Digital Security publications

For the most recent publications, please visit the authors' personal webpages.

Publications by year: 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003

Matching entries: 0
settings...

2021

Leeuw A and Jacobs BPF (2021), "'BKZ moet waarde inzien van open source als vereiste'".
BibTeX:
@misc{IDLIB0,
  author = {Leeuw, A. and Jacobs, B. P. F.},
  title = {'BKZ moet waarde inzien van open source als vereiste'},
  publisher = {binnenlandsbestuur.nl},
  year = {2021},
  url = {https://www.binnenlandsbestuur.nl/digitaal/nieuws/bzk-moet-waarde-inzien-van-open-source-als.19061488.lynkx}
}
Hoepman JH (2021), "'Het is niet te laat om anders over privacy te denken'".
BibTeX:
@misc{IDLIB1,
  author = {Hoepman, J. H.},
  title = {'Het is niet te laat om anders over privacy te denken'},
  publisher = {engineersonline.nl},
  year = {2021},
  url = {https://www.engineersonline.nl/nieuws/id34697-het-is-niet-te-laat-om-anders-over-privacy-te-denken.html}
}
Viguier BGP, Lemmen M, Peeters M, Daemen J, Van Assche G, Bertoni G, Van Keer R, Ashur T, Eichlseder M, Lauridsen MM, Leurent G, Minaud B, Rotella Y, Sasaki Y, Sprenkels D, Campos F, Jellema L, Müller L, Bernstein DJ, Schwabe P, Massolino PM, Schneider T, Kölbl S, Lucks S, Mendel F, Nawaz K, Standaert F-X and Todo Y (2021), "A Panorama on Classical Cryptography".
Abstract: Associated software that comes with my PhD thesis.
BibTeX:
@misc{IDLIB10,
  author = {Viguier, B. G. P. and Lemmen, M. and Peeters, M. and Daemen, J. and Van Assche, G. and Bertoni, G. and Van Keer, R. and Ashur, T. and Eichlseder, M. and Lauridsen, M. M. and Leurent, G. and Minaud, B. and Rotella, Yann and Sasaki, Yu and Sprenkels, D. and Campos, F. and Jellema, L. and Müller, L. and Bernstein, D. J. and Schwabe, P. and Massolino, P. M. and Schneider, T. and Kölbl, S. and Lucks, S. and Mendel, F. and Nawaz, K. and Standaert, F.-X. and Todo, Y.},
  title = {A Panorama on Classical Cryptography},
  publisher = {A Panorama on Classical Cryptography - Files},
  year = {2021},
  url = {https://doi.org/10.5281/zenodo.4534692},
  doi = {10.5281/zenodo.4534692}
}
Roos N and Jacobs BPF (2021), "Nijmegen security professor Bart Jacobs wins Stevin Prize".
BibTeX:
@misc{IDLIB100,
  author = {Roos, N. and Jacobs, B. P. F.},
  title = {Nijmegen security professor Bart Jacobs wins Stevin Prize},
  publisher = {bits-chips.nl},
  year = {2021},
  url = {https://bits-chips.nl/artikel/nijmegen-security-professor-bart-jacobs-wins-stevin-prize/}
}
Sabel P and Jacobs B (2021), "Nog veiliger dan een ingewikkeld wachtwoord, volgens Google: helemaal geen wachtwoord meer".
BibTeX:
@misc{IDLIB101,
  author = {Sabel, P. and Jacobs, B.},
  title = {Nog veiliger dan een ingewikkeld wachtwoord, volgens Google: helemaal geen wachtwoord meer},
  publisher = {volkskrant.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/e3e57e8d-fd18-49b3-853a-9de2ad3842f5/?context=1516831}
}
Larson M, Oostdijk NHJ and Zuiderveen Borgesius FJ (2021), "Not Directly Stated, Not Explicitly Stored: Conversational Agents and the Privacy Threat of Implicit Information", In UMAP '21: Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, Utrecht Netherlands June 21 - 25, 2021. New York , pp. 388-391. Association for Computing Machinery.
BibTeX:
@inproceedings{IDLIB102,
  author = {Larson, M. and Oostdijk, N. H. J. and Zuiderveen Borgesius, F. J.},
  editor = {Masthoff, J. and Herder, E.},
  title = {Not Directly Stated, Not Explicitly Stored: Conversational Agents and the Privacy Threat of Implicit Information},
  booktitle = {UMAP '21: Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, Utrecht Netherlands June 21 - 25, 2021},
  publisher = {Association for Computing Machinery},
  year = {2021},
  pages = {388--391},
  url = {https://repository.ubn.ru.nl/handle/2066/236516},
  doi = {10.1145/3450614.3463601}
}
Wassens R and Zuiderveen Borgesius FJ (2021), "OM vroeg zonder wettelijke basis ongeblurde' gezichten op foto's van kentekencamera's op".
BibTeX:
@misc{IDLIB103,
  author = {Wassens, R. and Zuiderveen Borgesius, F. J.},
  title = {OM vroeg zonder wettelijke basis ongeblurde' gezichten op foto's van kentekencamera's op},
  publisher = {nrc.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/bf24f9a5-0694-4ab4-b1ad-2f3d45e3084e/?context=1516831}
}
Brouwer N and Jacobs BPF (2021), "OO&R-podcast #11. De cyberverzekering vanuit civielrechtelijk perspectief".
BibTeX:
@misc{IDLIB104,
  author = {Brouwer, N. and Jacobs, B. P. F.},
  title = {OO&R-podcast #11. De cyberverzekering vanuit civielrechtelijk perspectief},
  publisher = {Radboud University},
  year = {2021},
  url = {https://soundcloud.com/user-494345957/oor-podcast-11-omgaan-met-cyberrisicos-de-cyberverzekering}
}
Chmielewski LM and Weissbart LJA (2021), "On Reverse Engineering Neural Network Implementation on GPU", In Applied Cryptography and Network Security Workshops: ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21--24, 2021, Proceedings. Cham Vol. 12809, pp. 96-113. Springer.
BibTeX:
@inproceedings{IDLIB105,
  author = {Chmielewski, L. M. and Weissbart, L. J. A.},
  editor = {Zhou, J.},
  title = {On Reverse Engineering Neural Network Implementation on GPU},
  booktitle = {Applied Cryptography and Network Security Workshops: ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21--24, 2021, Proceedings},
  publisher = {Springer},
  year = {2021},
  volume = {12809},
  pages = {96--113},
  url = {https://doi.org/10.1007/978-3-030-81645-2_7},
  doi = {10.1007/978-3-030-81645-2_7}
}
Mennink B and Neves S (2021), "On the Resilience of Even-Mansour to Invariant Permutations", Designs, Codes and Cryptography. Vol. 89, pp. 859-893.
BibTeX:
@article{IDLIB106,
  author = {Mennink, B. and Neves, S.},
  title = {On the Resilience of Even-Mansour to Invariant Permutations},
  journal = {Designs, Codes and Cryptography},
  year = {2021},
  volume = {89},
  pages = {859--893},
  url = {https://repository.ubn.ru.nl/handle/2066/235955},
  doi = {10.1007/s10623-021-00850-2}
}
van Pelt S and Jacobs BPF (2021), "Ondanks bezwaren gaat universiteit door met uitrol cloudservice Microsoft 365".
BibTeX:
@misc{IDLIB107,
  author = {van Pelt, S. and Jacobs, B. P. F.},
  title = {Ondanks bezwaren gaat universiteit door met uitrol cloudservice Microsoft 365},
  publisher = {VOX Magazine},
  year = {2021},
  url = {https://www.voxweb.nl/nieuws/universiteit-gaat-door-met-voorbereiden-van-cloudservice-microsoft365}
}
Zuiderveen Borgesius FJ and Austin E (2021), "Onrust over nieuwe voorwaarden, maar WhatsApp zet door".
BibTeX:
@misc{IDLIB108,
  author = {Zuiderveen Borgesius, F. J. and Austin, E.},
  title = {Onrust over nieuwe voorwaarden, maar WhatsApp zet door},
  publisher = {Nos.nl},
  year = {2021},
  url = {https://nos.nl/artikel/2380766-onrust-over-nieuwe-voorwaarden-maar-whatsapp-zet-door}
}
Scheifes I, Zuiderveen Borgesius FJ and van Eck M (2021), "Opening the black box".
BibTeX:
@misc{IDLIB109,
  author = {Scheifes, I. and Zuiderveen Borgesius, F. J. and van Eck, M.},
  title = {Opening the black box},
  publisher = {De Groene Amsterdammer},
  year = {2021},
  url = {https://www.groene.nl/artikel/opening-the-black-box}
}
Viguier BGP (2021), "A Panorama on Classical Cryptography; Designing, Implementing, Breaking, Verifying, and Standardizing Cryptography" , pp. xv,-302. s.n..
Abstract: In this thesis we cover a large part of the classical cryptography world: we examine the design of new symmetric primitive; we explore implementation strategies of lightweight schemes; we analyze a new high performance algorithm; we use formal verification to prove the correctness of Elliptic Curve Cryptography implementations; and finally we describe one of the way algorithms are standardized.
BibTeX:
@phdthesis{IDLIB11,
  author = {Viguier, B. G. P.},
  title = {A Panorama on Classical Cryptography; Designing, Implementing, Breaking, Verifying, and Standardizing Cryptography},
  publisher = {s.n.},
  year = {2021},
  pages = {xv,--302}
}
Sabel P, Verhagen L and Hoepman JH (2021), "Over de grens laat de CoronaCheck-app veel meer gegevens zien dan hier. Hoe zit het met mijn privacy?".
BibTeX:
@misc{IDLIB110,
  author = {Sabel, P. and Verhagen, L. and Hoepman, J. H.},
  title = {Over de grens laat de CoronaCheck-app veel meer gegevens zien dan hier. Hoe zit het met mijn privacy?},
  publisher = {Volkskrant.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/4dbdb736-681a-46ae-82f4-f2165e602c19/?context=1516831}
}
van Mersbergen C and Jacobs BPF (2021), "Overheid beschikt straks over al onze vaccinatiegegevens: is dat nodig?".
BibTeX:
@misc{IDLIB111,
  author = {van Mersbergen, C. and Jacobs, B. P. F.},
  title = {Overheid beschikt straks over al onze vaccinatiegegevens: is dat nodig?},
  publisher = {Parool.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/add27cfa-3b1a-487b-8ad5-1011654dc366/?context=1516831}
}
van Gils S and Jacobs BPF (2021), "Overheid dwingt burger in de richting van Google en Apple".
BibTeX:
@misc{IDLIB112,
  author = {van Gils, S. and Jacobs, B. P. F.},
  title = {Overheid dwingt burger in de richting van Google en Apple},
  publisher = {fd.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/164d79c8-7696-451f-8954-9f80a552bca9/?context=1516831}
}
Colesky MR (2021), "Patterns for Privacy: Data Subject Right Blueprints for Privacy Engineers" , pp. xvi,-144. s.n..
BibTeX:
@phdthesis{IDLIB113,
  author = {Colesky, M. R.},
  title = {Patterns for Privacy: Data Subject Right Blueprints for Privacy Engineers},
  publisher = {s.n.},
  year = {2021},
  pages = {xvi,--144}
}
Valentijn EA, Lineweaver CH, van der Velde KJ, Scholtens S, Amunts K, Schemmel J, De Silvestri A, Helmi A, Ynnerman A, Brouwer M, Falcke H, Vandersypen L, van Haarlem M, Samardjiska S and Sloot P (2021), "People's information Universe", In Powers of Two: The Information Universe --- Information as the Building Block of Everything. Cham , pp. 23-106. Springer International Publishing.
Abstract: Information exists when it is being copied---a rather important notion---think of bits, DNA and lottery. This concept is highlighted by Shannon's classical paper on Information theory which describes a mathematical theory of communication, communication being equal to the copying of information. The second leading notion is that the copying process only works when agreements have been made. Actually, everything we do with computers is based on agreements among people--- often in the form of standards.
BibTeX:
@inbook{IDLIB114,
  author = {Valentijn, E. A. and Lineweaver, C. H. and van der Velde, K. J. and Scholtens, S. and Amunts, K. and Schemmel, J. and De Silvestri, A. and Helmi, A. and Ynnerman, A. and Brouwer, M. and Falcke, H. and Vandersypen, L. and van Haarlem, M. and Samardjiska, S. and Sloot, P.},
  editor = {Valentijn, E. A.},
  title = {People's information Universe},
  booktitle = {Powers of Two: The Information Universe --- Information as the Building Block of Everything},
  publisher = {Springer International Publishing},
  year = {2021},
  pages = {23--106},
  url = {https://doi.org/10.1007/978-3-030-58345-3_3},
  doi = {10.1007/978-3-030-58345-3_3}
}
Sietsma S, van der Veen M and Zuiderveen Borgesius FJ (2021), "Persoonsgegevens tienduizenden geteste Nederlanders onvoldoende beveiligd".
BibTeX:
@misc{IDLIB115,
  author = {Sietsma, S. and van der Veen, M. and Zuiderveen Borgesius, F. J.},
  title = {Persoonsgegevens tienduizenden geteste Nederlanders onvoldoende beveiligd},
  publisher = {NOS Nieuwsuur},
  year = {2021},
  url = {https://nos.nl/nieuwsuur/artikel/2365412-persoonsgegevens-tienduizenden-geteste-nederlanders-onvoldoende-beveiligd.html}
}
Kannwischer MJ (2021), "Polynomial Multiplication for Post-Quantum Cryptography Accompanying Code".
Abstract: Contains the archived source code related to my PhD thesis titled ``Polynomial Multiplication for Post-Quantum Cryptography''. See https://kannwischer.eu Alternatively, you can get the code directly from upstream: https://github.com/mkannwischer/polymul https://github.com/mupq/polymul-z2mx-m4 https://github.com/mupq/nttm4 https://github.com/dilithium-cortexm/dilithium-cortexm https://github.com/ntt-polymul/ntt-polymul Copyright: Creative Commons Attribution 4.0 International Open Access
BibTeX:
@misc{IDLIB116,
  author = {Kannwischer, M. J.},
  title = {Polynomial Multiplication for Post-Quantum Cryptography Accompanying Code},
  year = {2021},
  url = {https://doi.org/10.5281/ZENODO.5555735},
  doi = {10.5281/ZENODO.5555735}
}
Shkaravska O and van Eekelen MCJD (2021), "Polynomial solutions of algebraic difference equations and homogeneous symmetric polynomials", Journal of Symbolic Computation. Vol. 103, pp. 22-45.
BibTeX:
@article{IDLIB117,
  author = {Shkaravska, O. and van Eekelen, M. C. J. D.},
  title = {Polynomial solutions of algebraic difference equations and homogeneous symmetric polynomials},
  journal = {Journal of Symbolic Computation},
  year = {2021},
  volume = {103},
  pages = {22--45},
  url = {https://repository.ubn.ru.nl/handle/2066/225737},
  doi = {10.1016/j.jsc.2019.10.022}
}
Grassi L, Khovratovich D, Rechberger C, Roy A and Schofnegger M (2021), "Poseidon: A New Hash Function for Zero-Knowledge Proof Systems", In USENIX Security Symposium '21: August 11-13, 2021. S.l. , pp. 1-17. Usenix.
BibTeX:
@inproceedings{IDLIB118,
  author = {Grassi, L. and Khovratovich, D. and Rechberger, C. and Roy, A. and Schofnegger, M.},
  title = {Poseidon: A New Hash Function for Zero-Knowledge Proof Systems},
  booktitle = {USENIX Security Symposium '21: August 11-13, 2021},
  publisher = {Usenix},
  year = {2021},
  pages = {1--17},
  url = {https://www.usenix.org/system/files/sec21summer_grassi.pdf}
}
Hülsing A, Ning K-C, Schwabe P, Weber F and Zimmermann PR (2021), "Post-quantum WireGuard", In 2021 IEEE Symposium on Security and Privacy (SP) May 23 2021 to May 27 2021 San Francisco, CA, US. New York Vol. 1, pp. 511-528. IEEE.
BibTeX:
@inproceedings{IDLIB119,
  author = {Hülsing, A. and Ning, K.-C. and Schwabe, P. and Weber, F. and Zimmermann, P. R.},
  title = {Post-quantum WireGuard},
  booktitle = {2021 IEEE Symposium on Security and Privacy (SP) May 23 2021 to May 27 2021 San Francisco, CA, US},
  publisher = {IEEE},
  year = {2021},
  volume = {1},
  pages = {511--528},
  url = {https://doi.org/10.1109/SP40001.2021.00030},
  doi = {10.1109/SP40001.2021.00030}
}
Compagna L, Jonker H, Krochewski J, Krumnow B and Sahin M (2021), "A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence", In EuroS&PW 2021: 2021 IEEE European Symposium on Security and Privacy Workshops, Virtual Conference. Los Alamitos , pp. 49-59. IEEE.
BibTeX:
@inproceedings{IDLIB12,
  author = {Compagna, L. and Jonker, H. and Krochewski, J. and Krumnow, B. and Sahin, M.},
  editor = {Maffei, M.},
  title = {A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence},
  booktitle = {EuroS&PW 2021: 2021 IEEE European Symposium on Security and Privacy Workshops, Virtual Conference},
  publisher = {IEEE},
  year = {2021},
  pages = {49--59},
  url = {https://doi.org/10.1109/EuroSPW54576.2021.00012},
  doi = {10.1109/EuroSPW54576.2021.00012}
}
Iooss A, Buhan I, Batina L and Bazangani O (2021), "Power traces, unprotected AES (Version 01)".
Abstract: We cloned the TinyAES implementation from this repository https://github.com/kokke/tiny-AES-c/ and loaded the firmware on an ARM Cortex M0, which was modified for the collection of traces. Copyright: Creative Commons Attribution 4.0 International Open Access
BibTeX:
@misc{IDLIB120,
  author = {Iooss, A. and Buhan, I. and Batina, L. and Bazangani, O.},
  title = {Power traces, unprotected AES (Version 01)},
  year = {2021},
  url = {https://doi.org/10.5281/ZENODO.4742566},
  doi = {10.5281/ZENODO.4742566}
}
Iooss A, Buhan I, Batina L and Bazangani O (2021), "Power traces, unprotected AES (Version 02)".
Abstract: We cloned the TinyAES implementation from this repository https://github.com/kokke/tiny-AES-c/ and loaded the firmware on an ARM Cortex M0, which was modified for the collection of traces. Copyright: Creative Commons Attribution 4.0 International Open Access
BibTeX:
@misc{IDLIB121,
  author = {Iooss, A. and Buhan, I. and Batina, L. and Bazangani, O.},
  title = {Power traces, unprotected AES (Version 02)},
  year = {2021},
  url = {https://doi.org/10.5281/ZENODO.4742593},
  doi = {10.5281/ZENODO.4742593}
}
Wiggers T and Samardjiska S (2021), "Practically Solving LPN", In ISIT 2021: IEEE nternational Symposium on Information Theory Proceedings 12--20 July 2021: Virtual Melbourne, Victoria, Australia. Piscataway , pp. 2399-2404. IEEE.
BibTeX:
@inproceedings{IDLIB122,
  author = {Wiggers, T. and Samardjiska, S.},
  editor = {Sadeghi, P.},
  title = {Practically Solving LPN},
  booktitle = {ISIT 2021: IEEE nternational Symposium on Information Theory Proceedings 12--20 July 2021: Virtual Melbourne, Victoria, Australia},
  publisher = {IEEE},
  year = {2021},
  pages = {2399--2404},
  url = {https://doi.org/10.1109/ISIT45174.2021.9518109},
  doi = {10.1109/ISIT45174.2021.9518109}
}
Serban AC, Blom K, Hoos H and Visser J (2021), "Practices for Engineering Trustworthy Machine Learning Applications", In WAIN 2021: 2021 IEEE/ACM 1st Workshop on AI Engineering - Software Engineering for AI, Virtual (originally Madrid, Spain). Los Alamitos , pp. 97-100. IEEE.
BibTeX:
@inproceedings{IDLIB123,
  author = {Serban, A. C. and Blom, K. and Hoos, H. and Visser, J.},
  title = {Practices for Engineering Trustworthy Machine Learning Applications},
  booktitle = {WAIN 2021: 2021 IEEE/ACM 1st Workshop on AI Engineering - Software Engineering for AI, Virtual (originally Madrid, Spain)},
  publisher = {IEEE},
  year = {2021},
  pages = {97--100},
  url = {https://doi.org/10.1109/WAIN52551.2021.00021},
  doi = {10.1109/WAIN52551.2021.00021}
}
Hoepman JH (2021), "Privacy is Hard, and Seven Other Myths: achieving privacy through careful design" Cambridge , pp. 280. MIT Press.
BibTeX:
@book{IDLIB124,
  author = {Hoepman, J. H.},
  title = {Privacy is Hard, and Seven Other Myths: achieving privacy through careful design},
  publisher = {MIT Press},
  year = {2021},
  pages = {280}
}
Zuiderveen Borgesius FJ (2021), "Privégegevens op straat door handel in GGD-data".
BibTeX:
@misc{IDLIB125,
  author = {Zuiderveen Borgesius, F. J.},
  title = {Privégegevens op straat door handel in GGD-data},
  publisher = {fd.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/c9855218-aba0-40de-a9b7-57a2acc353b8/?context=1516831}
}
Grassi L, Rechberger C and Schofnegger M (2021), "Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer", IACR Transactions on Symmetric Cryptology. Vol. 2021(2), pp. 314-352.
BibTeX:
@article{IDLIB126,
  author = {Grassi, L. and Rechberger, C. and Schofnegger, M.},
  title = {Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer},
  journal = {IACR Transactions on Symmetric Cryptology},
  year = {2021},
  volume = {2021},
  number = {2},
  pages = {314--352},
  url = {https://repository.ubn.ru.nl/handle/2066/233912}
}
van de Wetering JMM (2021), "Quantum Theory from Principles, Quantum Software from Diagrams" , pp. xvi,-317. s.n..
BibTeX:
@phdthesis{IDLIB127,
  author = {van de Wetering, J. M. M.},
  title = {Quantum Theory from Principles, Quantum Software from Diagrams},
  publisher = {s.n.},
  year = {2021},
  pages = {xvi,--317},
  url = {https://repository.ubn.ru.nl/handle/2066/232865}
}
Geuvers H and Jacobs B (2021), "RELATING APARTNESS AND BISIMULATION", Logical Methods in Computer Science. Vol. 17(3), pp. 1-35.
BibTeX:
@article{IDLIB128,
  author = {Geuvers, Herman and Jacobs, Bart},
  title = {RELATING APARTNESS AND BISIMULATION},
  journal = {Logical Methods in Computer Science},
  year = {2021},
  volume = {17},
  number = {3},
  pages = {1--35},
  note = {Gevonden in WoS met onderzoeker 1037208 Geuvers, J.H. (Herman) Affil. (Radboud OR Nijmegen) 2 auteurs volgens WoS},
  url = {https://repository.ubn.ru.nl/handle/2066/235962}
}
Herder E, Roßner D and Atzenbeck C (2021), "Reflecting on Social Media Behavior by Structuring and Exploring Posts and Comments", I-com. Vol. 19(3), pp. 239-250.
BibTeX:
@article{IDLIB129,
  author = {Herder, E. and Roßner, D. and Atzenbeck, C.},
  title = {Reflecting on Social Media Behavior by Structuring and Exploring Posts and Comments},
  journal = {I-com},
  year = {2021},
  volume = {19},
  number = {3},
  pages = {239--250},
  url = {https://repository.ubn.ru.nl/handle/2066/230672},
  doi = {10.1515/icom-2020-0019}
}
Masthoff J, Herder E, Nissenbaum H, de Rijke M and Vassileva J (2021), "ACM UMAP 2021 Keynote Addresses", In UMAP '21: Proceedings of the 29th ACM Conference on User Modeling, Adaptation and PersonalizationJune 2021. New York , pp. 1-2. Association for Computing Machinery.
