.

[81]
C.J.F. Cremers, S. Mauw, and E.P. de Vink. A syntactic criterion for injectivity of authentication protocols. In P. Degano and L. Viganò, editors, Proceedings of the Second Workshop on Automated Reasoning for Security Protocol analysis (ARSPA 2005), volume 135(1) of ENTCS, pages 23-38, Lisboa, Portugal, 2005. Elsevier.

[82]
Stefan Blom, Jan Friso Groote, Sjouke Mauw, and Alexander Serebrenik. Analysing the BKE-security protocol with mCRL. In Proceedings of ARTS 2004, the 6th AMAST Workshop on Real-Time Systems, volume 139(1) of ENTCS, pages 49-90, 2005.

[83]
C.J.F. Cremers and S. Mauw. Operational semantics of security protocols. In S. Leue and T.J. Systä, editors, Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 post-seminar proceedings), LNCS 3466, pages 66-89, 2005.

[84]
S. Mauw, J.H.S. Verschuren, and E.P. de Vink. A formalization of anonymity and onion routing. In P. Samarati, P. Ryan, D. Gollmann, and R. Molva, editors, ESORICS'04, pages 109-124, Sophia Antipolis, 2004.

[85]
C.J.F. Cremers and S. Mauw. Checking secrecy by means of partial order reduction. In D. Amyot and A.W. Williams, editors, SAM 2004: Security Analysis and Modelling, volume LNCS 3319 of Proceedings of the fourth SDL and MSC Workshop, pages 177-194, Ottawa, Canada, September 2004. Springer-Verlag, Berlin.

[86]
H.L. Jonker, S. Mauw, J.H.S. Verschuren, and A.T.S.C. Schoonen. Security aspects of DRM systems. In R. Pellikaan, editor, 25th Symposium on information theory in the Benelux, pages 169-176, Kerkrade, The Netherlands, June 2004.

[87]
H.M.A. van Beek and S. Mauw. Automatic conformance testing of internet applications. In Proceedings of the Third international Workshop on Formal Approaches to Testing of Software (FATES 2003), LNCS 2931, pages 205-222, Montreal, Canada, October 2003.

[88]
C.J.F. Cremers, S. Mauw, and E.P. de Vink. Defining authentication in a trace model. In Theo Dimitrakos and Fabio Martinelli, editors, FAST 2003, Proceedings of the first international Workshop on Formal Aspects in Security and Trust, pages 131-145, Pisa, September 2003. IITT-CNR technical report.

[89]
L.M.G. Feijs, N. Goga, S. Mauw, and J. Tretmans. Test selection, trace distance and heuristics. In TestCom 2002, Proceedings of the 14th International Conference on Testing of Communicating Systems, pages 267-282, Berlin, March 2002. Kluwer Academic Publishers.

[90]
S. Mauw, W.T. Wiersma, and T.A.C. Willemse. Language-driven system design. In HICSS-35, Proceedings of the Thirty-Fifth Annual Hawaii International Conference on System Sciences, minitrack on Domain-Specific Languages for Software Engineering, Hawaii, January 2002. IEEE Computer Society.

[91]
J.C.M. Baeten, H.M.A. van Beek, and S. Mauw. An MSC based representation of DiCons. In Rick Reed and Jeanne Reed, editors, SDL 2001, Proceedings of the tenth SDL Forum, pages 328-347, Copenhagen, June 2001.

[92]
J.C.M. Baeten, H.M.A. van Beek, and S. Mauw. Specifying Internet applications with DiCons. In Proceedings 16th ACM Symposium on Applied Computing (SAC 2001), pages 576-584, Las Vegas, USA, March 2001.

[93]
H. Vranken, T. Garcia Garcia, S. Mauw, and L. Feijs. IC design validation using Message Sequence Charts. In Proc. 26th Euromicro Conference, Digital Systems Design DSD'2000, volume 1, pages 122-127, Maastricht, The Netherlands, September 5-7 2000. IEEE Computer Society.

