Publications

Note: some of the work was published in offical proceedings. For these works the final version can be found at the official publisher's website. In these cases, a preliminary version is supplied below.

Published in 2017

Journal Articles

  1. Reviving the two-state Markov chain approach. A. Mizera, J. Pang and Q. Yuan. IEEE⁄ACM Transactions on Computational Biology and Bioinformatics (special issue of APBC 2017), xx:xx-xx, 2017. bib ]
  2. Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph. M. Lemanska, J. Rodríguez-Velázquez and R. Trujillo-Rasua. Fundam. Inform., 152(3):273–287, 2017. bib | preprint | DOI ]
  3. The Simultaneous Local Metric Dimension of Graph Families. G.A. Barragán-Ramírez, A. Estrada-Moreno, Y. Ramírez-Cruz and J.A. Rodríguez-Velázquez. Symmetry, 9(8), 2017. bib | DOI ]

Conference Proceedings

  1. Refinement-Aware Generation of Attack Trees. O. Gadyatskaya, R. Jhawar, S. Mauw, R. Trujillo-Rasua and T.A.C. Willemse. In Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, pp. 164–179, 2017. bib | preprint | DOI ]
  2. Towards Formal Security Analysis of Industrial Control Systems. M. Rocchetto and N. Tippenhauer. In Proc. ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2017. bib ]

Published in 2016

Edited Proceedings

  1. Proceedings of the 10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016), Darmstadt, Germany, July 18-22, 2016. S. Habib, J. Vassileva, S. Mauw and M. Mühlhäuser, editors. IFIP Advances in Information and Communication Technology 473, 2016. bib | preprint ]
  2. Proceedings of the Second International Workshop on Graphical Models for Security (GraMSec 2015), Verona, Italy, July 13, 2015. S. Mauw, B. Kordy and S. Jajodia, editors. Lecture Notes in Computer Science 9390, 2016. bib | preprint ]

Journal Articles

  1. Chemometric analysis of attenuated total reflectance infrared spectra of \emphProteus mirabilis strains with defined structures of LPS.. P. \.Zarnowiec, A. Mizera, M. Chrapek, M. Urbaniak and W. Kaca. Innate Immunity, 22(5):325–335, 2016. bib ]
  2. Characterizing 1-metric antidimensional trees and unicyclic graphs. R. Trujillo-Rasua and I.G. Yero. The Computer Journal, 2016. bib ]
  3. k-Metric antidimension: A privacy measure for social graphs. R. Trujillo-Rasua and I. Yero. Inf. Sci., 328:403 – 417, 2016. bib ]
  4. Preface: Selected and extended papers from ACM SVT 2014. J. Pang and M. Stoelinga. Science of Computer Programming, 123:1, 2016. bib ]
  5. Editorial (ICFEM 14 special issue, part II). S. Merz, J. Pang and J.S. Dong. Formal Aspects of Computing, 28(5):723-724, 2016. bib ]
  6. Editorial (ICFEM 14 special issue, part I). S. Merz, J. Pang and J.S. Dong. Formal Aspects of Computing, 28(3):343-344, 2016. bib ]
  7. Improving BDD-based attractor detection for synchronous Boolean networks. Q. Yuan, H. Qu, J. Pang and A. Mizera. SCIENCE CHINA Information Sciences, 59: 080101, 2016. bib | DOI ]

Conference Proceedings

  1. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. R. Jhawar, K. Lounis and S. Mauw. In Proc. 12th Workshop on Security and Trust Management (STM’16), Springer-Verlag, Lecture Notes in Computer Science 9871, pp. 138–153, 2016. bib ]
  2. Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. G. Lenzini, S. Mauw and S. Ouchani. In Proc. 12th Workshop on Security and Trust Management (STM’16), Springer-Verlag, Lecture Notes in Computer Science 9871, pp. 170–178, 2016. bib ]
  3. Optimality Results on the Security of Lookup-Based Protocols. S. Mauw, J. Toro-Pozo and R. Trujillo-Rasua. In Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers, pp. 137–150, 2016. bib | DOI ]
  4. A Topological Categorization of Agents for the Definition of Attack States in Multi-Agent Systems. K. Santacà, M. Cristani, M. Rocchetto and L. Viganò. In At the 14th European Conference on Multi-Agent Systems (EUMAS 2016), Spain, December 15, December 16, 2016, 2016. bib ]
  5. CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. M. Rocchetto and N. Tippenhauer. In At the 18th Conference on Formal Engineering Methods (ICFEM 2016), Japan, November 14, November 18, 2016, 2016. bib ]
  6. Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study. M. Fraile, M. Ford, O. Gadyatskaya, R. Kumar, M. Stoelinga and R. Trujillo-Rasua. In At the 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM) 8 - 10 November, 2016, Skövde, Sweden, 2016. bib | preprint ]
  7. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0. O. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw and R. Trujillo-Rasua. In Proc. 13th International Conference on Quantitative Evaluation of SysTems (QEST’16), Springer Verlag, LNCS 9826, pp. 159–162, 2016. bib | preprint ]
  8. The Fréchet⁄Manhattan distance and the trajectory anonymisation problem. C. Torres and R. Trujillo-Rasua. In 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec’16), Trento, Italy, July 18-21, 2016, 2016. bib | preprint ]
  9. Counteracting active attacks in social network graphs. S. Mauw, R. Trujillo-Rasua and B. Xuan. In Proc. 13th Annual IFIP WGII.3 Working Conference on Data and Applications Security and Privacy (DBSec’16), Springer-Verlag, LNCS 9766, pp. 233–248, 2016. bib | preprint ]
  10. Automating Cyber Defence Responses using Attack-Defense Trees and Game Theory. R. Jhawar, S. Mauw and I. Zakiuddin. In Proc. 15th European Conference on Cyber Warfare and Security (ECCWS’16), ACPI, pp. 163–172, 2016. bib ]
  11. Man-in-the-middle attacks evolved... but our security models didn’t. H. Jonker, S. Mauw and R. Trujillo-Rasua. In Proc. 24th Security Protocols Workshop, Springer-Verlag, LNCS, 2016. bib | preprint ]
  12. A class of precomputation-based distance-bounding protocols. S. Mauw, J. Toro-Pozo and R. Trujillo-Rasua. In Proc. 1st IEEE European Symposium on Security and Privacy (EuroS&P’16), IEEE, pp. 97–111, 2016. bib | preprint ]
  13. Modeling city locations as complex networks: An initial study. Z. Zhou, Y. Zhang, J. Pang and C.-T. Li. In Proc. 5th International Workshop on Complex Networks and their Applications (CNA’16), Springer-Verlag, Studies in Computational Intelligence Series 693, pp. 735-747, 2016. bib ]
  14. An empirical study on user access control in online social networks. H.W. M. Ni, Y. Zhang and J. Pang. In Proc. 21st ACM Symposium on Access Control Models and Technologies (SACMAT’16), ACM Press, pp. 13-23, 2016. bib ]
  15. A novel approach to parameterized verificationof cache coherence protocols. Y. Li, K. Duan, Y. Lv, J. Pang and S. Cai. In Proc. 34th IEEE International Conference on Computer Design (ICCD’16), IEEE Computer Society, pp. 560-567, 2016. bib ]
  16. On impact of weather on human mobility in cities. J. Pang, P. Zablotskaia and Y. Zhang. In Proc. 17th International Conference on Web Information System Engineering (WISE’16), Springer-Verlag, Lecture Notes in Computer Science 10042, pp. 247-256, 2016. bib ]
  17. Parallel Approximate Steady-state Analysis of Large Probabilistic Boolean Networks. A. Mizera, J. Pang and Q. Yuan. In Proc. 31st Annual ACM Symposium on Applied Computing (SAC’16), ACM, pp. 1-8, 2016. bib ]
  18. Fast simulation of probabilistic Boolean networks. A. Mizera, J. Pang and Q. Yuan. In Proc. 14th International Conference on Computational Methods in Systems Biology (CMSB’16), Springer-Verlag, Lecture Notes in Computer Science 9859, pp. 216–231, 2016. bib ]
  19. GPU-accelerated steady-state computation of large probabilistic Boolean networks. A. Mizera, J. Pang and Q. Yuan. In Proc. 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA’16), Springer-Verlag, Lecture Notes in Computer Science 9984, pp. 50–66, 2016. bib ]
  20. ASSA-PBN 2.0: A software tool for probabilistic Boolean networks. A. Mizera, J. Pang and Q. Yuan. In Proc. 14th International Conference on Computational Methods in Systems Biology (CMSB’16), Springer-Verlag, Lecture Notes in Computer Science 9859, pp. 309–315, 2016. bib ]
  21. Evaluation of Resource-based App Repackaging Detection in Android. O. Gadyatskaya, A.-L. Lezza and Y. Zhauniarovich. In Proc. of NordSec, Springer, LNCS 10014, 2016. bib ]
  22. Small changes, big changes: An updated view on the Android permission system. Y. Zhauniarovich and O. Gadyatskaya. In Proc. of RAID, Springer, LNCS 9854, pp. 346-367, 2016. bib ]
  23. Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees. O. Gadyatskaya, C. Harpes, S. Mauw, C. Muller and S. Muller. In Proc. 3rd International Workshop on Graphical Model for Security (GraMSec’16), Springer Verlag, LNCS 9987, pp. 80–93, 2016. bib ]
  24. Towards Empirical Evaluation of Automated Risk Assessment Methods. O. Gadyatskaya, K. Labunets and F. Paci. In Proc. of CRiSIS, Springer, 2016. bib ]
  25. Modelling Attack-defense Trees Using Timed Automata. O. Gadyatskaya, R.R. Hansen, K.G. Larsen, A. Legay, M.C. Olesen and D.B. Poulsen. In Proc. of FORMATS, Springer, LNCS 9884, pp. 35-50, 2016. bib ]