BibTeX:
@inproceedings{IDLIB13,
  author = {Masthoff, J. and Herder, E. and Nissenbaum, H. and de Rijke, M. and Vassileva, J.},
  editor = {Masthoff, J.},
  title = {ACM UMAP 2021 Keynote Addresses},
  booktitle = {UMAP '21: Proceedings of the 29th ACM Conference on User Modeling, Adaptation and PersonalizationJune 2021},
  publisher = {Association for Computing Machinery},
  year = {2021},
  pages = {1--2},
  url = {https://doi.org/10.1145/3450613.3465270},
  doi = {10.1145/3450613.3465270}
}
Arnbak A, Bos H, Jacobs B and Zuiderveen Borgesius FJ (2021), "Respecteer Encryptie".
BibTeX:
@misc{IDLIB130,
  author = {Arnbak, A. and Bos, H. and Jacobs, B. and Zuiderveen Borgesius, F. J.},
  title = {Respecteer Encryptie},
  publisher = {stimuleer-encryptie.nl},
  year = {2021},
  url = {https://www.stimuleer-encryptie.nl/}
}
Hildebrandt M (2021), "Robust AI and robust law (Part II: Robust law)".
BibTeX:
@misc{IDLIB131,
  author = {Hildebrandt, M.},
  title = {Robust AI and robust law (Part II: Robust law)},
  publisher = {cohubicol.com},
  year = {2021},
  url = {https://www.cohubicol.com/blog/robust-ai-and-robust-law-part-ii-robust-law/}
}
Shelton MA, Samwel N, Batina L, Regazzoni F, Wagner M and Yarom Y (2021), "Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers", In NDSS Symposium 2021: The Network and Distributed System Security Symposium (NDSS) 2021, 21-25 February 2021. S.l. , pp. 1-17. NDSS.
BibTeX:
@inproceedings{IDLIB132,
  author = {Shelton, M. A. and Samwel, N. and Batina, L. and Regazzoni, F. and Wagner, M. and Yarom, Y.},
  title = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers},
  booktitle = {NDSS Symposium 2021: The Network and Distributed System Security Symposium (NDSS) 2021, 21-25 February 2021},
  publisher = {NDSS},
  year = {2021},
  pages = {1--17}
}
Monterie A and Walree TF (2021), "Schadevergoeding bij datalek dwingt AVG beter af".
BibTeX:
@misc{IDLIB133,
  author = {Monterie, A. and Walree, T. F.},
  title = {Schadevergoeding bij datalek dwingt AVG beter af},
  publisher = {Computable.nl},
  year = {2021},
  url = {https://www.computable.nl/artikel/nieuws/overheid/7204212/250449/schadevergoeding-bij-datalek-dwingt-avg-beter-af.html}
}
Walree TF (2021), "Schadevergoeding bij de onrechtmatige verwerking van persoonsgegevens" (126), pp. 248. Wolters Kluwer.
BibTeX:
@phdthesis{IDLIB134,
  author = {Walree, T. F.},
  title = {Schadevergoeding bij de onrechtmatige verwerking van persoonsgegevens},
  publisher = {Wolters Kluwer},
  year = {2021},
  number = {126},
  pages = {248}
}
Daalder J, Hoepman JH and van Ess H (2021), "Scrapen is het nieuwe hacken, blijkt uit het nieuwste lek op Clubhouse".
BibTeX:
@misc{IDLIB135,
  author = {Daalder, J. and Hoepman, J. H. and van Ess, H.},
  title = {Scrapen is het nieuwe hacken, blijkt uit het nieuwste lek op Clubhouse},
  publisher = {NRC},
  year = {2021},
  url = {https://www.nrc.nl/nieuws/2021/04/14/scrapen-is-het-nieuwe-hacken-blijkt-uit-het-nieuwste-lek-op-clubhouse-a4039700}
}
Liu Z, Samwel N, Weissbart LJA, Zhao Z, Lauret D, Batina L and Larson M (2021), "Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel", In NDSS Symposium 2021: The Network and Distributed System Security Symposium (NDSS) 2021, 21-25 February 2021. S.l. , pp. 1-15. NDSS.
BibTeX:
@inproceedings{IDLIB136,
  author = {Liu, Z. and Samwel, N. and Weissbart, L. J. A. and Zhao, Z. and Lauret, D. and Batina, L. and Larson, M.},
  title = {Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel},
  booktitle = {NDSS Symposium 2021: The Network and Distributed System Security Symposium (NDSS) 2021, 21-25 February 2021},
  publisher = {NDSS},
  year = {2021},
  pages = {1--15},
  url = {https://repository.ubn.ru.nl/handle/2066/236522}
}
Costa Massolino PM (2021), "Secure cryptographic implementations in hardware: A delicious adventure" , pp. xxiv,-117. s.n..
Abstract: Cryptographic primitives are the basis for protocols that offer cryptography services, such as confidentiality, integrity, authentication, and non-repudiation. They usually require one secret key, or two keys where one is public and another private, or no keys at all. When designing a computer system for a certain task, in most cases, it is composed of a software stack on top of third-party hardware. However, in some applications, only the hardware is sufficient or it is bundled together with the software. In the case of cryptographic primitives, they can be designed as pure hardware or software solution, or a combination of the two. In this thesis, I will show the implementation of five different cryptographic primitives. The first two primitives operate with two keys and are based on two different problems with elliptic curves. The last three primitives require one or no keys and can directly provide confidentiality, authentication, and integrity.
BibTeX:
@phdthesis{IDLIB137,
  author = {Costa Massolino, P. M.},
  title = {Secure cryptographic implementations in hardware: A delicious adventure},
  publisher = {s.n.},
  year = {2021},
  pages = {xxiv,--117},
  url = {https://repository.ubn.ru.nl/handle/2066/239208}
}
Schuderer A, Bromuri S and van Eekelen M (2021), "Sim-Env: Decoupling OpenAI Gym Environments from Simulation Models", In Advances in Practical Applications of Agents, Multi-Agent Systems, and Social Good. The PAAMS Collection. Cham Vol. 12946, pp. 390-393. Springer International Publishing.
BibTeX:
@inproceedings{IDLIB138,
  author = {Schuderer, A. and Bromuri, S. and van Eekelen, M.},
  editor = {Dignum, F.},
  title = {Sim-Env: Decoupling OpenAI Gym Environments from Simulation Models},
  booktitle = {Advances in Practical Applications of Agents, Multi-Agent Systems, and Social Good. The PAAMS Collection},
  publisher = {Springer International Publishing},
  year = {2021},
  volume = {12946},
  pages = {390--393},
  url = {https://doi.org/10.1007/978-3-030-85739-4_39},
  doi = {10.1007/978-3-030-85739-4_39}
}
Jacobs BPF (2021), "Spinoza- en Stevinpremies voor cybersecurity en quantumcomputing".
BibTeX:
@misc{IDLIB139,
  author = {Jacobs, B. P. F.},
  title = {Spinoza- en Stevinpremies voor cybersecurity en quantumcomputing},
  publisher = {NPO radio 1},
  year = {2021},
  url = {https://www.nporadio1.nl/nieuws/wetenschap-techniek/25ddf81d-7965-40ea-b797-5b33bd0d56bc/spino-en-steven}
}
Sloot B, Jacobs BPF and van Eijk N (2021), "Academics in favour of Mass Surveillance? Beter ten halve gekeerd dan ten hele gedwaald".
BibTeX:
@misc{IDLIB14,
  author = {Sloot, B. and Jacobs, B. P. F. and van Eijk, N.},
  title = {Academics in favour of Mass Surveillance? Beter ten halve gekeerd dan ten hele gedwaald},
  publisher = {netkwesties.nl},
  year = {2021},
  url = {https://www.netkwesties.nl/1513/academics-in-favour-of-mass-surveillance.htm}
}
Rengers M, Bronzwaer S, Kooiman J, Zuiderveen Borgesius FJ and Zwenne G-J (2021), "Spion Andrew zocht bij Booking uit wie naar het Midden-Oosten reisde".
BibTeX:
@misc{IDLIB140,
  author = {Rengers, M. and Bronzwaer, S. and Kooiman, J. and Zuiderveen Borgesius, F. J. and Zwenne, G.-J.},
  title = {Spion Andrew zocht bij Booking uit wie naar het Midden-Oosten reisde},
  publisher = {nrc.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/5d46d405-7c74-4a67-8b21-a480b2b22da0/?context=1516831}
}
Rot J, Jacobs BPF and Levy PB (2021), "Steps and traces*", Journal of Logic and Computation. Vol. 31(6), pp. 1482-1525.
BibTeX:
@article{IDLIB141,
  author = {Rot, J. and Jacobs, B. P. F. and Levy, P. B.},
  title = {Steps and traces*},
  journal = {Journal of Logic and Computation},
  year = {2021},
  volume = {31},
  number = {6},
  pages = {1482--1525},
  url = {https://repository.ubn.ru.nl/handle/2066/238076},
  doi = {10.1093/logcom/exab050}
}
Beuken A and Jacobs BPF (2021), "Stevinprijs voor privacy-voorvechter Bart Jacobs".
BibTeX:
@misc{IDLIB142,
  author = {Beuken, A. and Jacobs, B. P. F.},
  title = {Stevinprijs voor privacy-voorvechter Bart Jacobs},
  publisher = {hcc.nl},
  year = {2021},
  url = {https://www.hcc.nl/kennis/4803-stevinprijs-voor-privacy-voorvechter-bart-jacobs}
}
Jacobs BPF and van Pagee M (2021), "Superscience: oog voor security én privacy. Hoe universiteitsproject voor digitale identiteit internationaal reikt.".
BibTeX:
@misc{IDLIB143,
  author = {Jacobs, B. P. F. and van Pagee, M.},
  title = {Superscience: oog voor security én privacy. Hoe universiteitsproject voor digitale identiteit internationaal reikt.},
  publisher = {agconnect.nl},
  year = {2021},
  url = {https://www.agconnect.nl/artikel/superscience-oog-voor-security-en-privacy}
}
Chen YL, Luykx A, Mennink B and Preneel B (2021), "Systematic Security Analysis of Stream Encryption With Key Erasure", IEEE Transactions on Information Theory. Vol. 67(11), pp. 7518-7534.
BibTeX:
@article{IDLIB144,
  author = {Chen, Yu Long and Luykx, A. and Mennink, Bart and Preneel, B.},
  title = {Systematic Security Analysis of Stream Encryption With Key Erasure},
  journal = {IEEE Transactions on Information Theory},
  year = {2021},
  volume = {67},
  number = {11},
  pages = {7518--7534},
  note = {Gevonden in WoS met onderzoeker 1331560 Mennink, B.J.M. (Bart) Affil. (Radboud OR Nijmegen) 4 auteurs volgens WoS 1 niet opgezochte namen},
  url = {https://doi.org/10.1109/TIT.2021.3109302},
  doi = {10.1109/TIT.2021.3109302}
}
Verhagen L and Zuiderveen Borgesius FJ (2021), "Tech-reuzen maken misbruik van het veel te aardige Ierland" , pp. 9-9.
BibTeX:
@article{IDLIB145,
  author = {Verhagen, L. and Zuiderveen Borgesius, F. J.},
  title = {Tech-reuzen maken misbruik van het veel te aardige Ierland},
  year = {2021},
  pages = {9--9},
  url = {https://advance.lexis.com/api/permalink/736d5b93-4e76-41e2-8908-dee15a3764d6/?context=1516831}
}
Zuiderveen Borgesius FJ and Nijenhuis L (2021), "Telegram vormt ontmoetingsplek voor relschoppers" , pp. 5-5.
BibTeX:
@article{IDLIB146,
  author = {Zuiderveen Borgesius, F. J. and Nijenhuis, L.},
  title = {Telegram vormt ontmoetingsplek voor relschoppers},
  year = {2021},
  pages = {5--5},
  url = {https://advance.lexis.com/api/permalink/fa9b5b96-2c98-428c-a219-eec8eb7b1f4f/?context=1516831}
}
Hildebrandt M (2021), "Text-Driven Jurisdiction in Cyberspace", Theoretical and Applied Law. Vol. 2021(2(8)), pp. 6-20.
BibTeX:
@article{IDLIB147,
  author = {Hildebrandt, M.},
  title = {Text-Driven Jurisdiction in Cyberspace},
  journal = {Theoretical and Applied Law},
  year = {2021},
  volume = {2021},
  number = {2(8)},
  pages = {6--20},
  url = {https://repository.ubn.ru.nl/handle/2066/238085}
}
de Boer I, Herder E and Van Lieshout M (2021), "The Illusion of Control in Privacy Trade-Offs: Does Familiarity Play a Role?", In UMAP '21: Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, Utrecht Netherlands June 21 - 25, 2021. New York , pp. 338-344. ACM.
BibTeX:
@inproceedings{IDLIB148,
  author = {de Boer, I. and Herder, E. and Van Lieshout, M.},
  editor = {Masthoff, J. and Herder, E.},
  title = {The Illusion of Control in Privacy Trade-Offs: Does Familiarity Play a Role?},
  booktitle = {UMAP '21: Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, Utrecht Netherlands June 21 - 25, 2021},
  publisher = {ACM},
  year = {2021},
  pages = {338--344},
  url = {https://doi.org/10.1145/3450614.3464471},
  doi = {10.1145/3450614.3464471}
}
Jacobs BPF and Zanasi F (2021), "The Logical Essentials of Bayesian Reasoning", In Foundations of Probabilistic Programming. Cambridge , pp. 295-332. Cambridge University Press.
Abstract: This chapter offers an accessible introduction to the channel-based approach to Bayesian probability theory. This framework rests on algebraic and logical foundations, inspired by the methodologies of programming language semantics. It offers a uniform, structured and expressive language for describing Bayesian phenomena in terms of familiar programming concepts, like channel, predicate transformation and state transformation. The introduction also covers inference in Bayesian networks, which will be modelled by a suitable calculus of string diagrams.
BibTeX:
@inbook{IDLIB149,
  author = {Jacobs, B. P. F. and Zanasi, Fabio},
  editor = {Silva, A. and Barthe, G. and Katoen, J.-P.},
  title = {The Logical Essentials of Bayesian Reasoning},
  booktitle = {Foundations of Probabilistic Programming},
  publisher = {Cambridge University Press},
  year = {2021},
  pages = {295--332},
  url = {https://repository.ubn.ru.nl/handle/2066/230675},
  doi = {10.1017/9781108770750.010}
}
Bok C, Brunsveld N, van Dijck J, Prins C, Jacobs B, Skeikh H, van den Heuvel B, Fikkers DJ, Stolk R, Regien I and Verstappen J (2021), "Advies publieke waarden voor het onderwijs" Den Haag VNSU.
BibTeX:
@techreport{IDLIB15,
  author = {Bok, C. and Brunsveld, N. and van Dijck, J. and Prins, C. and Jacobs, B. and Skeikh, H. and van den Heuvel, B. and Fikkers, D. J. and Stolk, R. and Regien, I. and Verstappen, J.},
  title = {Advies publieke waarden voor het onderwijs},
  publisher = {VNSU},
  year = {2021},
  url = {https://vsnu.nl/files/Advies%20werkgroep%20publieke%20waarden%20onderwijs.pdf}
}
Rioja U, Paguada Isaula SL, Batina L and Armendariz I (2021), "The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics", ACM Journal on Emerging Technologies in Computing Systems. Vol. 17(3), pp. 1-27.
BibTeX:
@article{IDLIB150,
  author = {Rioja, U. and Paguada Isaula, S. L. and Batina, L. and Armendariz, I.},
  title = {The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics},
  journal = {ACM Journal on Emerging Technologies in Computing Systems},
  year = {2021},
  volume = {17},
  number = {3},
  pages = {1--27},
  url = {https://doi.org/10.1145/3446997},
  doi = {10.1145/3446997}
}
Hildebrandt M (2021), "The adaptive nature of text-driven law", The Journal of Cross-Disciplinary Research in Computational Law. Vol. 1(1), pp. 1-15.
BibTeX:
@article{IDLIB151,
  author = {Hildebrandt, M.},
  title = {The adaptive nature of text-driven law},
  journal = {The Journal of Cross-Disciplinary Research in Computational Law},
  year = {2021},
  volume = {1},
  number = {1},
  pages = {1--15},
  url = {https://journalcrcl.org/crcl/article/view/2}
}
Hildebrandt M (2021), "The issue of bias: the framing powers of ML", In Machines We Trust. Perspectives on Dependable AI. Cambridge, MA , pp. 43-60. MIT Press.
BibTeX:
@inbook{IDLIB152,
  author = {Hildebrandt, M.},
  editor = {Pelillo, M.},
  title = {The issue of bias: the framing powers of ML},
  booktitle = {Machines We Trust. Perspectives on Dependable AI},
  publisher = {MIT Press},
  year = {2021},
  pages = {43--60}
}
Backens M, Miller-Bakewell H, de Felice G, Lobski L and van de Wetering J (2021), "There and back again: A circuit extraction tale", Quantum. Vol. 5, pp. 421-+.
BibTeX:
@article{IDLIB153,
  author = {Backens, Miriam and Miller-Bakewell, Hector and de Felice, Giovanni and Lobski, Leo and van de Wetering, John},
  title = {There and back again: A circuit extraction tale},
  journal = {Quantum},
  year = {2021},
  volume = {5},
  pages = {421--+},
  note = {Gevonden in WoS met onderzoeker 1330584 Wetering, J.M.M. van de (John) Affil. (Radboud OR Nijmegen) 5 auteurs volgens WoS},
  url = {https://repository.ubn.ru.nl/handle/2066/232803}
}
Bordes N, Daemen JJC, Kuijsters D and Van Assche G (2021), "Thinking Outside the Superbox", In Advances in Cryptology -- CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16--20, 2021, Proceedings, Part III. Cham Vol. 12827, pp. 337-367. Springer.
BibTeX:
@inproceedings{IDLIB154,
  author = {Bordes, N. and Daemen, J. J. C. and Kuijsters, D. and Van Assche, G.},
  editor = {Malkin, T.},
  title = {Thinking Outside the Superbox},
  booktitle = {Advances in Cryptology -- CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16--20, 2021, Proceedings, Part III},
  publisher = {Springer},
  year = {2021},
  volume = {12827},
  pages = {337--367},
  url = {https://doi.org/10.1007/978-3-030-84252-9_12},
  doi = {10.1007/978-3-030-84252-9_12}
}
Paguada S, Batina L and Armendariz I (2021), "Toward practical autoencoder-based side-channel analysis evaluations", Computer Networks-The International Journal of Computer and Telecommunications Networking. Vol. 196, pp. 1-17.
BibTeX:
@article{IDLIB155,
  author = {Paguada, S. and Batina, L. and Armendariz, I.},
  title = {Toward practical autoencoder-based side-channel analysis evaluations},
  journal = {Computer Networks-The International Journal of Computer and Telecommunications Networking},
  year = {2021},
  volume = {196},
  pages = {1--17},
  url = {https://repository.ubn.ru.nl/handle/2066/236615},
  doi = {10.1016/j.comnet.2021.108230}
}
Rioja U, Batina L, Flores JL and Armendariz I (2021), "Towards Automatic and Portable Data Loading Template Attacks on Microcontrollers", In ISQED 2021: Proceedings of the Twenty Second International Symposium on Quality Electronic Design, April 7-9, 2021, Santa Clara, California, USA. New York , pp. 437-443. IEEE.
BibTeX:
@inproceedings{IDLIB156,
  author = {Rioja, U. and Batina, L. and Flores, J. L. and Armendariz, I.},
  editor = {Ghosh, S.},
  title = {Towards Automatic and Portable Data Loading Template Attacks on Microcontrollers},
  booktitle = {ISQED 2021: Proceedings of the Twenty Second International Symposium on Quality Electronic Design, April 7-9, 2021, Santa Clara, California, USA},
  publisher = {IEEE},
  year = {2021},
  pages = {437--443},
  url = {https://doi.org/10.1109/ISQED51717.2021.9424276},
  doi = {10.1109/ISQED51717.2021.9424276}
}
Masthoff J, Herder E, Tintarev N and Tkalčič M (2021), "UMAP '21: Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization" New York , pp. 432. Association for Computing Machinery.
BibTeX:
@book{IDLIB157,
  author = {Masthoff, J. and Herder, E. and Tintarev, N. and Tkalčič, M.},
  title = {UMAP '21: Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization},
  publisher = {Association for Computing Machinery},
  year = {2021},
  pages = {432},
  url = {https://doi.org/10.1145/3450614},
  doi = {10.1145/3450614}
}
Masthoff J, Herder E, Tintarev N and Tkalčič M (2021), "UMAP '21: Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, June 21-25, 2020 Utrecht, Netherlands" New York , pp. 327. ACM.
BibTeX:
@book{IDLIB158,
  author = {Masthoff, J. and Herder, E. and Tintarev, N. and Tkalčič, M.},
  title = {UMAP '21: Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, June 21-25, 2020 Utrecht, Netherlands},
  publisher = {ACM},
  year = {2021},
  pages = {327},
  url = {https://doi.org/10.1145/3450613},
  doi = {10.1145/3450613}
}
Jacobs BPF (2021), "Uitnodigingsbrief voor coronavaccinatie was via Google te vinden".
BibTeX:
@misc{IDLIB159,
  author = {Jacobs, B. P. F.},
  title = {Uitnodigingsbrief voor coronavaccinatie was via Google te vinden},
  publisher = {security.nl},
  year = {2021},
  url = {https://www.security.nl/posting/703991/Uitnodigingsbrief+voor+coronavaccinatie+was+via+Google+te+vinden}
}
Hildebrandt M (2021), "Algometrisch strafrecht: spiegel of echoput. Kunstmatige intelligentie in het strafrecht", Delikt en Delinkwent. Vol. 2021/51(7), pp. 651-666.
BibTeX:
@article{IDLIB16,
  author = {Hildebrandt, M.},
  title = {Algometrisch strafrecht: spiegel of echoput. Kunstmatige intelligentie in het strafrecht},
  journal = {Delikt en Delinkwent},
  year = {2021},
  volume = {2021/51},
  number = {7},
  pages = {651--666},
  url = {http://deeplinking.kluwer.nl/?param=00D671A4&cpid=WKNL-LTR-Nav2}
}
Hildebrandt M (2021), "Understanding law and the rule of law: a plea to augment CS Curricula", Communications of the Acm. Vol. 64(5), pp. 28-31.
BibTeX:
@article{IDLIB160,
  author = {Hildebrandt, M.},
  title = {Understanding law and the rule of law: a plea to augment CS Curricula},
  journal = {Communications of the Acm},
  year = {2021},
  volume = {64},
  number = {5},
  pages = {28--31},
  url = {https://doi.org/10.1145/3425779},
  doi = {10.1145/3425779}
}
Pieterse V, Stuurman S and van Eekelen MCJD (2021), "Using Jungian Personality Types for Teaching Teamwork in a Software Engineering Capstone Course", In SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education Virtual Event USA March, 2021. , pp. 239-245. ACM.
BibTeX:
@inproceedings{IDLIB161,
  author = {Pieterse, V. and Stuurman, S. and van Eekelen, M. C. J. D.},
  editor = {Sherriff, M.},
  title = {Using Jungian Personality Types for Teaching Teamwork in a Software Engineering Capstone Course},
  booktitle = {SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education Virtual Event USA March, 2021},
  publisher = {ACM},
  year = {2021},
  pages = {239--245},
  url = {https://doi.org/10.1145/3408877.3432455},
  doi = {10.1145/3408877.3432455}
}
Verlaan D and Jacobs BPF (2021), "Vaccinatieprogramma al maanden lek, iedereen kan voordringen en prik krijgen".
BibTeX:
@misc{IDLIB162,
  author = {Verlaan, D. and Jacobs, B. P. F.},
  title = {Vaccinatieprogramma al maanden lek, iedereen kan voordringen en prik krijgen},
  publisher = {rtlnieuws.nl},
  year = {2021},
  url = {https://www.rtlnieuws.nl/nieuws/nederland/artikel/5230655/vaccinatie-programma-lek-voordringen-fraude-brief-zorgmedewerkers}
}
Rottinghuis K, Verhulp E and Zuiderveen Borgesius FJ (2021), "Vaccineren en werk: 'Lef hebben om debat aan te gaan en duidelijkheid te bieden'".
