Last update: 04/04/24
journals
conferences
books
miscellaneous
Journals
- [1]
- Reynaldo Gil-Pons, Sjouke Mauw, and Rolando
Trujillo-Rasua.
On the optimal resistance against mafia and distance fraud in distance-bounding
protocols.
Computer Communications, 210:69-78, 2023.
- [2]
- Ross Horne, Sjouke Mauw, Andrzej Mizera,
André Stemper, and Jan Thoemel.
Anomaly detection using deep learning respecting the resources on board a
cubesat.
Journal of Aerospace Information Systems, 20(12), 2023.
- [3]
- Sviatlana Hoehn, Barbara Lewandowska-Toszczyk,
Sjouke Mauw, and Dov Gabbay.
Dripping the poison: The instruments of bias -- A qualitative case study of
news articles in four languages over nine years.
Journal of applied logics, 10(4):555-585, 2023.
- [4]
- Ross Horne, Sjouke Mauw, and Semen Yurkov.
When privacy fails, a formula describes an attack: A complete and compositional
verification method for the applied pi -calculus.
Theoretical Computer Science, 959(113842), 2023.
- [5]
- Cengis Hasan, Ross Horne, Sjouke Mauw, and
Andrzej Mizera.
Cloud removal from
satellite imagery using multispectral edge-filtered conditional generative
adversarial networks.
International Journal of Remote Sensing, 43(5):1881-1893,
2022.
- [6]
- Sjouke Mauw, Yunior Ramírez-Cruz, and
Rolando Trujillo-Rasua.
Preventing active
re-identification attacks on social graphs via sybil subgraph
obfuscation.
Knowledge and Information Systems, 64:1077-1100, 2022.
- [7]
- Ross Horne and Sjouke Mauw.
Discovering ePassport
vulnerabilities using bisimilarity.
Logical Methods in Computer Science, 17(2):24:1-24:52, 2021.
- [8]
- Xihui Chen, Sjouke Mauw, and Yunior
Ramírez-Cruz.
Publishing
community-preserving attributed social graphs with a differential privacy
guarantee.
Proceedings on Privacy Enhancing Technologies, 4:131-152, 2020.
Presented at the 20th Privacy Enhancing Technologies Symposium (PETS 2020).
- [9]
- Aleksandr Pilgun, Olga Gadyatskaya, Yury
Zhauniarovich, Stanislav Dashevskyi, Artsiom Kushniarou, and Sjouke Mauw.
Fine-grained code
coverage measurement in automated black-box android testing.
ACM Transactions on Software Engineering Methodology,
29(4):23:1-35, 2020.
- [10]
- Ahto Buldas, Olga Gadyatskaya, Aleksandr
Lenin, Sjouke Mauw, and Rolando Trujillo-Rasua.
Attribute evaluation
on attack trees with incomplete information.
Computers and Security, 88(101630), 2020.
- [11]
- Sjouke Mauw, Yunior Ramírez-Cruz, and
Rolando Trujillo-Rasua.
Robust active attacks on
social graphs.
Data Mining and Knowledge Discovery, 33(5):1357-1392, 2019.
Presented at ECMLPKDD'19.
- [12]
- Sjouke Mauw, Yunior Ramírez-Cruz, and
Rolando Trujillo-Rasua.
Conditional adjacency
anonymity in social graphs under active attacks.
Knowledge and Information Systems, 61(1):485-511, 2019.
- [13]
- Sjouke Mauw, Yunior Ramírez-Cruz, and
Rolando Trujillo-Rasua.
Anonymising social
graphs in the presence of active attackers.
Transactions on Data Privacy, 11(2):169-198, 2018.
- [14]
- Ross Horne, Sjouke Mauw, and Alwen Tiu.
Semantics for
specialising attack trees based on linear logic.
Fundamenta Informaticae, 153(1-2):57-86, 2017.
- [15]
- Gildas Avoine, Sjouke Mauw, and Rolando
Trujillo-Rasua.
Comparing distance
bounding protocols: A critical mission supported by decision theory.
Computer Communications, 67:92-102, 2015.
- [16]
- Gabriele Lenzini, Sjouke Mauw, and Samir
Ouchani.
Security analysis of
socio-technical physical systems.
Computers and Electrical Engineering, 47:258-274, 2015.
- [17]
- Barbara Kordy, Sjouke Mauw, Sasa
Radomirovic, and Patrick Schweitzer.
Attack-Defense
trees.
Journal of Logic and Computation, 24(1):55-87, 2014.
- [18]
- H.L. Jonker, S. Mauw, and J. Pang.
Privacy and
verifiability in voting systems: Methods, developments and trends.
Computer Science Review, 10:1-30, 2013.
- [19]
- Daniel Marnach, Sjouke Mauw, Miguel
Martins, and Carlo Harpes.
Detecting meaconing
attacks by analysing the clock bias of GNSS receivers.
Artificial Satellites, Journal of Planetary Geodesy, 48(2):63-84,
2013.
- [20]
- Xihui Chen, Gabriele Lenzini, Sjouke Mauw, and
Jun Pang.
Design and formal
analysis of a group signature based electronic toll pricing system.
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable
Applications, 4(1):55-75, 2013.
- [21]
- Q. Yuan, P. Trairatphisan, J. Pang, S. Mauw,
M. Wiesinger, and T. Sauter.
Probabilistic model
checking of the PDGF signaling pathway.
Transactions on Computational Systems Biology, 7625:151-180,
2012.
- [22]
- Y. Sun, C. Zhang, J. Pang, B. Alcalde, and
S. Mauw.
A trust-augmented
voting scheme for collaborative privacy management.
Journal of Computer Security, 20(4):437-459, 2012.
- [23]
- Selwyn Piramuthu, Gaurav Kapoor, Wei Zhou, and
Sjouke Mauw.
Input online review
data and related bias in recommender systems.
Decision Support Systems, 53(3):418-424, 2012.
- [24]
- Ying Zhang, Chenyi Zhang, Jun Pang, and Sjouke
Mauw.
Game-based verification
of contract signing protocols with minimal messages.
Innovations in Systems and Software Engineering, 8(2):111-124,
2012.
- [25]
- Hugo Jonker, Sjouke Mauw, and Jun Pang.
A formal framework for
quantifying voter-controlled privacy.
Journal of Algorithms in Cognition, Informatics and Logic,
64(2-3):89-105, 2009.
- [26]
- S. Andova, C.J.F. Cremers,
K. Gjøsteen, S. Mauw, S.F. Mjølsnes, and S. Radomirovic.
A framework for
compositional verification of security protocols.
Information and Computation, 206(2-4):425-459, February 2008.
- [27]
- C.J.F. Cremers, S. Mauw, and E.P. de Vink.
Injective
synchronisation: an extension of the authentication hierarchy.
Theoretical Computer Science, 367(1-2):139-161, November 2006.
Special issue on ARSPA'05, (P. Degano and L. Viganò, eds.).
- [28]
- S. Mauw, W.T. Wiersma, and T.A.C. Willemse.
Language-driven
system design.
International Journal of Software Engineering and Knowledge
Engineering, 14(6):625-664, December 2004.
- [29]
- Sem Borst, Onno Boxma, Jan Friso Groote,
and Sjouke Mauw.
Task allocation in
a multi-server system.
Journal of Scheduling, 6(5):423-436, 2003.
- [30]
- A.G. Engels, S. Mauw, and M.A. Reniers.
A hierarchy of
communication models for Message Sequence Charts.
Science of Computer Programming, 44(3):253-292, September
2002.
- [31]
- A.G. Engels and S. Mauw.
Why men (and octopuses)
cannot juggle a four ball cascade.
Journal of Recreational Mathematics, 31(2):117-126, 2002/2003.
- [32]
- Sjouke Mauw and Victor Bos.
Drawing Message
Sequence Charts with LaTeX .
TUGBoat, 22(1-2):87-92, March/June 2001.
- [33]
- Marc Voorhoeve and Sjouke Mauw.
Impossible futures and
determinism.
