@inproceedings{DMR11,
author = {T. van Deursen and S. Mauw and S. Radomirovi\'c},
title = {m{C}arve: {C}arving attributed dump sets},
year = {2011},
booktitle = {USENIX Security Symposium},
publisher = {USENIX Association},
pages = {107-121},
}
@inproceedings{DR11,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Insider attacks and privacy of {RFID} protocols},
booktitle = {EuroPKI},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011},
note = {To appear}
}
@inproceedings{D11,
author = {T. van Deursen},
title = {50 Ways to Break {RFID} Privacy},
booktitle = {Privacy and Identity 2010},
publisher = {Springer},
series = {IFIP AICT},
volume = {352},
pages = {192--205},
year = {2011},
}
@inproceedings{DR10,
author = {T. van Deursen and S. Radomirovi\'c},
title = {{EC-RAC}: Enriching a Capacious {RFID} Attack Collection},
year = {2010},
booktitle = {6th Workshop on RFID Security (RFIDSec 2010)},
series = {Lecture Notes in Computer Science},
volume = {6370},
pages = {75--90},
publisher = {Springer},
}
@article{DR09d,
author = {T. van Deursen and S. Radomirovi\'c},
title = {On a new formal proof model for {RFID} location privacy},
year = {2009},
publisher = {Elsevier},
journal = {Information Processing Letters},
volume = {110},
number = {2},
pages = {57--61},
doi = {10.1016/j.ipl.2009.10.007}
}
@inproceedings{DMRV09,
author = {T. van Deursen and S. Mauw and S. Radomirovi\'c and P. Vullers},
title = {Secure ownership and ownership transfer in {RFID} systems},
year = {2009},
booktitle = {Proc.\ 14th European Symposium On Research In Computer Security (ESORICS'09)},
series = {Lecture Notes in Computer Science},
publisher = {Springer},
volume = {5789},
pages = {637-654},
}
@inproceedings{DR09,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Algebraic Attacks on {RFID} Protocols},
year = {2009},
booktitle = {Information Security Theory and Practices. Smart Devices, Pervasive Systems, and Ubiquitous Networks (WISTP'09)},
series = {Lecture Notes in Computer Science},
volume = {5746},
publisher = {Springer},
note = {38--51},
}
@inproceedings{CDP09,
author = {X. Chen and T. van Deursen and J. Pang},
title = {Improving Automatic Verification of Security Protocols with {XOR}},
year = {2009},
booktitle = {Proc.\ International Conference on Formal Engineering Methods (ICFEM'09)},
series = {Lecture Notes in Computer Science},
volume = {5885},
pages = {107--126},
publisher = {Springer},
}
@techreport{DR09c,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Attacks on {RFID} protocols (version 1.1)},
year = {2009},
note = {\url{http://eprint.iacr.org/2008/310}},
}
@techreport{DR09b,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Untraceable {RFID} protocols are not trivially composable: {Attacks} on the revision of {EC-RAC}},
year = {2009},
note = {\url{http://eprint.iacr.org/2009/332}},
}
@techreport{DR08f,
author = {T. van Deursen and S. Radomirovi\'c},
title = {On a new formal proof model for {RFID} Location Privacy},
year = {2008},
note = {\url{http://eprint.iacr.org/2008/477}},
}
@techreport{DR08e,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Attacks on {RFID} protocols (version 1.0)},
year = {2008},
note = {\url{http://eprint.iacr.org/2008/310}},
}
@misc{DR08b,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Vulnerabilities in {RFID} protocols due to algebraic properties},
year = {2008},
howpublished = {3rd Benelux Workshop on Information and System Security},
}
@inproceedings{DR08a,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Security of an {RFID} Protocol for Supply Chains},
year = {2008},
pages = {568-573},
publisher = {IEEE Computer Society},
booktitle = {Proc.\ 1st Workshop on Advances in RFID (AIR'08)},
}
@inproceedings{DR08,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Security of {RFID} Protocols -- {A} Case Study},
year = {2009},
pages = {41--52},
volume = {244},
series = {ENTCS},
publisher = {Elsevier},
booktitle = {Proc.\ 4th International Workshop on Security
and Trust Management (STM'08)},
}
@inproceedings{DKP08a,
author = {T. van Deursen and P. Koster and M. Petkovi\'c},
title = {Reliable Personal Health Records},
year = {2008},
series = {Studies in Health Technology and Informatics},
publisher = {IOS Press},
booktitle = {{eHealth} Beyond the Horizon -- Get {IT} There -- Proceedings of {MIE2008} -- The {XXI}st International Congress on the European Federation for Medical Informatics},
volume = {136},
pages = {484--489},
}
@inproceedings{DMR08,
author = {T. van Deursen and S. Mauw and S. Radomirovi\'c},
title = {Untraceability of {RFID} Protocols},
year = {2008},
pages = {1-15},
booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP'08)},
series = {Lecture Notes in Computer Science},
publisher = {Springer},
volume = {5019},
}
@inproceedings{DKP08,
author = {T. van Deursen and P. Koster and M. Petkovi\'c},
title = {Hedaquin: {A} reputation-based health data quality indicator},
year = {2008},
series = {ENTCS},
booktitle = {Proc.\ 3rd International Workshop on Security and Trust Management (STM'07)},
volume = {197},
issue = {2},
pages = {159--167},
}
@mastersthesis{D07,
author = {T. van Deursen},
title = {Hedaquin: A reputation-based health data quality indicator for personal health record systems},
year = {2007},
school = {Technische Universiteit Eindhoven},
}