BibTeX:
@misc{IDLIB163,
  author = {Rottinghuis, K. and Verhulp, E. and Zuiderveen Borgesius, F. J.},
  title = {Vaccineren en werk: 'Lef hebben om debat aan te gaan en duidelijkheid te bieden'},
  publisher = {nos.nl},
  year = {2021},
  url = {https://nos.nl/artikel/2391791-vaccineren-en-werk-lef-hebben-om-debat-aan-te-gaan-en-duidelijkheid-te-bieden}
}
Jacobs BPF (2021), "Veel mis in Nederlandse ict-beveiliging, zelfs geen verweer tegen simpele hacks [16:45]".
BibTeX:
@misc{IDLIB164,
  author = {Jacobs, B. P. F.},
  title = {Veel mis in Nederlandse ict-beveiliging, zelfs geen verweer tegen simpele hacks [16:45]},
  publisher = {NPO1},
  year = {2021},
  url = {https://www.npostart.nl/nos-journaal/06-04-2021/POW_04819856}
}
Gonzalez R, Hulsing A, Kannwischer MJ, Krämer J, Lange T, Stöttinger M, Waitz E, Wiggers TV and Yang B-Y (2021), "Verifying Post-Quantum Signatures in 8 KiB of RAM", In Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20--22, 2021, Proceedings. Cham Vol. 12841, pp. 215-233. Springer.
BibTeX:
@inproceedings{IDLIB165,
  author = {Gonzalez, R. and Hulsing, A. and Kannwischer, M. J. and Krämer, J. and Lange, T. and Stöttinger, M. and Waitz, E. and Wiggers, T. V. and Yang, B.-Y.},
  editor = {Cheon, J. H.},
  title = {Verifying Post-Quantum Signatures in 8 KiB of RAM},
  booktitle = {Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20--22, 2021, Proceedings},
  publisher = {Springer},
  year = {2021},
  volume = {12841},
  pages = {215--233},
  url = {https://doi.org/10.1007/978-3-030-81293-5_12},
  doi = {10.1007/978-3-030-81293-5_12}
}
Zuiderveen Borgesius FJ (2021), "Video van gewonde De Vries delen is niet strafbaar, wel problematisch".
BibTeX:
@misc{IDLIB166,
  author = {Zuiderveen Borgesius, F. J.},
  title = {Video van gewonde De Vries delen is niet strafbaar, wel problematisch},
  publisher = {nu.nl},
  year = {2021},
  url = {https://www.nu.nl/tech/6144130/video-van-gewonde-de-vries-delen-is-niet-strafbaar-wel-problematisch.html}
}
Beens P and Verheul ER (2021), "Volgende hack kan tot oorlog leiden".
BibTeX:
@misc{IDLIB167,
  author = {Beens, P. and Verheul, E. R.},
  title = {Volgende hack kan tot oorlog leiden},
  publisher = {rd.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/517abbae-cf54-4947-a795-751705fcb82a/?context=1516831}
}
Wiersma M and Poll E (2021), "Waarom kun je niet inchecken met een ov-chipkaart in een volle portemonnee? Durf te vragen" , pp. 12-12.
BibTeX:
@article{IDLIB168,
  author = {Wiersma, M. and Poll, E.},
  title = {Waarom kun je niet inchecken met een ov-chipkaart in een volle portemonnee? Durf te vragen},
  year = {2021},
  pages = {12--12},
  url = {https://advance.lexis.com/api/permalink/3fc38ac2-6101-4f82-b8e6-213c2c1aa212/?context=1516831}
}
Peer W and Jacobs BPF (2021), "Waarom zo veel cyberaanvallen uit Oost-Europa komen".
BibTeX:
@misc{IDLIB169,
  author = {Peer, W. and Jacobs, B. P. F.},
  title = {Waarom zo veel cyberaanvallen uit Oost-Europa komen},
  publisher = {Algemeen Dagblad},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/3ff4aec9-cc64-4d4b-afdb-a78cfb17ddcb/?context=1516831}
}
van Egmond J and Jacobs BPF (2021), "Als een computergijzeling echt de veiligheid bedreigt, is Nederland niet goed toegerust".
BibTeX:
@misc{IDLIB17,
  author = {van Egmond, Joost and Jacobs, B. P. F.},
  title = {Als een computergijzeling echt de veiligheid bedreigt, is Nederland niet goed toegerust},
  publisher = {trouw.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/668b4c8f-0832-45d1-b216-2e307706a159/?context=1516831}
}
Zuiderveen Borgesius FJ (2021), "Waarschuwingen na GGD-datadiefstal: 'Wees extra alert'".
BibTeX:
@misc{IDLIB170,
  author = {Zuiderveen Borgesius, F. J.},
  title = {Waarschuwingen na GGD-datadiefstal: 'Wees extra alert'},
  publisher = {NOS.nl},
  year = {2021},
  url = {https://nos.nl/artikel/2366244-waarschuwingen-na-ggd-datadiefstal-wees-extra-alert.html}
}
Jacobs BPF (2021), "Wat doet het RIVM met onze vaccinatiegegevens? NOS Radio 1 Journaal, dinsdag 5 januari 2021. BNNVARA. De Nieuws BV".
BibTeX:
@misc{IDLIB171,
  author = {Jacobs, B. P. F.},
  title = {Wat doet het RIVM met onze vaccinatiegegevens? NOS Radio 1 Journaal, dinsdag 5 januari 2021. BNNVARA. De Nieuws BV},
  publisher = {NOS Radio 1 Journaal},
  year = {2021},
  url = {https://www.nporadio1.nl/binnenland/28755-wat-doet-het-rivm-met-onze-vaccinatiegegevens}
}
Meijer CFJ, Moonsamy V and Wetzels J (2021), "Where's Crypto? Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code", In USENIX Security Symposium '21: August 11--13, 2021. S.l. , pp. 1-18. Usenix.
BibTeX:
@inproceedings{IDLIB172,
  author = {Meijer, C. F. J. and Moonsamy, Veelasha and Wetzels, J.},
  title = {Where's Crypto? Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code},
  booktitle = {USENIX Security Symposium '21: August 11--13, 2021},
  publisher = {Usenix},
  year = {2021},
  pages = {1--18},
  url = {https://www.usenix.org/system/files/sec21fall-meijer.pdf}
}
Pöpper C, Vanhoef M, Batina L and Mayrhofer R (2021), "WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi United Arab Emirates 28 June 2021- 2 July 2021" New York , pp. 322. Association for Computing Machinery.
BibTeX:
@book{IDLIB173,
  author = {Pöpper, C. and Vanhoef, M. and Batina, L. and Mayrhofer, R.},
  title = {WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi United Arab Emirates 28 June 2021- 2 July 2021},
  publisher = {Association for Computing Machinery},
  year = {2021},
  pages = {322},
  url = {https://doi.org/10.1145/3448300},
  doi = {10.1145/3448300}
}
Zuiderveen Borgesius FJ (2021), "Youssef werd gezien als extremist: 'Wie mijn naam googelt ziet NCTV, geen idee waarom'".
BibTeX:
@misc{IDLIB174,
  author = {Zuiderveen Borgesius, F. J.},
  title = {Youssef werd gezien als extremist: 'Wie mijn naam googelt ziet NCTV, geen idee waarom'},
  publisher = {AD/Algemeen Dagblad.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/3f1acc96-f59c-45c6-b59c-815e8d43b145/?context=1516831}
}
Wiggers T, Stebila D, Rijneveld J, Kwiatkowski K, Kannwischer MJ, Schanck J, Wichers Schreur RJM, Celi S and Tamvada G (2021), "kriskwiatkowski/pqc: Initial release".
Abstract: Reference implementations of post-quantum cryptographic primitives
BibTeX:
@misc{IDLIB175,
  author = {Wiggers, T. and Stebila, D. and Rijneveld, J. and Kwiatkowski, K. and Kannwischer, M. J. and Schanck, J. and Wichers Schreur, R. J. M. and Celi, S. and Tamvada, G.},
  title = {kriskwiatkowski/pqc: Initial release},
  year = {2021},
  url = {https://doi.org/10.5281/ZENODO.5346922},
  doi = {10.5281/ZENODO.5346922}
}
Wiggers TV and Renovate W (2021), "thomwiggers/lpn: Release version 0.2.0".
Abstract: Many speedups since 0.1.0 Many more codes for code-reduce Copyright: Open Access
BibTeX:
@misc{IDLIB177,
  author = {Wiggers, T. V. and Renovate, W.},
  title = {thomwiggers/lpn: Release version 0.2.0},
  year = {2021},
  url = {https://doi.org/10.5281/ZENODO.4655955},
  doi = {10.5281/ZENODO.4655955}
}
Wiggers TV and Renovate W (2021), "thomwiggers/m4ri-rust v0.4.0".
Abstract: M4RI Rust bindings Copyright: Open Access
BibTeX:
@misc{IDLIB179,
  author = {Wiggers, T. V. and Renovate, W.},
  title = {thomwiggers/m4ri-rust v0.4.0},
  year = {2021},
  url = {https://doi.org/10.5281/ZENODO.4534049},
  doi = {10.5281/ZENODO.4534049}
}
Rosenberg E, Berkhout K, Zuiderveen Borgesius FJ and Terstegge J (2021), "Ambtenaren willen meer dan mag" , pp. 6-6.
BibTeX:
@article{IDLIB18,
  author = {Rosenberg, E. and Berkhout, K. and Zuiderveen Borgesius, F. J. and Terstegge, J.},
  title = {Ambtenaren willen meer dan mag},
  year = {2021},
  pages = {6--6},
  url = {https://advance.lexis.com/api/permalink/5e0b3752-130c-46d3-9dcc-9f767da768cd/?context=1516831}
}
Hoepman JH (2021), "Het is niet te laat om anders over privacy te gaan denken'".
BibTeX:
@misc{IDLIB180,
  author = {Hoepman, J. H.},
  title = {Het is niet te laat om anders over privacy te gaan denken'},
  publisher = {emerce.nl},
  year = {2021},
  url = {https://www.emerce.nl/wire/het-om-anders-privacy-gaan-denken}
}
Olsthoorn P and Jacobs BPF (2021), "Sleepnetten inlichtingendiensten onder één noemer'".
BibTeX:
@misc{IDLIB181,
  author = {Olsthoorn, P. and Jacobs, B. P. F.},
  title = {Sleepnetten inlichtingendiensten onder één noemer'},
  publisher = {Netkwesties.nl},
  year = {2021},
  url = {https://www.netkwesties.nl/1479/sleepnetten-inlichtingendiensten-onder.htm}
}
König E and Jacobs BPF (2021), "Smoking gun' Huawei toont kwetsbaarheid van telecom".
BibTeX:
@misc{IDLIB182,
  author = {König, E. and Jacobs, B. P. F.},
  title = {Smoking gun' Huawei toont kwetsbaarheid van telecom},
  publisher = {Nrc.nl},
  year = {2021},
  url = {https://www.nrc.nl/nieuws/2021/04/18/smoking-gun-huawei-toont-kwetsbaarheid-van-telecom-a4040288}
}
Verhagen L and Hoepman JH (2021), "Apple gaat apparaten gebruikers ongevraagd scannen op verdachte foto's van kinderen" , pp. 14-14.
BibTeX:
@article{IDLIB19,
  author = {Verhagen, L. and Hoepman, J. H.},
  title = {Apple gaat apparaten gebruikers ongevraagd scannen op verdachte foto's van kinderen},
  year = {2021},
  pages = {14--14},
  url = {https://advance.lexis.com/api/permalink/a2302ead-ff02-4b6b-8533-d23a018f3b97/?context=1516831}
}
Modderkolk H, Verhagen L and Hoepman J-H (2021), "'Uitspraken De Jonge over datalek onjuist': GGD en privacy" , pp. 3-3.
BibTeX:
@article{IDLIB2,
  author = {Modderkolk, H. and Verhagen, L. and Hoepman, J.-H.},
  title = {'Uitspraken De Jonge over datalek onjuist': GGD en privacy},
  year = {2021},
  pages = {3--3},
  url = {https://advance-lexis-com.ru.idm.oclc.org/api/permalink/7cbccec5-5dc2-46be-9c66-8ab1b82e7530/?context=1516831}
}
Waarlo N and Hoepman JH (2021), "Apple stelt plan uit om iPhones te scannen op kinderporno na grote privacyzorgen".
BibTeX:
@misc{IDLIB20,
  author = {Waarlo, N. and Hoepman, J. H.},
  title = {Apple stelt plan uit om iPhones te scannen op kinderporno na grote privacyzorgen},
  publisher = {volkskrant.nl},
  year = {2021},
  url = {https://www.volkskrant.nl/nieuws-achtergrond/apple-stelt-plan-uit-om-iphones-te-scannen-op-kinderporno-na-grote-privacyzorgen b1cbb8426/}
}
Hijink M and Hoepman JH (2021), "Apples omstreden nieuwe detectiesysteem maakt nul fouten - zegt Apple".
BibTeX:
@misc{IDLIB21,
  author = {Hijink, M. and Hoepman, J. H.},
  title = {Apples omstreden nieuwe detectiesysteem maakt nul fouten - zegt Apple},
  publisher = {nrc.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/2a94e86e-937d-411c-942b-624e909ba91a/?context=1516831}
}
Dobraunig C, Eichlseder M, Mendel F and Schlaffer M (2021), "Ascon v1.2: Lightweight Authenticated Encryption and Hashing", Journal of Cryptology. Vol. 34(3), pp. 1-42.
BibTeX:
@article{IDLIB23,
  author = {Dobraunig, Christoph and Eichlseder, M. and Mendel, Florian and Schlaffer, Martin},
  title = {Ascon v1.2: Lightweight Authenticated Encryption and Hashing},
  journal = {Journal of Cryptology},
  year = {2021},
  volume = {34},
  number = {3},
  pages = {1--42},
  note = {Gevonden in WoS met onderzoeker 1399904 Dobraunig, C.E. (Christoph) Affil. (Radboud OR Nijmegen) 4 auteurs volgens WoS},
  url = {https://repository.ubn.ru.nl/handle/2066/235128},
  doi = {10.1007/s00145-021-09398-9}
}
Hu WY, van den Broek FMJ, Jacobs BPF and Wolters PTJ (2021), "Attribuut-gebaseerde elektronische handtekeningen en de eIDAS-verordening", In Digitalisering en conflictoplossing. Deventer , pp. 293-315. Wolters Kluwer.
BibTeX:
@inbook{IDLIB24,
  author = {Hu, W. Y. and van den Broek, F. M. J. and Jacobs, B. P. F. and Wolters, P. T. J.},
  editor = {Wolters, P. T. J. and Hermans, R. M.},
  title = {Attribuut-gebaseerde elektronische handtekeningen en de eIDAS-verordening},
  booktitle = {Digitalisering en conflictoplossing},
  publisher = {Wolters Kluwer},
  year = {2021},
  pages = {293--315}
}
Rioja U, Batina L, Flores JL and Armendariz I (2021), "Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis", Computer Networks-The International Journal of Computer and Telecommunications Networking. Vol. 198, pp. 1-19.
BibTeX:
@article{IDLIB25,
  author = {Rioja, U. and Batina, Lejla and Flores, J. L. and Armendariz, I.},
  title = {Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis},
  journal = {Computer Networks-The International Journal of Computer and Telecommunications Networking},
  year = {2021},
  volume = {198},
  pages = {1--19},
  note = {Gevonden in WoS met onderzoeker 1102799 Batina, L. (Lejla) Affil. (Radboud OR Nijmegen) 4 auteurs volgens WoS},
  url = {https://repository.ubn.ru.nl/handle/2066/237439},
  doi = {10.1016/j.comnet.2021.108405}
}
van Pelt S and Jacobs BPF (2021), "Bart Jacobs: een principiële criticus die niet snel buigt".
BibTeX:
@misc{IDLIB26,
  author = {van Pelt, Stan and Jacobs, B. P. F.},
  title = {Bart Jacobs: een principiële criticus die niet snel buigt},
  publisher = {voxweb.nl},
  year = {2021},
  url = {https://www.voxweb.nl/nieuws/bart-jacobs-een-principiele-criticus-die-niet-snel-buigt}
}
Nieuwesteeg BFH, van den Berg B, Pras A, Lodder AR, de Laat C, Custers B, Koops B-J, Daemen J, van Eekelen MCJD, van Dijk N, Mentens N, van Rijswijk RM, Ruiter S and Faure MG (2021), "Betaal geen losgeld bij een ransomware-aanval".
BibTeX:
@misc{IDLIB27,
  author = {Nieuwesteeg, B. F. H. and van den Berg, B. and Pras, A. and Lodder, A. R. and de Laat, C. and Custers, B. and Koops, B.-J. and Daemen, J. and van Eekelen, M. C. J. D. and van Dijk, N. and Mentens, N. and van Rijswijk, R. M. and Ruiter, S. and Faure, M. G.},
  title = {Betaal geen losgeld bij een ransomware-aanval},
  publisher = {fd.nl},
  year = {2021},
  url = {https://fd.nl/opinie/1390205/betaal-geen-losgeld-bij-een-ransomware-aanval}
}
Opromolla F, Vranken HPE and den Daas S (2021), "Bitcoins 'minen' lucratief, maar gevolgen voor stroomvoorziening groot".
BibTeX:
@misc{IDLIB28,
  author = {Opromolla, F. and Vranken, H. P. E. and den Daas, S.},
  title = {Bitcoins 'minen' lucratief, maar gevolgen voor stroomvoorziening groot},
  publisher = {Nos.nl},
  year = {2021},
  url = {https://nos.nl/artikel/2377235-bitcoins-minen-lucratief-maar-gevolgen-voor-stroomvoorziening-groot.html}
}
Koens T and Poll E (2021), "Blockchain Utility in Use Cases: Observations, Red Flags, and Requirements", In Euro-Par 2020: Parallel Processing Workshops. Cham Vol. 12480, pp. 5-17. Springer International Publishing.
BibTeX:
@inproceedings{IDLIB29,
  author = {Koens, T. and Poll, E.},
  editor = {Balis, B.},
  title = {Blockchain Utility in Use Cases: Observations, Red Flags, and Requirements},
  booktitle = {Euro-Par 2020: Parallel Processing Workshops},
  publisher = {Springer International Publishing},
  year = {2021},
  volume = {12480},
  pages = {5--17},
  url = {https://doi.org/10.1007/978-3-030-71593-9_1},
  doi = {10.1007/978-3-030-71593-9_1}
}
van Heezik C, Jacobs BPF and van Dijck J (2021), "'We willen laten zien hoe het internet anders kan'" , pp. 6-6.
BibTeX:
@article{IDLIB3,
  author = {van Heezik, C. and Jacobs, B. P. F. and van Dijck, J.},
  title = {'We willen laten zien hoe het internet anders kan'},
  year = {2021},
  pages = {6--6},
  url = {https://advance.lexis.com/api/permalink/a2d9fc3b-37f6-4aac-88dd-3ac6c065be0c/?context=1516831}
}
Koens T, van Aubel PJM and Poll E (2021), "Blockchain adoption drivers: The rationality of irrational choices", Concurrency and Computation: Practice and Experience. Vol. 33(8(SI)), pp. 1-15.
BibTeX:
@article{IDLIB30,
  author = {Koens, T. and van Aubel, P. J. M. and Poll, Erik},
  title = {Blockchain adoption drivers: The rationality of irrational choices},
  journal = {Concurrency and Computation: Practice and Experience},
  year = {2021},
  volume = {33},
  number = {8(SI)},
  pages = {1--15},
  url = {https://repository.ubn.ru.nl/handle/2066/231642},
  doi = {10.1002/cpe.5843}
}
Hamburg M, Hermelink J, Primas R, Samardjiska S, Schamberger T, Streit S, Strieder E and van Vredendaal C (2021), "Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber", IACR Transactions on Cryptographic Hardware and Embedded Systems. Vol. 2021(4), pp. 88-113.
BibTeX:
@article{IDLIB31,
  author = {Hamburg, M. and Hermelink, J. and Primas, R. and Samardjiska, S. and Schamberger, T. and Streit, S. and Strieder, E. and van Vredendaal, C.},
  title = {Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber},
  journal = {IACR Transactions on Cryptographic Hardware and Embedded Systems},
  year = {2021},
  volume = {2021},
  number = {4},
  pages = {88--113},
  url = {https://repository.ubn.ru.nl/handle/2066/237976}
}
Dobraunig C, Grassi L, Guinet A and Kuijsters D (2021), "Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields", In Advances in Cryptology -- EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17--21, 2021, Proceedings, Part I. Cham Vol. 12697, pp. 3-34. Springer International Publishing.
BibTeX:
@inproceedings{IDLIB32,
  author = {Dobraunig, C. and Grassi, L. and Guinet, A. and Kuijsters, D.},
  editor = {Canteaut, A.},
  title = {Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields},
  booktitle = {Advances in Cryptology -- EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17--21, 2021, Proceedings, Part I},
  publisher = {Springer International Publishing},
  year = {2021},
  volume = {12697},
  pages = {3--34},
  url = {https://doi.org/10.1007/978-3-030-77886-6_1},
  doi = {10.1007/978-3-030-77886-6_1}
}
Verhagen L, Hoepman JH and Bogaerts G-J (2021), "Cleandeskpolicy" , pp. 26-27.
BibTeX:
@article{IDLIB33,
  author = {Verhagen, L. and Hoepman, J. H. and Bogaerts, G.-J.},
  title = {Cleandeskpolicy},
  year = {2021},
  pages = {26--27},
  url = {https://advance.lexis.com/api/permalink/faab3d45-2aa1-4d21-86e5-3f80609c6056/?context=1516831}
}
Schoone JJP, Dobraunig CE and Rotella Y (2021), "Code to count monomials of several rounds of Pyjamask".
Abstract: The result ons the number of monomials are obtained by running the code. Abstract from [Dobraunig, C., Rotella, Y., & Schoone, J. (2020). Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96. IACR Transactions on Symmetric Cryptology, 2020(1), 289-312. DOI: https://doi.org/10.13154/tosc.v2020.i1.289-312] Cryptographic competitions, like the ongoing NIST call for lightweight cryptography, always provide a thriving research environment, where new interesting ideas are proposed and new cryptographic insights are made. One proposal for this NIST call that is accepted for the second round is Pyjamask. Pyjamask is an authenticated encryption scheme that builds upon two block ciphers, Pyjamask-96 and Pyjamask-128, that aim to minimize the number of AND operations at the cost of a very strong linear layer. A side-effect of this goal is a slow growth in the algebraic degree. In this paper, we focus on the block cipher Pyjamask-96 and are able to provide a theoretical key-recovery attack reaching 14 (out of 14) rounds as well as a practical attack on 8 rounds. We do this by combining higher-order differentials with an in-depth analysis of the system of equations gotten for 2.5 rounds of Pyjamask-96. The AEAD-scheme Pyjamask itself is not threatened by the work in this paper. In order to obtain the theoretical results for the key-recovery attack on 14 rounds, we needed to compute the number of monomials that would be present in the aforementioned system of equations. The deposited code is specifically written with this cipher and goal in mind. It is therefore usable to recheck the results indicated in Section 6.3 of the paper. Furthermore, one can adapt the code to compute the number of monomials present is a similar system of equations for a different cipher.
BibTeX:
@misc{IDLIB34,
  author = {Schoone, J. J. P. and Dobraunig, C. E. and Rotella, Y.},
  title = {Code to count monomials of several rounds of Pyjamask},
  year = {2021},
  url = {https://github.com/JJPSchoone/alg-att-pyjamask-supp}
}
Greconici DOC, Kannwischer MJ and Sprenkels D (2021), "Compact Dilithium Implementations on Cortex-M3 and Cortex-M4", IACR Transactions on Cryptographic Hardware and Embedded Systems. Vol. 2021(1), pp. 1-24.
BibTeX:
@article{IDLIB35,
  author = {Greconici, D. O. C. and Kannwischer, Matthias J. and Sprenkels, D.},
  title = {Compact Dilithium Implementations on Cortex-M3 and Cortex-M4},
  journal = {IACR Transactions on Cryptographic Hardware and Embedded Systems},
  year = {2021},
  volume = {2021},
  number = {1},
  pages = {1--24},
  url = {https://repository.ubn.ru.nl/handle/2066/230711}
}
van Aubel PJM and Poll E (2021), "Compromised through Compression: Privacy Implications of Smart Meter Traffic Analysis", In SecureComm 2021: Security and Privacy in Communication Networks 17th EAI International Conference, Virtual Event, September 6--9, 2021, Proceedings, Part II. Cham Vol. 399, pp. 317-337. Springer.