Information Processing Letters, 80(1):51-58, 2001.
- [34]
- J.F. Groote, W.H. Hesselink, S. Mauw, and
R. Vermeulen.
An algorithm for
the asynchronous write-all problem based on process collision.
Distributed Computing, 14:75-81, 2001.
- [35]
- S. Mauw and M.A. Reniers.
Operational semantics
for MSC'96.
Computer Networks and ISDN Systems, 31(17):1785-1799, 1999.
- [36]
- S. Mauw.
The formalization of
Message Sequence Charts.
Computer Networks and ISDN Systems, 28(12):1643-1657, 1996.
- [37]
- J.J. Brunekreef, J.-P. Katoen, R. Koymans,
and S. Mauw.
Design and analysis
of dynamic leader election protocols in broadcast networks.
Distributed Computing, 9(4):157-171, 1996.
Full version: Department of Computer Science, Eindhoven University of
Technology report 93/37.
- [38]
- S. Mauw and M.A. Reniers.
An algebraic semantics
of Basic Message Sequence Charts.
The computer journal, 37(4):269-277, 1994.
- [39]
- S. Mauw and T. Winter.
A prototype toolset for
Interworkings.
Philips Telecommunication Review, 51(3):41-45, December 1993.
- [40]
- J.A. Bergstra, S. Mauw, and F. Wiedijk.
Uniform algebraic
specifications of finite sets with equality.
Int. J. of Foundations of Computer Science, 1(2):43-65, 1991.
- [41]
- S. Mauw and G.J. Veltink.
A process specification
formalism.
Fundamenta Informaticae, XIII:85-139, 1990.
Conference and workshop proceedings
- [1]
- Yurong Hao, Xihui Chen, Xiaoting Lyu, Jiqiang
Liu, Yongsheng Zhu, Zhiguo Wan, Sjouke Mauw, and Wei Wang.
Not one less: Exploring interplay between user profiles and items in untargeted
attacks against federated recommendation.
In Proc. 31st ACM Conference on Computer and Communications Security
(CCS'24). ACM Press, 2024.
To appear.
- [2]
- Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw,
and Jun Pang.
Formal verification and solutions for Estonian e-voting.
In Proc. 19th ACM ASIA Conference on Computer and Communications
Security (ASIACCS'24), Singapore, 2024. ACM Press.
To appear.
- [3]
- Christoph H.-J. Braun, Ross Horne, Tobias
Käfer, and Sjouke Mauw.
SSI, from specifications to protocol? Formally verify security!
In Proc. The 2024 Web Conference (WWW'24), Singapore, 2024. ACM.
To appear.
- [4]
- Sergiu Bursuc, Sjouke Mauw, Reynaldo Gil Pons,
and Rolando Trujillo Rasua.
Software-based memory erasure with relaxed isolation requirements.
In Proc. 37th IEEE Computer Security Foundations Symposium
(CSF'24), Enschede, The Netherlands, 2024. IEEE Computer Society.
To appear.
- [5]
- Sviatlana Höhn, Bettina Migge, Britta
Schneider, Doris Dippold, and Sjouke Mauw.
Language ideology bias in conversational technology.
In Proc. 7th International Workshop on Chatbot Research and Design
(CONVERSATIONS'23), volume 14524 of LNCS, pages 133-148,
Oslo, Norway, 2023. Springer-Verlag.
- [6]
- Sergui Bursuc, Ross Horne, Sjouke Mauw, and
Semen Yurkov.
Provably unlinkable smart card-based payments.
In Proc. 30th ACM Conference on Computer and Communications Security
(CCS'23), pages 1392-1406. ACM Press, 2023.
- [7]
- Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw,
and Jun Pang.
Election verifiability in receipt-free voting protocols.
In Proc. 36th IEEE Computer Security Foundations Symposium
(CSF'23), pages 59-74, Dubrovnik, Croatia, 2023. IEEE Computer
Society.
- [8]
- Matteo Acclavio, Ross Horne, Sjouke Mauw, and
Lutz Straßburger.
A graphical proof theory of logical time.
In Proc. 7th International Conference on Formal Structures for
Computation and Deduction (FSCD'22), volume 228 of
LIPICS, pages 22:1-22:25, Haifa, Israel, 2022. Schloss Dagstuhl
- Leibniz-Zentrum fuer Informatik.
- [9]
- Sergiu Bursuc and Sjouke Mauw.
Contingent payments from
two-party signing and verification for abelian groups.
In Proc. 35th IEEE Computer Security Foundations Symposium
(CSF'22), pages 179-194, Haifa, Israel, 2022. IEEE Computer
Society.
- [10]
- Sviatlana Höhn, Nicholas Asher, and Sjouke
Mauw.
Belelect: a new dataset
for bias research from a ``dark'' platform.
In Proc. 16th International Conference on web and social media (AAAI
ICWSM'22), volume 16(1), pages 1268-1274, Atlanta, Georgia, 2022.
AAAI Press.
- [11]
- Reynaldo Gil-Pons, Ross Horne, Sjouke Mauw,
Alwen Tiu, and Rolando Trujillo-Rasua.
Is Eve nearby?
Analysing protocols under the distant-attacker assumption.
In Proc. 35th IEEE Computer Security Foundations Symposium
(CSF'22), pages 17-32, Haifa, Israel, 2022. IEEE Computer Society.
- [12]
- Ross Horne, Sjouke Mauw, and Semen Yurkov.
Unlinkability of an
improved key agreement protocol for EMV 2nd Gen payments.
In Proc. 35th IEEE Computer Security Foundations Symposium
(CSF'22), pages 348-363, Haifa, Israel, 2022. IEEE Computer
Society.
- [13]
- Sviatlana Höhn, Nicholas Asher, and Sjouke
Mauw.
Examining linguistic
biases in Telegram with a game theoretic analysis.
In Proc. 3rd Multidisciplinary International Symposium on Disinformation
in Open Online Media (MISDOOM'21), volume 12887 of LNCS,
pages 16-32, Oxford, UK, 2021. Springer-Verlag.
- [14]
- Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw,
and Jun Pang.
Provably improving
election verifiability in Belenios.
In Proc. 6th International Joint Conference on Electronic Voting
(E-Vote-ID'21), volume 12900 of LNCS, pages 1-16.
Springer-Verlag, 2021.
- [15]
- Ross Horne, Sjouke Mauw, and Semen Yurkov.
Compositional analysis
of protocol equivalence in the applied pi -calculus using quasi-open
bisimilarity.
In Proc. 18th International Colloquium on Theoretical Aspects of
Computing (ICTAC'21), volume 12819 of LNCS, pages
235-255, Nur-Sultan, Kazakhstan, 2021. Springer-Verlag.
- [16]
- Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw,
and Jun Pang.
Election verifiability
revisited: automated security proofs and attacks on Helios and
Belenios.
In Proc. 34th IEEE Computer Security Foundations Symposium
(CSF'21), pages 1-15, Dubrovnik, Croatia, 2021. IEEE Computer
Society.
- [17]
- Dov M. Gabbay, Ross Horne, Sjouke Mauw, and
Leendert van der Torre.
Attack-Defence
Frameworks: Argumentation-based semantics for Attack-Defence
Trees.
In Harley Eades III and Olga Gadyatskaya, editors, Proc. 7th
International Workshop on Graphical Models for Security (GraMSec'20),
volume 12419 of LNCS, pages 143-165. Springer Verlag, 2020.
- [18]
- Xihui Chen, Ema Këpuska, Sjouke Mauw, and
Yunior Ramírez-Cruz.
Active
re-identification attacks on periodically released dynamic social graphs.
In Liqun Chen, Ninghui Li, Kaitai Liang, and Steve Schneider, editors,
Proc. 25th European Symposium On Research In Computer Security
(ESORICS'20), Part II, volume 12309 of Lecture Notes in Computer
Science, pages 185-205, Guildford, UK, September 14-18 2020.
Springer-Verlag.
- [19]
- Christof Ferreira Torres, Mathis Baden,
Robert Norvill, Beltran Borja Fiz Pontiveros, Hugo Jonker, and Sjouke Mauw.