Published in 2015

Book Chapters

  1. Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach. R. Trujillo-Rasua and J. Domingo-Ferrer. In Advanced Research in Data Privacy, pp. 197–214, 2015. bib ]

Edited Proceedings

  1. Proceedings of the 4th International Workshop on Engineering Safety and Security Systems. J. Pang, Y. Liu and S. Mauw, editors. EPTCS 184, 2015. bib | from publisher ]

Journal Articles

  1. Security analysis of socio-technical physical systems. G. Lenzini, S. Mauw and S. Ouchani. Computers and Electrical Engineering, 47:258–274, 2015. bib ]
  2. A new access control scheme for Facebook-style social networks. J. Pang and Y. Zhang. Computers & Security, 54():44-59, 2015. bib | preprint ]
  3. Formalizing provable anonymity in Isabelle⁄HOL. Y. Li and J. Pang. Formal Aspects of Computing, 27(2):255-282, 2015. bib | preprint ]
  4. Comparing distance bounding protocols: A critical mission supported by decision theory. G. Avoine, S. Mauw and R. Trujillo-Rasua. Computer Communications, 67:92–102, 2015. bib ]

Conference Proceedings

  1. FP-Block: usable web privacy by controlling browser fingerprinting. C. Torres, H. Jonker and S. Mauw. In Proc. 20th European Symposium On Research In Computer Security (ESORICS’15), Part II, Springer-Verlag, Lecture Notes in Computer Science 9327, pp. 3–19, 2015. bib ]
  2. Improving BDD-based attractor detection for synchronous Boolean networks. H. Qu, Q. Yuan, J. Pang and A. Mizera. In Proc. 7th Asia-Pacific Symposium on Internetware (Internetware’15), ACM Press, pp. xx-xx (to appear), 2015. bib | preprint ]
  3. Location prediction: Communities speak louder than friends. J. Pang and Y. Zhang. In Proc. 3rd ACM Conference on Online Social Networks (COSN’15), ACM Press, pp. 161-171, 2015. bib | preprint ]
  4. ASSA-PBN: An approximate steady-state analyser for probabilistic Boolean networks. A. Mizera, J. Pang and Q. Yuan. In Proc. 13th International Symposium on Automated Technology for Verification and Analysis (ATVA’15), Springer-Verlag, Lecture Notes in Computer Science 9364, pp. 214-220, 2015. bib | preprint ]
  5. paraVerifier: An automatic framework for proving parameterized cache coherence protocols. Y. Li, J. Pang, Y. Lv, D. Fan, S. Cao, and K. Duan. In Proc. 13th International Symposium on Automated Technology for Verification and Analysis (ATVA’15), Springer-Verlag, Lecture Notes in Computer Science 9364, pp. 207-213, 2015. bib | preprint ]
  6. Activity tracking: A new attack on location privacy. X. Chen, A. Mizera and J. Pang. In Proc. 3rd IEEE Conference on Communications and Network Security (CNS’15), IEEE Computer Society, pp. 22-30, 2015. bib | preprint ]
  7. Cryptographic protocols for enforcing relationship-based access control policies. J. Pang and Y. Zhang. In Proc. 39th Annual IEEE Computers, Software & Applications Conference (COMPSAC’15), IEEE Computer Society, pp. 484-493, 2015. bib | preprint ]
  8. Event prediction with community leaders. J. Pang and Y. Zhang. In Proc. 10th Conference on Availability, Reliability and Security (ARES’15), IEEE Computer Society, pp. 238-243, 2015. bib | preprint ]
  9. Inferring friendship from check-in data of location-based social networks. R. Cheng, J. Pang and Y. Zhang. In Proc. 5th Workshop on Social Network Analysis in Applications (SNAA’15) (as part of 7th IEEE⁄ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’15)), ACM Press, pp. 1284-1291, 2015. bib | preprint ]
  10. Community-driven social influence analysis and applications. Y. Zhang and J. Pang. In Proc. Porc. 15th International Conference on Web Engineering (PhD Symposium) (ICWE’15), Springer-Verlag, Lecture Notes in Computer Science 9114, pp. 644-647, 2015. bib | preprint ]
  11. A logical approach to restricting access in online social networks. M. Cramer, J. Pang and Y. Zhang. In Proc. 20th ACM Symposium on Access Control Models and Technologies (SACMAT’15), ACM Press, pp. 75-86, 2015. bib | preprint ]
  12. Exploring communities for effective location prediction. J. Pang and Y. Zhang. In Proc. 24th World Wide Web Conference (Companion Volume) (WWW’15), ACM Press, pp. 87-88, 2015. bib | preprint ]
  13. Attack trees with sequential conjunction. R. Jhawar, B. Kordy, S. Mauw, S. Radomirović and R. Trujillo-Rasua. In Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIPSec’15), Springer-Verlag, IFIP AICT 455, pp. 339–353, 2015. bib ]
  14. Location-private interstellar communication. H. Jonker, S. Mauw and S. Radomirović. In Proc. 23rd Security Protocols Workshop, Springer-Verlag, LNCS 9379, pp. 105–115, 2015. bib ]
  15. Location-private interstellar communication (Transcript of Discussion). S. Mauw. In Proc. 23rd Security Protocols Workshop, Springer-Verlag, LNCS 9379, pp. 116–125, 2015. bib ]
  16. Generalizing multi-party contract signing. S. Mauw and S. Radomirović. In Proc. 4th Conference on Principles of Security and Trust (POST’15), Springer Verlag, LNCS 9036, pp. 156–175, 2015. bib ]
  17. StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. Y. Zhauniarovich, M. Ahmad, O. Gadyatskaya, B. Crispo and F. Massacci. In Proceedings of ACM CODASPY’2015, ACM, 2015. bib ]
  18. Towards Black Box Testing of Android Apps. Y. Zhauniarovich, A. Philippov, O. Gadyatskaya, B. Crispo and F. Massacci. In Proc. of Software Assurance Workshop at the 10th International Conference on Availability, Reliability and Security (ARES), pp. 501–510, 2015. bib ]