BibTeX:
@inproceedings{IDLIB36,
  author = {van Aubel, P. J. M. and Poll, E.},
  editor = {Garcia-Alfaro, J.},
  title = {Compromised through Compression: Privacy Implications of Smart Meter Traffic Analysis},
  booktitle = {SecureComm 2021: Security and Privacy in Communication Networks 17th EAI International Conference, Virtual Event, September 6--9, 2021, Proceedings, Part II},
  publisher = {Springer},
  year = {2021},
  volume = {399},
  pages = {317--337},
  url = {https://doi.org/10.1007/978-3-030-90022-9_16},
  doi = {10.1007/978-3-030-90022-9_16}
}
van de Wetering J (2021), "Constructing quantum circuits with global gates", New Journal of Physics. Vol. 23(4), pp. 1-13.
BibTeX:
@article{IDLIB37,
  author = {van de Wetering, John},
  title = {Constructing quantum circuits with global gates},
  journal = {New Journal of Physics},
  year = {2021},
  volume = {23},
  number = {4},
  pages = {1--13},
  note = {Gevonden in WoS met onderzoeker 1330584 Wetering, J.M.M. van de (John) Affil. (Radboud OR Nijmegen) 1 auteurs volgens WoS},
  url = {https://repository.ubn.ru.nl/handle/2066/233080},
  doi = {10.1088/1367-2630/abf1b3}
}
Jacobs BPF (2021), "Cowboy Spionnen".
BibTeX:
@misc{IDLIB38,
  author = {Jacobs, B. P. F.},
  title = {Cowboy Spionnen},
  publisher = {ibestuur.nl},
  year = {2021},
  url = {https://ibestuur.nl/podium/cowboy-spionnen}
}
Bulten CDJ, Jacobs BPF and Jansen CJH (2021), "Cybersecurity. Chefsache?!", Ondernemingsrecht. Vol. 79(12), pp. 475-480.
BibTeX:
@article{IDLIB39,
  author = {Bulten, C. D. J. and Jacobs, B. P. F. and Jansen, C. J. H.},
  title = {Cybersecurity. Chefsache?!},
  journal = {Ondernemingsrecht},
  year = {2021},
  volume = {79},
  number = {12},
  pages = {475--480},
  url = {https://www.recht.nl/vakliteratuur/ondernemingsrecht/artikel/514107/cybersecurity-chefsache/}
}
van Ooij D and Hoepman JH (2021), "1 miljoen prikken niet goed geregistreerd voor Europese coronapas".
BibTeX:
@misc{IDLIB4,
  author = {van Ooij, D. and Hoepman, J. H.},
  title = {1 miljoen prikken niet goed geregistreerd voor Europese coronapas},
  publisher = {nos.nl},
  year = {2021},
  url = {https://nos.nl/nieuwsuur/artikel/2381895-1-miljoen-prikken-niet-goed-geregistreerd-voor-europese-coronapas}
}
Graßl PAJ, Schraffenberger HK, Zuiderveen Borgesius FJ and Buijzen MA (2021), "Dark and bright patterns in cookie consent requests", Journal of Digital Social Research. Vol. 3(1), pp. 1-38.
Abstract: Dark patterns are (evil) design nudges that steer people's behaviour through persuasive interface design. Increasingly found in cookie consent requests, they possibly undermine principles of EU privacy law. In two preregistered online experiments we investigated the effects of three common design nudges (default, aesthetic manipulation, obstruction) on users' consent decisions and their perception of control over their personal data in these situations. In the first experiment (N = 228) we explored the effects of design nudges towards the privacy-unfriendly option (dark patterns). The experiment revealed that most participants agreed to all consent requests regardless of dark design nudges. Unexpectedly, despite generally low levels of perceived control, obstructing the privacy-friendly option led to more rather than less perceived control. In the second experiment (N = 255) we reversed the direction of the design nudges towards the privacy-friendly option, which we title ``bright patterns''. This time the obstruction and default nudges swayed people effectively towards the privacy-friendly option, while the result regarding perceived control stayed the same compared to Experiment 1. Overall, our findings suggest that many current implementations of cookie consent requests do not enable meaningful choices by internet users, and are thus not in line with the intention of the EU policymakers. We also explore how policymakers could address the problem.
BibTeX:
@article{IDLIB40,
  author = {Graßl, P. A. J. and Schraffenberger, H. K. and Zuiderveen Borgesius, F. J. and Buijzen, M. A.},
  title = {Dark and bright patterns in cookie consent requests},
  journal = {Journal of Digital Social Research},
  year = {2021},
  volume = {3},
  number = {1},
  pages = {1--38},
  url = {https://repository.ubn.ru.nl/handle/2066/231659}
}
van Gastel BE, Jacobs B and Popma JAM (2021), "Data Protection Using Polymorphic Pseudonymisation in a Large-Scale Parkinson's Disease Study", Journal of Parkinson's Disease. Vol. 11(S1), pp. S19-S25.
BibTeX:
@article{IDLIB41,
  author = {van Gastel, B. E. and Jacobs, B. and Popma, J. A. M.},
  title = {Data Protection Using Polymorphic Pseudonymisation in a Large-Scale Parkinson's Disease Study},
  journal = {Journal of Parkinson's Disease},
  year = {2021},
  volume = {11},
  number = {S1},
  pages = {S19--S25},
  url = {https://repository.ubn.ru.nl/handle/2066/235876},
  doi = {10.3233/JPD-202431}
}
Daemen J and Van Assche G (2021), "Data values encryption method". 2021, 2021.
BibTeX:
@misc{IDLIB42,
  author = {Daemen, Joan and Van Assche, G.},
  title = {Data values encryption method},
  year = {2021},
  number = {US 2021/0110050 A1},
  url = {https://worldwide.espacenet.com/patent/search?q=pn%3DUS2021110050A1}
}
Modderkolk H, Verhagen L and Hoepman J-H (2021), "Datalek GGD raakt ook gevaccineerden, ministerie had al van begin af aan zorgen" , pp. 2-2.
BibTeX:
@article{IDLIB43,
  author = {Modderkolk, H. and Verhagen, L. and Hoepman, J.-H.},
  title = {Datalek GGD raakt ook gevaccineerden, ministerie had al van begin af aan zorgen},
  year = {2021},
  pages = {2--2},
  url = {https://advance-lexis-com.ru.idm.oclc.org/api/permalink/2368cf3b-64cc-42d5-b8a3-66b6b3d1e042/?context=1516831}
}
Gibbs N and Jacobs BPF (2021), "De strijd om vaccinatiegegevens, De Nieuws BV, Radio 1, Dinsdag 5 januari 2020".
BibTeX:
@misc{IDLIB44,
  author = {Gibbs, N. and Jacobs, B. P. F.},
  title = {De strijd om vaccinatiegegevens, De Nieuws BV, Radio 1, Dinsdag 5 januari 2020},
  publisher = {NPO Radio 1},
  year = {2021},
  url = {https://www.nporadio1.nl/de-nieuws-bv/onderwerpen/70313-2021-01-05-de-strijd-om-vaccinatiegegevens}
}
van Tilburg AM, Grit M, Keizer P and Jacobs BPF (2021), "De wereld achter WhatsApp-fraude. 1 februari 2021. Pointer. KRO-NCRV".
BibTeX:
@misc{IDLIB45,
  author = {van Tilburg, A. M. and Grit, M. and Keizer, P. and Jacobs, B. P. F.},
  title = {De wereld achter WhatsApp-fraude. 1 februari 2021. Pointer. KRO-NCRV},
  publisher = {Pointer. KRO-NCRV},
  year = {2021},
  url = {https://pointer.kro-ncrv.nl/de-wereld-achter-whatsapp-fraude}
}
Bodo B, Brekke JK and Hoepman J-H (2021), "Decentralisation: a multidisciplinary perspective", Internet Policy Review. Vol. 10(2), pp. 1-21.
BibTeX:
@article{IDLIB46,
  author = {Bodo, B. and Brekke, Jaya Klara and Hoepman, Jaap-Henk},
  title = {Decentralisation: a multidisciplinary perspective},
  journal = {Internet Policy Review},
  year = {2021},
  volume = {10},
  number = {2},
  pages = {1--21},
  note = {Gevonden in WoS met onderzoeker 1052888 Hoepman, J.H. (Jaap-Henk) Affil. (Radboud OR Nijmegen) 3 auteurs volgens WoS},
  url = {https://repository.ubn.ru.nl/handle/2066/236508}
}
Cho K, Westerbaan B and van de Wetering JMM (2021), "Dichotomy between deterministic and probabilistic models in countably additive effectus theory", In QPL 2020: Proceedings 17th International Conference on Quantum Physics and Logic, June 2-6, 2020, Paris. S.l. Vol. 340, pp. 91-113. EPTCS.
BibTeX:
@inproceedings{IDLIB47,
  author = {Cho, K. and Westerbaan, Bas and van de Wetering, J. M. M.},
  editor = {Valiron, B.},
  title = {Dichotomy between deterministic and probabilistic models in countably additive effectus theory},
  booktitle = {QPL 2020: Proceedings 17th International Conference on Quantum Physics and Logic, June 2-6, 2020, Paris},
  publisher = {EPTCS},
  year = {2021},
  volume = {340},
  pages = {91--113},
  url = {https://repository.ubn.ru.nl/handle/2066/237986},
  doi = {10.4204/EPTCS.340.5}
}
Fechner W and Herder E (2021), "Digital Nudging for More Ecological Supermarket Purchases", In UMAP '21: Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, June 21-25, 2020 Utrecht, Netherlands. New York , pp. 284-292. ACM.
BibTeX:
@inproceedings{IDLIB48,
  author = {Fechner, W. and Herder, E.},
  editor = {Masthoff, J. and Herder, E.},
  title = {Digital Nudging for More Ecological Supermarket Purchases},
  booktitle = {UMAP '21: Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, June 21-25, 2020 Utrecht, Netherlands},
  publisher = {ACM},
  year = {2021},
  pages = {284--292},
  url = {https://doi.org/10.1145/3450614.3464620},
  doi = {10.1145/3450614.3464620}
}
Jacobs BPF (2021), "Digitale Pandemie".
BibTeX:
@misc{IDLIB49,
  author = {Jacobs, B. P. F.},
  title = {Digitale Pandemie},
  publisher = {iBestuur},
  year = {2021},
  url = {https://ibestuur.nl/podium/digitale-pandemie}
}
Venema MTC and Alpár G (2021), "A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption", In Topics in Cryptology -- CT-RSA 2021: Cryptographers' Track at the RSA Conference 2021, Virtual Event, May 17--20, 2021, Proceedings. Cham Vol. 12704, pp. 100-125. Springer International Publishing.
BibTeX:
@inproceedings{IDLIB5,
  author = {Venema, M. T. C. and Alpár, G.},
  editor = {Paterson, K. G.},
  title = {A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption},
  booktitle = {Topics in Cryptology -- CT-RSA 2021: Cryptographers' Track at the RSA Conference 2021, Virtual Event, May 17--20, 2021, Proceedings},
  publisher = {Springer International Publishing},
  year = {2021},
  volume = {12704},
  pages = {100--125},
  url = {https://doi.org/10.1007/978-3-030-75539-3_5},
  doi = {10.1007/978-3-030-75539-3_5}
}
Schellevis J, Andringa R, Jacobs BPF and Gekiere L (2021), "Digitale deuren staan soms wagenwijd open, 'situatie is alarmerend'".
BibTeX:
@misc{IDLIB50,
  author = {Schellevis, J. and Andringa, R. and Jacobs, B. P. F. and Gekiere, L.},
  title = {Digitale deuren staan soms wagenwijd open, 'situatie is alarmerend'},
  publisher = {NOS},
  year = {2021},
  url = {https://nos.nl/artikel/2375676-digitale-deuren-staan-soms-wagenwijd-open-situatie-is-alarmerend.html}
}
Jacobs BPF and Meijer R (2021), "Digitale identiteit als Nederlandse troefkaart in Europa".
BibTeX:
@misc{IDLIB51,
  author = {Jacobs, B. P. F. and Meijer, R.},
  title = {Digitale identiteit als Nederlandse troefkaart in Europa},
  publisher = {ibestuur.nl},
  year = {2021},
  url = {https://ibestuur.nl/podium/digitale-identiteit-als-nederlandse-troefkaart-in-europa}
}
van Burik J, Schut M and Hoepman JH (2021), "Digitale privacy".
BibTeX:
@misc{IDLIB52,
  author = {van Burik, J. and Schut, Meindert and Hoepman, J. H.},
  title = {Digitale privacy},
  publisher = {BNR.nl},
  year = {2021},
  url = {https://www.bnr.nl/player/audio/10203641/10455027}
}
Hildebrandt M (2021), "Discrimination, Data-driven AI Systems and Practical Reason", European Data Protection Law Review. Vol. 7(3), pp. 358-366.
BibTeX:
@article{IDLIB53,
  author = {Hildebrandt, M.},
  title = {Discrimination, Data-driven AI Systems and Practical Reason},
  journal = {European Data Protection Law Review},
  year = {2021},
  volume = {7},
  number = {3},
  pages = {358--366}
}
de Vries J and Jacobs BPF (2021), "Echt of nep? De groeiende dreiging van deepfakes".
BibTeX:
@misc{IDLIB54,
  author = {de Vries, J. and Jacobs, B. P. F.},
  title = {Echt of nep? De groeiende dreiging van deepfakes},
  publisher = {NPO Radio 1},
  year = {2021},
  url = {https://www.nporadio1.nl/radio-focus/onderwerpen/72775-2021-02-23-echt-of-nep-de-groeiende-dreiging-van-deepfakes}
}
Jacobs BPF (2021), "Een nieuw sociaal netwerk met IRMA in de hoofdrol: ``Identiteit en persoonsgegevens zijn geen handelswaar''".
BibTeX:
@misc{IDLIB55,
  author = {Jacobs, B. P. F.},
  title = {Een nieuw sociaal netwerk met IRMA in de hoofdrol: ``Identiteit en persoonsgegevens zijn geen handelswaar''},
  publisher = {sidn.nl},
  year = {2021},
  url = {https://www.sidn.nl/nieuws-en-blogs/een-nieuw-sociaal-netwerk-met-irma-in-de-hoofdrol?utm_medium=email}
}
Huisman C, Sabel P, Verhagen L and Hoepman JH (2021), "Een toegangsbewijs en coronapas ineen" , pp. 4-4.
BibTeX:
@article{IDLIB56,
  author = {Huisman, C. and Sabel, P. and Verhagen, L. and Hoepman, J. H.},
  title = {Een toegangsbewijs en coronapas ineen},
  year = {2021},
  pages = {4--4},
  url = {https://advance.lexis.com/api/permalink/f6d7b2bf-59d7-48aa-ae1f-da61fd3b7f66/?context=1516831}
}
Hoogerwerf E, van Tetering D, Bay A and Erkin Z (2021), "Efficient Joint Random Number Generation for Secure Multi-party Computation", In SECRYPT 2021: Proceedings of the 18th International Conference on Security and Cryptography, July 6-8, 2021. Setubal Vol. 1, pp. 436-443. SciTePress.
BibTeX:
@inproceedings{IDLIB57,
  author = {Hoogerwerf, E. and van Tetering, D. and Bay, Asli and Erkin, Z.},
  editor = {De Capitani di Vimercati, S.},
  title = {Efficient Joint Random Number Generation for Secure Multi-party Computation},
  booktitle = {SECRYPT 2021: Proceedings of the 18th International Conference on Security and Cryptography, July 6-8, 2021},
  publisher = {SciTePress},
  year = {2021},
  volume = {1},
  pages = {436--443},
  url = {https://doi.org/10.5220/0010534804360443},
  doi = {10.5220/0010534804360443}
}
Schoolderman MR, Moerman JS, Smetsers JEW and van Eekelen M (2021), "Efficient Verification of Optimized Code: Correct High-Speed X25519", In NASA Formal Methods: 13th International Symposium, NFM 2021, Virtual Event, May 24--28, 2021, Proceedings. Cham Vol. 12673, pp. 304-321. Springer International Publishing.
BibTeX:
@inproceedings{IDLIB58,
  author = {Schoolderman, M. R. and Moerman, J. S. and Smetsers, J. E. W. and van Eekelen, M.},
  editor = {Dutle, A. and Moscato, M. M. and Titolo, L. and Muñoz, C. A. and Perez, I.},
  title = {Efficient Verification of Optimized Code: Correct High-Speed X25519},
  booktitle = {NASA Formal Methods: 13th International Symposium, NFM 2021, Virtual Event, May 24--28, 2021, Proceedings},
  publisher = {Springer International Publishing},
  year = {2021},
  volume = {12673},
  pages = {304--321},
  url = {https://doi.org/10.1007/978-3-030-76384-8_19},
  doi = {10.1007/978-3-030-76384-8_19}
}
Carbon G and Vranken HPE (2021), "Energy Web x Filecoin Orbit Community Event - Green Filecoin: Energy Web Zero/CCA".
BibTeX:
@misc{IDLIB59,
  author = {Carbon, G. and Vranken, H. P. E.},
  title = {Energy Web x Filecoin Orbit Community Event - Green Filecoin: Energy Web Zero/CCA},
  publisher = {medium.com},
  year = {2021},
  url = {https://medium.com/ew-articulos/energy-web-x-filecoin-orbit-community-event-green-filecoin-79586f25d135}
}
van der Meer V, Jonker H and Bos J (2021), "A Contemporary Investigation of NTFS File Fragmentation", In DFRWS-APAC'20: January 27-29, 2021 virtually. S.l. , pp. 1-11. s.n..
BibTeX:
@inproceedings{IDLIB6,
  author = {van der Meer, V. and Jonker, H. and Bos, J.},
  title = {A Contemporary Investigation of NTFS File Fragmentation},
  booktitle = {DFRWS-APAC'20: January 27-29, 2021 virtually},
  publisher = {s.n.},
  year = {2021},
  pages = {1--11},
  url = {https://dfrws.org/wp-content/uploads/2021/01/2021_APAC_paper-a_contemporary_investigation_of_ntfs_file_fragmentation.pdf}
}
la Bastide-van Gemert S and Jacobs BPF (2021), "Europa wil volgend jaar met digitaal ID voor iedereen experimenteren: 'Maar met onze Nederlandse software kan dat morgen al'".
BibTeX:
@misc{IDLIB60,
  author = {la Bastide-van Gemert, S. and Jacobs, B. P. F.},
  title = {Europa wil volgend jaar met digitaal ID voor iedereen experimenteren: 'Maar met onze Nederlandse software kan dat morgen al'},
  publisher = {EenVandaag},
  year = {2021},
  url = {https://eenvandaag.avrotros.nl/item/europa-wil-volgend-jaar-met-digitaal-id-voor-iedereen-experimenteren-maar-met-onze-nederlandse-software-kan-dat-morgen-al/}
}
Jones-Bos R, Bot T, Dommering E, van den Herik L, Jacobs B, Nagtegaal W and Zijlstra SE (2021), "Evaluatie 2020. Wet op de inlichtingen- en veiligheidsdiensten 2017" Den Haag Rijksoverheid.
BibTeX:
@techreport{IDLIB61,
  author = {Jones-Bos, R. and Bot, T. and Dommering, E. and van den Herik, L. and Jacobs, B. and Nagtegaal, W. and Zijlstra, S. E.},
  title = {Evaluatie 2020. Wet op de inlichtingen- en veiligheidsdiensten 2017},
  publisher = {Rijksoverheid},
  year = {2021},
  url = {https://www.rijksoverheid.nl/actueel/nieuws/2021/01/20/evaluatiecommissie-wiv-enkele-wijzigingen-wet-noodzakelijk}
}
Stupp C, Schrem M and Zuiderveen Borgesius FJ (2021), "Facebook Should Clarify Terms of Service, Irish Privacy Regulator Says".
BibTeX:
@misc{IDLIB62,
  author = {Stupp, C. and Schrem, M. and Zuiderveen Borgesius, F. J.},
  title = {Facebook Should Clarify Terms of Service, Irish Privacy Regulator Says},
  publisher = {wsj.com},
  year = {2021},
  url = {https://www.wsj.com/articles/facebook-should-clarify-terms-of-service-irish-privacy-regulator-says-11634290201}
}
Spruyt A, Milburn A and Chmielewski LM (2021), "Fault Injection as an Oscilloscope: Fault Correlation Analysis", IACR Transactions on Cryptographic Hardware and Embedded Systems. Vol. 2021(1), pp. 192-216.
BibTeX:
@article{IDLIB63,
  author = {Spruyt, A. and Milburn, A. and Chmielewski, L. M.},
  title = {Fault Injection as an Oscilloscope: Fault Correlation Analysis},
  journal = {IACR Transactions on Cryptographic Hardware and Embedded Systems},
  year = {2021},
  volume = {2021},
  number = {1},
  pages = {192--216},
  url = {https://repository.ubn.ru.nl/handle/2066/230663}
}
Jacobs BPF (2021), "From Multisets over Distributions to Distributions over Multisets", In LICS 2021: 36th Annual ACM/IEEE Symposium on Logic in Computer Science, 29 june 2021 - 2 July 2021, Rome, Italy / virtual. Los Alamitos , pp. 1-13. IEEE.
BibTeX:
@inproceedings{IDLIB64,
  author = {Jacobs, B. P. F.},
  editor = {Libkin, L.},
  title = {From Multisets over Distributions to Distributions over Multisets},
  booktitle = {LICS 2021: 36th Annual ACM/IEEE Symposium on Logic in Computer Science, 29 june 2021 - 2 July 2021, Rome, Italy / virtual},
  publisher = {IEEE},
  year = {2021},
  pages = {1--13},
  url = {https://doi.org/10.1109/LICS52264.2021.9470678},
  doi = {10.1109/LICS52264.2021.9470678}
}
van de Wetering JMM (2021), "From diagrams to quantum theory", Quantum. Vol. 5, pp. 54-+.
BibTeX:
@article{IDLIB65,
  author = {van de Wetering, J. M. M.},
  title = {From diagrams to quantum theory},
  journal = {Quantum},
  year = {2021},
  volume = {5},
  pages = {54--+},
  url = {https://repository.ubn.ru.nl/handle/2066/239976}
}
von Piekartz H and Jacobs BPF (2021), "Gemeenten kijken in het geheim mee op sociale media" , pp. 1-1.
BibTeX:
@article{IDLIB66,
  author = {von Piekartz, H. and Jacobs, B. P. F.},
  title = {Gemeenten kijken in het geheim mee op sociale media},
  year = {2021},
  pages = {1--1},
  url = {https://advance.lexis.com/api/permalink/2c1d0936-75c9-4861-a277-c48265d1850b/?context=1516831}
}
Bantema W, Custers B and Jacobs BPF (2021), "Gemeenten speuren anoniem op sociale media: 'Weten niet dat ze grenzen overgaan'".
BibTeX:
@misc{IDLIB67,
  author = {Bantema, W. and Custers, B. and Jacobs, B. P. F.},
  title = {Gemeenten speuren anoniem op sociale media: 'Weten niet dat ze grenzen overgaan'},
  publisher = {nos.nl},
  year = {2021},
  url = {https://nos.nl/artikel/2381211-gemeenten-speuren-anoniem-op-sociale-media-weten-niet-dat-ze-grenzen-overgaan}
}
Sabel P, Risher M and Jacobs BPF (2021), "Google wil van het wachtwoord af" , pp. 26-27.
BibTeX:
@article{IDLIB68,
  author = {Sabel, P. and Risher, M. and Jacobs, B. P. F.},
  title = {Google wil van het wachtwoord af},
  year = {2021},
  pages = {26--27},
  url = {https://advance.lexis.com/api/permalink/079dd1aa-008f-4625-9af0-80735791aaaa/?context=1516831}
}
Grijzen P and Jacobs BPF (2021), "Google, Amazon, Facebook, Apple en Microsoft. Hoe tem je de Big Five?".