AEGIS: Shielding
vulnerable smart contracts against attacks.
In Proc. 15th ACM ASIA Conference on Computer and Communications
Security (ASIACCS'20), pages 584-597, Taipei, Taiwan, 2020. ACM
Press.
- [20]
- Olga Gadyatskaya and Sjouke Mauw.
Attack-tree series: A
case for dynamic attack tree analysis.
In Massimiliano Albanese, Ross Horne, and Christian W. Probst, editors,
Proc. 6th International Workshop on Graphical Models for Security
(GraMSec'19), volume 11720 of LNCS, pages 7-19, Hoboken,
USA, 2019. Springer Verlag.
- [21]
- Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, and
Rolando Trujillo-Rasua.
Post-collusion security
and distance bounding.
In Proc. 26th ACM Conference on Computer and Communications Security
(CCS'19), pages 941-958. ACM Press, 2019.
- [22]
- Ihor Filimonov, Ross Horne, Sjouke Mauw, and
Zach Smith.
Breaking unlinkability
of the ICAO 9303 standard for e-passports using bisimilarity.
In Kazue Sako, Steve Schneider, and Peter Y. A. Ryan, editors, Proc. 24th European Symposium On Research In Computer Security (ESORICS'19),
volume 11735 of Lecture Notes in Computer Science, pages
577-594, Luxembourg, September 23-27 2019. Springer-Verlag.
- [23]
- Ravi Jhawar, Karim Lounis, Sjouke Mauw, and
Yunior Ramírez-Cruz.
Semi-automatically
augmenting Attack Trees using an annotated Attack Tree library.
In S.K. Katsikas and C. Alcaraz, editors, Proc. 14th Workshop on
Security and Trust Management (STM'18), volume 11091 of Lecture
Notes in Computer Science, pages 85-101, Barcelona, Spain, September
6-7 2018. Springer-Verlag.
- [24]
- Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, and
Rolando Trujillo-Rasua.
Automated
identification of desynchronisation attacks on shared secrets.
In J. Lopez, J. Zhou, and M. Soriano, editors, Proc. 23th European
Symposium On Research In Computer Security (ESORICS'18), volume 11098
of Lecture Notes in Computer Science, pages 406-426, Barcelona,
Spain, September 3-7 2018. Springer-Verlag.
- [25]
- Ross Horne, Sjouke Mauw, and Alwen Tiu.
The attacker does not
always hold the initiative: attack trees with external refinement.
In George Cybenko, David Pym, and Barbara Fila, editors, Proc. 5th
International Workshop on Graphical Models for Security (GraMSec'18),
volume 11086 of LNCS, pages 90-110, Oxford, UK, 2018. Springer
Verlag.
- [26]
- Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, and
Rolando Trujillo-Rasua.
Distance-bounding
protocols: Verification without time and location.
In Proc. 39th IEEE Symposium on Security and Privacy (S&P'18),
pages 549-566, San Francisco, USA, May 21-23 2018. IEEE.
- [27]
- Hugo Jonker, Sjouke Mauw, and Tom Schmitz.
Reverse Bayesian
poisoning: How to use spam filters to manipulate online elections.
In R. Krimmer et al., editor, Proc. 2nd International Joint Conference
on Electronic Voting (E-Vote-ID'17), volume 10615 of Lecture
Notes in Computer Science, pages 183-197, Bregenz, Austria, October
24-27 2017. Springer-Verlag.
- [28]
- Olga Gadyatskaya, Ravi Jhawar, Sjouke Mauw,
Rolando Trujillo-Rasua, and Tim Willemse.
Refinement-aware
generation of attack trees.
In G. Livraga and C. Mitchell, editors, Proc. 13th Workshop on
Security and Trust Management (STM'17), volume 10547 of Lecture
Notes in Computer Science, pages 164-179, Oslo, Norway, September
14-15 2017. Springer-Verlag.
- [29]
- Ravi Jhawar and Sjouke Mauw.
Model-driven situational
awareness for moving target defense.
In Marc Scanlon and Nhien-An Le-Khac, editors, Proc. 16th European
Conference on Cyber Warfare and Security (ECCWS'17), pages 184-192,
Dublin, Ireland, June 29-30 2017. ACPI.
- [30]
- Hugo Jonker and Sjouke Mauw.
A security perspective on
publication metrics.
In F. Stajano et al., editor, Proc. 25th Security Protocols
Workshop, volume 10476 of LNCS, pages 186-200,
Cambridge, United Kingdom, March 20-22 2017. Springer-Verlag.
- [31]
- Sjouke Mauw, Jorge Toro-Pozo, and Rolando
Trujillo-Rasua.
Optimality results on
the security of lookup-based protocols.
In G. Hancke and K. Markantonakis, editors, Proc. 12th Workshop on
RFID and IoT Security (RFIDSec'16), volume 10155 of Lecture
Notes in Computer Science, pages 137-150, Hong Kong, November
30-December 2 2016. Springer-Verlag.
- [32]
- Gabriele Lenzini, Sjouke Mauw, and Samir
Ouchani.
Analysing the efficacy
of security policies in cyber-physical socio-technical systems.
In G. Barthe, E. Markatos, and P. Samarati, editors, Proc. 12th
Workshop on Security and Trust Management (STM'16), volume 9871 of
Lecture Notes in Computer Science, pages 170-178, Heraklion,
Greece, September 26-27 2016. Springer-Verlag.
- [33]
- Ravi Jhawar, Karim Lounis, and Sjouke Mauw.
A stochastic framework
for quantitative analysis of attack-defense trees.
In G. Barthe, E. Markatos, and P. Samarati, editors, Proc. 12th
Workshop on Security and Trust Management (STM'16), volume 9871 of
Lecture Notes in Computer Science, pages 138-153, Heraklion,
Greece, September 26-27 2016. Springer-Verlag.
- [34]
- Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw,
Cédric Muller, and Steve Muller.
Bridging two worlds:
Reconciling practical risk assessment methodologies with theory of attack
trees.
In Barbara Kordy, Mathias Ekstedt, and Dong Seong Kim, editors, Proc. 3rd International Workshop on Graphical Models for Security
(GraMSec'16), volume 9987 of LNCS, pages 80-93, Lisbon,
Portugal, 2016. Springer Verlag.
- [35]
- Olga Gadyatskaya, Ravi Jhawar, Piotr Kordy,
Karim Lounis, Sjouke Mauw, and Rolando Trujillo-Rasua.
Attack trees for
practical security assessment: Ranking of attack scenarios with ADTool
2.0.
In Gul Agha and Benny Van Houdt, editors, Proc. 13th International
Conference on Quantitative Evaluation of SysTems (QEST'16), volume
9826 of LNCS, pages 159-162, Québec city, Canada, August
23-25 2016. Springer Verlag.
- [36]
- Sjouke Mauw, Rolando Trujillo-Rasua, and
Bochuan Xuan.
Counteracting active
attacks in social network graphs.
In Silvio Ranise and Vipin Swarup, editors, Proc. 13th Annual IFIP
WGII.3 Working Conference on Data and Applications Security and Privacy
(DBSec'16), volume 9766 of LNCS, pages 233-248, Trento,
Italy, July 18-21 2016. Springer-Verlag.
- [37]
- Ravi Jhawar, Sjouke Mauw, and Irfan Zakiuddin.
Automating cyber defence
responses using attack-defense trees and game theory.
In Robert Koch and Gabi Rodosek, editors, Proc. 15th European Conference
on Cyber Warfare and Security (ECCWS'16), pages 163-172, Munich,
Germany, July 7-8 2016. ACPI.
- [38]
- Hugo Jonker, Sjouke Mauw, and Rolando
Trujillo-Rasua.
Man-in-the-middle
attacks evolved... but our security models didn't.
In J. Anderson, V. Matyás, B. Christianson, and F. Stajano, editors,
Proc. 24th Security Protocols Workshop, volume 10368 of
LNCS, pages 19-25, Brno, Czech Republic, April 7-8 2016.