[94]
L.M.G. Feijs, N. Goga, and S. Mauw. Probabilities in the TorX test derivation algorithm. In Susanne Graf, Claude Jard, and Yair Lahav, editors, SAM2000 - 2nd Workshop on SDL and MSC, pages 173-188, Col de Porte, Grenoble, June 2000. VERIMAG, IRISA, SDL Forum Society.

[95]
W. Janssen, R. Mateescu, S. Mauw, P. Fennema, and P. van der Stappen. Model checking for managers. In Dennis Dams, Rob Gerth, Stefan Leue, and Mieke Massink, editors, Theoretical and practical aspects of SPIN Model Checking, Proceedings of the 5th and 6th International SPIN Workshops, Lecture Notes in Computer Science 1680, pages 92-107, Toulouse, France, September 1999. Springer Verlag.

[96]
A. Belinfante, J. Feenstra, R.G. de Vries, J. Tretmans, N. Goga, L. Feijs, S. Mauw, and L. Heerink. Formal test automation: A simple experiment. In G. Csopaki, S. Dibuz, and K. Tarnay, editors, 12th Int. Workshop on Testing of Communicating Systems, pages 179-196. Kluwer Academic Publishers, 1999.

[97]
A.G. Engels, L.M.G. Feijs, and S. Mauw. MSC and data: dynamic variables. In R. Dssouli, G.v. Bochmann, and Y. Lahav, editors, SDL'99, Proceedings of the Ninth SDL Forum, pages 105-120, Montreal, June 21-25 1999. Elsevier Science Publishers B.V.

[98]
W. Janssen, R. Mateescu, S. Mauw, and J. Springintveld. Verifying business processes using spin. In Gerard Holzmann, Elie Najm, and Ahmed Serhrouchni, editors, Proceedings of the 4th International SPIN Workshop (Paris, France), pages 21-36, Paris, November 1998. Ecole Nationale Supérieure des Télécommunications.

[99]
L.M.G. Feijs and S. Mauw. MSC and data. In Yair Lahav, Adam Wolisz, Joachim Fischer, and Eckhardt Holz, editors, SAM98 - 1st Workshop on SDL and MSC. Proceedings of the SDL Forum Society on SDL and MSC, number 104 in Informatikberichte, pages 85-96. Humboldt-Universität Berlin, 1998.

[100]
A. Engels, S. Mauw, and M.A. Reniers. A hierarchy of communication models for Message Sequence Charts. In T. Mizuno, N. Shiratori, T. Higashino, and A. Togashi, editors, FORTE/PSTV'97, pages 75-90, Osaka, Japan, november 1997. Chapman & Hall.

[101]
S. Mauw and M.A. Reniers. High-level Message Sequence Charts. In A. Cavalli and A. Sarma, editors, SDL'97: Time for Testing - SDL, MSC and Trends, Proceedings of the Eighth SDL Forum, pages 291-306, Evry, France, September 1997.

[102]
A. Engels, L.M.G. Feijs, and S. Mauw. Test generation for intelligent networks using model checking. In E. Brinksma, editor, TACAS'97, Lecture Notes in Computer Science 1217, pages 384-398. Springer, 1997.

[103]
S. Mauw and M.A. Reniers. Refinement in Interworkings. In U. Montanari and V. Sassone, editors, Proc. CONCUR'96, LNCS 1119, pages 671-686. Pisa, Springer, 1996.

[104]
S. Mauw and P. D'Argenio. Delayed choice for process algebra with abstraction. In Proc. CONCUR '95. Philadelphia, Springer Verlag, 1995.

[105]
S. Mauw and E.A. van der Meulen. Generating tools for Message Sequence Charts. In R. Bræk and A. Sarma, editors, SDL'95 with MSC in CASE, Proceedings of the Seventh SDL Forum, pages 51-62, Oslo, 1995. Elsevier Science Publishers B.V.