BibTeX:
@misc{IDLIB69,
  author = {Grijzen, P. and Jacobs, B. P. F.},
  title = {Google, Amazon, Facebook, Apple en Microsoft. Hoe tem je de Big Five?},
  publisher = {NPO},
  year = {2021},
  url = {https://www.npostart.nl/atlas/13-10-2021/VPWON_1328193}
}
Maasland D, Niesters B and Zuiderveen Borgesius FJ (2021), "Groot lek testbedrijf: iedereen kon valse toegangsbewijzen in app CoronaCheck krijgen".
BibTeX:
@misc{IDLIB70,
  author = {Maasland, D. and Niesters, B. and Zuiderveen Borgesius, F. J.},
  title = {Groot lek testbedrijf: iedereen kon valse toegangsbewijzen in app CoronaCheck krijgen},
  publisher = {rtlnieuws.nl},
  year = {2021},
  url = {https://www.rtlnieuws.nl/nieuws/nederland/artikel/5242193/valse-coronacheck-bewijzen-datalek-testcoronanu}
}
Conlan O and Herder E (2021), "HT '21: Proceedings of the 32nd ACM Conference on Hypertext and Social Media, Virtual Event Ireland, 30 August 2021- 2 September 2021" New York , pp. 295. Association for Computing Machinery.
BibTeX:
@book{IDLIB71,
  author = {Conlan, O. and Herder, E.},
  title = {HT '21: Proceedings of the 32nd ACM Conference on Hypertext and Social Media, Virtual Event Ireland, 30 August 2021- 2 September 2021},
  publisher = {Association for Computing Machinery},
  year = {2021},
  pages = {295},
  url = {https://doi.org/10.1145/3465336},
  doi = {10.1145/3465336}
}
Hofman E and Jacobs BPF (2021), "Het einde van de anonimiteit. Privacy wordt iets voor de bourgeoisie", De Groene Amsterdammer. Vol. 39, pp. 26-26.
BibTeX:
@article{IDLIB72,
  author = {Hofman, E. and Jacobs, B. P. F.},
  title = {Het einde van de anonimiteit. Privacy wordt iets voor de bourgeoisie},
  journal = {De Groene Amsterdammer},
  year = {2021},
  volume = {39},
  pages = {26--26},
  url = {https://advance.lexis.com/api/permalink/8d774432-6bb5-47bd-95d9-25c6c115ef75/?context=1516831}
}
Toebes F and Hoepman JH (2021), "Hoe kun je rijk worden met het handelen in online memes (NFT's)? Mitchell en Rose leggen uit wat ze doen".
BibTeX:
@misc{IDLIB73,
  author = {Toebes, F. and Hoepman, J. H.},
  title = {Hoe kun je rijk worden met het handelen in online memes (NFT's)? Mitchell en Rose leggen uit wat ze doen},
  publisher = {eenvandaag.avrotros.nl},
  year = {2021},
  url = {https://eenvandaag.avrotros.nl/item/hoe-kun-je-rijk-worden-met-het-handelen-in-online-memes-nfts-mitchell-en-rose-leggen-uit-wat-ze-doen/}
}
Jacobs BPF (2021), "Hoe met het verder met de sleepnetwet?. Argos, 5-6-2021".
BibTeX:
@misc{IDLIB74,
  author = {Jacobs, B. P. F.},
  title = {Hoe met het verder met de sleepnetwet?. Argos, 5-6-2021},
  publisher = {VPRO},
  year = {2021},
  url = {https://www.vpro.nl/argos/media/luister/argos-radio/onderwerpen/2021/hoe-moet-het-verder-met-de-sleepnetwet-.html}
}
Boots R and Jacobs BPF (2021), "Hoogleraar wint 2,5 miljoen voor app waarmee sociale media veiliger wordt".
BibTeX:
@misc{IDLIB75,
  author = {Boots, R. and Jacobs, B. P. F.},
  title = {Hoogleraar wint 2,5 miljoen voor app waarmee sociale media veiliger wordt},
  publisher = {Gelderlander.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/7fab59eb-e617-4721-bccb-cae16e9a8d5e/?context=1516831}
}
Jacobs BPF and Webredactie BNR (2021), "Huawei had inzage in miljoenen klantgegevens Telfort".
BibTeX:
@misc{IDLIB76,
  author = {Jacobs, B. P. F. and Webredactie, B. N. R.},
  title = {Huawei had inzage in miljoenen klantgegevens Telfort},
  publisher = {BNR},
  year = {2021},
  url = {https://www.bnr.nl/nieuws/technologie/10436478/huawei-had-inzage-in-miljoenen-klantengegevens-telfort}
}
Modderkolk H, Jacobs BPF and van Eeten M (2021), "Huawei had toegang tot gegevens miljoenen Telfort-klanten: Inlichtingendienst AIVD waarschuwde moederbedrijf KPN meerdere keren voor Chinese spionage" , pp. 6-7.
BibTeX:
@article{IDLIB77,
  author = {Modderkolk, H. and Jacobs, B. P. F. and van Eeten, M.},
  title = {Huawei had toegang tot gegevens miljoenen Telfort-klanten: Inlichtingendienst AIVD waarschuwde moederbedrijf KPN meerdere keren voor Chinese spionage},
  year = {2021},
  pages = {6--7},
  url = {https://advance.lexis.com/api/permalink/5ff3c9b4-d054-4e7b-b4f7-f44725d47ee6/?context=1516831}
}
Lemonniers L, van de Wetering JMM and Kissinger A (2021), "Hypergraph simplification: Linking the path-sum approach to the ZH-calculus", In QPL 2020: Proceedings 17th International Conference on Quantum Physics and Logic, June 2-6, 2020, Paris. S.l. Vol. 340, pp. 188-212. EPTCS.
BibTeX:
@inproceedings{IDLIB78,
  author = {Lemonniers, L. and van de Wetering, J. M. M. and Kissinger, A.},
  editor = {Valiron, B.},
  title = {Hypergraph simplification: Linking the path-sum approach to the ZH-calculus},
  booktitle = {QPL 2020: Proceedings 17th International Conference on Quantum Physics and Logic, June 2-6, 2020, Paris},
  publisher = {EPTCS},
  year = {2021},
  volume = {340},
  pages = {188--212},
  url = {https://repository.ubn.ru.nl/handle/2066/238018},
  doi = {10.4204/EPTCS.340.10}
}
Zuiderveen Borgesius FJ (2021), "Illegale handel in privégegevens miljoenen Nederlanders uit coronasystemen GGD".
BibTeX:
@misc{IDLIB79,
  author = {Zuiderveen Borgesius, F. J.},
  title = {Illegale handel in privégegevens miljoenen Nederlanders uit coronasystemen GGD},
  publisher = {rtlnieuws.nl},
  year = {2021},
  url = {https://www.rtlnieuws.nl/nieuws/nederland/artikel/5210644/handel-gegevens-nederlanders-ggd-systemen-database-coronit-hpzone}
}
Viguier B, Schwabe P, Weerwag T and Wiedijk F (2021), "A Coq proof of the correctness of X25519 in TweetNaCl".
Abstract: Source code for the paper: A Coq proof of the correctness of X25519 in TweetNaCl. We formally prove that the C implementation of the X25519 key-exchange protocol in the TweetNaCl library is correct. We prove both that it correctly implements the protocol from Bernstein's 2006 paper, as standardized in RFC 7748, as well as the absence of undefined behavior like arithmetic overflows and array out of bounds errors. We also formally prove, based on the work of Bartzia and Strub, that X25519 is mathematically correct, i.e., that it correctly computes scalar multiplication on the elliptic curve Curve25519. The proofs are all computer-verified using the Coq theorem prover. To establish the link between C and Coq we use the Verified Software Toolchain (VST)
BibTeX:
@misc{IDLIB8,
  author = {Viguier, B. and Schwabe, P. and Weerwag, T. and Wiedijk, F.},
  title = {A Coq proof of the correctness of X25519 in TweetNaCl},
  year = {2021},
  url = {https://doi.org/10.5281/ZENODO.4439686},
  doi = {10.5281/ZENODO.4439686}
}
Celi S, Faz-Hernández A, Sullivan N, Tamvada G, Valenta L, Wiggers T, Westerbaan B and Wood CA (2021), "Implementing and Measuring KEMTLS", In Progress in Cryptology -- LATINCRYPT 2021 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6--8, 2021, Proceedings. Cham Vol. 12912, pp. 88-107. Springer International Publishing.
BibTeX:
@inproceedings{IDLIB80,
  author = {Celi, S. and Faz-Hernández, A. and Sullivan, N. and Tamvada, G. and Valenta, L. and Wiggers, T. and Westerbaan, B. and Wood, C. A.},
  editor = {Longa, P.},
  title = {Implementing and Measuring KEMTLS},
  booktitle = {Progress in Cryptology -- LATINCRYPT 2021 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6--8, 2021, Proceedings},
  publisher = {Springer International Publishing},
  year = {2021},
  volume = {12912},
  pages = {88--107},
  url = {https://doi.org/10.1007/978-3-030-88238-9_5},
  doi = {10.1007/978-3-030-88238-9_5}
}
Zuiderveen Borgesius FJ, Schraffenberger H and van Bekkum M (2021), "Insurance, Algorithmic Decision-Making, and Discrimination", In UMAP '21: Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, Utrecht Netherlands June 21 - 25, 2021. New York , pp. 333-333. Association for Computing Machinery.
BibTeX:
@inproceedings{IDLIB81,
  author = {Zuiderveen Borgesius, F. J. and Schraffenberger, H. and van Bekkum, M.},
  editor = {Masthoff, J. and Herder, E.},
  title = {Insurance, Algorithmic Decision-Making, and Discrimination},
  booktitle = {UMAP '21: Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, Utrecht Netherlands June 21 - 25, 2021},
  publisher = {Association for Computing Machinery},
  year = {2021},
  pages = {333--333},
  url = {https://doi.org/10.1145/3450614.3461451},
  doi = {10.1145/3450614.3461451}
}
Batina L, Djukanovic M, Heuser A and Picek S (2021), "It Started with Templates: The Future of Profiling in Side-Channel Analysis", In Security of Ubiquitous Computing Systems: Selected Topics. Cham , pp. 133-145. Springer International Publishing.
Abstract: Side-channel attacks (SCAs) are powerful attacks based on the information obtained from the implementation of cryptographic devices. Profiling side-channel attacks has received a lot of attention in recent years due to the fact that this type of attack defines the worst-case security assumptions. The SCA community realized that the same approach is actually used in other domains in the form of supervised machine learning. Consequently, some researchers started experimenting with different machine learning techniques and evaluating their effectiveness in the SCA context. More recently, we are witnessing an increase in the use of deep learning techniques in the SCA community with strong first results in side-channel analyses, even in the presence of countermeasures. In this chapter, we consider the evolution of profiling attacks, and subsequently we discuss the impacts they have made in the data preprocessing, feature engineering, and classification phases. We also speculate on the future directions and the best-case consequences for the security of small devices.
BibTeX:
@inbook{IDLIB82,
  author = {Batina, L. and Djukanovic, M. and Heuser, A. and Picek, S.},
  editor = {Avoine, G. and Hernandez-Castro, J.},
  title = {It Started with Templates: The Future of Profiling in Side-Channel Analysis},
  booktitle = {Security of Ubiquitous Computing Systems: Selected Topics},
  publisher = {Springer International Publishing},
  year = {2021},
  pages = {133--145},
  url = {https://repository.ubn.ru.nl/handle/2066/230666},
  doi = {10.1007/978-3-030-10591-4_8}
}
van Kins F and Zuiderveen Borgesius FJ (2021), "Justitie blokkeert Telegram-groepen, 'ongebruikelijk maar niet schokkend'".
BibTeX:
@misc{IDLIB83,
  author = {van Kins, F. and Zuiderveen Borgesius, F. J.},
  title = {Justitie blokkeert Telegram-groepen, 'ongebruikelijk maar niet schokkend'},
  publisher = {nos.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/c2bf3764-2d72-4db9-b09f-86f1f30d2b5d/?context=1516831}
}
Modderkolk H, Prins R, Jacobs BPF and van Eeten M (2021), "KPN Mobiel was de speelbal van Huawei" , pp. 10-13.
BibTeX:
@article{IDLIB84,
  author = {Modderkolk, H. and Prins, R. and Jacobs, B. P. F. and van Eeten, M.},
  title = {KPN Mobiel was de speelbal van Huawei},
  year = {2021},
  pages = {10--13},
  url = {https://advance.lexis.com/api/permalink/6c31ae68-4a62-458c-b146-afbbb0d7de71/?context=1516831}
}
Perin G, Chmielewski LM, Batina L and Picek S (2021), "Keep it Unsupervised: Horizontal Attacks Meet Deep Learning", IACR Transactions on Cryptographic Hardware and Embedded Systems. Vol. 2021(1), pp. 343-372.
BibTeX:
@article{IDLIB85,
  author = {Perin, G. and Chmielewski, L. M. and Batina, L. and Picek, S.},
  title = {Keep it Unsupervised: Horizontal Attacks Meet Deep Learning},
  journal = {IACR Transactions on Cryptographic Hardware and Embedded Systems},
  year = {2021},
  volume = {2021},
  number = {1},
  pages = {343--372},
  url = {https://repository.ubn.ru.nl/handle/2066/230667}
}
Wollaars J/ and Zuiderveen Borgesius FJ (2021), "Kentekencamera fotografeerde ook je gezicht [2.32]".
BibTeX:
@misc{IDLIB86,
  author = {Wollaars, J. /. and Zuiderveen Borgesius, F. J.},
  title = {Kentekencamera fotografeerde ook je gezicht [2.32]},
  publisher = {NPO2},
  year = {2021},
  url = {https://www.npostart.nl/nieuwsuur/04-08-2021/VPWON_1324293#2021-08-0510:25?start_at=151}
}
Zimmermann P, Buhrman H, Liang K, Lange T, Schwabe P and van Heesch M (2021), "Kunnen kwantumcomputers versleuteling kraken?".
BibTeX:
@misc{IDLIB87,
  author = {Zimmermann, P. and Buhrman, H. and Liang, K. and Lange, T. and Schwabe, P. and van Heesch, M.},
  title = {Kunnen kwantumcomputers versleuteling kraken?},
  publisher = {pcmweb.nl},
  year = {2021},
  url = {https://pcmweb.nl/artikelen/nieuws/kunnen-kwantumcomputers-versleuteling-kraken/}
}
Dobraunig C and Mennink B (2021), "Leakage Resilient Value Comparison With Application to Message Authentication", In Advances in Cryptology -- EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17--21, 2021, Proceedings, Part II. Cham Vol. 12697, pp. 377-407. Springer.
BibTeX:
@inproceedings{IDLIB88,
  author = {Dobraunig, C. and Mennink, B.},
  editor = {Canteaut, A.},
  title = {Leakage Resilient Value Comparison With Application to Message Authentication},
  booktitle = {Advances in Cryptology -- EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17--21, 2021, Proceedings, Part II},
  publisher = {Springer},
  year = {2021},
  volume = {12697},
  pages = {377--407},
  url = {https://doi.org/10.1007/978-3-030-77886-6_13},
  doi = {10.1007/978-3-030-77886-6_13}
}
Perin G, Buhan IR and Picek S (2021), "Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis", In COSADE 2021: Constructive Side-Channel Analysis and Secure Design 12th International Workshop, Lugano, Switzerland, October 25--27, 2021, Proceedings. Cham Vol. 12910, pp. 53-81. Springer International Publishing.
BibTeX:
@inproceedings{IDLIB89,
  author = {Perin, G. and Buhan, I. R. and Picek, S.},
  editor = {Bhasin, S.},
  title = {Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis},
  booktitle = {COSADE 2021: Constructive Side-Channel Analysis and Secure Design 12th International Workshop, Lugano, Switzerland, October 25--27, 2021, Proceedings},
  publisher = {Springer International Publishing},
  year = {2021},
  volume = {12910},
  pages = {53--81},
  url = {https://doi.org/10.1007/978-3-030-89915-8_3},
  doi = {10.1007/978-3-030-89915-8_3}
}
Oldenhave D, Hoppenbrouwers SJBA and van der Weide TP (2021), "A Heuristic Approach to Use Behavioral Models to Design for Change: Refining and Validating the Persuasive and Motivational Design Method", International Journal of Information System Modeling and Design. Vol. 12(3), pp. 44-61.
BibTeX:
@article{IDLIB9,
  author = {Oldenhave, Danny and Hoppenbrouwers, S. J. B. A. and van der Weide, Theo P.},
  title = {A Heuristic Approach to Use Behavioral Models to Design for Change: Refining and Validating the Persuasive and Motivational Design Method},
  journal = {International Journal of Information System Modeling and Design},
  year = {2021},
  volume = {12},
  number = {3},
  pages = {44--61},
  note = {Gevonden in WoS met onderzoeker 1002631 Weide, Th.P. van der (Theo) Affil. (Radboud OR Nijmegen) 3 auteurs volgens WoS},
  url = {https://doi.org/10.4018/IJISMD.2021070103},
  doi = {10.4018/IJISMD.2021070103}
}
Jacobs BPF and Boer A (2021), "Leny (62) wil eindelijk zonder hulp van haar Johan haar zaakjes kunnen regelen: Het is je reinste discriminatie'".
BibTeX:
@misc{IDLIB90,
  author = {Jacobs, B. P. F. and Boer, A.},
  title = {Leny (62) wil eindelijk zonder hulp van haar Johan haar zaakjes kunnen regelen: Het is je reinste discriminatie'},
  publisher = {destentor.nl},
  year = {2021},
  url = {https://advance.lexis.com/api/permalink/ddf84912-c426-46e7-b362-be9aadb74246/?context=1516831}
}
Chen M-S, Hülsing A, Rijneveld J, Samardjiska S and Schwabe P (2021), "MQDSS specifications" S.l. , pp. 81. mqdss.org.
Abstract: This document is a detailed specification of the design and security arguments of the digital signature scheme MQDSS. It is divided in two main parts:* Part I Backbone results-contains:--an analysis of the hardness of the underlying hard problem with respect to both classical …
BibTeX:
@book{IDLIB91,
  author = {Chen, M.-S. and Hülsing, A. and Rijneveld, J. and Samardjiska, S. and Schwabe, P.},
  title = {MQDSS specifications},
  publisher = {mqdss.org},
  year = {2021},
  pages = {81},
  url = {http://mqdss.org/files/mqdssVer2point1.pdf}
}
Kasteleijn K and Zuiderveen Borgesius FJ (2021), "Mag ik je volgen op internet? iPhone-apps moeten dit voortaan vragen".
BibTeX:
@misc{IDLIB92,
  author = {Kasteleijn, K. and Zuiderveen Borgesius, F. J.},
  title = {Mag ik je volgen op internet? iPhone-apps moeten dit voortaan vragen},
  publisher = {NOS},
  year = {2021},
  url = {https://nos.nl/artikel/2378343-mag-ik-je-volgen-op-internet-iphone-apps-moeten-dit-voortaan-vragen}
}
Calzavara S, Jonker H, Krumnow B and Rabitti A (2021), "Measuring Web Session Security at Scale", Computers & Security. Vol. 111, pp. 1-18.
BibTeX:
@article{IDLIB93,
  author = {Calzavara, S. and Jonker, H. and Krumnow, B. and Rabitti, A.},
  title = {Measuring Web Session Security at Scale},
  journal = {Computers & Security},
  year = {2021},
  volume = {111},
  pages = {1--18},
  url = {https://repository.ubn.ru.nl/handle/2066/238037},
  doi = {10.1016/j.cose.2021.102472}
}
Zuiderveen Borgesius FJ and van Eijk R (2021), "Met Googles afscheid van tracking cookies verandert voor consument weinig".
BibTeX:
@misc{IDLIB94,
  author = {Zuiderveen Borgesius, F. J. and van Eijk, R.},
  title = {Met Googles afscheid van tracking cookies verandert voor consument weinig},
  publisher = {NOS.nl},
  year = {2021},
  url = {https://nos.nl/artikel/2371220-met-googles-afscheid-van-tracking-cookies-verandert-voor-consument-weinig.html}
}
Feldmann E and Jacobs BPF (2021), "Microsoft zet stap naar wachtwoordloze toekomst, maar einde is nog niet in zicht".
BibTeX:
@misc{IDLIB95,
  author = {Feldmann, E. and Jacobs, B. P. F.},
  title = {Microsoft zet stap naar wachtwoordloze toekomst, maar einde is nog niet in zicht},
  publisher = {nu.nl},
  year = {2021},
  url = {https://www.nu.nl/tech/6157468/microsoft-zet-stap-naar-wachtwoordloze-toekomst-maar-einde-is-nog-niet-in-zicht.html}
}
Schwabe P, Stebila D and Wiggers T (2021), "More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys", In Computer Security -- ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4--8, 2021, Proceedings, Part I. Cham Vol. 12972, pp. 3-22. Springer International Publishing.
BibTeX:
@inproceedings{IDLIB96,
  author = {Schwabe, P. and Stebila, D. and Wiggers, T.},
  editor = {Bertino, E.},
  title = {More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys},
  booktitle = {Computer Security -- ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4--8, 2021, Proceedings, Part I},
  publisher = {Springer International Publishing},
  year = {2021},
  volume = {12972},
  pages = {3--22},
  url = {https://doi.org/10.1007/978-3-030-88418-5_1},
  doi = {10.1007/978-3-030-88418-5_1}
}
Bay A, Erkin Z, Alishahi M and Vos J (2021), "Multi-Party Private Set Intersection Protocols for Practical Applications", In SECRYPT 2021: Proceedings of the 18th International Conference on Security and Cryptography, July 6-8, 2021. Setubal Vol. 1, pp. 515-522. SciTePress.
BibTeX:
@inproceedings{IDLIB97,
  author = {Bay, Asli and Erkin, Z. and Alishahi, M. and Vos, J.},
  editor = {De Capitani di Vimercati, S.},
  title = {Multi-Party Private Set Intersection Protocols for Practical Applications},
  booktitle = {SECRYPT 2021: Proceedings of the 18th International Conference on Security and Cryptography, July 6-8, 2021},
  publisher = {SciTePress},
  year = {2021},
  volume = {1},
  pages = {515--522},
  url = {https://doi.org/10.5220/0010547605150522},
  doi = {10.5220/0010547605150522}
}
Olsthoorn P, Jacobs BPF and van Dijck J (2021), "Nederlandse wetenschappers kondigen aanval op Facebook aan: Toepassing van Irma-technologie uitbreiden".
BibTeX:
@misc{IDLIB98,
  author = {Olsthoorn, P. and Jacobs, B. P. F. and van Dijck, J.},
  title = {Nederlandse wetenschappers kondigen aanval op Facebook aan: Toepassing van Irma-technologie uitbreiden},
  publisher = {netkwesties.nl},
  year = {2021},
  url = {https://www.netkwesties.nl/1522/nederlandse-wetenschappers-kondigen-aanval.htm}
}
Chen X, Bromuri S and van Eekelen MCJD (2021), "Neural Machine Translation for Harmonized System Codes Prediction", In ICML 2021: Proceedings of 2021 6th International Conference on Machine Learing Technologies. Virtual Conference April 23-2, 2021. New York , pp. 158-163. ACM.
BibTeX:
@inproceedings{IDLIB99,
  author = {Chen, X. and Bromuri, S. and van Eekelen, M. C. J. D.},
  editor = {Neri, F.},
  title = {Neural Machine Translation for Harmonized System Codes Prediction},
  booktitle = {ICML 2021: Proceedings of 2021 6th International Conference on Machine Learing Technologies. Virtual Conference April 23-2, 2021},
  publisher = {ACM},
  year = {2021},
  pages = {158--163},
  url = {https://repository.ubn.ru.nl/handle/2066/238051},
  doi = {10.1145/3468891.3468915}
}

2020

Hoepman J-H (2020), "'De overheid heeft de afslag gemist'".