Springer-Verlag.
- [39]
- Sjouke Mauw, Jorge Toro-Pozo, and Rolando
Trujillo-Rasua.
A class of
precomputation-based distance-bounding protocols.
In Proc. 1st IEEE European Symposium on Security and Privacy
(EuroS&P'16), pages 97-111, Saarbrücken, Germany, March 21-24
2016. IEEE.
- [40]
- Christof Ferreira Torres, Hugo Jonker, and
Sjouke Mauw.
FP-Block: usable web
privacy by controlling browser fingerprinting.
In Günther Pernul, Peter Y.A. Ryan, and Edgar Weippl, editors, Proc. 20th European Symposium On Research In Computer Security (ESORICS'15), Part
II, volume 9327 of Lecture Notes in Computer Science,
pages 3-19, Vienna, Austria, September 23-25 2015. Springer-Verlag.
- [41]
- Ravi Jhawar, Barbara Kordy, Sjouke Mauw,
Sasa Radomirovic, and Rolando Trujillo-Rasua.
Attack trees with
sequential conjunction.
In H. Federrath and D. Gollmann, editors, Proc. 30th IFIP TC-11
International Information Security and Privacy Conference
(IFIPSec'15), volume 455 of IFIP AICT, pages 339-353,
Hamburg, Germany, May 31-28 2015. Springer-Verlag.
- [42]
- Hugo Jonker, Sjouke Mauw, and Sasa
Radomirovic.
Location-private
interstellar communication.
In B. Christianson et al., editor, Proc. 23rd Security Protocols
Workshop, volume 9379 of LNCS, pages 105-115, Cambridge,
United Kingdom, March 31-April 2 2015. Springer-Verlag.
- [43]
- Sjouke Mauw.
Location-private interstellar communication (Transcript of Discussion).
In B. Christianson et al., editor, Proc. 23rd Security Protocols
Workshop, volume 9379 of LNCS, pages 116-125, Cambridge,
United Kingdom, March 31-April 2 2015. Springer-Verlag.
- [44]
- S. Mauw and S. Radomirovic.
Generalizing multi-party
contract signing.
In R. Focardi and A. Myers, editors, Proc. 4th Conference on Principles
of Security and Trust (POST'15), volume 9036 of LNCS,
pages 156-175, London, UK, April 11-18 2015. Springer Verlag.
- [45]
- Zhang Jie, Yang Liu, Sjouke Mauw, and Tim
Muller.
On robustness of trust
systems.
In Proc. 8th IFIP WG 11.11 International Conference on Trust Management
(IFIPTM'14), pages 44-60, Singapore, July 7-10 2014. IFIP.
- [46]
- Piotr Kordy, Rom Langerak, Sjouke Mauw, and
Jan Willem Polderman.
A symbolic algorithm
for the analysis of robust timed automata.
In Cliff Jones, Pekka Pihlajasaari, and Jun Sun, editors, Proc. 19th
International Symposium on Formal Methods (FM'14), volume 8442 of
LNCS, pages 351-366, Singapore, May 12-16 2014. Springer
Verlag.
- [47]
- X. Chen, C. Harpes, G. Lenzini, M. Martins,
S. Mauw, and J. Pang.
Demo: Demonstrating a
trust framework for evaluating GNSS signal integrity.
In Proc. 20th ACM Conference on Computer and Communications Security
(CCS'13), pages 1329-1332. ACM Press, 2013.
- [48]
- Barbara Kordy, Piotr Kordy, Sjouke Mauw,
and Patrick Schweitzer.
ADTool: Security
analysis with attack-defense trees.
In Proc. 10th International Conference on Quantitative Evaluation of
SysTems (QEST'13), volume 8054 of LNCS, pages 173-176,
Buenos Aires, Argentina, 2013. Springer Verlag.
- [49]
- X. Chen, G. Lenzini, M. Martins,
S. Mauw, and J. Pang.
A trust framework
for evaluating GNSS signal integrity.
In Proc. 26th IEEE Computer Security Foundations Symposium
(CSF'13), pages 179-192, New Orleans, USA, 2013. IEEE Computer
Society.
- [50]
- B. Kordy, S. Mauw, and P. Schweitzer.
Quantitative
questions on attack-defense trees.
In Taekyoung Kwon, Mun-Kyu Lee, and Daesung Kwon, editors, Proc. 15th
Annual International Conference on Information Security and Cryptology
(ICISC'12), volume 7839 of Lecture Notes in Computer
Science, pages 49-64, Seoul, South Korea, November 28-30 2013.
Springer-Verlag.
- [51]
- S. Mauw and S. Piramuthu.
PUF-based
authentication protocol to address ticket-switching of RFID-tagged
items.
In A. Jøsang, P. Samarati, and M. Petrocchi, editors, Proc. 8th
Workshop on Security and Trust Management (STM'12), volume 7783 of
Lecture Notes in Computer Science, pages 209-224, Pisa, Italy,
September 13-14 2012. Springer-Verlag.
- [52]
- C. Harpes, M. Martins, X. Chen, G. Lenzini,
S. Mauw, and J. Pang.
Implementation and
validation of a localisation assurance service provider.
In Proc. 6th ESA Workshop on Satellite Navigation Technologies
(NAVITEC'12), pages 1-8, Noordwijk, The Netherlands, December 5-7
2012. IEEE.
- [53]
- X. Chen, G. Lenzini, S. Mauw, and J. Pang.
A group signature based
electronic toll pricing system.
In International Conference on Availability, Reliability and Security
(ARES'12), pages 85-93, Prague, Czech Republic, August 20-24 2012.
IEEE Computer Society.
- [54]
- Q. Li, P. Schaffer, J. Pang, and S. Mauw.
Comparative analysis of
clustering protocols with probabilistic model checking.
In T. Margaria, Z. Qiu, and H. Yang, editors, Sixth IEEE International
Symposium on Theoretical Aspects of Software Engineering (TASE'12),
pages 249-252, Beijing, China, July 4-6 2012. IEEE Computer Society.
- [55]
- D. Marnach, S. Mauw, M. Martins, and
C. Harpes.
Detecting meaconing
attacks by analysing the clock bias of GNSS receivers.
In European Navigation Conference (ENC 2012), Gdansk, Poland,
April 25-27 2012.
- [56]
- Q. Yuan, J. Pang, S. Mauw, P. Trairatphisan,
M. Wiesinger, and T. Sauter.
A study of the PDGF
signaling pathway with PRISM.
In 3rd International Workshop on Computational Models for Cell Processes
(CompMod 2011), volume 67 of Electronic Proceedings in
Theoretical Computer Science, pages 65-81, Aachen, Germany, September
10 2011.
- [57]
- W. Jamroga, S. Mauw, and M. Melissen.
Fairness in
non-repudiation protocols.
In C. Meadows and C. Fernandez-Gago, editors, Proc. 7th Workshop on
Security and Trust Management (STM'11), volume 7170 of Lecture
Notes in Computer Science, pages 122-139, Copenhagen, Denmark, June
27-28 2012. Springer-Verlag.
- [58]
- T. van Deursen, S. Mauw, and S. Radomirovic.
mCarve: Carving
attributed dump sets.
In Proc. 20th USENIX Security Symposium, pages 107-121, San
Francisco, USA, August 8-12 2011. USENIX Association.
- [59]
- G. Lenzini, S. Mauw, and J. Pang.
Selective location
blinding using hash chains.
In B. Christianson et al., editor, Proc. 19th Security Protocols
Workshop, volume 7114 of LNCS, pages 132-141, Cambridge,
United Kingdom, March 28-30 2011. Springer-Verlag.
- [60]
- S. Mauw.
Selective location blinding using hash chains (Transcript of Discussion).
In B. Christianson et al., editor, Proc. 19th Security Protocols
Workshop, volume 7114 of LNCS, pages 142-149, Cambridge,
United Kingdom, March 28-30 2011. Springer-Verlag.
- [61]
- B. Kordy, S. Mauw, M. Melissen, and
P. Schweitzer.
Attack-defense trees
and two-player binary zero-sum extensive form games are equivalent.