[106]
J.C.M. Baeten and S. Mauw. Delayed choice: an operator for joining Message Sequence Charts. In D. Hogrefe and S. Leue, editors, Formal Description Techniques, VII, pages 340-354. Chapman & Hall, 1995.

[107]
S. Mauw and J.C. Mulder. Regularity of BPA-systems is decidable. In B. Jonsson and J. Parrow, editors, Proc. CONCUR '94, LNCS 836, pages 34-47. Uppsala, Springer Verlag, 1994.

[108]
J.J. Brunekreef, J.-P. Katoen, R. Koymans, and S. Mauw. Algebraic specification of dynamic leader election protocols in broadcast networks. In A. Ponse, C. Verhoef, and S.F.M van Vlijmen, editors, Algebra of Communicating Processes, Proceedings of ACP94, Workshops in Computing, pages 338-358. Springer, 1994.

[109]
S. Mauw, M. van Wijk, and T. Winter. A formal semantics of synchronous Interworkings. In O. Færgemand and A. Sarma, editors, SDL'93 Using Objects, Proceedings of the Sixth SDL Forum, pages 167-178, Darmstadt, 1993. Elsevier Science Publishers B.V.

[110]
S. Mauw and F. Wiedijk. Specification of the transit node in PSFd. In J.A. Bergstra and L.M.G. Feijs, editors, Algebraic Methods II: Theory, Tools and Applications, Springer LNCS 490, pages 341-361, 1991.

[111]
S. Mauw and G.J. Veltink. A proof assistant for PSF. In K.G. Larsen and A. Skou, editors, Proc. Third Workshop on Computer Aided Verification (CAV'91), Springer LNCS 575, pages 158-168, Aalborg, 1992.

[112]
J.C.M. Baeten, J.A. Bergstra, S. Mauw, and G.J. Veltink. A process specification formalism based on static COLD. In J.A. Bergstra and L.M.G. Feijs, editors, Algebraic Methods II: Theory, Tools and Applications, Springer LNCS 490, pages 303-335, 1991.

[113]
S. Mauw. An algebraic specification of process algebra, including two examples. In M. Wirsing and J.A. Bergstra, editors, Algebraic Methods: Theory, Tools and Applications, Springer LNCS 394, pages 507-554, Passau, 1989.

[114]
S. Mauw and G.J. Veltink. An introduction to PSFd. In J. Diaz and F. Orejas, editors, Proc. International Joint Conference on Theory and Practice of Software Development, TAPSOFT '89, Springer LNCS 352, pages 272-285, 1989.

[115]
S. Mauw. A constructive version of the approximation induction principle. In Proc. SION Conf. CSN 87, pages 235-252, Amsterdam, 1987.

Books/Book chapters/Standards/Edited volumes

[1]
Marco Crepaldi, Ross Horne, and Sjouke Mauw. Space Law in a Networked World (P.J. Blount and M. Hofmann, eds.), chapter Software certification as a limit on liability: The case of cubesat operations, pages 162-185. Studies in Space Law. Brill, 2023.

[2]
Sjouke Mauw and Mauro Conti, editors. Proceedings of the 15th International Workshop on Security and Trust Management (STM 2019), Luxembourg, September 26-27, 2019, volume 11738 of Lecture Notes in Computer Science. Springer, 2019.

[3]
Peng Liu, Sjouke Mauw, and Ketil Stølen, editors. Proceedings of the Fourth International Workshop on Graphical Models for Security (GraMSec 2017), Santa Barbara, CA, USA, August 21, 2017, volume 10744 of Lecture Notes in Computer Science. Springer, 2018.

[4]
Sheikh Mahbub Habib, Julita Vassileva, Sjouke Mauw, and Max Mühlhäuser, editors. Proceedings of the 10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016), Darmstadt, Germany, July 18-22, 2016, volume 473 of IFIP Advances in Information and Communication Technology. Springer, 2016.