BibTeX:
@misc{IDLIB0,
  author = {Hoepman, J.-H.},
  title = {'De overheid heeft de afslag gemist'},
  publisher = {IBestuur Online},
  year = {2020},
  url = {https://ibestuur.nl/podium/de-overheid-heeft-de-afslag-gemist}
}
Jacobs BPF and Jaspers H (2020), "'Spionageschandaal is wake-upcall voor de Nederlandse politiek' Nieuwsuur, 13-01-2020. NPO2".
BibTeX:
@misc{IDLIB1,
  author = {Jacobs, B. P. F. and Jaspers, H.},
  title = {'Spionageschandaal is wake-upcall voor de Nederlandse politiek' Nieuwsuur, 13-01-2020. NPO2},
  publisher = {NPO2},
  year = {2020},
  url = {https://nos.nl/uitzending/47823-nieuwsuur.html}
}
Jacobs BPF and Hoepman J-H (2020), "Bescherm onze gezondheid, maar bescherm ook onze rechten".
BibTeX:
@misc{IDLIB10,
  author = {Jacobs, B. P. F. and Hoepman, J.-H.},
  title = {Bescherm onze gezondheid, maar bescherm ook onze rechten},
  publisher = {veiligtegencorona.n},
  year = {2020},
  url = {https://www.veiligtegencorona.nl/}
}
Klinik MAA, van Gastel B, Kop CLM and van Eekelen MCJD (2020), "Source code for the SECA symbolic execution engine".
Abstract: Source code accompanying the paper: Markus Klinik, Bernard van Gastel, Cynthia Kop, and Marko van Eekelen. Skylines for symbolic energy consumption analysis. In Proceedings of 25th FMICS. Springer, 2020. CONTENTS - app: Contains the main program. - src: Contains the source code of the compiler, the analysis itself, the merge algorithm, and the graph generator. - test: Contains unit tests; mostly interesting for developers. - programs: Contains various test programs to demonstrate the analysis. - More information on how to compile and run this program can be found in README.txt SHORT SUMMARY Energy consumption in embedded systems plays a large role as it has implications for the power supply and the batteries used. Programmers of these systems should consider how their programs control external devices , and where energy consumption hotspots lie. We present a static analysis to predict and visualize energy consumption of external devices controlled by programs written in a simple imperative programming language. Currently available energy consumption analysis techniques generate graphs over time, which makes it difficult to see from where in the source code the consumption originates. Our method generates graphs over source locations, called skyline diagrams, showing the maximum power draw for each line of source code. Our method harnessess symbolic execution extended with support for controlling external devices. This gives accurate predictions and complete code path coverage, as far as the limits of computability allow. To make the diagrams easier to understand, we introduce a merge algorithm that condenses all skylines into a concise overview. We demonstrate the potential by analysing various example programs with our prototype implementation. We envision this approach being used to identify energy consumption hotspots of embedded systems during the design and development phase, in a less involved way than traditional approaches.
BibTeX:
@misc{IDLIB102,
  author = {Klinik, M. A. A. and van Gastel, Bernard and Kop, C. L. M. and van Eekelen, M. C. J. D.},
  title = {Source code for the SECA symbolic execution engine},
  publisher = {DANS EASY},
  year = {2020},
  url = {https://gitlab.science.ru.nl/mklinik/eca-symbolic-execution/-/wikis/home}
}
Daemen J and Rijmen V (2020), "Specification of Rijndael", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 31-51. Springer.
BibTeX:
@inbook{IDLIB103,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {Specification of Rijndael},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {31--51},
  url = {https://doi.org/10.1007/978-3-662-60769-5_3},
  doi = {10.1007/978-3-662-60769-5_3}
}
Lodiers P, Hoepman J-H and Mujagic E (2020), "Sterft contant geld uit?. NPO radio1, donderdag 27 augustus, BNNVARA, De Nieuws BV".
BibTeX:
@misc{IDLIB104,
  author = {Lodiers, P. and Hoepman, J.-H. and Mujagic, E.},
  title = {Sterft contant geld uit?. NPO radio1, donderdag 27 augustus, BNNVARA, De Nieuws BV},
  publisher = {NPO Radio 1},
  year = {2020},
  url = {https://www.nporadio1.nl/de-nieuws-bv/onderwerpen/63938-2020-08-27-sterft-contant-geld-uit}
}
Zuiderveen Borgesius FJ (2020), "Strengthening legal protection against discrimination by algorithms and artificial intelligence", The International Journal of Human Rights. Vol. 24(10), pp. 1572-1593.
BibTeX:
@article{IDLIB105,
  author = {Zuiderveen Borgesius, F. J.},
  title = {Strengthening legal protection against discrimination by algorithms and artificial intelligence},
  journal = {The International Journal of Human Rights},
  year = {2020},
  volume = {24},
  number = {10},
  pages = {1572--1593},
  url = {https://doi.org/10.1080/13642987.2020.1743976},
  doi = {10.1080/13642987.2020.1743976}
}
Jacobs BPF and Doeland W (2020), "Surveillance software: NPO1 EenVandaag, 21 september 18.15 - Seizoen Afl.266".
BibTeX:
@misc{IDLIB107,
  author = {Jacobs, B. P. F. and Doeland, W.},
  title = {Surveillance software: NPO1 EenVandaag, 21 september 18.15 - Seizoen Afl.266},
  publisher = {NPO1},
  year = {2020},
  url = {https://www.npostart.nl/eenvandaag/21-09-2020/AT_2145022#2020-09-2118:15?start_at=42}
}
Leander NG, Mennink B, Nyberg K and Yasuda K (2020), "Symmetric Cryptography", Dagstuhl Reports. Vol. 10(1), pp. 130-143.
BibTeX:
@article{IDLIB108,
  author = {Leander, N. G. and Mennink, B. and Nyberg, K. and Yasuda, K.},
  title = {Symmetric Cryptography},
  journal = {Dagstuhl Reports},
  year = {2020},
  volume = {10},
  number = {1},
  pages = {130--143},
  url = {https://hdl.handle.net/2066/221056},
  doi = {10.4230/DagRep.10.1.130}
}
Wester J and Jacobs BPF (2020), "Brabants ziekenhuis merkte jarenlang datalekken niet op"
BibTeX:
@article{IDLIB11,
  author = {Wester, J. and Jacobs, B. P. F.},
  title = {Brabants ziekenhuis merkte jarenlang datalekken niet op},
  year = {2020},
  url = {https://www.nrc.nl/nieuws/2020/12/06/brabants-ziekenhuis-merkte-jarenlang-datalekken-niet-op-a4022838}
}
Daemen J and Rijmen V (2020), "The Advanced Encryption Standard Process", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 1-8. Springer.
BibTeX:
@inbook{IDLIB111,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {The Advanced Encryption Standard Process},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {1--8},
  url = {https://doi.org/10.1007/978-3-662-60769-5_1},
  doi = {10.1007/978-3-662-60769-5_1}
}
Hildebrandt M (2020), "The Artificial Intelligence of European Union Law", German Law Journal. Vol. 21(1), pp. 74-79.
BibTeX:
@article{IDLIB112,
  author = {Hildebrandt, M.},
  title = {The Artificial Intelligence of European Union Law},
  journal = {German Law Journal},
  year = {2020},
  volume = {21},
  number = {1},
  pages = {74--79},
  url = {https://hdl.handle.net/2066/219367},
  doi = {10.1017/glj.2019.99}
}
Daemen J and Rijmen V (2020), "The Data Encryption Standard", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 83-89. Springer.
BibTeX:
@inbook{IDLIB113,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {The Data Encryption Standard},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {83--89},
  url = {https://doi.org/10.1007/978-3-662-60769-5_6},
  doi = {10.1007/978-3-662-60769-5_6}
}
Daemen J and Rijmen V (2020), "The Design of Rijndael: The Advanced Encryption Standard (AES)" Berlin , pp. XVIII, 282-282. Springer.
BibTeX:
@book{IDLIB114,
  author = {Daemen, J. and Rijmen, V.},
  title = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {XVIII, 282--282},
  url = {https://doi.org/10.1007/978-3-662-60769-5},
  doi = {10.1007/978-3-662-60769-5}
}
Daemen J and Rijmen V (2020), "The Road to Rijndael", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 169-179. Springer.
BibTeX:
@inbook{IDLIB115,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {The Road to Rijndael},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {169--179},
  url = {https://doi.org/10.1007/978-3-662-60769-5_11},
  doi = {10.1007/978-3-662-60769-5_11}
}
Daemen J and Rijmen V (2020), "The Wide Trail Strategy", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 125-147. Springer.
BibTeX:
@inbook{IDLIB118,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {The Wide Trail Strategy},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {125--147},
  url = {https://doi.org/10.1007/978-3-662-60769-5_9},
  doi = {10.1007/978-3-662-60769-5_9}
}
Koning ME (2020), "The purpose and limitations of purpose limitation" , pp. VII, 280. s.n..
Abstract: This thesis is the most comprehensive study into the role of the purpose limitation principle in European data protection law and fundamental rights law. The study discusses the two components of the purpose limitation principle separately: the purpose specification requirement and the non-incompatibility requirement. This study zooms in on purpose limitation in relation to the right to privacy, the right to protection of personal data, the General Data Protection Regulation (GDPR, Regulation (EU) 2016/679), the Law Enforcement Directive (LED, DPDP, (EU) 2016/680), and the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data CETS No. 108. This study includes the case law of the European Court on Human Rights (ECtHR) on article 8 European Convention on Human Rights (ECHR) and the Court of Justice of the European Union (CJEU) on article 7 and 8 of the Charter of Fundamental Rights of the European Union (CFREU). The author concludes that there is a hierarchy in data protection principles and that the purpose specification requirement belongs to the essence of the right to protection of personal data. This requirement plays a central role in the protection of personal data in Europe. The non-incompatibility requirement, on the other hand, is just one of the many forms of use limitation that are regulated in the European data protection framework. The role of the purpose limitation principle differs highly per component. The research is conducted with a focus on voluntary data sharing between commercial entities and criminal law enforcement agencies in the pre-crime phase of criminal law enforcement. This focus gives the study relevance in discussions on data-driven policing, predictive policing and public-private partnerships.
BibTeX:
@phdthesis{IDLIB119,
  author = {Koning, M. E.},
  title = {The purpose and limitations of purpose limitation},
  publisher = {s.n.},
  year = {2020},
  pages = {VII, 280},
  url = {https://hdl.handle.net/2066/221665}
}
Alizadeh H, Vranken HPE, Zuquete A and Miri A (2020), "Timely Classification and Verification of Network Traffic Using Gaussian Mixture Models", IEEE Access. Vol. 8, pp. 91287-91302.
BibTeX:
@article{IDLIB120,
  author = {Alizadeh, Hassan and Vranken, H. P. E. and Zuquete, Andre and Miri, Ali},
  title = {Timely Classification and Verification of Network Traffic Using Gaussian Mixture Models},
  journal = {IEEE Access},
  year = {2020},
  volume = {8},
  pages = {91287--91302},
  note = {Gevonden in WoS met onderzoeker 1170683 Vranken, H.P.E. Affil. (Radboud OR Nijmegen) 4 auteurs volgens WoS},
  url = {https://hdl.handle.net/2066/219972},
  doi = {10.1109/ACCESS.2020.2992556}
}
Jacobs B (2020), "To your good stealth. A beery European spy club is revealed: How the Danes, Swedes, Germans and Dutch shared secrets" , pp. 1-1.
BibTeX:
@article{IDLIB121,
  author = {Jacobs, B.},
  title = {To your good stealth. A beery European spy club is revealed: How the Danes, Swedes, Germans and Dutch shared secrets},
  year = {2020},
  pages = {1--1},
  url = {https://www.economist.com/europe/2020/05/28/a-beery-european-spy-club-is-revealed}
}
Hoffman AS, Jacobs BPF, van Gastel BE, Schraffenberger HK, Sharon T and Pas BR (2020), "Towards a seamful ethics of Covid-19 contact tracing apps?", Ethics and Information Technology.
Abstract: In the early months of 2020, the deadly Covid-19 disease spread rapidly around the world. In response, national and regional governments implemented a range of emergency lockdown measures, curtailing citizens' movements and greatly limiting economic activity. More recently, as restrictions begin to be loosened or lifted entirely, the use of so-called contact tracing apps has figured prominently in many jurisdictions' plans to reopen society. Critics have questioned the utility of such technologies on a number of fronts, both practical and ethical. However, little has been said about the ways in which the normative design choices of app developers, and the products that result therefrom, might contribute to ethical reflection and wider political debate. Drawing from scholarship in critical design and human--computer interaction, this paper examines the development of a QR code-based tracking app called Zwaai ('Wave' in Dutch), where its designers explicitly positioned the app as an alternative to the predominant Bluetooth and GPS-based approaches. Through analyzing these designers' choices, this paper argues that QR code infrastructures can work to surface a set of ethical--political seams, two of which are discussed here - responsibilization and networked (im)permanence - that more 'seamless' protocols like Bluetooth actively aim to bypass, and which may go otherwise unnoticed by existing ethical frameworks.
BibTeX:
@article{IDLIB123,
  author = {Hoffman, A. S. and Jacobs, B. P. F. and van Gastel, B. E. and Schraffenberger, H. K. and Sharon, T. and Pas, B. R.},
  title = {Towards a seamful ethics of Covid-19 contact tracing apps?},
  journal = {Ethics and Information Technology},
  year = {2020},
  url = {https://hdl.handle.net/2066/222324},
  doi = {10.1007/s10676-020-09559-7}
}
McGhie AS, Bjornager JA, Jensen H, Nielsen JB and Jacobs BPF (2020), "Tre agenter gik i 1976 ind på en bar. Siden har Danmark været en del af et hemmeligt spionnetværk" , pp. 22-24.
BibTeX:
@article{IDLIB124,
  author = {McGhie, A. S. and Bjornager, J. A. and Jensen, H. and Nielsen, J. B. and Jacobs, B. P. F.},
  title = {Tre agenter gik i 1976 ind på en bar. Siden har Danmark været en del af et hemmeligt spionnetværk},
  year = {2020},
  pages = {22--24},
  url = {https://hdl.handle.net/2066/222059}
}
Daemen J and Rijmen V (2020), "Two-Round Differential Trail Clustering", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 205-221. Springer.
Abstract: This chapter is based on material that appeared earlier in [50]. Bounds on the EDP of trails are proven in Sect. 9.5.2. Bounds on the EDP of differentials have been investigated in Chap. 13 and [79, 126, 127].
BibTeX:
@inbook{IDLIB126,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {Two-Round Differential Trail Clustering},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {205--221},
  url = {https://doi.org/10.1007/978-3-662-60769-5_14},
  doi = {10.1007/978-3-662-60769-5_14}
}
Guibert N and Jacobs BPF (2020), "Une petite note manuscrite du renseignement extérieur allemand brise un très vieux secret"
BibTeX:
@article{IDLIB128,
  author = {Guibert, N. and Jacobs, B. P. F.},
  title = {Une petite note manuscrite du renseignement extérieur allemand brise un très vieux secret},
  year = {2020},
  url = {https://www.lemonde.fr/international/article/2020/07/24/une-petite-note-manuscrite-du-renseignement-exterieur-allemand-brise-un-tres-vieux-secret_6047210_3210.html}
}
Redactie and Jacobs BPF (2020), "Van Engelshoven: surveillancesoftware heeft impact op privacy student".
BibTeX:
@misc{IDLIB129,
  author = {Redactie, .. and Jacobs, B. P. F.},
  title = {Van Engelshoven: surveillancesoftware heeft impact op privacy student},
  publisher = {Security.nl},
  year = {2020},
  url = {https://www.security.nl/posting/678479/Van+Engelshoven%3A+surveillancesoftware+heeft+impact+op+privacy+student}
}
Verlaan J and Jacobs BPF (2020), "CDA: Hugo de Jonge heeft eerlijk gewonnen".
BibTeX:
@misc{IDLIB13,
  author = {Verlaan, J. and Jacobs, B. P. F.},
  title = {CDA: Hugo de Jonge heeft eerlijk gewonnen},
  publisher = {NRC},
  year = {2020},
  url = {https://www.nrc.nl/nieuws/2020/08/19/cda-hugo-de-jonge-heeft-eerlijk-gewonnen-a4009204}
}
Nijssen T and Jacobs BPF (2020), "Veilig buiten surfen" , pp. 31-31.
BibTeX:
@article{IDLIB130,
  author = {Nijssen, T. and Jacobs, B. P. F.},
  title = {Veilig buiten surfen},
  year = {2020},
  pages = {31--31},
  url = {https://hdl.handle.net/2066/222062}
}
Hoepman J-H (2020), "Verlies privacy: 'Surveillance in ons digitale leven is onvermijdelijk' . NPORadio1, 22-01-2020".
BibTeX:
@misc{IDLIB132,
  author = {Hoepman, J.-H.},
  title = {Verlies privacy: 'Surveillance in ons digitale leven is onvermijdelijk' . NPORadio1, 22-01-2020},
  publisher = {NPO Radio 1},
  year = {2020},
  url = {https://www.nporadio1.nl/achtergrond/21156-we-appen-erop-los-en-verliezen-privacy-surveillance-in-digitale-leven-is-onvermijdelijk}
}
de Leeuw M-J and Jacobs BPF (2020), "Vraagtekens bij samenwerking Amsterdamse universiteiten en Huawei. NOS Nieuws. Dinsdag 25 augustus".
BibTeX:
@misc{IDLIB133,
  author = {de Leeuw, M.-J. and Jacobs, B. P. F.},
  title = {Vraagtekens bij samenwerking Amsterdamse universiteiten en Huawei. NOS Nieuws. Dinsdag 25 augustus},
  publisher = {NOS.nl},
  year = {2020},
  url = {https://nos.nl/artikel/2345373-vraagtekens-bij-samenwerking-amsterdamse-universiteiten-en-huawei.html}
}
Rotman R and Zuiderveen Borgesius FJ (2020), "Wat als slimme camera's straks overal zijn?"
BibTeX:
@article{IDLIB134,
  author = {Rotman, R. and Zuiderveen Borgesius, F. J.},
  title = {Wat als slimme camera's straks overal zijn?},
  year = {2020},
  url = {https://advance.lexis.com/api/permalink/316fa1b6-5344-42ed-b726-b9fa69f30376/?context=1516831}
}
Banach B, Hendrikx A and Jacobs BPF (2020), "Wie krijgt het losgeld van de Universiteit Maastricht?"
BibTeX:
@article{IDLIB136,
  author = {Banach, B. and Hendrikx, A. and Jacobs, B. P. F.},
  title = {Wie krijgt het losgeld van de Universiteit Maastricht?},
  year = {2020},
  url = {https://www.limburger.nl/cnt/dmf20200103_00139521/wie-krijgt-het-losgeld-van-de-universiteit-maastricht}
}
Heithuis N and Jacobs BPF (2020), "Zomerserie Lessen van Corona: de wereld van high-tech".
BibTeX:
@misc{IDLIB139,
  author = {Heithuis, N. and Jacobs, B. P. F.},
  title = {Zomerserie Lessen van Corona: de wereld van high-tech},
  publisher = {NPO Radio 1},
  year = {2020},
  url = {https://www.nporadio1.nl/reporter-radio/onderwerpen/61955-2020-07-19-zomerserie-lessen-van-corona-de-wereld-van-high-tech}
}
Schouwenaars W, Blankesteijn H, Gevers R and Jacobs BPF (2020), "Zoom: nog nooit zo populair, nog nooit zoveel kritiek".
BibTeX:
@misc{IDLIB140,
  author = {Schouwenaars, W. and Blankesteijn, H. and Gevers, R. and Jacobs, B. P. F.},
  title = {Zoom: nog nooit zo populair, nog nooit zoveel kritiek},
  publisher = {BNR Radio},
  year = {2020},
  url = {https://www.bnr.nl/podcast/digitaal/10407276/zoom-nog-nooit-zo-populair-nog-nooit-zoveel-kritiek}
}
Wiggers TV (2020), "thomwiggers/kemtls-experiment: ACM CCS version".
Abstract: Version of the code as of the camera-ready version submitted to ACM CCS 2020 Copyright: Open Access
BibTeX:
@misc{IDLIB142,
  author = {Wiggers, T. V.},
  title = {thomwiggers/kemtls-experiment: ACM CCS version},
  publisher = {Zenodo},
  year = {2020},
  url = {https://doi.org/10.5281/ZENODO.4020887},
  doi = {10.5281/ZENODO.4020887}
}
Wassens R and Jacobs B (2020), "`OV-chipkaart is nog altijd kwetsbaar voor fraude'"
BibTeX:
@article{IDLIB144,
  author = {Wassens, R. and Jacobs, B.},
  title = {`OV-chipkaart is nog altijd kwetsbaar voor fraude'},
  year = {2020},
  url = {https://www.nrc.nl/nieuws/2020/07/11/openbaar-vervoer-ov-chipkaart-is-nog-altijd-kwetsbaar-voor-fraude-a4005647}
}
Rennela M and Staton S (2020), "Classical control, quantum circuits and linear logic in enriched category theory", Logical Methods in Computer Science. Vol. 16(1), pp. 1-24.
BibTeX:
@article{IDLIB15,
  author = {Rennela, M. and Staton, Sam},
  title = {Classical control, quantum circuits and linear logic in enriched category theory},
  journal = {Logical Methods in Computer Science},
  year = {2020},
  volume = {16},
  number = {1},
  pages = {1--24},
  note = {Gevonden in WoS met onderzoeker 1204106 Rennela, M.P.A. Affil. (Radboud OR Nijmegen) 2 auteurs volgens WoS},
  url = {https://hdl.handle.net/2066/217750}
}
van de Wetering JMM (2020), "Commutativity in Jordan operator algebras", Journal of Pure and Applied Algebra. Vol. 224(11), pp. 1-15.
BibTeX:
@article{IDLIB17,
  author = {van de Wetering, J. M. M.},
  title = {Commutativity in Jordan operator algebras},
  journal = {Journal of Pure and Applied Algebra},
  year = {2020},
  volume = {224},
  number = {11},
  pages = {1--15},
  note = {Gevonden in WoS met onderzoeker 1330584 Wetering, J.M.M. van de (John) Affil. (Radboud OR Nijmegen) 1 auteurs volgens WoS},
  url = {https://hdl.handle.net/2066/219746},
  doi = {10.1016/j.jpaa.2020.106407}
}
Hoepman J-H (2020), "Corona-app van overheid maakt gebruik van Apple-Google API".
BibTeX:
@misc{IDLIB18,
  author = {Hoepman, J.-H.},
  title = {Corona-app van overheid maakt gebruik van Apple-Google API},
  publisher = {security.nl},
  year = {2020},
  url = {https://www.security.nl/posting/655814/Corona-app+van+overheid+maakt+gebruik+van+Apple-Google+API}
}
Daemen J and Rijmen V (2020), "Correlation Analysis in GF(2n)", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 181-194. Springer.
BibTeX:
@inbook{IDLIB19,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {Correlation Analysis in GF(2n)},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {181--194},
  url = {https://doi.org/10.1007/978-3-662-60769-5_12},
  doi = {10.1007/978-3-662-60769-5_12}
}
Teunis H and Zuiderveen Borgesius FJ (2020), "'TikTok ook uit Nederlandse appwinkels bij Amerikaans verbod' Dinsdag 25 augustus 2020. RTL Nieuws".
BibTeX:
@misc{IDLIB2,
  author = {Teunis, H. and Zuiderveen Borgesius, F. J.},
  title = {'TikTok ook uit Nederlandse appwinkels bij Amerikaans verbod' Dinsdag 25 augustus 2020. RTL Nieuws},
  publisher = {RTL},
  year = {2020},
  url = {https://www.rtlnieuws.nl/economie/tech-business/artikel/5179123/tiktok-verbod-nederland-wereldwijd-app-store-play-store}
}
Daemen J and Rijmen V (2020), "Correlation Matrices", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 91-113. Springer.
BibTeX:
@inbook{IDLIB20,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {Correlation Matrices},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {91--113},
  url = {https://doi.org/10.1007/978-3-662-60769-5_7},
  doi = {10.1007/978-3-662-60769-5_7}
}
Daemen J and Rijmen V (2020), "Cryptanalysis", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin , pp. 149-167. Springer.