In Proc. 1st Conference on Decision and Game Theory for Security
(GameSec 2010), volume 6442 of Lecture Notes in Computer
Science, pages 245-256, Berlin, Germany, November 22-23 2010.
Springer-Verlag.
- [62]
- Y. Sun, C. Zhang, J. Pang, B. Alcalde, and
S. Mauw.
A trust-augmented
voting scheme for collaborative privacy management.
In J. Cuellar, J. Lopez, G. Barthe, and A. Pretschner, editors, Proc. 6th Workshop on Security and Trust Management (STM'10), volume 6710 of
Lecture Notes in Computer Science, pages 132-146, Athens,
Greece, September 23-24 2011. Springer-Verlag.
- [63]
- B. Kordy, S. Mauw, S. Radomirovic, and
P. Schweitzer.
Foundations of
attack-defense trees.
In Pierpaolo Degano, Sandro Etalle, and Joshua Guttman, editors, Proc. 7th Workshop on Formal Aspects in Security and Trust (FAST'10), volume
6561 of Lecture Notes in Computer Science, pages 80-95, Pisa,
Italy, September 13-18 2010. Springer-Verlag.
- [64]
- S. Mauw, S. Radomirovic, and P.Y. Ryan.
Security protocols for
Secret Santa.
In Bruce Christianson and James Malcolm, editors, Proc. 18th Security
Protocols Workshop, volume 7601 of Lecture Notes in Computer
Science, pages 175-184, Cambridge, United Kingdom, March 24-26 2010.
Springer-Verlag.
- [65]
- S. Mauw.
Security protocols for Secret Santa (Transcript of Discussion).
In Bruce Christianson and James Malcolm, editors, Proc. 18th Security
Protocols Workshop, volume 7601 of Lecture Notes in Computer
Science, pages 185-190, Cambridge, United Kingdom, March 24-26 2010.
Springer-Verlag.
- [66]
- B. Alcalde and S. Mauw.
An algebra for trust
dilution and trust fusion.
In Pierpaolo Degano and Joshua Guttman, editors, Proc. 6th Workshop on
Formal Aspects in Security and Trust (FAST'09), volume 5983 of
Lecture Notes in Computer Science, pages 4-20, Eindhoven, The
Netherlands, November 5-6 2009. Springer-Verlag.
- [67]
- Y. Zhang, C. Zhang, J. Pang, and S. Mauw.
Game-based verification
of multi-party contract signing protocols.
In Pierpaolo Degano and Joshua Guttman, editors, Proc. 7th Workshop on
Formal Aspects in Security and Trust (FAST'09), volume 5983 of
Lecture Notes in Computer Science, pages 186-200, Eindhoven,
The Netherlands, November 5-6 2009. Springer-Verlag.
- [68]
- T. van Deursen, S. Mauw, S. Radomirovic, and
P. Vullers.
Secure ownership and
ownership transfer in RFID systems.
In Michael Backes and Peng Ning, editors, Proc. 14th European Symposium
On Research In Computer Security (ESORICS'09), volume 5789 of
Lecture Notes in Computer Science, pages 637-654, Saint-Malo,
France, September 21-23 2009. Springer-Verlag.
- [69]
- S. Mauw, S. Radomirovic, and M. Torabi
Dashti.
Minimal message
complexity of asynchronous multi-party contract signing.
In Proceedings of the 22nd IEEE Computer Security Foundations Symposium
(CSF'09), pages 13-25, Port Jefferson, USA, July 8-10 2009. IEEE
Computer Society.
- [70]
- Hugo Jonker, Sjouke Mauw, and Jun Pang.
Measuring
voter-controlled privacy.
In Proc. 4th Conference on Availability, Reliability and Security -
ARES'09, pages 289-298. IEEE Computer Society, 2009.
- [71]
- Baptiste Alcalde, Eric Dubois, Sjouke Mauw,
Nicolas Mayer, and Sasa Radomirovic.
Towards a decision
model based on trust and security risk management.
In Ljiljana Brankovic and Willy Susilo, editors, Proc. 7th Australasian
Information Security Conference - AISC'09, volume 98 of
Conferences in Research and Practice in Information Technology
(CRPIT), pages 61-69, New Zealand, Wellington, January 20-23 2009.
Australian Computer Society.
- [72]
- T. van Deursen, S. Mauw, and
S. Radomirovic.
Untraceability of
RFID protocols.
In Information Security Theory and Practices. Smart Devices, Convergence
and Next Generation Networks, volume 5019 of LNCS, pages
1-15, Seville, Spain, 2008. Springer.
- [73]
- J. Cederquist, M. Torabi Dashti, and
S. Mauw.
A certified email
protocol using key chains.
In Proceedings of the 21st International Conference on Advanced
Information Networking and Applications Workshops - Volume 01
(AINAW'07), pages 525-530, Los Alamitos, CA, USA, 2007. IEEE Computer
Society.
- [74]
- B. Bouwman, S. Mauw, and M. Petkovic.
Rights management for
role-based access control.
In Fifth Annual IEEE Consumer Communications & Networking Conference
2008 (CCNC'08), pages 1085-1090, Las Vegas, USA, January 2008.
IEEE.
- [75]
- P. Ceelen, S. Mauw, and S. Radomirovic.
Chosen-name attacks: An
overlooked class of type-flaw attacks.
In 3rd International Workshop on Security and Trust Management
(STM'07), volume 197 of ENTCS, pages 31-43, Dresden,
Germany, February 2008.
- [76]
- S. Mauw, J.H.S. Verschuren, and E.P.
de Vink.
Data anonymity in the
FOO voting scheme.
In M. ter Beek and F. Gadducci, editors, Second International Workshop on
Views On Designing Complex Architectures (VODCA 2006), volume 168 of
ENTCS, pages 5-28, Bertinoro, Italy, Feb 2007.
- [77]
- C.J.F. Cremers and S. Mauw.
A family of
multi-party authentication protocols - extended abstract.
In 1st Benelux Workshop on Information and System Security --
WISSEC'06, Antwerpen, Belgium, November 2006.
- [78]
- S. Mauw, I. van Vessem, and B. Bos.
Forward secure
communication in wireless sensor networks.
In John A. Clark, Richard F. Paige, Fiona Polack, and Phillip J. Brooke,
editors, Third International Conference Security in Pervasive Computing
(SPC'06), LNCS 3934, pages 32-42, York, UK, April 2006.
Springer-Verlag, Berlin.
- [79]
- Sjouke Mauw and Martijn Oostdijk.
Foundations of attack
trees.
In Dongho Won and Seungjoo Kim, editors, Proc. 8th International
Conference on Information Security and Cryptology (ICISC'05), volume
3935 of Lecture Notes in Computer Science, pages 186-198,
Seoul, South Korea, 2006. Springer-Verlag.
- [80]
- Gopakumar G Nair, Ajeesh Gopalakrishnan,
Sjouke Mauw, and Erik Moll.
XML security in
the next generation optical disc context.
In W. Jonker and M. Petkovic, editors, Second workshop on Secure Data
Management, SDM'05, LNCS 3674, pages 217-233, Trondheim, Norway,
September 2005. Springer-Verlag, Berlin.
- [81]
- C.J.F. Cremers, S. Mauw, and E.P. de Vink.
A syntactic criterion
for injectivity of authentication protocols.
In P. Degano and L. Viganò, editors, Proceedings of the Second Workshop
on Automated Reasoning for Security Protocol analysis (ARSPA 2005),
volume 135(1) of ENTCS, pages 23-38, Lisboa, Portugal, 2005.
Elsevier.
- [82]
- Stefan Blom, Jan Friso Groote, Sjouke
Mauw, and Alexander Serebrenik.
Analysing the
BKE-security protocol with mCRL.
In Proceedings of ARTS 2004, the 6th AMAST Workshop on Real-Time
Systems, volume 139(1) of ENTCS, pages 49-90, 2005.
- [83]
- C.J.F. Cremers and S. Mauw.