Published in 2014

Edited Proceedings

  1. Proceedings of the 10th International Workshop on Security and Trust Management (STM 2014), Wroclaw, Poland, September 10-11, 2014. S. Mauw and C. Jensen, editors. Lecture Notes in Computer Science 8743, 2014. bib ]
  2. Proceedings of the 16th International Conference on Formal Engineering Methods. S. Merz and J. Pang, editors. Lecture Notes in Computer Science 8229, 2014. bib | from publisher ]
  3. Proceedings of the 3rd International Workshop on Engineering Safety and Security Systems. J. Pang and Y. Liu, editors. EPTCS 150, 2014. bib | from publisher ]
  4. Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014. B. Kordy, S. Mauw and W. Pieters, editors. EPTCS 148, 2014. bib | from publisher ]

Journal Articles

  1. Special issue on software verification and testing. M.R. Mousavi and J. Pang. Science of Computer Programming, 95(3):273-274, 2014. bib | preprint ]
  2. Attacks Generation by Detecting Attack Surfaces. S. Ouchani and G. Lenzini. Procedia Computer Science, 32(0):529 - 536, 2014. bib ]
  3. Constructing and comparing user mobility profiles. X. Chen, J. Pang and R. Xue. ACM Transactions on the Web, 8(4):article 21, 2014. bib | preprint ]
  4. Distance Bounding Facing Both Mafia and Distance Frauds. R. Trujillo-Rasua, B. Martin and G. Avoine. IEEE Transactions on Wireless Communications, 13(10):5690–5698, 2014. bib ]
  5. optPBN: an optimisation toolbox for probabilistic Boolean networks. P. Trairatphisan, A. Mizera, J. Pang, A.-A. Tantar and T. Sauter. PLOS ONE, 9(7):e98001, 2014. bib | preprint ]
  6. Preface: Foundational aspects of security. K. Chatzikokolakis, S.A. Mödersheim, C. Palamidessi and J. Pang. Journal of Computer Security, 22(2):201-202, 2014. bib | preprint ]
  7. Protecting query privacy in location-based services. X. Chen and J. Pang. GeoInformatica, 18(1):95-133, 2014. bib | preprint ]
  8. Model Checking with Fairness Assumptions using PAT. Y. Si, J. Sun, Y. Liu, J.S. Dong, J. Pang, S. Zhang and X. Yang. Frontiers of Computer Science, 8(1):1-16, 2014. bib | preprint ]
  9. Attack–Defense Trees. B. Kordy, S. Mauw, S. Radomirović and P. Schweitzer. Journal of Logic and Computation, 24(1):55-87, 2014. bib | preprint | DOI ]

Conference Proceedings

  1. On robustness of trust systems. Z. Jie, Y. Liu, S. Mauw and T. Muller. In Proc. 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM’14), IFIP, pp. 44–60, 2014. bib ]
  2. Secure Auctions Without Cryptography. J. Dreier, H.L. Jonker and P. Lafourcade. In Proc. 7th conference on Fun with Algorithms (FUN’14), Springer, LNCS 8496, pp. 158-170, 2014. bib | preprint | DOI ]
  3. Dynamic analysis of usage control policies. Y. Elrahaiby and J. Pang. In Proc. 11th Conference on Security and Cryptography (SECRYPT’14), SciTePress, pp. 88-100, 2014. bib | preprint ]
  4. MinUS: Mining user similarity with trajectory patterns. X. Chen, P. Kordy, R. Lv and J. Pang. In Proc. 7th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML⁄PKDD’14), Springer-Verlag, Lecture Notes in Computer Science 8726, pp. 436-439, 2014. bib | preprint ]
  5. A new access control scheme for Facebook-style social networks. J. Pang and Y. Zhang. In Proc. 9th Conference on Availability, Reliability and Security (ARES’14), IEEE Computer Society, pp. 1-10, 2014. bib | preprint ]
  6. Measuring user similarity with trajectory patterns: Principles and new metrics. X. Chen, R. Lv, X. Ma and J. Pang. In Proc. 16th Asia-Pacific Web Conference (APWeb’14), Springer-Verlag, Lecture Notes in Computer Science 8709, pp. 437-448, 2014. bib | preprint ]
  7. Model-checking based approaches to parameter estimation of gene regulatory networks. A. Mizera, J. Pang and Q. Yuan. In Proc. 19th IEEE Conference on Engineering of Complex Computer Systems (ICECCS’14), IEEE Computer Society, pp. 206-209, 2014. bib | preprint ]
  8. Symbolic analysis of an electric vehicle charging protocol. L. Li, J. Pang, Y. Liu, J. Sun and J.S. Dong. In Proc. 19th IEEE Conference on Engineering of Complex Computer Systems (ICECCS’14), IEEE Computer Society, pp. 11-18, 2014. bib | preprint ]
  9. A Probabilistic Framework for Security Scenarios with Dependent Actions. B. Kordy, M. Pouly and P. Schweitzer. In Integrated Formal Methods (iFM 2014), Springer International Publishing Switzerland, LNCS 8739, pp. 256-271, 2014. bib ]
  10. A strand space approach to provable anonymity. Y. Li and J. Pang. In Proc. 2nd Workshop on Formal Techniques for Safety-Critical Systems (FTSCS’13), Springer-Verlag, Communications in Computer and Information Science 419, pp. 71-87, 2014. bib | preprint ]
  11. A symbolic algorithm for the analysis of robust timed automata. P. Kordy, R. Langerak, S. Mauw and J. Polderman. In Proc. 19th International Symposium on Formal Methods (FM’14), Springer Verlag, LNCS 8442, pp. 351-366, 2014. bib ]
  12. FSquaDRA: Fast Detection of Repackaged Applications. Y. Zhauniarovich, O. Gadyatskaya, B. Crispo, L.F. Spina and E. Moser. In Proceedings of 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec’2014), Springer, LNCS 8566, pp. 130-145, 2014. bib ]

Technical Reports

  1. Informaticaonderwijs aan Nederlandse Universiteiten in 2013 - State of the Art. J. Paredaens, L. Bijlsma, P. Boot, K. Bosschere, J. van den Herik, S. Mauw, S. Mullender, B. Preneel, W. Petegem and R. Verbij. Technical report, Quality Assurance Netherlands Universities, 2014. bib ]

Published in 2013

Journal Articles

  1. Location assurance and privacy in GNSS navigation. X. Chen, C. Harpes, G. Lenzini, S. Mauw and J. Pang. ERCIM News, (94):11, 2013. bib ]
  2. Detecting Meaconing Attacks by analysing the Clock Bias of GNSS Receivers. D. Marnach, S. Mauw, M. Martins and C. Harpes. Artificial Satellites, Journal of Planetary Geodesy, 48(2):63–84, 2013. bib ]
  3. Special issue: Software verification and testing. M.R. Mousavi and J. Pang. Innovations in Systems and Software Engineering, 9(2):57-58, 2013. bib | preprint ]
  4. Privacy and verifiability in voting systems: Methods, developments and trends. H.L. Jonker, S. Mauw and J. Pang. Computer Science Review, 10:1-30, 2013. bib | preprint ]
  5. Attack–Defense Trees. B. Kordy, S. Mauw, S. Radomirović and P. Schweitzer. Journal of Logic and Computation, 2013. bib | preprint | DOI ]
  6. Recent development and biomedical applications of probabilistic Boolean networks. P. Trairatphisan, A. Mizera, J. Pang, A.-A. Tantar, J. Schneider and T. Sauter. Cell Communication and Signaling, 11:46, 2013. bib | preprint ]
  7. An inductive approach to strand spaces. Y. Li and J. Pang. Formal Aspects of Computing, 25(4):465-501, 2013. bib | preprint ]
  8. Design and formal verification of a certified email protocol with transparent TTP. Z. Liu, J. Pang and C. Zhang. Frontiers of Computer Science, 7(2):279-297, 2013. bib | preprint ]
  9. Design and formal analysis of a group signature based electronic toll pricing system. X. Chen, G. Lenzini, S. Mauw and J. Pang. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4(1):55-75, 2013. bib | preprint ]