BibTeX:
@inbook{IDLIB21,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {Cryptanalysis},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {149--167},
  url = {https://doi.org/10.1007/978-3-662-60769-5_10},
  doi = {10.1007/978-3-662-60769-5_10}
}
Graßl PAJ, Schraffenberger HK, Zuiderveen Borgesius FJ and Buijzen MA (2020), "Dark and bright patterns in cookie consent requests".
BibTeX:
@misc{IDLIB22,
  author = {Graßl, P. A. J. and Schraffenberger, H. K. and Zuiderveen Borgesius, F. J. and Buijzen, M. A.},
  title = {Dark and bright patterns in cookie consent requests},
  publisher = {PsyArXiv},
  year = {2020},
  url = {https://psyarxiv.com/gqs5h/}
}
Arends E and Zuiderveen Borgesius FJ (2020), "Datahonger te lijf met de AVG. Werkt dat? NPO Radio 1 (15.54)".
BibTeX:
@misc{IDLIB23,
  author = {Arends, E. and Zuiderveen Borgesius, F. J.},
  title = {Datahonger te lijf met de AVG. Werkt dat? NPO Radio 1 (15.54)},
  publisher = {NPO Radio 1},
  year = {2020},
  url = {https://www.vpro.nl/argos/media/afleveringen/2020/uitzending-30-mei-datahonger-te-lijf-met-de-avg-werkt-dat-.html}
}
Jacobs B and Staton S (2020), "De Finetti's Construction as a Categorical Limit. Radboud University Nijmegen. Categorial Porbability and Statistics, 5-8 June 2020". 2020, 2020.
BibTeX:
@misc{IDLIB25,
  author = {Jacobs, B. and Staton, S.},
  title = {De Finetti's Construction as a Categorical Limit. Radboud University Nijmegen. Categorial Porbability and Statistics, 5-8 June 2020},
  year = {2020},
  note = {unpublished conference paper},
  url = {https://www.youtube.com/watch?v=OYtmXiRzAXo}
}
Hoepman JH and Buitenweg K (2020), "De Staat van het internet". 2020, 2020.
BibTeX:
@misc{IDLIB26,
  author = {Hoepman, J. H. and Buitenweg, K.},
  title = {De Staat van het internet},
  year = {2020},
  note = {unpublished conference paper}
}
Jacobs BPF (2020), "De patiënt is niet autonoom", In Datadilemma's in de zorg : op weg naar oplossingen in het belang van de patiënt. Houten , pp. 56-67. Bohn Stafleu van Loghum.
BibTeX:
@inbook{IDLIB27,
  author = {Jacobs, B. P. F.},
  editor = {van Houdenhoven, M.},
  title = {De patiënt is niet autonoom},
  booktitle = {Datadilemma's in de zorg : op weg naar oplossingen in het belang van de patiënt},
  publisher = {Bohn Stafleu van Loghum},
  year = {2020},
  pages = {56--67},
  url = {https://doi.org/10.1007/978-90-368-2428-6_6},
  doi = {10.1007/978-90-368-2428-6_6}
}
Jongepier F and Jacobs BPF (2020), "De persoonlijke gezondheidsomgeving: grip op gezondheid?". 2020, 2020.
BibTeX:
@misc{IDLIB28,
  author = {Jongepier, F. and Jacobs, B. P. F.},
  title = {De persoonlijke gezondheidsomgeving: grip op gezondheid?},
  year = {2020},
  note = {unpublished conference paper},
  url = {https://www.youtube.com/watch?v=4q2YdjxTcZ8&t=270s}
}
Westerink JHDM, Rajae-Joordens RJE, Ouwerkerk M, van Dooren M, Jelfs S, Denissen AJM, de Vries E and van Ee R (2020), "Deriving a Cortisol-Related Stress Indicator From Wearable Skin Conductance Measurements: Quantitative Model & Experimental Validation", Frontiers in Computer Science. Vol. 2, pp. 1-11.
BibTeX:
@article{IDLIB29,
  author = {Westerink, J. H. D. M. and Rajae-Joordens, R. J. E. and Ouwerkerk, M. and van Dooren, Marieke and Jelfs, S. and Denissen, A. J. M. and de Vries, E. and van Ee, R.},
  title = {Deriving a Cortisol-Related Stress Indicator From Wearable Skin Conductance Measurements: Quantitative Model & Experimental Validation},
  journal = {Frontiers in Computer Science},
  year = {2020},
  volume = {2},
  pages = {1--11},
  url = {https://www.frontiersin.org/article/10.3389/fcomp.2020.00039},
  doi = {10.3389/fcomp.2020.00039}
}
Daemen J and Rijmen V (2020), "Design Philosophy", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 65-82. Springer.
BibTeX:
@inbook{IDLIB30,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {Design Philosophy},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {65--82},
  url = {https://doi.org/10.1007/978-3-662-60769-5_5},
  doi = {10.1007/978-3-662-60769-5_5}
}
Daemen J and Rijmen V (2020), "Difference Propagation", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 115-123. Springer.
BibTeX:
@inbook{IDLIB31,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {Difference Propagation},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {115--123},
  url = {https://doi.org/10.1007/978-3-662-60769-5_8},
  doi = {10.1007/978-3-662-60769-5_8}
}
Daemen JJC (2020), "Dit nagenoeg onbreekbare algorithme beschermt bijna al je data".
BibTeX:
@misc{IDLIB33,
  author = {Daemen, J. J. C.},
  title = {Dit nagenoeg onbreekbare algorithme beschermt bijna al je data},
  publisher = {Radboud Recharge},
  year = {2020},
  url = {https://www.radboudrecharge.nl/nl/artikel/dit-nagenoeg-onbreekbare-algoritme-beschermt-bijna-al-je-data}
}
Müller P, Stoll U, Ridd D and Jacobs BPF (2020), "Exklusiv-Recherche: BND spionierte jahrzehntelang am Parlament vorbei".
BibTeX:
@misc{IDLIB36,
  author = {Müller, P. and Stoll, U. and Ridd, D. and Jacobs, B. P. F.},
  title = {Exklusiv-Recherche: BND spionierte jahrzehntelang am Parlament vorbei},
  publisher = {Frankfurter Rundschau},
  year = {2020},
  url = {https://www.fr.de/politik/geheimoperation-bnd-maximator-13818604.html}
}
van Wijnen JF and Hoepman J-H (2020), "Eén muisklik en alle cookies staan voor altijd uit".
BibTeX:
@misc{IDLIB37,
  author = {van Wijnen, J. F. and Hoepman, J.-H.},
  title = {Eén muisklik en alle cookies staan voor altijd uit},
  publisher = {Het Financieele Dagblad},
  year = {2020},
  url = {https://advance.lexis.com/api/document?collection=news&id=urn:contentItem:6118-MHY1-DYWB-S1XB-00000-00&context=1516831.}
}
Cornelissen J, Zuiderveen Borgesius FJ and Koelemeijer K (2020), "Facebook wil ook als webverkoper almachtig worden".
BibTeX:
@misc{IDLIB39,
  author = {Cornelissen, J. and Zuiderveen Borgesius, F. J. and Koelemeijer, K.},
  title = {Facebook wil ook als webverkoper almachtig worden},
  publisher = {Het Financieele Dagblad},
  year = {2020},
  url = {https://advance.lexis.com/api/document?collection=news&id=urn:contentItem:615R-6JD1-JCD9-22K9-00000-00&context=1516831}
}
van der Meer V, Jonker H, Dols G, ter Beek H, Bos J and van Eekelen M (2020), "File Fragmentation in the Wild: a Privacy-Friendly Approach", In WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12- December. Los Alamitos , pp. 1-6. IEEE.
BibTeX:
@inproceedings{IDLIB40,
  author = {van der Meer, V. and Jonker, H. and Dols, G. and ter Beek, H. and Bos, J. and van Eekelen, M.},
  title = {File Fragmentation in the Wild: a Privacy-Friendly Approach},
  booktitle = {WIFS'19: IEEE Workshop on Information Forensics and Security, Delft, The Netherlands, 9-12- December},
  publisher = {IEEE},
  year = {2020},
  pages = {1--6},
  url = {https://doi.org/10.1109/WIFS47025.2019.9034981},
  doi = {10.1109/WIFS47025.2019.9034981}
}
Jacobs B and Schraffenberger HK (2020), "Friction for privacy: Why privacy by design needs user experience design", In European Cyber Security Perspectives 2020. Amsterdam , pp. 12-14. KPN.
Abstract: IRMA is an open source identity platform that is run by the not-for-profit Privacy by Design foundation in The Netherlands. It grew out of academic research at Radboud University Nijmegen - and originally at IBM Research at Zurich in the 1990s. IRMA is now clearly gaining momentum and is being integrated in various ways, especially in healthcare, (local) government, and also in commercial areas such as insurance. The techniques underlying IRMA have been developed with privacy protection as explicit goal. This article explores the impact of this privacy focus on the user experience (UX) and on the ongoing (re)design of the interface of the IRMA app. The authors are both closely involved in the development of IRMA.
BibTeX:
@inbook{IDLIB42,
  author = {Jacobs, B. and Schraffenberger, H. K.},
  editor = {van der Wekke, K.},
  title = {Friction for privacy: Why privacy by design needs user experience design},
  booktitle = {European Cyber Security Perspectives 2020},
  publisher = {KPN},
  year = {2020},
  pages = {12--14},
  url = {https://www.overons.kpn/downloads/news/European-Cyber-Security-Perspectives-KPN-2020.pdf}
}
Duncan R, Kissinger A, Perdrix S and van de Wetering JMM (2020), "Graph-theoretic Simplification of Quantum Circuits with the ZX-calculus", Quantum. Vol. 4, pp. 1-33.
BibTeX:
@article{IDLIB44,
  author = {Duncan, Ross and Kissinger, A. and Perdrix, Simon and van de Wetering, J. M. M.},
  title = {Graph-theoretic Simplification of Quantum Circuits with the ZX-calculus},
  journal = {Quantum},
  year = {2020},
  volume = {4},
  pages = {1--33},
  note = {Gevonden in WoS met onderzoeker 1330584 Wetering, J.M.M. van de (John) Affil. (Radboud OR Nijmegen) 4 auteurs volgens WoS},
  url = {https://hdl.handle.net/2066/219970}
}
Jacobs B and Sijtsma T (2020), "Het euvel van de buurtapp: schimmig type? Nee joh, dat is de buurman"
BibTeX:
@article{IDLIB45,
  author = {Jacobs, B. and Sijtsma, T.},
  title = {Het euvel van de buurtapp: schimmig type? Nee joh, dat is de buurman},
  year = {2020},
  url = {https://www.parool.nl/ps/het-euvel-van-de-buurtapp-schimmig-type-nee-joh-dat-is-de-buurman b114184e3/}
}
Winter S and Jacobs BPF (2020), "Het geheime afluistergenootschap van Maximator bleef vijftig jaar onder de radar"
BibTeX:
@article{IDLIB46,
  author = {Winter, S. and Jacobs, B. P. F.},
  title = {Het geheime afluistergenootschap van Maximator bleef vijftig jaar onder de radar},
  year = {2020},
  url = {https://www.gelderlander.nl/nijmegen/het-geheime-afluistergenootschap-van-maximator-bleef-vijftig-jaar-onder-de-radar a72b033c/}
}
Walree TF and Wolters PTJ (2020), "Het recht op schadevergoeding van een concurrent bij een schending van de AVG", Sew. Tijdschrift voor Europees en Economisch Recht. Vol. 2020(1), pp. 2-10.
BibTeX:
@article{IDLIB47,
  author = {Walree, T. F. and Wolters, P. T. J.},
  title = {Het recht op schadevergoeding van een concurrent bij een schending van de AVG},
  journal = {Sew. Tijdschrift voor Europees en Economisch Recht},
  year = {2020},
  volume = {2020},
  number = {1},
  pages = {2--10},
  url = {https://www.uitgeverijparis.nl/nl/reader/206305/1001454367}
}
Nijssen T and Jacobs BPF (2020), "Hoe internet je veilig op het vakantieadres? (Misschien niet met de campingwifi)"
BibTeX:
@article{IDLIB48,
  author = {Nijssen, T. and Jacobs, B. P. F.},
  title = {Hoe internet je veilig op het vakantieadres? (Misschien niet met de campingwifi)},
  year = {2020},
  url = {https://www.volkskrant.nl/de-gids/hoe-internet-je-veilig-op-het-vakantieadres-misschien-niet-met-de-campingwifi b00349ea/}
}
Jacobs BPF (2020), "Hoe twee IT'ers anderhalf jaar gratis konden treinen na geslaagde hack"
BibTeX:
@article{IDLIB49,
  author = {Jacobs, B. P. F.},
  title = {Hoe twee IT'ers anderhalf jaar gratis konden treinen na geslaagde hack},
  year = {2020},
  url = {https://www.nrc.nl/nieuws/2020/07/11/anderhalf-jaar-gratis-treinen-na-geslaagde-hack-a4005641}
}
Jacobs BPF and Redactie (2020), "Hoogleraar computerbeveiliging gaat apart toestel voor corona-app gebruiken".
BibTeX:
@misc{IDLIB50,
  author = {Jacobs, B. P. F. and Redactie, ..},
  title = {Hoogleraar computerbeveiliging gaat apart toestel voor corona-app gebruiken},
  publisher = {Security.nl},
  year = {2020},
  url = {https://www.security.nl/posting/665011/Hoogleraar+computerbeveiliging+gaat+apart+toestel+voor+corona-app+gebruiken}
}
Jacobs B and Security.nl R (2020), "Hoogleraar computerbeveiliging kritisch over afhankelijkheid van Apple en Google bij corona-app".
BibTeX:
@misc{IDLIB51,
  author = {Jacobs, B. and Security.nl, Redactie},
  title = {Hoogleraar computerbeveiliging kritisch over afhankelijkheid van Apple en Google bij corona-app},
  publisher = {Security.nl},
  year = {2020},
  url = {https://www.security.nl/posting/661426/Hoogleraar+computerbeveiliging+kritisch+over+afhankelijkheid+van+Apple+en+Google+bij+corona-app}
}
Jacobs BPF (2020), "IRMA, een proportioneel eID, short IRMA pitch a". 2020, 2020.
BibTeX:
@misc{IDLIB53,
  author = {Jacobs, B. P. F.},
  title = {IRMA, een proportioneel eID, short IRMA pitch a},
  year = {2020},
  note = {unpublished conference paper},
  url = {https://www.youtube.com/watch?v=Rs1K4koT6oc}
}
Schouwenaars W, Blankesteijn H and Jacobs B (2020), "IRMA. [8.27]".
BibTeX:
@misc{IDLIB54,
  author = {Schouwenaars, W. and Blankesteijn, H. and Jacobs, B.},
  title = {IRMA. [8.27]},
  publisher = {BNR},
  year = {2020},
  url = {https://www.bnr.nl/podcast/digitaal/10407276/zoom-nog-nooit-zo-populair-nog-nooit-zoveel-kritiek}
}
Daemen J and Rijmen V (2020), "Implementation Aspects", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 53-63. Springer.
BibTeX:
@inbook{IDLIB55,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {Implementation Aspects},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {53--63},
  url = {https://doi.org/10.1007/978-3-662-60769-5_4},
  doi = {10.1007/978-3-662-60769-5_4}
}
Papagiannopoulos K (2020), "Interactive Side-Channel Analysis" , pp. 210. s.n..
Abstract: The modern, always-online world relies on numerous electronic devices. Ensuring the unobstructed operation of transactions is quintessential, yet non-trivial to achieve. Devices operate in resource-constraint environments, often trying to achieve security with very narrow margins. Physical attacks such as side-channel cryptanalysis and fault injection pose a serious threat against their security. Techniques such as Differential Power Analysis and Template Attacks exploit physical observables of embedded targets, compromising cryptography in otherwise secure mathematical ciphers. To meet the security needs of our society, numerous countermeasures have been deployed. Masking and shuffling rank among the most popular choices, yet they do not come for free. Deploying them can make the implementation cost prohibitive, leading to situations where only partially secure products are used in the field. Therefore, this thesis puts forward the following contribution points. First, it develops efficient masking and shuffling countermeasures. To do so, it relies on high speed assembly-based implementations that push the limit of ARM/AVR devices. It also investigates closely the security level, aiming to remove leakage effects that hinder countermeasures. Second, instead of viewing countermeasures as isolated components, it promotes a holistic approach that examines the interactions between countermeasures, security and performance of a cryptographic implementation. Through information-theoretic analysis, we establish the tradeoff between randomness and masking/shuffling countermeasures, culminating in Reduced Randomness Masking/Shuffling schemes. Likewise, we link the fault injection resistance of duplication, infective protection and build-in fault detection to the side-channel security. Such tradeoffs can assist the designer and result in effective, yet affordable security. Third, it integrates new attack vectors to the existing arsenal. It inspects closely the location-based attacks on ARM devices and assesses their real-world impact. Concurrently, we take steps towards modeling location leakage, aiming to understand its root cause and once again to establish tradeoffs between attack parameters and attack impact.
BibTeX:
@phdthesis{IDLIB57,
  author = {Papagiannopoulos, Kostas},
  title = {Interactive Side-Channel Analysis},
  publisher = {s.n.},
  year = {2020},
  pages = {210},
  url = {https://hdl.handle.net/2066/218980}
}
Schellevis J, Hoepman J-H, Broersma B and San Jose Sanches J (2020), "Internetstemmen is vragen om problemen, weet nu ook het CDA".
BibTeX:
@misc{IDLIB58,
  author = {Schellevis, J. and Hoepman, J.-H. and Broersma, B. and San Jose Sanches, J.},
  title = {Internetstemmen is vragen om problemen, weet nu ook het CDA},
  publisher = {NOS.nl},
  year = {2020},
  url = {https://nos.nl/artikel/2340296-internetstemmen-is-vragen-om-problemen-weet-nu-ook-het-cda.html}
}
Hofmans T, Jacobs BPF, Pras A and Moerel L (2020), "Kiesraad past stemtellingsproces aan vanwege kritiek op verkiezingssoftware".
BibTeX:
@misc{IDLIB60,
  author = {Hofmans, T. and Jacobs, B. P. F. and Pras, A. and Moerel, L.},
  title = {Kiesraad past stemtellingsproces aan vanwege kritiek op verkiezingssoftware},
  publisher = {Tweakers.net},
  year = {2020},
  url = {https://tweakers.net/nieuws/174366/kiesraad-past-stemtellingsproces-aan-vanwege-kritiek-op-verkiezingssoftware.html}
}
Jacobs BPF (2020), "Kom op voor de publieke zaak in de digitale wereld", In Đatađilemma's in de zorg: Op weg naar oplossingen in het belang van de patiënt. Houten , pp. 126-135. Bohn Stafleu van Loghum.
BibTeX:
@inbook{IDLIB61,
  author = {Jacobs, B. P. F.},
  editor = {van Houdenhoven, M.},
  title = {Kom op voor de publieke zaak in de digitale wereld},
  booktitle = {Đatađilemma's in de zorg: Op weg naar oplossingen in het belang van de patiënt},
  publisher = {Bohn Stafleu van Loghum},
  year = {2020},
  pages = {126--135},
  url = {https://doi.org/10.1007/978-90-368-2428-6_13},
  doi = {10.1007/978-90-368-2428-6_13}
}
Jacobs BPF (2020), "Kritiek op de corona-app. (5.36 min)".
BibTeX:
@misc{IDLIB62,
  author = {Jacobs, B. P. F.},
  title = {Kritiek op de corona-app. (5.36 min)},
  publisher = {NPO},
  year = {2020},
  url = {https://nos.nl/nieuwsuur/artikel/2337025-de-uitzending-van-12-juni-kritiek-op-corona-app-coronabrandhaard-zuid-amerika-hoe-doorstaat-de-ns-de-crisis-nederland-koopt-vaccins.html}
}
Jacobs B (2020), "Kritiek verstomt niet: 'Corona-app is prestigeproject van Hugo de Jonge'".
BibTeX:
@misc{IDLIB63,
  author = {Jacobs, B.},
  title = {Kritiek verstomt niet: 'Corona-app is prestigeproject van Hugo de Jonge'},
  publisher = {Nieuwsuur},
  year = {2020},
  url = {https://nos.nl/nieuwsuur/artikel/2337085-kritiek-verstomt-niet-corona-app-is-prestigeproject-van-hugo-de-jonge.html}
}
Ruwhof S, Bos H and Jacobs BPF (2020), "Kunnen de Nederlandse verkiezingen gehackt worden?".
BibTeX:
@misc{IDLIB64,
  author = {Ruwhof, S. and Bos, H. and Jacobs, B. P. F.},
  title = {Kunnen de Nederlandse verkiezingen gehackt worden?},
  publisher = {NPO Radio 1},
  year = {2020},
  url = {https://www.nporadio1.nl/binnenland/27601-kunnen-de-nederlandse-verkiezingen-gehackt-worden}
}
Zuiderveen Borgesius FJ (2020), "Laws offer limited protection against price differentiation by algorithms".
BibTeX:
@misc{IDLIB65,
  author = {Zuiderveen Borgesius, F. J.},
  title = {Laws offer limited protection against price differentiation by algorithms},
  publisher = {Phys.org},
  year = {2020},
  url = {https://phys.org/news/2020-07-laws-limited-price-differentiation-algorithms.html}
}
van Eekelen MCJD (2020), "Marktgericht opleiden op academisch niveau".
BibTeX:
@misc{IDLIB68,
  author = {van Eekelen, M. C. J. D.},
  title = {Marktgericht opleiden op academisch niveau},
  publisher = {Computable.nl},
  year = {2020},
  url = {https://www.computable.nl/artikel/advertorial/sponsor-artikelen/7077807/6474655/marktgericht-opleiden-op-academisch-niveau.html}
}
Jacobs B, Jaspers H and Arends E (2020), "Maximator -- Geheim Europees afluistergenootschap, NPO Radio 1, 11 april".
BibTeX:
@misc{IDLIB69,
  author = {Jacobs, B. and Jaspers, H. and Arends, E.},
  title = {Maximator -- Geheim Europees afluistergenootschap, NPO Radio 1, 11 april},
  publisher = {NPO Radio 1},
  year = {2020},
  url = {https://www.nporadio1.nl/argos/onderwerpen/534594-maximator-geheim-europees-afluistergenootschap}
}
Jacobs B (2020), "Maximator: European signals intelligence cooperation, from a Dutch perspective", Intelligence and National Security. Vol. 35(5), pp. 659-668.
BibTeX:
@article{IDLIB70,
  author = {Jacobs, B.},
  title = {Maximator: European signals intelligence cooperation, from a Dutch perspective},
  journal = {Intelligence and National Security},
  year = {2020},
  volume = {35},
  number = {5},
  pages = {659--668},
  url = {https://hdl.handle.net/2066/221037},
  doi = {10.1080/02684527.2020.1743538}
}
Jacobs B (2020), "Met een app weer naar buiten".
BibTeX:
@misc{IDLIB71,
  author = {Jacobs, B.},
  title = {Met een app weer naar buiten},
  publisher = {iBestuur Online},
  year = {2020},
  url = {https://ibestuur.nl/weblog/met-een-app-weer-naar-buiten}
}
Modderkolk H and Jacobs BPF (2020), "Nederland luisterde dankzij superchip jarenlang landen af" , pp. 4-5.
BibTeX:
@article{IDLIB72,
  author = {Modderkolk, H. and Jacobs, B. P. F.},
  title = {Nederland luisterde dankzij superchip jarenlang landen af},
  year = {2020},
  pages = {4--5},
  url = {https://www.volkskrant.nl/nieuws-achtergrond/nederland-luisterde-jarenlang-landen-af-dankzij-superchip bc9a9ce4/}
}
Monterie A and Jacobs BPF (2020), "Nederlandse cryptografie besliste loop Falkland-oorlog".