[5]
Sjouke Mauw, Barbara Kordy, and Sushil Jajodia, editors. Proceedings of the Second International Workshop on Graphical Models for Security (GraMSec 2015), Verona, Italy, July 13, 2015, volume 9390 of Lecture Notes in Computer Science. Springer, 2016.

[6]
Jun Pang, Yang Liu, and Sjouke Mauw, editors. Proceedings of the 4th International Workshop on Engineering Safety and Security Systems (ESSS 2015), Oslo, Norway, June 22, 2015, volume 184 of Electronic Proceedings in Theoretical Computer Science, 2015.

[7]
Sjouke Mauw and Christian Damsgaard Jensen, editors. Proceedings of the 10th International Workshop on Security and Trust Management (STM 2014), Wroclaw, Poland, September 10-11, 2014, volume 8743 of Lecture Notes in Computer Science. Springer, 2014.

[8]
Barbara Kordy, Sjouke Mauw, and Wolter Pieters, editors. Proceedings of the First International Workshop on Graphical Models for Security (GraMSec 2014), Grenoble, France, April 12, 2014, volume 148 of EPTCS, 2014.

[9]
C. Cremers and S. Mauw. Operational semantics and verification of security protocols. Springer-Verlag, 2012.

[10]
H. Jonker, S. Mauw, and J. Pang. Digital Enlightenment Yearbook 2012 (J. Bus, M. Crampton, M. Hildebrandt, G. Metakides, eds.), chapter Location-based Services: Privacy, Security and Assurance, pages 235-244. IOS Press, 2012.

[11]
M. Torabi Dashti and S. Mauw. Handbook of Financial Cryptography and Security (G. Rosenberg, ed.), chapter Fair Exchange, pages 109-132. Chapman and Hall/CRC, 2010.

[12]
H.L. Jonker and S. Mauw. Handbook of research on secure multimedia distribution (Shiguo Lian and Yan Zhang, eds.), chapter Discovering the core security requirements of DRM systems by means of objective trees, pages 71-85. IGI Global publications, 2009.

[13]
S. Mauw, F. Massacci, and F. Piessens (guest editors). Special issue on security and trust. Science of Computer Programming, 74(1-2), December 2008.

[14]
Stig Fr. Mjølsnes, Sjouke Mauw, and Sokratis K. Katsikas, editors. Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, volume 5057 of Lecture Notes in Computer Science. Springer, 2008.

[15]
H.L. Jonker and S. Mauw. Digital Rights Management -- An Introduction (D. Satish, ed.), chapter Core security requirements of DRM systems, pages 73-90. ICFAI University Press, 2007.

[16]
S. Mauw, V. Issarny, and C.J.F. Cremers, editors. STM'05, Proceedings of the First International Workshop on Security and Trust Management, volume 157(3) of Electronic Notes in Theoretical Computer Science. Elsevier, Milan, Italy, September 2005.

[17]
S. Mauw (guest editor). Special issue on Visual Formal Methods '99. Computer languages, 27(1-3), April-October 2001.

[18]
S. Mauw, M.A. Reniers, and T.A.C. Willemse. Message Sequence Charts in the software engineering process. In S.K. Chang, editor, Handbook of Software Engineering and Knowledge Engineering, pages 437-463. World Scientific Publishing Co., 2001.

[19]
S. Mauw and M.A. Reniers. A process algebra for Interworkings. In Jan A. Bergstra, Alban Ponse, and Scott A. Smolka, editors, Handbook of Process Algebra, pages 1269-1327. Elsevier, 2001.

[20]
J.C.M. Baeten and S. Mauw, editors. CONCUR'99, Proceedings of the 10th International Conference on Concurrency Theory. Lecture Notes in Computer Science 1664. Springer Verlag, Eindhoven, the Netherlands, August 24-27 1999.

[21]
ITU-TS. ITU-TS Recommendation Z.120 Annex B: Algebraic semantics of Message Sequence Charts. ITU-TS, Geneva, 1995.