Conference Proceedings

  1. Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding. R. Trujillo-Rasua. In Mobile and Ubiquitous Systems: Computing, Networking, and Services - 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013, pp. 289–302, 2013. bib ]
  2. Editorial message: Special track on software verification and testing. J. Pang and M.R. Mousavi. In Proc. 28th Symposium on Applied Computing (SAC’13), ACM Press, pp. 1186–1187, 2013. bib ]
  3. Modeling the German Legal Latitude Principles for Internet Voting Systems. S. Neumann, A. Kahlert, M. Henning, H. Jonker and M. Volkamer. In Proc. 5th conference on eParticipation (ePart 2013), Springer-Verlag, LNCS 8075, pp. 49-56, 2013. bib | preprint | from publisher ]
  4. Defining Verifiability in e-Auction Protocols. J. Dreier, H.L. Jonker and P. Lafourcade. In Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), ACM, pp. 547-552, 2013. bib | preprint | from publisher ]
  5. Verifiability in e-Auction protocols & Brandt’s protocol revisited. J. Dreier, J.-G. Dumas, H.L. Jonker and P. Lafourcade. In 1st Workshop on Hot Issues in Security Principles and Trust (HOTSPOT 2013), 2013. bib | preprint | from publisher ]
  6. DEMO: Demonstrating a trust framework for evaluating GNSS signal integrity. X. Chen, C. Harpes, G. Lenzini, M. Martins, S. Mauw and J. Pang. In Proc. 20th ACM Conference on Computer and Communications Security (CCS’13), ACM Press, pp. 1329-1332, 2013. bib | preprint ]
  7. Verification of functional and non-functional requirements of web service composition. M. Chen, T.H. Tan, J. Sun, Y. Liu, J. Pang and X. Li. In Proc. 15th Conference on Formal Engineering Methods (ICFEM’13), Springer-Verlag, Lecture Notes in Computer Science 8144, pp. 313-328, 2013. bib | preprint ]
  8. A balancing act: Parameter estimation for biological models with steady-state measurements. A. Mizera, J. Pang, T. Sauter and P. Trairatphisan. In Proc. 11th Conference on Computational Methods in Systems Biology (CMSB’13), Springer-Verlag, Lecture Notes in Bioinformatics 8130, pp. 253-254, 2013. bib | preprint ]
  9. ADTool: Security Analysis with Attack–Defense Trees. B. Kordy, P. Kordy, S. Mauw and P. Schweitzer. In QEST, Springer, LNCS 8054, pp. 173-176, 2013. bib | from publisher ]
  10. Quantitative Questions on Attack–Defense Trees. B. Kordy, S. Mauw and P. Schweitzer. In ICISC, Springer, LNCS 7839, pp. 49–64, 2013. bib ]
  11. Unterstützung der juristisch-informatischen Kommunikation im Hinblick auf elektronische Wahlprotokolle. S. Neumann, A. Kahlert, M. Henning, H. Jonker and M. Volkamer. In Proc. 16. Internationales Rechtsinformatik Symposion (IRIS2013), Oesterreichische Computer Gesellschaft, 2013. bib | from publisher ]
  12. A Formal Derivation of Composite Trust. T. Muller and P. Schweitzer. In Foundations and Practice of Security - 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers, Springer, LNCS 7743, pp. 132-148, 2013. bib ]
  13. Enforcing privacy in the presence of others: Notions, formalisations and relations. N. Dong, H.L. Jonker and J. Pang. In Proc. 18th European Symposium on Research in Computer Security (ESORICS’13), Springer-Verlag, Lecture Notes in Computer Science 8134, pp. 499-516, 2013. bib | preprint ]
  14. A trust framework for evaluating GNSS signal integrity. X. Chen, G. Lenzini, M. Martins, S. Mauw and J. Pang. In Proc. 26th IEEE Computer Security Foundations Symposium (CSF’13), IEEE Computer Society, pp. 179-192, 2013. bib | preprint ]
  15. Mathematical modelling of the Platelet-Derived Growth Factor (PDGF) signalling pathway. A. Mizera, J. Pang, T. Sauter and P. Trairatphisan. In Proc. 4th Workshop on Computational Models for Cell Processes (CompMod’13), Electronic Proceedings in Theoretical Computer Science 116, pp. 35, 2013. bib | preprint ]
  16. Constructing and comparing user mobility profiles for location-based services. X. Chen, J. Pang and R. Xue. In Proc. 28th ACM Symposium on Applied Computing (SAC’13), ACM, pp. 261-266, 2013. bib | preprint ]
  17. Exploring dependency for query privacy protection in location-based services. X. Chen and J. Pang. In Proc. 3rd ACM Conference on Data and Application Security and Privacy (CODASPY’13), ACM, pp. 37-47, 2013. bib | preprint ]
  18. Post-hoc analysis of user traceability in electronic toll collection systems. X. Chen, D. Fonkwe and J. Pang. In Proc. 7th Workshop on Data Privacy Management (DPM’12), Springer-Verlag, Lecture Notes in Computer Science 7731, pp. 29-42, 2013. bib | preprint ]
  19. Incentives and Rationality in Security of Interaction Protocols. W. Jamroga, M. Melissen and H. Schnoor. In PRIMA 2013: Principles and Practice of Multi-Agent Systems. Proceedings, 2013. bib ]
  20. Logic of Negation-Complete Interactive Proofs (Formal Theory of Epistemic Deciders). S. Kramer. In Proc. 6th Workshop on Intuitionistic Modal Logic and Applications, Electronic Notes in Theoretical Computer Science 300, pp. 47-70, 2013. bib ]

PhD Theses

  1. Attack–Defense Trees. . Schweitzer. PhD thesis, University of Luxembourg, 2013. bib ]
  2. Enforced Privacy: from Practice to Theory. . Dong. PhD thesis, University of Luxembourg, 2013. bib ]
  3. A Formal Analysis of Trust Operations: Trust Aggregation, Trust Chaining and Logical Trust Operations. . Muller. PhD thesis, University of Luxembourg, 2013. bib ]
  4. Game-theory and Logic for Non-repudiation Protocols and Attack Analysis. . Melissen. PhD thesis, University of Luxembourg, 2013. bib ]

Published in 2012

Books

  1. Operational Semantics and Verification of Security Protocols. C. Cremers and S. Mauw. Springer-Verlag, , 2012. bib ]

Book Chapters

  1. Specification and Verification of Multi-Agent Systems. W. Jamroga and W. Penczek. In Lectures on Logic and Computation, Springer, LNCSpp. 210–263, 2012. bib ]
  2. Computational methods for quantitative submodel comparison. A. Mizera, E. Czeizler and I. Petre. In Biomolecular Information Processing. From Logic Systems to Smart Sensors and Actuators, Wiley-VCH Verlag GmbH, pp. 323–346, 2012. bib ]
  3. Location-Based Services: Privacy, Security and Assurance. H.L. Jonker, S. Mauw and J. Pang. In Digital Enlightenment Yearbook 2012, IOS Press, pp. 235–244, 2012. bib | preprint ]