Operational semantics
of security protocols.
In S. Leue and T.J. Systä, editors, Scenarios: Models, Algorithms and
Tools (Dagstuhl 03371 post-seminar proceedings), LNCS 3466, pages
66-89, 2005.
- [84]
- S. Mauw, J.H.S. Verschuren, and E.P.
de Vink.
A formalization of
anonymity and onion routing.
In P. Samarati, P. Ryan, D. Gollmann, and R. Molva, editors,
ESORICS'04, pages 109-124, Sophia Antipolis, 2004.
- [85]
- C.J.F. Cremers and S. Mauw.
Checking secrecy by
means of partial order reduction.
In D. Amyot and A.W. Williams, editors, SAM 2004: Security Analysis and
Modelling, volume LNCS 3319 of Proceedings of the fourth SDL and
MSC Workshop, pages 177-194, Ottawa, Canada, September 2004.
Springer-Verlag, Berlin.
- [86]
- H.L. Jonker, S. Mauw, J.H.S. Verschuren, and
A.T.S.C. Schoonen.
Security aspects of
DRM systems.
In R. Pellikaan, editor, 25th Symposium on information theory in the
Benelux, pages 169-176, Kerkrade, The Netherlands, June 2004.
- [87]
- H.M.A. van Beek and S. Mauw.
Automatic conformance
testing of internet applications.
In Proceedings of the Third international Workshop on Formal Approaches
to Testing of Software (FATES 2003), LNCS 2931, pages 205-222,
Montreal, Canada, October 2003.
- [88]
- C.J.F. Cremers, S. Mauw, and E.P. de Vink.
Defining
authentication in a trace model.
In Theo Dimitrakos and Fabio Martinelli, editors, FAST 2003,
Proceedings of the first international Workshop on Formal Aspects in Security
and Trust, pages 131-145, Pisa, September 2003. IITT-CNR technical
report.
- [89]
- L.M.G. Feijs, N. Goga, S. Mauw, and
J. Tretmans.
Test selection,
trace distance and heuristics.
In TestCom 2002, Proceedings of the 14th International Conference
on Testing of Communicating Systems, pages 267-282, Berlin, March 2002.
Kluwer Academic Publishers.
- [90]
- S. Mauw, W.T. Wiersma, and T.A.C. Willemse.
Language-driven
system design.
In HICSS-35, Proceedings of the Thirty-Fifth Annual Hawaii
International Conference on System Sciences, minitrack on Domain-Specific
Languages for Software Engineering, Hawaii, January 2002. IEEE Computer
Society.
- [91]
- J.C.M. Baeten, H.M.A. van Beek, and
S. Mauw.
An MSC based
representation of DiCons.
In Rick Reed and Jeanne Reed, editors, SDL 2001, Proceedings of
the tenth SDL Forum, pages 328-347, Copenhagen, June 2001.
- [92]
- J.C.M. Baeten, H.M.A. van Beek, and S. Mauw.
Specifying Internet
applications with DiCons.
In Proceedings 16th ACM Symposium on Applied Computing (SAC
2001), pages 576-584, Las Vegas, USA, March 2001.
- [93]
- H. Vranken, T. Garcia Garcia, S. Mauw, and
L. Feijs.
IC design
validation using Message Sequence Charts.
In Proc. 26th Euromicro Conference, Digital Systems Design
DSD'2000, volume 1, pages 122-127, Maastricht, The Netherlands,
September 5-7 2000. IEEE Computer Society.
- [94]
- L.M.G. Feijs, N. Goga, and S. Mauw.
Probabilities in the
TorX test derivation algorithm.
In Susanne Graf, Claude Jard, and Yair Lahav, editors, SAM2000 - 2nd
Workshop on SDL and MSC, pages 173-188, Col de Porte, Grenoble, June
2000. VERIMAG, IRISA, SDL Forum Society.
- [95]
- W. Janssen, R. Mateescu, S. Mauw,
P. Fennema, and P. van der Stappen.
Model checking
for managers.
In Dennis Dams, Rob Gerth, Stefan Leue, and Mieke Massink, editors,
Theoretical and practical aspects of SPIN Model Checking, Proceedings
of the 5th and 6th International SPIN Workshops, Lecture Notes in
Computer Science 1680, pages 92-107, Toulouse, France, September 1999.
Springer Verlag.
- [96]
- A. Belinfante, J. Feenstra, R.G. de Vries,
J. Tretmans, N. Goga, L. Feijs, S. Mauw, and L. Heerink.
Formal test automation:
A simple experiment.
In G. Csopaki, S. Dibuz, and K. Tarnay, editors, 12th Int. Workshop
on Testing of Communicating Systems, pages 179-196. Kluwer Academic
Publishers, 1999.
- [97]
- A.G. Engels, L.M.G. Feijs, and S. Mauw.
MSC and data:
dynamic variables.
In R. Dssouli, G.v. Bochmann, and Y. Lahav, editors, SDL'99,
Proceedings of the Ninth SDL Forum, pages 105-120, Montreal, June 21-25
1999. Elsevier Science Publishers B.V.
- [98]
- W. Janssen, R. Mateescu, S. Mauw, and
J. Springintveld.
Verifying business
processes using spin.
In Gerard Holzmann, Elie Najm, and Ahmed Serhrouchni, editors,
Proceedings of the 4th International SPIN Workshop (Paris,
France), pages 21-36, Paris, November 1998. Ecole Nationale
Supérieure des Télécommunications.
- [99]
- L.M.G. Feijs and S. Mauw.
MSC and data.
In Yair Lahav, Adam Wolisz, Joachim Fischer, and Eckhardt Holz, editors,
SAM98 - 1st Workshop on SDL and MSC. Proceedings of the SDL Forum
Society on SDL and MSC, number 104 in Informatikberichte, pages
85-96. Humboldt-Universität Berlin, 1998.
- [100]
- A. Engels, S. Mauw, and M.A. Reniers.
A hierarchy of
communication models for Message Sequence Charts.
In T. Mizuno, N. Shiratori, T. Higashino, and A. Togashi, editors,
FORTE/PSTV'97, pages 75-90, Osaka, Japan, november 1997.
Chapman & Hall.
- [101]
- S. Mauw and M.A. Reniers.
High-level Message
Sequence Charts.
In A. Cavalli and A. Sarma, editors, SDL'97: Time for Testing - SDL, MSC
and Trends, Proceedings of the Eighth SDL Forum, pages 291-306, Evry,
France, September 1997.
- [102]
- A. Engels, L.M.G. Feijs, and S. Mauw.
Test generation for
intelligent networks using model checking.
In E. Brinksma, editor, TACAS'97, Lecture Notes in Computer
Science 1217, pages 384-398. Springer, 1997.
- [103]
- S. Mauw and M.A. Reniers.
Refinement in
Interworkings.
In U. Montanari and V. Sassone, editors, Proc. CONCUR'96, LNCS
1119, pages 671-686. Pisa, Springer, 1996.
- [104]
- S. Mauw and P. D'Argenio.
Delayed choice for
process algebra with abstraction.
In Proc. CONCUR '95. Philadelphia, Springer Verlag, 1995.
- [105]
- S. Mauw and E.A. van der Meulen.
Generating tools for
Message Sequence Charts.
In R. Bræk and A. Sarma, editors, SDL'95 with MSC in CASE,
Proceedings of the Seventh SDL Forum, pages 51-62, Oslo, 1995. Elsevier
Science Publishers B.V.
- [106]
- J.C.M. Baeten and S. Mauw.
Delayed choice: an
operator for joining Message Sequence Charts.
In D. Hogrefe and S. Leue, editors, Formal Description Techniques,
VII, pages 340-354. Chapman & Hall, 1995.
- [107]
- S. Mauw and J.C. Mulder.
Regularity of
BPA-systems is decidable.
In B. Jonsson and J. Parrow, editors, Proc. CONCUR '94, LNCS 836,
pages 34-47. Uppsala, Springer Verlag, 1994.