[22]
S. Mauw and G.J. Veltink, editors. Algebraic specification of communication protocols. Cambridge Tracts in Theoretical Computer Science 36. Cambridge University Press, 1993.

[23]
S. Mauw. Process algebra as a tool for the specification and verification of CIM-architectures. In J.C.M. Baeten, editor, Applications of Process Algebra, Cambridge Tracts in Theoretical Computer Science 17, pages 53-80. Cambridge University Press, 1990.

[24]
S. Mauw. PSF - A process specification formalism. PhD thesis, Programming Research Group, University of Amsterdam, 1991.

Miscellaneous

[1]
Sergiu Bursuc, Ross Horne, Sjouke Mauw, and Semen Yurkov. Towards unlinkable smartcard-based payments: an extended abstract. In Workshop on Foundations of Computer Security (FCS'22), Haifa, Israel, 2022. Informal proceedings.

[2]
Theo D'Hondt, Sjouke Mauw, and Wim Van Petegem. Computer Science in The Netherlands - Reflections on the state of the art. QANU State-of-the-art report, Quality Assurance Netherlands Universities, 2020.

[3]
Jan Paredaens, Lex Bijlsma, Peter Boot, Koen De Bosschere, Jaap van den Herik, Sjouke Mauw, Sape Mullender, Bart Preneel, Wim Van Petegem, and Ruud Verbij. Informaticaonderwijs aan Nederlandse Universiteiten in 2013 - State of the Art. QANU State-of-the-art report, Quality Assurance Netherlands Universities, 2014.

[4]
X. Chen, C. Harpes, G. Lenzini, S. Mauw, and J. Pang. Location assurance and privacy in GNSS navigation. ERCIM News, 94:11, July 2013.

[5]
W. Jamroga, S. Mauw, and M. Melissen. Imperfect information and intention in non-repudiation protocols. In Grande Region Security and Reliability Day (SecDay'11), Trier, Germany, March 25 2011. Informal proceedings.

[6]
X. Chen, G. Lenzini, S. Mauw, and J. Pang. Hiding in groups: Anonymity-preserving electronic toll pricing. In Grande Region Security and Reliability Day (SecDay'11), Trier, Germany, March 25 2011. Informal proceedings.

[7]
Baptiste Alcalde, Eric Dubois, Sjouke Mauw, Nicolas Mayer, and Sasa Radomirovic. Towards a decision model based on trust and security risk management. In WISSec'08, 2009.

[8]
C.J.F. Cremers and S. Mauw. Generalizing Needham-Schroeder-Lowe for multi-party authentication. CS-Report 06/04, Department of Mathematics and Computing Science, Eindhoven University of Technology, 2006.

[9]
H.L. Jonker and S. Mauw. Core security requirements of DRM systems. CS-Report 05/24, Department of Mathematics and Computing Science, Eindhoven University of Technology, July 2005.

[10]
S. Mauw and M. Oostdijk. Attack trees: Door de bomen de bedreigingen zien. GvIB Informatiebeveiliging, 7(1):16-17, February 2006.

[11]
C.J.F. Cremers, S. Mauw, and E.P. de Vink. Formal methods for security protocols: Three examples of the black-box approach. NVTI newsletter, 7:21-32, 2003. Newsletter of the Dutch Association for Theoretical Computing Scientists.

[12]
J.C.M. Baeten, H.M.A. van Beek, and S. Mauw. Operational semantics of DiCons, a formal language for developing internet applications. CS-Report 01/12, Department of Mathematics and Computing Science, Eindhoven University of Technology, October 2001.

[13]
L.M.G. Feijs, N. Goga, S. Mauw, and T. Willemse. Proceedings 7e nederlandse testdag. Report 01/10, Department of Mathematics and Computing Science, Eindhoven University of Technology, 2001.

[14]
René de Vries, Jan Tretmans, Axel Belinfante, Jan Feenstra, Loe Feijs, Sjouke Mauw, Nicolae Goga, Lex Heerink, and Arjen de Heer. Côte de Resyste in PROGRESS. In Jean Pierre Veen, editor, PROGRESS 2000, Proc. Workshop on Embedded Systems, pages 141-148. Technology Foundation (STW), October 2000.