Edited Proceedings

  1. Proceedings of the 5th Workshop on Logical Aspects of Multi-Agent Systems LAMAS’2012. V. Goranko and W. Jamroga, editors. 2012. bib ]

Journal Articles

  1. Input Online Review Data and Related Bias in Recommender Systems. S. Piramuthu, G. Kapoor, W. Zhou and S. Mauw. Decision Support Systems, 53(3):418–424, 2012. bib ]
  2. Strategic Games and Truly Playable Effectivity Functions. V. Goranko, W. Jamroga and P. Turrini. Journal of Autonomous Agents and Multi-Agent Systems, 2012. bib ]
  3. Quantitative analysis of the self-assembly strategies of intermediate filaments from tetrameric vimentin. E. Czeizler, A. Mizera, E. Czeizler, R.-J. Back, J.E. Eriksson and I. Petre. IEEE⁄ACM Transactions on Computational Biology and Bioinformatics, 9(3):885–898, 2012. bib ]
  4. Self-assembly models of variable resolution. A. Mizera, E. Czeizler and I. Petre. Transactions on Computational Systems Biology, 7625:181–203, 2012. bib ]
  5. A trust-augmented voting scheme for collaborative privacy management. Y. Sun, C. Zhang, J. Pang, B. Alcalde and S. Mauw. Journal of Computer Security, 20(4):437–459, 2012. bib | preprint ]
  6. Probabilistic model checking of the PDGF signaling pathway. Q. Yuan, P. Trairatphisan, J. Pang, S. Mauw, M. Wiesinger and T. Sauter. Transactions on Computational Systems Biology, 7625:151–180, 2012. bib | preprint ]
  7. Game-based verification of contract signing protocols with minimal messages. Y. Zhang, C. Zhang, J. Pang and S. Mauw. Innovations in Systems and Software Engineering, 8(2):111–124, 2012. bib | preprint ]
  8. Attribute Decoration of Attack–Defense Trees. A. Bagnato, B. Kordy, P. Meland and P. Schweitzer. International Journal of Secure Software Engineering (IJSSE), 3(2):1–35, 2012. bib | DOI ]

Conference Proceedings

  1. Detecting Meaconing Attacks by analysing the Clock Bias of GNSS Receivers. D. Marnach, S. Mauw, M. Martins and C. Harpes. In European Navigation Conference (ENC 2012), 2012. bib ]
  2. Constructing Optimistic Multi-party Contract Signing Protocols. B. Kordy and S. Radomirović. In Computer Security Foundations (CSF 2012), IEEE, pp. 215-229, 2012. bib ]
  3. Concepts, Agents, and Coalitions in Alternating Time. W. Jamroga. In Proceedings of ECAI, IOS Press, pp. 438–443, 2012. bib ]
  4. State and Path Effectivity Models for Logics of Multi-Player Games. V. Goranko and W. Jamroga. In Proceedings of AAMAS, pp. 1123–1130, 2012. bib ]
  5. Distance-Based Rules for Weighted Judgment Aggregation (Extended Abstract). M. Slavkovik and W. Jamroga. In Proceedings of AAMAS, pp. 1405-1406, 2012. bib ]
  6. Fairness in Non-Repudiation Protocols. W. Jamroga, S. Mauw and M. Melissen. In Proceedings of the 7th International Workshop on Security and Trust Management (STM 2011), Springer, LNCS 7170, pp. 122–139, 2012. bib | preprint ]
  7. A group signature based electronic toll pricing system. X. Chen, G. Lenzini, S. Mauw and J. Pang. In Proc. 7th Conference on Availability, Reliability and Security (ARES’12), IEEE Computer Society, pp. 85–93, 2012. bib | preprint ]
  8. Comparative analysis of clustering protocols with probabilistic model checking. Q. Li, P. Schaffer, J. Pang and S. Mauw. In Proc. 6th IEEE Symposium on Theoretical Aspects of Software Engineering (TASE’12), IEEE Computer Society, pp. 249–252, 2012. bib | preprint ]
  9. Measuring query privacy in location-based services. X. Chen and J. Pang. In Proc. 2nd ACM Conference on Data and Application Security and Privacy (CODASPY’12), ACM, pp. 49–60, 2012. bib | preprint ]
  10. An algorithm for probabilistic alternating simulation. C. Zhang and J. Pang. In Proc. 38th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM’12), Springer-Verlag, Lecture Notes in Computer Science 7147, pp. 431–442, 2012. bib | preprint ]
  11. Formal analysis of privacy in an eHealth protocol. N. Dong, H.L. Jonker and J. Pang. In Proc. 17th European Symposium on Research in Computer Security (ESORICS’12), Springer-Verlag, LNCS 7459, pp. 325–342, 2012. bib | from publisher ]
  12. Random Block Verification: Improving the Norwegian Electoral Mix Net. D. Demirel, H. Jonker and M. Volkamer. In EVOTE 2012, Gesellschaft für Informatik, Lecture Notes in Informatics 205, pp. 65–78, 2012. bib | preprint ]
  13. Insider attacks and privacy of RFID protocols. T. van Deursen and S. Radomirović. In EuroPKI, Springer, LNCS 7163, pp. 91–105, 2012. bib ]
  14. Computational Aspects of Attack–Defense Trees. B. Kordy, M. Pouly and P. Schweitzer. In Security & Intelligent Information Systems, Springer, LNCS 7053, pp. 103–116, 2012. bib | preprint ]
  15. Challenges in eHealth: from enabling to enforcing privacy. N. Dong, H.L. Jonker and J. Pang. In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (FHIES’11), Springer-Verlag, LNCS 7151, pp. 195–206, 2012. bib ]

Technical Reports

  1. Quantitative Questions on Attack-Defense Trees. B. Kordy, S. Mauw and P. Schweitzer. Technical report, University of Luxembourg, 2012. bib | from publisher ]
  2. A Logic of Interactive Proofs. S. Kramer. Technical report, University of Luxembourg, 2012. bib ]
  3. Logic of Negation-Complete Interactive Proofs (Formal Theory of Epistemic Deciders). S. Kramer. Technical report, University of Luxembourg, 2012. bib ]
  4. Logic of Non-Monotonic Interactive Proofs (Formal Theory of Temporary Knowledge Transfer). S. Kramer. Technical report, University of Luxembourg, 2012. bib ]
  5. Parametric Constructive Kripke-Semantics for Standard Multi-Agent Belief and Knowledge (Knowledge As Unbiased Belief). S. Kramer and J. Sack. Technical report, University of Luxembourg, 2012. bib ]

Miscellaneous

  1. Editorial message: Special track on software verification and testing. J. Pang and M.R. Mousavi. 2012. bib ]

Published in 2011

Edited Proceedings

  1. M4M’2011 and LAMAS’2011. H. van Ditmarsch, D. Fernández Duque, V. Goranko, W. Jamroga and M. Ojeda-Aciego, editors. Electronic Notes in Theoretical Computer Science 278, 2011. bib ]

Journal Articles

  1. Fast leader election in anonymous rings with bounded expected delay. R. Bakhshi, J. Endrullis, W.J. Fokkink and J. Pang. Information Processing Letters, 111(17):864–870, 2011. bib ]

