Publications

@inproceedings{DMR11,
  author = {T. van Deursen and S. Mauw and S. Radomirovi\'c},
  title = {m{C}arve: {C}arving attributed dump sets},
  year = {2011},
  booktitle = {USENIX Security Symposium},
  publisher = {USENIX Association},
  pages = {107-121},
}
@inproceedings{DR11,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Insider attacks and privacy of {RFID} protocols},
  booktitle = {EuroPKI},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  year = {2011},
  note = {To appear}
}
@inproceedings{D11,
  author = {T. van Deursen},
  title = {50 Ways to Break {RFID} Privacy},
  booktitle = {Privacy and Identity 2010},
  publisher = {Springer},
  series = {IFIP AICT},
  volume = {352},
  pages = {192--205},
  year = {2011},
}
@inproceedings{DR10,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {{EC-RAC}: Enriching a Capacious {RFID} Attack Collection},
  year = {2010},
  booktitle = {6th Workshop on RFID Security (RFIDSec 2010)},
  series = {Lecture Notes in Computer Science},
  volume = {6370},
  pages = {75--90},
  publisher = {Springer},
}
@article{DR09d,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {On a new formal proof model for {RFID} location privacy},
  year = {2009},
  publisher = {Elsevier},
  journal = {Information Processing Letters},
  volume = {110},
  number = {2},
  pages = {57--61},
  doi = {10.1016/j.ipl.2009.10.007}
}
@inproceedings{DMRV09,
  author = {T. van Deursen and S. Mauw and S. Radomirovi\'c and P. Vullers},
  title = {Secure ownership and ownership transfer in {RFID} systems},
  year = {2009},
  booktitle = {Proc.\ 14th European Symposium On Research In Computer Security (ESORICS'09)},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  volume = {5789},
  pages = {637-654},
}
@inproceedings{DR09,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Algebraic Attacks on {RFID} Protocols},
  year = {2009},
  booktitle = {Information Security Theory and Practices. Smart Devices, Pervasive Systems, and Ubiquitous Networks (WISTP'09)},
  series = {Lecture Notes in Computer Science},
  volume = {5746},
  publisher = {Springer},
  note = {38--51},
}
@inproceedings{CDP09,
  author = {X. Chen and T. van Deursen and J. Pang},
  title = {Improving Automatic Verification of Security Protocols with {XOR}},
  year = {2009},
  booktitle = {Proc.\ International Conference on Formal Engineering Methods (ICFEM'09)},
  series = {Lecture Notes in Computer Science},
  volume = {5885},
  pages = {107--126},
  publisher = {Springer},
}
@techreport{DR09c,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Attacks on {RFID} protocols (version 1.1)},
  year = {2009},
  note = {\url{http://eprint.iacr.org/2008/310}},
}
@techreport{DR09b,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Untraceable {RFID} protocols are not trivially composable: {Attacks} on the revision of {EC-RAC}},
  year = {2009},
  note = {\url{http://eprint.iacr.org/2009/332}},
}
@techreport{DR08f,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {On a new formal proof model for {RFID} Location Privacy},
  year = {2008},
  note = {\url{http://eprint.iacr.org/2008/477}},
}
@techreport{DR08e,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Attacks on {RFID} protocols (version 1.0)},
  year = {2008},
  note = {\url{http://eprint.iacr.org/2008/310}},
}
@misc{DR08b,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Vulnerabilities in {RFID} protocols due to algebraic properties},
  year = {2008},
  howpublished = {3rd Benelux Workshop on Information and System Security},
}
@inproceedings{DR08a,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Security of an {RFID} Protocol for Supply Chains},
  year = {2008},
  pages = {568-573},
  publisher = {IEEE Computer Society},
  booktitle = {Proc.\ 1st Workshop on Advances in RFID (AIR'08)},
}
@inproceedings{DR08,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Security of {RFID} Protocols -- {A} Case Study},
  year = {2009},
  pages = {41--52},
  volume = {244},
  series = {ENTCS},
  publisher = {Elsevier},
  booktitle = {Proc.\ 4th International Workshop on Security 
     and Trust Management (STM'08)},
}
@inproceedings{DKP08a,
  author = {T. van Deursen and P. Koster and M. Petkovi\'c},
  title = {Reliable Personal Health Records},
  year = {2008},
  series = {Studies in Health Technology and Informatics},
  publisher = {IOS Press},
  booktitle = {{eHealth} Beyond the Horizon -- Get {IT} There -- Proceedings of {MIE2008} -- The {XXI}st International Congress on the European Federation for Medical Informatics},
  volume = {136},
  pages = {484--489},
}
@inproceedings{DMR08,
  author = {T. van Deursen and S. Mauw and S. Radomirovi\'c},
  title = {Untraceability of {RFID} Protocols},
  year = {2008},
  pages = {1-15},
  booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP'08)},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  volume = {5019},
}
@inproceedings{DKP08,
  author = {T. van Deursen and P. Koster and M. Petkovi\'c},
  title = {Hedaquin: {A} reputation-based health data quality indicator},
  year = {2008},
  series = {ENTCS},
  booktitle = {Proc.\ 3rd International Workshop on Security and Trust Management (STM'07)},
  volume = {197},
  issue = {2},
  pages = {159--167},
}
@mastersthesis{D07,
  author = {T. van Deursen},
  title = {Hedaquin: A reputation-based health data quality indicator for personal health record systems},
  year = {2007},
  school = {Technische Universiteit Eindhoven},
}