- [108]
- J.J. Brunekreef, J.-P. Katoen,
R. Koymans, and S. Mauw.
Algebraic
specification of dynamic leader election protocols in broadcast networks.
In A. Ponse, C. Verhoef, and S.F.M van Vlijmen, editors, Algebra of
Communicating Processes, Proceedings of ACP94, Workshops in Computing,
pages 338-358. Springer, 1994.
- [109]
- S. Mauw, M. van Wijk, and T. Winter.
A formal semantics of
synchronous Interworkings.
In O. Færgemand and A. Sarma, editors, SDL'93 Using Objects,
Proceedings of the Sixth SDL Forum, pages 167-178, Darmstadt, 1993. Elsevier
Science Publishers B.V.
- [110]
- S. Mauw and F. Wiedijk.
Specification of the
transit node in PSFd.
In J.A. Bergstra and L.M.G. Feijs, editors, Algebraic Methods II: Theory,
Tools and Applications, Springer LNCS 490, pages 341-361, 1991.
- [111]
- S. Mauw and G.J. Veltink.
A proof assistant for
PSF.
In K.G. Larsen and A. Skou, editors, Proc. Third Workshop on Computer
Aided Verification (CAV'91), Springer LNCS 575, pages 158-168,
Aalborg, 1992.
- [112]
- J.C.M. Baeten, J.A. Bergstra, S. Mauw, and
G.J. Veltink.
A process specification
formalism based on static COLD.
In J.A. Bergstra and L.M.G. Feijs, editors, Algebraic Methods II: Theory,
Tools and Applications, Springer LNCS 490, pages 303-335, 1991.
- [113]
- S. Mauw.
An algebraic specification
of process algebra, including two examples.
In M. Wirsing and J.A. Bergstra, editors, Algebraic Methods: Theory,
Tools and Applications, Springer LNCS 394, pages 507-554, Passau,
1989.
- [114]
- S. Mauw and G.J. Veltink.
An introduction to
PSFd.
In J. Diaz and F. Orejas, editors, Proc. International Joint Conference
on Theory and Practice of Software Development, TAPSOFT '89,
Springer LNCS 352, pages 272-285, 1989.
- [115]
- S. Mauw.
A constructive version of
the approximation induction principle.
In Proc. SION Conf. CSN 87, pages 235-252, Amsterdam, 1987.
Books/Book chapters/Standards/Edited volumes
- [1]
- Marco Crepaldi, Ross Horne, and Sjouke Mauw.
Space Law in a
Networked World (P.J. Blount and M. Hofmann, eds.), chapter
Software certification as a limit on liability: The case of cubesat
operations, pages 162-185.
Studies in Space Law. Brill, 2023.
- [2]
- Sjouke Mauw and Mauro Conti, editors.
Proceedings of
the 15th International Workshop on Security and Trust Management (STM 2019),
Luxembourg, September 26-27, 2019, volume 11738 of Lecture
Notes in Computer Science. Springer, 2019.
- [3]
- Peng Liu, Sjouke Mauw, and Ketil Stølen,
editors.
Proceedings of
the Fourth International Workshop on Graphical Models for Security (GraMSec
2017), Santa Barbara, CA, USA, August 21, 2017, volume 10744 of
Lecture Notes in Computer Science. Springer, 2018.
- [4]
- Sheikh Mahbub Habib, Julita Vassileva, Sjouke
Mauw, and Max Mühlhäuser, editors.
Proceedings of
the 10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM
2016), Darmstadt, Germany, July 18-22, 2016, volume 473 of
IFIP Advances in Information and Communication Technology.
Springer, 2016.
- [5]
- Sjouke Mauw, Barbara Kordy, and Sushil Jajodia,
editors.
Proceedings of
the Second International Workshop on Graphical Models for Security (GraMSec
2015), Verona, Italy, July 13, 2015, volume 9390 of Lecture
Notes in Computer Science. Springer, 2016.
- [6]
- Jun Pang, Yang Liu, and Sjouke Mauw, editors.
Proceedings
of the 4th International Workshop on Engineering Safety and Security Systems
(ESSS 2015), Oslo, Norway, June 22, 2015, volume 184 of
Electronic Proceedings in Theoretical Computer Science, 2015.
- [7]
- Sjouke Mauw and Christian Damsgaard Jensen,
editors.
Proceedings of
the 10th International Workshop on Security and Trust Management (STM 2014),
Wroclaw, Poland, September 10-11, 2014, volume 8743 of
Lecture Notes in Computer Science. Springer, 2014.
- [8]
- Barbara Kordy, Sjouke Mauw, and Wolter Pieters,
editors.
Proceedings
of the First International Workshop on Graphical Models for Security (GraMSec
2014), Grenoble, France, April 12, 2014, volume 148 of
EPTCS, 2014.
- [9]
- C. Cremers and S. Mauw.
Operational
semantics and verification of security protocols.
Springer-Verlag, 2012.
- [10]
- H. Jonker, S. Mauw, and J. Pang.
Digital
Enlightenment Yearbook 2012 (J. Bus, M. Crampton, M. Hildebrandt, G.
Metakides, eds.), chapter Location-based Services: Privacy,
Security and Assurance, pages 235-244.
IOS Press, 2012.
- [11]
- M. Torabi Dashti and S. Mauw.
Handbook of
Financial Cryptography and Security (G. Rosenberg, ed.), chapter
Fair Exchange, pages 109-132.
Chapman and Hall/CRC, 2010.
- [12]
- H.L. Jonker and S. Mauw.
Handbook of
research on secure multimedia distribution (Shiguo Lian and Yan Zhang,
eds.), chapter Discovering the core security requirements of DRM
systems by means of objective trees, pages 71-85.
IGI Global publications, 2009.
- [13]
- S. Mauw, F. Massacci, and F. Piessens (guest
editors).
Special
issue on security and trust.
Science of Computer Programming, 74(1-2), December 2008.
- [14]
- Stig Fr. Mjølsnes, Sjouke Mauw, and
Sokratis K. Katsikas, editors.
Public
Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI
2008, Trondheim, Norway, June 16-17, 2008, Proceedings, volume
5057 of Lecture Notes in Computer Science. Springer, 2008.
- [15]
- H.L. Jonker and S. Mauw.
Digital Rights
Management -- An Introduction (D. Satish, ed.), chapter Core
security requirements of DRM systems, pages 73-90.
ICFAI University Press, 2007.
- [16]
- S. Mauw, V. Issarny, and C.J.F. Cremers,
editors.
STM'05,
Proceedings of the First International Workshop on Security and Trust
Management, volume 157(3) of Electronic Notes in Theoretical
Computer Science.
Elsevier, Milan, Italy, September 2005.
- [17]
- S. Mauw (guest editor).
Special
issue on Visual Formal Methods '99.
Computer languages, 27(1-3), April-October 2001.
- [18]
- S. Mauw, M.A. Reniers, and T.A.C. Willemse.
Message Sequence
Charts in the software engineering process.
In S.K. Chang, editor, Handbook of Software Engineering and Knowledge
Engineering, pages 437-463. World Scientific Publishing Co., 2001.
- [19]
- S. Mauw and M.A. Reniers.
A process algebra for
Interworkings.
In Jan A. Bergstra, Alban Ponse, and Scott A. Smolka, editors, Handbook
of Process Algebra, pages 1269-1327. Elsevier, 2001.
- [20]
- J.C.M. Baeten and S. Mauw, editors.
CONCUR'99,
Proceedings of the 10th International Conference on Concurrency
Theory.
Lecture Notes in Computer Science 1664. Springer Verlag, Eindhoven, the
Netherlands, August 24-27 1999.
- [21]
- ITU-TS.
ITU-TS
Recommendation Z.120 Annex B: Algebraic semantics of Message Sequence
Charts.
ITU-TS, Geneva, 1995.
- [22]
- S. Mauw and G.J. Veltink, editors.
Algebraic
specification of communication protocols.
Cambridge Tracts in Theoretical Computer Science 36. Cambridge University
Press, 1993.
- [23]
- S. Mauw.
Process algebra as a tool
for the specification and verification of CIM-architectures.