[15]
D. Bosnacki, S. Mauw, and T. Willemse. Proceedings of the first international symposium on visual formal methods VFM'99. Report 99/08, Department of Mathematics and Computing Science, Eindhoven University of Technology, 1999.

[16]
W. Janssen, S. Mauw, and J. Springintveld. Feasibility of model checking in the context of business processes using amber and spin. Testbed/wp4/n011/v001, Telematica Research Centre, 1997.

[17]
B. Knaack and S. Mauw. The usage of MSC with uBET-toolsupport in the software development process. In Network development Hans Uithol and support department, editors, International call processing symposium. Lucent Technologies, 1999.

[18]
A. Engels and S. Mauw. Why men (and octopuses) cannot juggle a four ball cascade. In Dat is dus heel interessant - Liber Amicorum voor Paul Klint, pages 109-115. Centre for Mathematics and Computer Science, November 1997.

[19]
S. Mauw and M.A. Reniers. Operational semantics for MSC'96. In A. Cavalli and D. Vincent, editors, SDL'97: Time for Testing - SDL, MSC and Trends, Tutorials of the Eighth SDL Forum, pages 135-152, Evry, France, September 1997.

[20]
S. Mauw and E.A. van der Meulen. Specification of tools for Message Sequence Charts. In ASF+SDF '95. Amsterdam, 1995.

[21]
S. Mauw and J.C. Mulder. A PSF library of data types. In ASF+SDF '95. Amsterdam, 1995.

[22]
S. Mauw and M.A. Reniers. Hierarchical MSC. SG10 meeting Geneva TD28, ITU-TS, September 1995.

[23]
S. Mauw and M.A. Reniers. Thoughts on the meaning of conditions. Experts meeting SG10, St. Petersburg TD9016, ITU-TS, 1995.

[24]
S. Mauw and H.T.G. Weffers. PSF'95 - proceedings of a seminar on current use and future developments of the process specification formalism. Technical report, Eindhoven University of Technology, Formal Methods Group, April 1995.

[25]
S. Mauw and M.A. Reniers. Modifications to requirements. Joint rapporteurs meeting SG10, Geneva TD9011, ITU-TS, 1994.

[26]
S. Mauw and M.A. Reniers. Formalization of static requirements for Message Sequence Charts. Joint rapporteurs meeting SG10, Geneva TD9010, ITU-TS, 1994.

[27]
S. Mauw. Formele specifikatie met PSF. Xootic magazine tijdschrift voor technische informatica, pages 19-21, april 1993.

[28]
S. Mauw and M.A. Reniers. A classification of Message Sequence Charts. Joint rapporteurs meeting SG10, Geneva TD9041, ITU-TS, 1993.

[29]
S. Mauw, M. van Wijk, and T. Winter. Syntax and semantics of synchronous Interworkings - informal semantics. Meeting SG10, Geneva, D.95-X/3, CCITT, 1992.

[30]
S. Mauw, M. van Wijk, and T. Winter. Syntax and semantics of synchronous Interworkings - formal semantics. Meeting SG10, Geneva, D.96-X/3, CCITT, 1992.

[31]
S. Mauw, M. van Wijk, and T. Winter. Syntax and semantics of synchronous Interworkings. Technical Report IST RWB-508-RE-92436, Philips, 1992.

[32]
S. Mauw and Gy. Max. A formal specification of the Ethernet protocol. Report P9007, Programming Research Group, University of Amsterdam, 1990.

[33]
H. Jacobsson and S. Mauw. A token ring network in PSFd. Report P8914, Programming Research Group, University of Amsterdam, 1989.

[34]
S. Mauw and G.J. Veltink. A tool interface language for PSF. Report P8912, Programming Research Group, University of Amsterdam, 1989.