Conference Proceedings

  1. Alternating Epistemic Mu-Calculus. N. Bulling and W. Jamroga. In Proceedings of IJCAI-11, pp. 109–114, 2011. bib ]
  2. Strategic Games and Truly Playable Effectivity Functions. V. Goranko, W. Jamroga and P. Turrini. In Proceedings of AAMAS2011, pp. 727–734, 2011. bib ]
  3. Comparing Variants of Strategic Ability. W. Jamroga and N. Bulling. In Proceedings of IJCAI-11, pp. 252–257, 2011. bib ]
  4. Agents, Actions and Goals in Dynamic Environments. P. Novak and W. Jamroga. In Proceedings of IJCAI-11, pp. 313–318, 2011. bib ]
  5. Distance-based Judgment Aggregation of Three-valued Judgments with Weights. M. Slavkovik and W. Jamroga. In Proceedings of the IJCAI Workshop on Social Choice and Artificial Intelligence, pp. 81–86, 2011. bib ]
  6. Bulletin boards in voting systems: Modelling and measuring privacy. H. Jonker and J. Pang. In Proc. 6th International Conference on Availability, Reliability and Security, IEEE Computer Society, pp. 294–300, 2011. bib | preprint ]
  7. An inductive approach to provable anonymity. Y. Li and J. Pang. In Proc. 6th Conference on Availability, Reliability and Security (ARES’11), IEEE Computer Society, pp. 454–459, 2011. bib | preprint ]
  8. Verification of a key-chain based TTP transparent CEM protocol. Z. Liu, J. Pang and C. Zhang. In Proc. 3rd Workshop on Harnessing Theories for Tool Support in Software (TTSS’10), Elsevier, Electronic Notes in Theoretical Computer Science 274, pp. 51–65, 2011. bib | preprint ]
  9. A trust-augmented voting scheme for collaborative privacy management. Y. Sun, C. Zhang, J. Pang, B. Alcalde and S. Mauw. In Proc. 6th Workshop on Security and Trust Management (STM’10), Springer-Verlag, LNCS 6710, pp. 132–146, 2011. bib | preprint ]
  10. On combining state space reductions with global fairness assumptions. S. Zhang, J. Sun, J. Pang, Y. Liu and J.-S. Dong. In Proc. 17th Symposium on Formal Methods (FM’11), Springer-Verlag, LNCS 6664, pp. 432–447, 2011. bib | preprint ]
  11. A Study of the PDGF Signaling Pathway with PRISM. Q. Yuan, J. Pang, S. Mauw, P. Trairatphisan, M. Wiesinger and T. Sauter. In 3rd International Workshop on Computational Models for Cell Processes (CompMod 2011), Electronic Proceedings in Theoretical Computer Science 67, pp. 65–81, 2011. bib | preprint ]
  12. Selective Location Blinding using Hash Chains. G. Lenzini, S. Mauw and J. Pang. In Proc. 19th Security Protocols Workshop, Springer-Verlag, LNCS 7114, pp. 132–141, 2011. bib ]
  13. Selective Location Blinding using Hash Chains (Transcript of Discussion). S. Mauw. In Proc. 19th Security Protocols Workshop, Springer-Verlag, LNCS 7114, pp. 142–149, 2011. bib ]
  14. A Modular Multi-Modal Specification of Real-Timed, End-To-End Voter-Verifiable Voting Systems. S. Kramer and P.Y.A. Ryan. In Proceedings of the RE-affiliated Workshop on Requirements Engineering for Electronic Voting Systems, IEEE, pp. 9–21, 2011. bib ]
  15. mCarve: Carving attributed dump sets. T. van Deursen, S. Mauw and S. Radomirović. In 20th USENIX Security Symposium, USENIX Association, pp. 107–121, 2011. bib | preprint ]
  16. 50 Ways to Break RFID Privacy. T. van Deursen. In Privacy and Identity 2010, Springer, IFIP AICT 352, pp. 192–205, 2011. bib | preprint ]
  17. Analysis of a receipt-free auction protocol in the applied pi calculus. N. Dong, H.L. Jonker and J. Pang. In Proc. 7th Workshop on Formal Aspects in Security and Trust, Springer-Verlag, LNCS 6561, pp. 223–238, 2011. bib | preprint ]
  18. Foundations of Attack–Defense Trees. B. Kordy, S. Mauw, S. Radomirović and P. Schweitzer. In Proceedings of the 7th international Workshop on Formal Aspects in Security and Trust (FAST 2010), Springer-Verlag, LNCS 6561, pp. 80–95, 2011. bib | preprint | DOI ]
  19. Semantics of Trust. T. Muller. In Proceedings of the 7th international Workshop on Formal Aspects in Security and Trust (FAST 2010), Springer-Verlag, LNCS 6561, pp. 141–156, 2011. bib ]
  20. The Generative Capacity of the Lambek-Grishin Calculus: A New Lower Bound. M. Melissen. In Proceedings of Formal Grammar 2009, Springer, LNCS 5591, pp. 118–132, 2011. bib | preprint | from publisher ]
  21. Doubtful Deviations and Farsighted Play. W. Jamroga and M. Melissen. In Progress in Artificial Intelligence, Proceedings of the 15th Portuguese Conference on Artificial Intelligence, Springer, LNCS 7026, pp. 506–520, 2011. bib | preprint | from publisher ]

PhD Theses

  1. Security of RFID Protocols. . van Deursen. PhD thesis, University of Luxembourg, 2011. bib ]

Published in 2010

Book Chapters

  1. Model Checking Logics of Strategic Ability: Complexity. N. Bulling, J. Dix and W. Jamroga. In Specification and Verification of Multi-Agent Systems, Springer, pp. 125–159, 2010. bib ]
  2. Fair Exchange. .M. Dashti and S. Mauw. In Handbook of Financial Cryptography and Security, Chapmand and Hall⁄CRC, pp. 109–132, 2010. bib ]

Edited Proceedings

  1. Proceedings of the 3rd Workshop on Logical Aspects of Multi-Agent Systems (LAMAS 2010). V. Goranko and W. Jamroga, editors. 2010. bib ]
  2. Computational Logic in Multi-Agent Systems. Proceedings of CLIMA XI. J. Dix, J. Leite, G. Governatori and W. Jamroga, editors. LNCS 6245, 2010. bib ]

Journal Articles

  1. Verifying Agents with Memory Is Harder than It Seemed. N. Bulling and W. Jamroga. AI Communications, 23:380–403, 2010. bib ]
  2. Coalition Description Logic for Individuals. İ. Seylan and W. Jamroga. Electronic Notes in Theoretical Computer Science, 262:231–248, 2010. bib ]
  3. A Comparison of Semantic Models for Noninterference. R. van der Meyden and C. Zhang. Theoretical Computer Science, 411:4123–4147, 2010. bib ]
  4. The optimal size of a permit market. F.C. Krysiak and P. Schweitzer. Journal of Environmental Economics and Management, 60(2):133–143, 2010. bib | preprint | DOI ]
  5. Connecting face hitting sets in planar graphs. P. Schweitzer and P. Schweitzer. Information Processing Letters, 111(1):11–15, 2010. bib | preprint | DOI ]