In J.C.M. Baeten, editor, Applications of Process Algebra,
Cambridge Tracts in Theoretical Computer Science 17, pages 53-80. Cambridge
University Press, 1990.
- [24]
- S. Mauw.
PSF - A process specification formalism.
PhD thesis, Programming Research Group, University of Amsterdam, 1991.
Miscellaneous
- [1]
- Sergiu Bursuc, Ross Horne, Sjouke Mauw, and
Semen Yurkov.
Towards unlinkable smartcard-based payments: an extended abstract.
In Workshop on Foundations of Computer Security (FCS'22), Haifa,
Israel, 2022.
Informal proceedings.
- [2]
- Theo D'Hondt, Sjouke Mauw, and Wim Van Petegem.
Computer
Science in The Netherlands - Reflections on the state of the art.
QANU State-of-the-art report, Quality Assurance Netherlands Universities,
2020.
- [3]
- Jan Paredaens, Lex Bijlsma, Peter Boot, Koen De
Bosschere, Jaap van den Herik, Sjouke Mauw, Sape Mullender, Bart Preneel,
Wim Van Petegem, and Ruud Verbij.
Informaticaonderwijs aan Nederlandse Universiteiten in 2013 - State of
the Art.
QANU State-of-the-art report, Quality Assurance Netherlands Universities,
2014.
- [4]
- X. Chen, C. Harpes, G. Lenzini, S. Mauw, and
J. Pang.
Location assurance and
privacy in GNSS navigation.
ERCIM News, 94:11, July 2013.
- [5]
- W. Jamroga, S. Mauw, and M. Melissen.
Imperfect information and intention in non-repudiation protocols.
In Grande Region Security and Reliability Day (SecDay'11), Trier,
Germany, March 25 2011.
Informal proceedings.
- [6]
- X. Chen, G. Lenzini, S. Mauw, and J. Pang.
Hiding in groups: Anonymity-preserving electronic toll pricing.
In Grande Region Security and Reliability Day (SecDay'11), Trier,
Germany, March 25 2011.
Informal proceedings.
- [7]
- Baptiste Alcalde, Eric Dubois, Sjouke Mauw,
Nicolas Mayer, and Sasa Radomirovic.
Towards a decision model based on trust and security risk management.
In WISSec'08, 2009.
- [8]
- C.J.F. Cremers and S. Mauw.
Generalizing Needham-Schroeder-Lowe for multi-party authentication.
CS-Report 06/04, Department of Mathematics and Computing Science, Eindhoven
University of Technology, 2006.
- [9]
- H.L. Jonker and S. Mauw.
Core security requirements of DRM systems.
CS-Report 05/24, Department of Mathematics and Computing Science, Eindhoven
University of Technology, July 2005.
- [10]
- S. Mauw and M. Oostdijk.
Attack trees: Door de
bomen de bedreigingen zien.
GvIB Informatiebeveiliging, 7(1):16-17, February 2006.
- [11]
- C.J.F. Cremers, S. Mauw, and E.P.
de Vink.
Formal methods
for security protocols: Three examples of the black-box approach.
NVTI newsletter, 7:21-32, 2003.
Newsletter of the Dutch Association for Theoretical Computing Scientists.
- [12]
- J.C.M. Baeten, H.M.A. van Beek, and S. Mauw.
Operational semantics of DiCons, a formal language for developing internet
applications.
CS-Report 01/12, Department of Mathematics and Computing Science, Eindhoven
University of Technology, October 2001.
- [13]
- L.M.G. Feijs, N. Goga, S. Mauw, and
T. Willemse.
Proceedings 7e nederlandse testdag.
Report 01/10, Department of Mathematics and Computing Science, Eindhoven
University of Technology, 2001.
- [14]
- René de Vries, Jan Tretmans, Axel
Belinfante, Jan Feenstra, Loe Feijs, Sjouke Mauw, Nicolae Goga, Lex Heerink,
and Arjen de Heer.
Côte de Resyste
in PROGRESS.
In Jean Pierre Veen, editor, PROGRESS 2000, Proc. Workshop on Embedded
Systems, pages 141-148. Technology Foundation (STW), October 2000.
- [15]
- D. Bosnacki, S. Mauw, and T. Willemse.
Proceedings of the first international symposium on visual formal methods
VFM'99.
Report 99/08, Department of Mathematics and Computing Science, Eindhoven
University of Technology, 1999.
- [16]
- W. Janssen, S. Mauw, and J. Springintveld.
Feasibility of model checking in the context of business processes using amber
and spin.
Testbed/wp4/n011/v001, Telematica Research Centre, 1997.
- [17]
- B. Knaack and S. Mauw.
The usage of MSC with
uBET-toolsupport in the software development process.
In Network development Hans Uithol and support department, editors,
International call processing symposium. Lucent Technologies,
1999.
- [18]
- A. Engels and S. Mauw.
Why men (and octopuses) cannot juggle a four ball cascade.
In Dat is dus heel interessant - Liber Amicorum voor Paul Klint,
pages 109-115. Centre for Mathematics and Computer Science, November
1997.
- [19]
- S. Mauw and M.A. Reniers.
Operational semantics for MSC'96.
In A. Cavalli and D. Vincent, editors, SDL'97: Time for Testing - SDL,
MSC and Trends, Tutorials of the Eighth SDL Forum, pages 135-152,
Evry, France, September 1997.
- [20]
- S. Mauw and E.A. van der Meulen.
Specification of tools
for Message Sequence Charts.
In ASF+SDF '95. Amsterdam, 1995.
- [21]
- S. Mauw and J.C. Mulder.
A PSF library of data
types.
In ASF+SDF '95. Amsterdam, 1995.
- [22]
- S. Mauw and M.A. Reniers.
Hierarchical MSC.
SG10 meeting Geneva TD28, ITU-TS, September 1995.
- [23]
- S. Mauw and M.A. Reniers.
Thoughts on the meaning of conditions.
Experts meeting SG10, St. Petersburg TD9016, ITU-TS, 1995.
- [24]
- S. Mauw and H.T.G. Weffers.
PSF'95 - proceedings of a seminar on current use and future developments of
the process specification formalism.
Technical report, Eindhoven University of Technology, Formal Methods Group,
April 1995.
- [25]
- S. Mauw and M.A. Reniers.
Modifications to requirements.
Joint rapporteurs meeting SG10, Geneva TD9011, ITU-TS, 1994.
- [26]
- S. Mauw and M.A. Reniers.
Formalization of static requirements for Message Sequence Charts.
Joint rapporteurs meeting SG10, Geneva TD9010, ITU-TS, 1994.
- [27]
- S. Mauw.
Formele specifikatie met
PSF.
Xootic magazine tijdschrift voor technische informatica, pages
19-21, april 1993.
- [28]
- S. Mauw and M.A. Reniers.
A classification of Message Sequence Charts.
Joint rapporteurs meeting SG10, Geneva TD9041, ITU-TS, 1993.
- [29]
- S. Mauw, M. van Wijk, and T. Winter.
Syntax and semantics of
synchronous Interworkings - informal semantics.
Meeting SG10, Geneva, D.95-X/3, CCITT, 1992.
- [30]
- S. Mauw, M. van Wijk, and T. Winter.
Syntax and semantics of synchronous Interworkings - formal semantics.
Meeting SG10, Geneva, D.96-X/3, CCITT, 1992.
- [31]
- S. Mauw, M. van Wijk, and T. Winter.
Syntax and semantics of synchronous Interworkings.
Technical Report IST RWB-508-RE-92436, Philips, 1992.
- [32]
- S. Mauw and Gy. Max.
A formal specification of the Ethernet protocol.
Report P9007, Programming Research Group, University of Amsterdam, 1990.
- [33]
- H. Jacobsson and S. Mauw.
A token ring network in PSFd.
Report P8914, Programming Research Group, University of Amsterdam, 1989.
- [34]
- S. Mauw and G.J. Veltink.
A tool interface language for PSF.
Report P8912, Programming Research Group, University of Amsterdam, 1989.