@inproceedings{DMR11, author = {T. van Deursen and S. Mauw and S. Radomirovi\'c}, title = {m{C}arve: {C}arving attributed dump sets}, year = {2011}, booktitle = {USENIX Security Symposium}, publisher = {USENIX Association}, pages = {107-121}, }
@inproceedings{DR11, author = {T. van Deursen and S. Radomirovi\'c}, title = {Insider attacks and privacy of {RFID} protocols}, booktitle = {EuroPKI}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, year = {2011}, note = {To appear} }
@inproceedings{D11, author = {T. van Deursen}, title = {50 Ways to Break {RFID} Privacy}, booktitle = {Privacy and Identity 2010}, publisher = {Springer}, series = {IFIP AICT}, volume = {352}, pages = {192--205}, year = {2011}, }
@inproceedings{DR10, author = {T. van Deursen and S. Radomirovi\'c}, title = {{EC-RAC}: Enriching a Capacious {RFID} Attack Collection}, year = {2010}, booktitle = {6th Workshop on RFID Security (RFIDSec 2010)}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {75--90}, publisher = {Springer}, }
@article{DR09d, author = {T. van Deursen and S. Radomirovi\'c}, title = {On a new formal proof model for {RFID} location privacy}, year = {2009}, publisher = {Elsevier}, journal = {Information Processing Letters}, volume = {110}, number = {2}, pages = {57--61}, doi = {10.1016/j.ipl.2009.10.007} }
@inproceedings{DMRV09, author = {T. van Deursen and S. Mauw and S. Radomirovi\'c and P. Vullers}, title = {Secure ownership and ownership transfer in {RFID} systems}, year = {2009}, booktitle = {Proc.\ 14th European Symposium On Research In Computer Security (ESORICS'09)}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, volume = {5789}, pages = {637-654}, }
@inproceedings{DR09, author = {T. van Deursen and S. Radomirovi\'c}, title = {Algebraic Attacks on {RFID} Protocols}, year = {2009}, booktitle = {Information Security Theory and Practices. Smart Devices, Pervasive Systems, and Ubiquitous Networks (WISTP'09)}, series = {Lecture Notes in Computer Science}, volume = {5746}, publisher = {Springer}, note = {38--51}, }
@inproceedings{CDP09, author = {X. Chen and T. van Deursen and J. Pang}, title = {Improving Automatic Verification of Security Protocols with {XOR}}, year = {2009}, booktitle = {Proc.\ International Conference on Formal Engineering Methods (ICFEM'09)}, series = {Lecture Notes in Computer Science}, volume = {5885}, pages = {107--126}, publisher = {Springer}, }
@techreport{DR09c, author = {T. van Deursen and S. Radomirovi\'c}, title = {Attacks on {RFID} protocols (version 1.1)}, year = {2009}, note = {\url{http://eprint.iacr.org/2008/310}}, }
@techreport{DR09b, author = {T. van Deursen and S. Radomirovi\'c}, title = {Untraceable {RFID} protocols are not trivially composable: {Attacks} on the revision of {EC-RAC}}, year = {2009}, note = {\url{http://eprint.iacr.org/2009/332}}, }
@techreport{DR08f, author = {T. van Deursen and S. Radomirovi\'c}, title = {On a new formal proof model for {RFID} Location Privacy}, year = {2008}, note = {\url{http://eprint.iacr.org/2008/477}}, }
@techreport{DR08e, author = {T. van Deursen and S. Radomirovi\'c}, title = {Attacks on {RFID} protocols (version 1.0)}, year = {2008}, note = {\url{http://eprint.iacr.org/2008/310}}, }
@misc{DR08b, author = {T. van Deursen and S. Radomirovi\'c}, title = {Vulnerabilities in {RFID} protocols due to algebraic properties}, year = {2008}, howpublished = {3rd Benelux Workshop on Information and System Security}, }
@inproceedings{DR08a, author = {T. van Deursen and S. Radomirovi\'c}, title = {Security of an {RFID} Protocol for Supply Chains}, year = {2008}, pages = {568-573}, publisher = {IEEE Computer Society}, booktitle = {Proc.\ 1st Workshop on Advances in RFID (AIR'08)}, }
@inproceedings{DR08, author = {T. van Deursen and S. Radomirovi\'c}, title = {Security of {RFID} Protocols -- {A} Case Study}, year = {2009}, pages = {41--52}, volume = {244}, series = {ENTCS}, publisher = {Elsevier}, booktitle = {Proc.\ 4th International Workshop on Security and Trust Management (STM'08)}, }
@inproceedings{DKP08a, author = {T. van Deursen and P. Koster and M. Petkovi\'c}, title = {Reliable Personal Health Records}, year = {2008}, series = {Studies in Health Technology and Informatics}, publisher = {IOS Press}, booktitle = {{eHealth} Beyond the Horizon -- Get {IT} There -- Proceedings of {MIE2008} -- The {XXI}st International Congress on the European Federation for Medical Informatics}, volume = {136}, pages = {484--489}, }
@inproceedings{DMR08, author = {T. van Deursen and S. Mauw and S. Radomirovi\'c}, title = {Untraceability of {RFID} Protocols}, year = {2008}, pages = {1-15}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP'08)}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, volume = {5019}, }
@inproceedings{DKP08, author = {T. van Deursen and P. Koster and M. Petkovi\'c}, title = {Hedaquin: {A} reputation-based health data quality indicator}, year = {2008}, series = {ENTCS}, booktitle = {Proc.\ 3rd International Workshop on Security and Trust Management (STM'07)}, volume = {197}, issue = {2}, pages = {159--167}, }
@mastersthesis{D07, author = {T. van Deursen}, title = {Hedaquin: A reputation-based health data quality indicator for personal health record systems}, year = {2007}, school = {Technische Universiteit Eindhoven}, }