Conference Proceedings

  1. Verifying Agents with Memory Is Harder than It Seemed. N. Bulling and W. Jamroga. In Proceedings of AAMAS2010, pp. 633–640, 2010. bib ]
  2. Reasoning about Strategies of Multi-Agent Programs. M. Dastani and W. Jamroga. In Proceedings of AAMAS2010, pp. 625–632, 2010. bib ]
  3. Strategic Games and Truly Playable Effectivity Functions. V. Goranko, W. Jamroga and P. Turrini. In Proceedings of EUMAS2010, 2010. bib ]
  4. Comparing Variants of Strategic Ability. W. Jamroga and N. Bulling. In Proceedings of EUMAS2010, 2010. bib ]
  5. Towards a Model for Security and Privacy in the Internet of Things. S. Radomirović. In 1st International Workshop on the Security of the Internet of Things (SecIoT’10), 2010. bib ]
  6. Anonymity and Verifiability in Voting: Understanding (Un)Linkability. L. Langer, H. Jonker and W. Pieters. In Proc. 12th Conference on Information and Communications Security (ICICS’10), Springer-Verlag, LNCS 6476, pp. 296–310, 2010. bib | preprint | DOI ]
  7. Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface. Z. Xia, C. Culnane, J. Heather, H. Jonker, P. Ryan, S. Schneider and S. Srinivasan. In Proc. IndoCrypt, Springer-Verlag, LNCS 6498, pp. 98–114, 2010. bib | preprint | DOI ]
  8. Anonymity in Voting Revisited. H. Jonker and W. Pieters. In Towards Trustworthy Elections, pp. 216–230, 2010. bib | preprint | from publisher ]
  9. The Complexity of Synchronous Notions of Information Flow Security. F. Cassez, .R. der Meyden and C. Zhang. In Proceedings of FoSSaCS 2010, pp. 282–296, 2010. bib ]
  10. Extending a key-chain based certified email protocol with transparent TTP. Z. Liu, J. Pang and C. Zhang. In Proc. 6th IEEE⁄IFIP Symposium on Trusted Computing and Communications, IEEE Computer Society, pp. 630–636, 2010. bib | preprint ]
  11. Regular Expressions with Parallel Composition modulo Bisimilarity. J. Baeten, B. Luttik, T. Muller and P. van Tilburg. In Proc. 17th International Workshop on Expressiveness in Concurrency, Electronic Proceedings in Theoretical Computer Science 41, pp. 1–15, 2010. bib | from publisher ]
  12. Security protocols for Secret Santa. S. Mauw, S. Radomirović and P.Y. Ryan. In Proc. 18th Security Protocols Workshop, Springer-Verlag, Lecture Notes in Computer Science 7601, pp. 175–184, 2010. bib | preprint ]
  13. Security protocols for Secret Santa (Transcript of Discussion). S. Mauw. In Proc. 18th Security Protocols Workshop, Springer-Verlag, Lecture Notes in Computer Science 7601, pp. 185–190, 2010. bib ]
  14. On probabilistic alternating simulations. C. Zhang and J. Pang. In Proc. 6th IFIP Conference on Theoretical Computer Science, IFIP International Federation for Information Processing, IFIP AICT 323, pp. 71–85, 2010. bib | preprint ]
  15. Brief announcement: Asynchronous bounded expected delay networks. R. Bakhshi, J. Endrullis, W.J. Fokkink and J. Pang. In Proc. 29th Annual ACM Symposium on Principles of Distributed Computing, ACM, pp. 392–393, 2010. bib | preprint ]
  16. Model checking round-based distributed algorithms. X. An and J. Pang. In Proc. 15th IEEE Conference on Engineering of Complex Computer Systems, IEEE Computer Society, pp. 127–135, 2010. bib | preprint ]
  17. Contextual Biometric-based Authentication for Ubiquitous Services. I. Buhan, G. Lenzini and S. Radomirović. In 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010), Springer, LNCS 6406, pp. 680–693, 2010. bib | DOI ]
  18. EC-RAC: Enriching a Capacious RFID Attack Collection. T. van Deursen and S. Radomirović. In 6th Workshop on RFID Security (RFIDSec 2010), Springer, LNCS 6370, pp. 75–90, 2010. bib | preprint | DOI ]
  19. Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. B. Kordy, S. Mauw, M. Melissen and P. Schweitzer. In Proceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Springer, LNCS 6442, pp. 245–256, 2010. bib | preprint ]
  20. Trusted Third Party, Who Are You?. B. Alcalde. In Short Paper Proceedings of the Fourth IFIP WG11.11 International Conference on Trust Management (IFIPTM 2010), Information Processing Society of Japan, pp. 49–56, 2010. bib ]
  21. Abstracting Audit Data for Lightweight Intrusion Detection. W. Wei, X. Zhang and G. Pitsilis. In Sixth International Conference on Information Systems Security, Springer-Verlag, LNCS 6503, 2010. bib | DOI ]

Published in 2009

Book Chapters

  1. Discovering the core security requirements of DRM systems by means of objective trees. H.L. Jonker and S. Mauw. In Handbook of Research on Secure Multimedia Distribution, IGI Global, pp. 71–85, 2009. bib ]

Journal Articles

  1. A formal framework for quantifying voter-controlled privacy. H.L. Jonker, S. Mauw and J. Pang. Journal of Algorithms in Cognition, Informatics and Logic, 64(2-3):89–105, 2009. bib | preprint ]
  2. On a new formal proof model for RFID location privacy. T. van Deursen and S. Radomirović. Information Processing Letters, 110(2):57–61, 2009. bib | DOI ]
  3. What Agents Can Probably Enforce. N. Bulling and W. Jamroga. Fundamenta Informaticae, 93(1-3):81–96, 2009. bib ]

Conference Proceedings

  1. Algebraic Attacks on RFID Protocols. T. van Deursen and S. Radomirović. In Information Security Theory and Practices. Smart Devices, Pervasive Systems, and Ubiquitous Networks (WISTP’09), Springer, LNCS 5746, 2009. bib | preprint ]
  2. Secure ownership and ownership transfer in RFID systems. T. van Deursen, S. Mauw, S. Radomirović and P. Vullers. In Proc. 14th European Symposium On Research In Computer Security (ESORICS’09), Springer, LNCS 5789, pp. 637–654, 2009. bib | preprint ]
  3. Improving Automatic Verification of Security Protocols with XOR. X. Chen, T. van Deursen and J. Pang. In Proc. 11th International Conference on Formal Engineering Methods (ICFEM’09), Springer-Verlag, LNCS 5885, pp. 107–126, 2009. bib | preprint ]
  4. A Rewrite Approach for Pattern Containment. B. Kordy. In Recent Trends in Algebraic Development Techniques, Springer-Verlag, pp. 236–250, 2009. bib ]
  5. An algebra for trust dilution and trust fusion. B. Alcalde and S. Mauw. In Proc. 6th Workshop on Formal Aspects in Security and Trust, Springer-Verlag, LNCS 5983, pp. 4–20, 2009. bib ]
  6. Game-based verification of multi-party contract signing protocols. Y. Zhang, C. Zhang, J. Pang and S. Mauw. In Proc. 6th Workshop on Formal Aspects in Security and Trust, Springer-Verlag, LNCS 5983, pp. 186–200, 2009. bib | preprint ]
  7. How to work with honest but curious judges? (preliminary report). J. Pang and C. Zhang. In Proc. 7th International Workshop on Security Issues in Concurrency, Electronic Proceedings in Theoretical Computer Science 7, pp. 31–45, 2009. bib | preprint ]
  8. Verification of population ring protocols in PAT. Y. Liu, J. Pang, J. Sun and J. Zhao. In Proc. 3rd IEEE Symposium on Theoretical Aspects of Software Engineering, IEEE Computer Society, pp. 81–89, 2009. bib | preprint ]
  9. PAT: Towards flexible verification under fairness. J. Sun, Y. Liu, J.-S. Dong and J. Pang. In Proc. 21th International Conference on Computer Aided Verification, Springer-Verlag, LNCS 5643, pp. 709–714, 2009. bib | preprint ]
  10. Measuring voter-controlled privacy. H.L. Jonker, S. Mauw and J. Pang. In Proc. 4th International Conference on Availability, Reliability and Security, IEEE Computer Society, pp. 289–298, 2009. bib | preprint ]
  11. Towards a Decision Model Based on Trust and Security Risk Management. B. Alcalde, E. Dubois, S. Mauw, N. Mayer and S. Radomirović. In Proc. 7th Australasian Information Security Conference - AISC’09, Australian Computer Society, Conferences in Research and Practice in Information Technology (CRPIT) 98, pp. 61–69, 2009. bib ]
  12. Minimal message complexity of asynchronous multi-party contract signing. S. Mauw, S. Radomirović and T.M. Dashti. In Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF’09), IEEE Computer Society, pp. 13–25, 2009. bib | preprint ]
  13. Security of RFID Protocols – A Case Study. T. van Deursen and S. Radomirović. In Proc. 4th International Workshop on Security and Trust Management (STM’08), Elsevier, ENTCS 244, pp. 41–52, 2009. bib | preprint | DOI ]
  14. Model Checking ATL$^+$ Is Harder than It Seemed. N. Bulling and W. Jamroga. In Proceedings of EUMAS’09, 2009. bib ]
  15. Rational Play and Rational Beliefs under Uncertainty. N. Bulling and W. Jamroga. In Proceedings of AAMAS’09, pp. 257–264, 2009. bib ]
  16. Reasoning about Strategic Properties of Multi-Agent Programs. N. Bulling and W. Jamroga. In Proceedings of EUMAS2009, 2009. bib ]
  17. Easy Yet Hard: Model Checking Strategies of Agents. W. Jamroga. In Computational Logic in Multi-Agent Systems: Proceedings of CLIMA IX, LNCS 5405, pp. 1–12, 2009. bib ]
  18. Code Patterns for Agent Oriented Programming. P. Novák and W. Jamroga. In Proceedings of AAMAS’09, pp. 105–112, 2009. bib ]
  19. Code Patterns for Agent Oriented Programming (Extended Abstract). P. Novák and W. Jamroga. In Proceedings of BNAIC’09, 2009. bib ]
  20. Coalition Description Logic for Individuals. İ. Seylan and W. Jamroga. In Proceedings of the 6th Workshop on Methods for Modalities M4M-6, pp. 146–162, 2009. bib ]
  21. Description Logic for Coalitions. İ. Seylan and W. Jamroga. In Proceedings of AAMAS’09, pp. 425–432, 2009. bib ]

