@inproceedings{DR11, author = {T. van Deursen and S. Radomirovi\'c}, title = {Insider attacks and privacy of {RFID} protocols}, booktitle = {EuroPKI}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, year = {2011}, note = {To appear} }
@inproceedings{DMR11, author = {T. van Deursen and S. Mauw and S. Radomirovi\'c}, title = {m{C}arve: {C}arving attributed dump sets}, year = {2011}, booktitle = {Proc.\ 20th USENIX Security Symposium}, publisher = {USENIX Association}, month = {August}, note = {To appear}, }
@inproceedings{D11, author = {T. van Deursen}, title = {50 Ways to Break {RFID} Privacy}, booktitle = {Privacy and Identity 2010}, publisher = {Springer}, series = {IFIP AICT}, volume = {352}, pages = {192--205}, year = {2011}, }
@inproceedings{DR10, author = {T. van Deursen and S. Radomirovi\'c}, title = {{EC-RAC}: Enriching a Capacious {RFID} Attack Collection}, year = {2010}, booktitle = {6th Workshop on RFID Security (RFIDSec 2010)}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {75--90}, publisher = {Springer}, doi = {10.1007/978-3-642-16822-2_8}, }
@article{DR09d, author = {T. van Deursen and S. Radomirovi\'c}, title = {On a new formal proof model for {RFID} location privacy}, year = {2009}, publisher = {Elsevier}, journal = {Information Processing Letters}, volume = {110}, number = {2}, pages = {57--61}, doi = {10.1016/j.ipl.2009.10.007}, }
@inproceedings{DR09, author = {T. van Deursen and S. Radomirovi\'c}, title = {Algebraic Attacks on {RFID} Protocols}, year = {2009}, booktitle = {Information Security Theory and Practices. Smart Devices, Pervasive Systems, and Ubiquitous Networks (WISTP'09)}, series = {Lecture Notes in Computer Science}, volume = {5746}, publisher = {Springer}, note = {38--51}, }
@inproceedings{DMRV09, author = {T. van Deursen and S. Mauw and S. Radomirovi\'c and P. Vullers}, title = {Secure ownership and ownership transfer in {RFID} systems}, year = {2009}, booktitle = {Proc.\ 14th European Symposium On Research In Computer Security (ESORICS'09)}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, volume = {5789}, pages = {637--654}, }
@inproceedings{DR08, author = {T. van Deursen and S. Radomirovi\'c}, title = {Security of {RFID} Protocols -- {A} Case Study}, month = {August}, year = {2009}, pages = {41--52}, volume = {244}, series = {ENTCS}, publisher = {Elsevier}, booktitle = {Proc.\ 4th International Workshop on Security and Trust Management (STM'08)}, doi = {10.1016/j.entcs.2009.07.037} }
@techreport{DR09b, author = {T. van Deursen and S. Radomirovi\'c}, title = {Untraceable {RFID} protocols are not trivially composable: {Attacks} on the revision of {EC-RAC}}, year = {2009}, institution = {University of Luxembourg}, month = {July}, note = {\url{http://eprint.iacr.org/2009/332}}, }
@techreport{DR09c, author = {T. van Deursen and S. Radomirovi\'c}, title = {Attacks on {RFID} protocols (version 1.1)}, year = {2009}, institution = {University of Luxembourg}, month = {August}, note = {\url{http://eprint.iacr.org/2008/310}}, }
@techreport{DR08f, author = {T. van Deursen and S. Radomirovi\'c}, title = {On a new formal proof model for {RFID} Location Privacy}, year = {2008}, month = {November}, note = {\url{http://eprint.iacr.org/2008/477}}, }
@inproceedings{DMR08, author = {T. van Deursen and S. Mauw and S. Radomirovi\'c}, title = {Untraceability of {RFID} Protocols}, year = {2008}, pages = {1--15}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP'08)}, address = {Seville, Spain}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, volume = {5019}, }
@inproceedings{DR08a, author = {T. van Deursen and S. Radomirovi\'c}, title = {Security of an {RFID} Protocol for Supply Chains}, month = {October}, year = {2008}, pages = {568--573}, publisher = {IEEE Computer Society}, booktitle = {Proc.\ 1st Workshop on Advances in RFID (AIR'08)}, }
@misc{DR08b, author = {T. van Deursen and S. Radomirovi\'c}, title = {Vulnerabilities in {RFID} protocols due to algebraic properties}, month = {November}, year = {2008}, howpublished = {3rd Benelux Workshop on Information and System Security}, }