PhD Theses

  1. Security Matters: Privacy in Voting and Fairness in Digital Exchange. H.L. Jonker. PhD thesis, Eindhoven University of Technology and University of Luxembourg, 2009. bib ]

Technical Reports

  1. Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC. T. van Deursen and S. Radomirović. Technical report, University of Luxembourg, 2009. bib | preprint ]
  2. Attacks on RFID protocols (version 1.1). T. van Deursen and S. Radomirović. Technical report, University of Luxembourg, 2009. bib | preprint ]
  3. Towards a toolkit for efficient and flexible verification under fairness. J. Sun, Y. Liu, J.-S. Dong and J. Pang. Technical report (TRB2/09), National University of Singapore, School of Computing, 2009. bib ]
  4. What Agents Can Probably Enforce. N. Bulling and W. Jamroga. Technical report (IfI-09-04), Clausthal University of Technology, 2009. bib ]
  5. Model Checking ATL$^+$ is Harder than It Seemed. W. Jamroga and N. Bulling. Technical report (IfI-09-13), Clausthal University of Technology, 2009. bib ]

Miscellaneous

  1. Modeling, Verification, and Strategic Reasoning in Multi-Agent Systems. W. Jamroga. 2009. bib ]

Published in 2008

Edited Proceedings

  1. Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings. S. Mjølsnes, S. Mauw and S.K. Katsikas, editors. LNCS 5057, 2008. bib ]
  2. Special issue on Security and Trust. S. Mauw, F. Massacci and P.F. editors), editors. 2008. bib ]

Journal Articles

  1. A framework for compositional verification of security protocols. S. Andova, C.J.F. Cremers, K. Gjøsteen, S. Mauw, S.F. Mjølsnes and S. Radomirović. Information and Computation, 206:425–459, 2008. bib | preprint ]
  2. On automatic verification of self-stabilizing population protocols. J. Pang, Z. Luo and Y. Deng. Frontiers of Computer Science in China, 2(4):357–367, 2008. bib | preprint ]
  3. Is timed branching bisimilarity a congruence indeed?. W.J. Fokkink, J. Pang and A.J. Wijs. Fundamenta Informaticae, 87(3-4):287–311, 2008. bib | preprint ]

Conference Proceedings

  1. Leader election in anonymous rings: Franklin goes probabilistic. R. Bakhshi, W.J. Fokkink, J. Pang and .J.C. de Pol. In Proc. 5th IFIP Conference on Theoretical Computer Science, Springer-Verlag, IFIP International Federation for Information Processing 273, pp. 57–72, 2008. bib | preprint ]
  2. On automatic verification of self-stabilizing population protocols. J. Pang, Z. Luo and Y. Deng. In Proc. 2nd IEEE Symposium on Theoretical Aspects of Software Engineering, IEEE Computer Society, pp. 185–192, 2008. bib | preprint ]
  3. Chosen-name attacks: An overlooked class of type-flaw attacks. P. Ceelen, S. Mauw and S. Radomirović. In Proceedings of the 3rd International Workshop on Security and Trust Management (STM 2007), ENTCS 197, pp. 31–43, 2008. bib | preprint ]
  4. Rights Management for Role-Based Access Control. B. Bouwman, S. Mauw and M. Petkovic. In Fifth Annual IEEE Consumer Communications & Networking Conference 2008 (CCNC’08), IEEE, pp. 1085–1090, 2008. bib | preprint ]
  5. Hedaquin: A reputation-based health data quality indicator. T. van Deursen, P. Koster and M. Petkovic. In Proc. 3rd International Workshop on Security and Trust Management (STM’07), ENTCS 197, pp. 159–167, 2008. bib | preprint ]
  6. Untraceability of RFID Protocols. T. van Deursen, S. Mauw and S. Radomirović. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP’08), Springer, LNCS 5019, pp. 1–15, 2008. bib | preprint ]
  7. Reliable Personal Health Records. T. van Deursen, P. Koster and M. Petković. In eHealth Beyond the Horizon – Get IT There – Proceedings of MIE2008 – The XXIst International Congress on the European Federation for Medical Informatics, IOS Press, Studies in Health Technology and Informatics 136, pp. 484–489, 2008. bib | preprint ]
  8. Security of an RFID Protocol for Supply Chains. T. van Deursen and S. Radomirović. In Proc. 1st Workshop on Advances in RFID (AIR’08), IEEE Computer Society, pp. 568–573, 2008. bib | preprint ]

Technical Reports

  1. On a new formal proof model for RFID Location Privacy. T. van Deursen and S. Radomirović. Technical report, University of Luxembourg, 2008. bib | preprint ]

Miscellaneous

  1. Towards a Decision Model Based on Trust and Security Risk Management in e-Services. B. Alcalde, E. Dubois, S. Mauw, N. Mayer and S. Radomirović. 2008. bib ]
  2. Vulnerabilities in RFID protocols due to algebraic properties. T. van Deursen and S. Radomirović. 3rd Benelux Workshop on Information and System Security, 2008. bib ]

Published in 2007

Book Chapters

  1. Core security requirements of DRM systems. H.L. Jonker and S. Mauw. In Digital Rights Management – An Introduction, ICFAI University Press, pp. 73–90, 2007. bib | preprint ]

Conference Proceedings

  1. Data anonymity in the FOO voting scheme. S. Mauw, J.H.S. Verschuren and E.P. de Vink. In Second International Workshop on Views On Designing Complex Architectures (VODCA 2006), ENTCS 168, pp. 5–28, 2007. bib ]
  2. Compliance of RIES to the proposed e-Voting protection profile. H. Jonker and M. Volkamer. In VOTE-ID 2007, LNCS 4896, pp. 50–61, 2007. bib ]
  3. A Certified Email Protocol Using Key Chains. J. Cederquist, T.M. Dashti and S. Mauw. In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01 (AINAW’07), IEEE Computer Society, pp. 525–530, 2007. bib | preprint ]

Miscellaneous

  1. Vote buying revisited: implications for receipt-freeness. W. Pieters and H. Jonker. 2007. bib | from publisher ]

Generated using BibHTML by Hugo Jonker, based on the BiblioPhile PHP BibTex parser.