BibTeX:
@misc{IDLIB73,
  author = {Monterie, A. and Jacobs, B. P. F.},
  title = {Nederlandse cryptografie besliste loop Falkland-oorlog},
  publisher = {Computable},
  year = {2020},
  url = {https://www.computable.nl/artikel/achtergrond/security/6931193/1444691/nederlandse-cryptografie-besliste-loop-falkland-oorlog.html}
}
van der Ziel A and Jacobs B (2020), "Nederlandse spionnen gaven Britten cruciale hulp tijdens Falklandoorlog: geheime afluisterdienst"
BibTeX:
@article{IDLIB74,
  author = {van der Ziel, A. and Jacobs, B.},
  title = {Nederlandse spionnen gaven Britten cruciale hulp tijdens Falklandoorlog: geheime afluisterdienst},
  year = {2020},
  url = {https://www.trouw.nl/buitenland/nederlandse-spionnen-gaven-britten-cruciale-hulp-tijdens-falklandoorlog bd35a155/}
}
Verhagen L and Zuiderveen Borgesius FJ (2020), "Nieuwe privacywetgeving leidt tot explosieve toename privacyklachten"
BibTeX:
@article{IDLIB75,
  author = {Verhagen, L. and Zuiderveen Borgesius, F. J.},
  title = {Nieuwe privacywetgeving leidt tot explosieve toename privacyklachten},
  year = {2020},
  url = {https://www.volkskrant.nl/nieuws-achtergrond/nieuwe-privacywetgeving-leidt-tot-explosieve-toename-privacyklachten bef5be13/}
}
Modderkolk H and Jacobs BPF (2020), "Nog steeds wrevel over de `sleepwet': geklaag bij geheime diensten, zorgen bij toezichthouder"
BibTeX:
@article{IDLIB76,
  author = {Modderkolk, H. and Jacobs, B. P. F.},
  title = {Nog steeds wrevel over de `sleepwet': geklaag bij geheime diensten, zorgen bij toezichthouder},
  year = {2020},
  url = {https://advance.lexis.com/api/document?collection=news&id=urn:contentItem:60ST-TTS1-DY0X-90S8-00000-00&context=1516831}
}
Hoepman J-H (2020), "Offering 'Home' Protection to Private Digital Storage Spaces", SCRIPTed. Vol. 17(2), pp. 359-388.
BibTeX:
@article{IDLIB78,
  author = {Hoepman, J.-H.},
  title = {Offering 'Home' Protection to Private Digital Storage Spaces},
  journal = {SCRIPTed},
  year = {2020},
  volume = {17},
  number = {2},
  pages = {359--388},
  url = {https://hdl.handle.net/2066/222050},
  doi = {10.2966/scrip.170220.359}
}
Daemen J and Rijmen V (2020), "On the EDP and the ELP of Two and Four Rijndael Rounds", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 195-204. Springer.
BibTeX:
@inbook{IDLIB79,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {On the EDP and the ELP of Two and Four Rijndael Rounds},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {195--204},
  url = {https://doi.org/10.1007/978-3-662-60769-5_13},
  doi = {10.1007/978-3-662-60769-5_13}
}
Hallinan D and Zuiderveen Borgesius FJ (2020), "Opinions can be incorrect (in our opinion)! On data protection law's accuracy principle", International Data Privacy Law. Vol. 10(1), pp. 1-10.
BibTeX:
@article{IDLIB81,
  author = {Hallinan, D. and Zuiderveen Borgesius, F. J.},
  title = {Opinions can be incorrect (in our opinion)! On data protection law's accuracy principle},
  journal = {International Data Privacy Law},
  year = {2020},
  volume = {10},
  number = {1},
  pages = {1--10},
  url = {https://doi.org/10.1093/idpl/ipz025},
  doi = {10.1093/idpl/ipz025}
}
Kraaij W, Verberne S, Koldijk S, de Korte E, van Dantzig S, Sappelli M, Neerincx MA and van Sinderen M (2020), "Personalized support for well-being at work: an overview of the SWELL project", User Modeling and User-Adapted Interaction. Vol. 30(3), pp. 413-446.
BibTeX:
@article{IDLIB84,
  author = {Kraaij, Wessel and Verberne, S. and Koldijk, Saskia and de Korte, E. and van Dantzig, Saskia and Sappelli, Maya and Neerincx, M. A. and van Sinderen, Marten},
  title = {Personalized support for well-being at work: an overview of the SWELL project},
  journal = {User Modeling and User-Adapted Interaction},
  year = {2020},
  volume = {30},
  number = {3},
  pages = {413--446},
  note = {Gevonden in WoS met onderzoeker 1065079 Kraaij, W. (Wessel) Affil. (Radboud OR Nijmegen) 16 auteurs volgens WoS 8 overgeslagen externe auteur(s)},
  url = {https://hdl.handle.net/2066/221657},
  doi = {10.1007/s11257-019-09238-3}
}
Daemen J and Rijmen V (2020), "Plateau Trails", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 223-247. Springer.
BibTeX:
@inbook{IDLIB85,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {Plateau Trails},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {223--247},
  url = {https://doi.org/10.1007/978-3-662-60769-5_15},
  doi = {10.1007/978-3-662-60769-5_15}
}
Shkaravska O and van Eekelen MCJD (2020), "Polynomial solutions of algebraic difference equations and homogeneous symmetric polynomials", Journal of Symbolic Computation. Vol. 103, pp. 22-45.
BibTeX:
@article{IDLIB87,
  author = {Shkaravska, O. and van Eekelen, M. C. J. D.},
  title = {Polynomial solutions of algebraic difference equations and homogeneous symmetric polynomials},
  journal = {Journal of Symbolic Computation},
  year = {2020},
  volume = {103},
  pages = {22--45},
  url = {https://doi.org/10.1016/j.jsc.2019.10.022},
  doi = {10.1016/j.jsc.2019.10.022}
}
Jacobs BPF (2020), "Arjen Kamphuis en de publieke zaak in de digitale wereld".
BibTeX:
@misc{IDLIB9,
  author = {Jacobs, B. P. F.},
  title = {Arjen Kamphuis en de publieke zaak in de digitale wereld},
  publisher = {IBestuur Online},
  year = {2020},
  url = {https://ibestuur.nl/podium/arjen-kamphuis-en-de-publieke-zaak-in-de-digitale-wereld}
}
Daemen J and Rijmen V (2020), "Preliminaries", In The Design of Rijndael: The Advanced Encryption Standard (AES). Berlin, Heidelberg , pp. 9-30. Springer.
BibTeX:
@inbook{IDLIB90,
  author = {Daemen, J. and Rijmen, V.},
  editor = {Daemen, J. and Rijmen, V.},
  title = {Preliminaries},
  booktitle = {The Design of Rijndael: The Advanced Encryption Standard (AES)},
  publisher = {Springer},
  year = {2020},
  pages = {9--30},
  url = {https://doi.org/10.1007/978-3-662-60769-5_2},
  doi = {10.1007/978-3-662-60769-5_2}
}
Kissinger AR and van de Wetering JMM (2020), "PyZX: Large Scale Automated Diagrammatic Reasoning", Electronic Proceedings in Theoretical Computer Science. Vol. 318, pp. 229-241.
BibTeX:
@article{IDLIB94,
  author = {Kissinger, A. R. and van de Wetering, J. M. M.},
  title = {PyZX: Large Scale Automated Diagrammatic Reasoning},
  journal = {Electronic Proceedings in Theoretical Computer Science},
  year = {2020},
  volume = {318},
  pages = {229--241},
  url = {https://hdl.handle.net/2066/221050},
  doi = {10.4204/eptcs.318.14}
}
Kissinger A and van de Wetering J (2020), "Reducing the number of non-Clifford gates in quantum circuits", Physical Review A. Covering atomic, molecular, and optical physics and quantum information. Vol. 102(2), pp. 1-10.
BibTeX:
@article{IDLIB95,
  author = {Kissinger, A. and van de Wetering, John},
  title = {Reducing the number of non-Clifford gates in quantum circuits},
  journal = {Physical Review A. Covering atomic, molecular, and optical physics and quantum information},
  year = {2020},
  volume = {102},
  number = {2},
  pages = {1--10},
  note = {Gevonden in WoS met onderzoeker 1279687 Kissinger, A.R. Affil. (Radboud OR Nijmegen) 2 auteurs volgens WoS},
  url = {https://hdl.handle.net/2066/221660},
  doi = {10.1103/PhysRevA.102.022406}
}
Kivits N and van Eekelen M (2020), "Rubik's Kubus. De wiskunde achter de helse puzzel", Kijk. Vol. 2020(5), pp. 24-29.
BibTeX:
@article{IDLIB97,
  author = {Kivits, N. and van Eekelen, M.},
  title = {Rubik's Kubus. De wiskunde achter de helse puzzel},
  journal = {Kijk},
  year = {2020},
  volume = {2020},
  number = {5},
  pages = {24--29},
  url = {https://www.kijkmagazine.nl/science/de-wiskunde-achter-de-rubiks-kubus/}
}
Jonker H, Karsch S, Krumnow B and Sleegers M (2020), "Shepherd: a generic approach to automating website login", In MADWEB'20: Proc. 2nd Workshop on Measurements, Attacks and Defenses for the Web, 2020 23 February 2020, San Diego, CA, USA. Reston , pp. 1-10. Internet Society.
BibTeX:
@inproceedings{IDLIB99,
  author = {Jonker, H. and Karsch, S. and Krumnow, B. and Sleegers, M.},
  editor = {Jaeger, T.},
  title = {Shepherd: a generic approach to automating website login},
  booktitle = {MADWEB'20: Proc. 2nd Workshop on Measurements, Attacks and Defenses for the Web, 2020 23 February 2020, San Diego, CA, USA},
  publisher = {Internet Society},
  year = {2020},
  pages = {1--10},
  url = {https://hdl.handle.net/2066/221053}
}

2019

Venhoek D, Moerman J and Rot J (2018), "Fast Computations on Ordered Nominal Sets", In Theoretical Aspects of Computing - ICTAC 2018 - 15th International Colloquium, Stellenbosch, South Africa, October 16-19, 2018, Proceedings. Vol. 11187, pp. 493-512. Springer.
BibTeX:
@inproceedings{dis-2019-Venhoek-a,
  author = {Venhoek, David and Moerman, Joshua and Rot, Jurriaan},
  editor = {Fischer, Bernd and Uustalu, Tarmo},
  title = {Fast Computations on Ordered Nominal Sets},
  booktitle = {Theoretical Aspects of Computing - ICTAC 2018 - 15th International Colloquium, Stellenbosch, South Africa, October 16-19, 2018, Proceedings},
  publisher = {Springer},
  year = {2019},
  volume = {11187},
  pages = {493--512},
  url = {https://doi.org/10.1007/978-3-030-02508-326},
  doi = {10.1007/978-3-030-02508-3\_26}
}
Abel A, Allais G, Hameer A, Pientka B, Momigliano A, Schaefer S and Stark K (2019), "POPLMark reloaded: Mechanizing proofs by logical relations", Journal of Functional Programming. Vol. 29, pp. 1-43.
BibTeX:
@article{dis-2019-Abel-a,
  author = {Abel, Andreas and Allais, Guillaume and Hameer, Aliya and Pientka, Brigitte and Momigliano, Alberto and Schaefer, Steven and Stark, Kathrin},
  title = {POPLMark reloaded: Mechanizing proofs by logical relations},
  journal = {Journal of Functional Programming},
  year = {2019},
  volume = {29},
  pages = {1--43}
}
Andrikos C, Batina L, Chmielewski L, Lerman L, Mavroudis V, Papagiannopoulos K, Perin G, Rassias G and Sonnino A (2019), "Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages", In Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III. Vol. 11923, pp. 285-314. Springer.
BibTeX:
@inproceedings{dis-2019-Andrikos-a,
  author = {Andrikos, Christos and Batina, Lejla and Chmielewski, Lukasz and Lerman, Liran and Mavroudis, Vasilios and Papagiannopoulos, Kostas and Perin, Guilherme and Rassias, Giorgos and Sonnino, Alberto},
  editor = {Galbraith, Steven D. and Moriai, Shiho},
  title = {Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages},
  booktitle = {Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III},
  publisher = {Springer},
  year = {2019},
  volume = {11923},
  pages = {285--314},
  url = {https://doi.org/10.1007/978-3-030-34618-810},
  doi = {10.1007/978-3-030-34618-8\_10}
}
Ankele R, Dobraunig CE, Guo J, Lambooij E, Leander G and Todo Y (2019), "Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion", IACR Transactions on Symmetric Cryptology. Vol. 2019(1), pp. 192-235.
BibTeX:
@article{dis-2019-Ankele-a,
  author = {Ankele, R. and Dobraunig, C. E. and Guo, J. and Lambooij, E. and Leander, G. and Todo, Y.},
  title = {Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion},
  journal = {IACR Transactions on Symmetric Cryptology},
  year = {2019},
  volume = {2019},
  number = {1},
  pages = {192--235},
  url = {http://hdl.handle.net/2066/204511}
}
Aronstein IV, Tweehuysen V and Walree TF (2019), "Jong OO&R symposium Bits (&) Privaatrecht".
BibTeX:
@misc{dis-2019-Aronstein-a,
  author = {Aronstein, I. V. and Tweehuysen, V. and Walree, T. F.},
  title = {Jong OO&R symposium Bits (&) Privaatrecht},
  year = {2019}
}
van Aubel PJM and Poll E (2019), "Smart metering in the Netherlands: what, how and why", International Journal of Electrical Power & Energy Systems. Vol. 109, pp. 719-725.
BibTeX:
@article{dis-2019-Aubel-a,
  author = {van Aubel, P. J. M. and Poll, E.},
  title = {Smart metering in the Netherlands: what, how and why},
  journal = {International Journal of Electrical Power & Energy Systems},
  year = {2019},
  volume = {109},
  pages = {719--725},
  url = {http://hdl.handle.net/2066/204501}
}
Aubel PV, Poll E and Rijneveld J (2019), "Non-Repudiation and End-to-End Security for Electric-Vehicle Charging", In 2019 IEEE PES Innovative Smart Grid Technologies Europe, ISGT-Europe 2019, Bucharest, Romania, September 29 - October 2, 2019. , pp. 1-5. IEEE.
BibTeX:
@inproceedings{dis-2019-Aubel-b,
  author = {Aubel, Pol Van and Poll, Erik and Rijneveld, Joost},
  title = {Non-Repudiation and End-to-End Security for Electric-Vehicle Charging},
  booktitle = {2019 IEEE PES Innovative Smart Grid Technologies Europe, ISGT-Europe 2019, Bucharest, Romania, September 29 - October 2, 2019},
  publisher = {IEEE},
  year = {2019},
  pages = {1--5},
  url = {https://ieeexplore.ieee.org/xpl/conhome/8892271/proceeding},
  doi = {10.1109/ISGTEurope.2019.8905444}
}
Augstein M, Herder E, Wörndl W and Yigitbas E (2019), "ABIS '19: Proceedings of the 23rd International Workshop on Personalization and Recommendation on the Web and Beyond, Hof, Germany --- September 17 - 17, 2019", In ABIS '19: Proceedings of the 23rd International Workshop on Personalization and Recommendation on the Web and Beyond, Hof, Germany --- September 17 - 17, 2019. New York , pp. 1-34. ACM.
BibTeX:
@inproceedings{dis-2019-Augstein-a,
  author = {Augstein, M. and Herder, E. and Wörndl, W. and Yigitbas, E.},
  editor = {Augstein, M. and Herder, E. and Wörndl, W. and Yigitbas, E.},
  title = {ABIS '19: Proceedings of the 23rd International Workshop on Personalization and Recommendation on the Web and Beyond, Hof, Germany --- September 17 - 17, 2019},
  booktitle = {ABIS '19: Proceedings of the 23rd International Workshop on Personalization and Recommendation on the Web and Beyond, Hof, Germany --- September 17 - 17, 2019},
  publisher = {ACM},
  year = {2019},
  pages = {1--34},
  url = {https://dl.acm.org/citation.cfm?id=3345002}
}
Augstein M, Herder E, Wörndl W and Yigitbas E (2019), "HT '19: Proceedings of the 30th ACM Conference on Hypertext and Social Media, Hof, Germany --- September 17 - 20, 2019", In HT '19: Proceedings of the 30th ACM Conference on Hypertext and Social Media, Hof, Germany --- September 17 - 20, 2019. New York , pp. 301-302. ACM.
BibTeX:
@inproceedings{dis-2019-Augstein-b,
  author = {Augstein, M. and Herder, E. and Wörndl, W. and Yigitbas, E.},
  editor = {Herder, E.},
  title = {HT '19: Proceedings of the 30th ACM Conference on Hypertext and Social Media, Hof, Germany --- September 17 - 20, 2019},
  booktitle = {HT '19: Proceedings of the 30th ACM Conference on Hypertext and Social Media, Hof, Germany --- September 17 - 20, 2019},
  publisher = {ACM},
  year = {2019},
  pages = {301--302}
}
Augstein M, Herder E and Wörndl W (2019), "Personalized Human-Computer Interaction" Oldenbourg , pp. 310. De Gruyter.
BibTeX:
@book{dis-2019-Augstein-c,
  author = {Augstein, M. and Herder, E. and Wörndl, W.},
  title = {Personalized Human-Computer Interaction},
  publisher = {De Gruyter},
  year = {2019},
  pages = {310},
  note = {Edited book}
}
Backens M and Kissinger A (2019), "ZH: A Complete Graphical Calculus for Quantum Computations Involving Classical Non-linearity", Electronic Proceedings in Theoretical Computer Science. Vol. 287, pp. 23-42.
BibTeX:
@article{dis-2019-Backens-a,
  author = {Backens, M. and Kissinger, A.},
  title = {ZH: A Complete Graphical Calculus for Quantum Computations Involving Classical Non-linearity},
  journal = {Electronic Proceedings in Theoretical Computer Science},
  year = {2019},
  volume = {287},
  pages = {23--42},
  url = {http://hdl.handle.net/2066/204509}
}
Badarinath Hampiholi B (2019), "Contextual Identity in Practice Attribute-based Authentication and Signing on Smartphones" , pp. xx, 175. s.n..
BibTeX:
@phdthesis{dis-2019-BadarinathHampiholi-a,
  author = {Badarinath Hampiholi, B.},
  title = {Contextual Identity in Practice Attribute-based Authentication and Signing on Smartphones},
  publisher = {s.n.},
  year = {2019},
  pages = {xx, 175},
  url = {http://hdl.handle.net/2066/202994}
}
Batina L, Bhasin S, Jap D and Picek S (2019), "CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel", In CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. , pp. 1-19. USENIX.
BibTeX:
@inproceedings{dis-2019-Batina-a,
  author = {Batina, L. and Bhasin, S. and Jap, D. and Picek, S.},
  title = {CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel},
  booktitle = {CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel},
  publisher = {USENIX},
  year = {2019},
  pages = {1--19},
  url = {http://hdl.handle.net/2066/207790}
}
Batina L, Jauernig P, Mentens N, Sadeghi A-R and Stapf E (2019), "In Hardware We Trust: Gains and Pains of Hardware-assisted Security", In DAC '19: Proceedings of the 56th Annual Design Automation Conference 2019, Las Vegas, NV, USA --- June 02 - 06, 2019. New York , pp. 1-4. ACM.
BibTeX:
@inproceedings{dis-2019-Batina-b,
  author = {Batina, L. and Jauernig, P. and Mentens, N. and Sadeghi, A.-R. and Stapf, E.},
  title = {In Hardware We Trust: Gains and Pains of Hardware-assisted Security},
  booktitle = {DAC '19: Proceedings of the 56th Annual Design Automation Conference 2019, Las Vegas, NV, USA --- June 02 - 06, 2019},
  publisher = {ACM},
  year = {2019},
  pages = {1--4},
  url = {http://hdl.handle.net/2066/204493}
}
Batina L, Chow SSM, Hancke G and Liu Z (2019), "Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks", ACM Transactions on Embedded Computing Systems. Vol. 18(3), pp. 1-3.
BibTeX:
@article{dis-2019-Batina-c,
  author = {Batina, L. and Chow, S. S. M. and Hancke, G. and Liu, Z.},
  title = {Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks},
  journal = {ACM Transactions on Embedded Computing Systems},
  year = {2019},
  volume = {18},
  number = {3},
  pages = {1--3}
}
Batina L, Chmielewski L, Papachristodoulou L, Schwabe P and Tunstall M (2019), "Online template attacks", Journal of Cryptographic Engineering. Vol. 9(1), pp. 21-36.
BibTeX:
@article{dis-2019-Batina-d,
  author = {Batina, Lejla and Chmielewski, L. and Papachristodoulou, L. and Schwabe, Peter and Tunstall, M.},
  title = {Online template attacks},
  journal = {Journal of Cryptographic Engineering},
  year = {2019},
  volume = {9},
  number = {1},
  pages = {21--36},
  url = {http://hdl.handle.net/2066/203036}
}
Bernstein DJ, Hülsing A, Kölbl S, Niederhagen R, Rijneveld J and Schwabe P (2019), "The SPHINCS+ signature framework", In CCS '19:Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom --- November 11 - 15, 2019. New York , pp. 2129-2146. ACM.
BibTeX:
@inproceedings{dis-2019-Bernstein-a,
  author = {Bernstein, D. J. and Hülsing, A. and Kölbl, S. and Niederhagen, R. and Rijneveld, J. and Schwabe, P.},
  editor = {Cavallaro, L.},
  title = {The SPHINCS+ signature framework},
  booktitle = {CCS '19:Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom --- November 11 - 15, 2019},
  publisher = {ACM},
  year = {2019},
  pages = {2129--2146},
  url = {https://hdl.handle.net/2066/210207}
}
Bloem BR, Marks WJ, Silva de Lima AL, Kuijf ML, van Laar T, Jacobs BPF, Verbeek MM, van de Warrenburg BPC, Evers LJW, in't Hout J, van de Zande TT, Kapur R and Meinders MJ (2019), "The Personalized Parkinson Project: examining disease progression through broad biomarkers in early Parkinson's disease", BMC Neurology. Vol. 19
BibTeX:
@article{dis-2019-Bloem-a,
  author = {Bloem, B. R. and Marks, W. J. and Silva de Lima, A. L. and Kuijf, M. L. and van Laar, T. and Jacobs, B. P. F. and Verbeek, M. M. and van de Warrenburg, B. P. C. and Evers, L. J. W. and in't Hout, J. and van de Zande, T. T. and Kapur, R. and Meinders, M. J.},
  title = {The Personalized Parkinson Project: examining disease progression through broad biomarkers in early Parkinson's disease},
  journal = {BMC Neurology},
  year = {2019},
  volume = {19},
  url = {http://hdl.handle.net/2066/206735}
}
Bobbert Y and Mulder H (2019), "Enterprise Engineering in Business Information Security", In Advances in Enterprise Engineering XII: 8th Enterprise Engineering Working Conference, EEWC 2018, Luxembourg, Luxembourg, May 28 -- June 1. Proceedings. Cham Vol. 334, pp. 88-112. Springer International Publishing.
BibTeX:
@inproceedings{dis-2019-Bobbert-a,
  author = {Bobbert, Y. and Mulder, H.},
  editor = {Aveiro, D.},
  title = {Enterprise Engineering in Business Information Security},
  booktitle = {Advances in Enterprise Engineering XII: 8th Enterprise Engineering Working Conference, EEWC 2018, Luxembourg, Luxembourg, May 28 -- June 1. Proceedings},
  publisher = {Springer International Publishing},
  year = {2019},
  volume = {334},
  pages = {88--112}
}
Bockenek JA, Verbeek F, Lammich P, Ravindran B, Bharadwaj A and Roessle I (2019), "Formal Verification of Memory Preservation of x86-64 Binaries", In Computer Safety, Reliability, and Security - 38th International Conference, SAFECOMP 2019, Turku, Finland, September 11-13, 2019, Proceedings. Vol. 11698, pp. 35-49. Springer.
BibTeX:
@inproceedings{dis-2019-Bockenek-a,
  author = {Bockenek, Joshua A. and Verbeek, Freek and Lammich, Peter and Ravindran, Binoy and Bharadwaj, Abhijith and Roessle, Ian},
  editor = {Romanovsky, Alexander B. and Troubitsyna, Elena and Bitsch, Friedemann and Roop, Partha S. and Zhan, Naijun and Gao, Sicun and Nuzzo, Pierluigi},
  title = {Formal Verification of Memory Preservation of x86-64 Binaries},
  booktitle = {Computer Safety, Reliability, and Security - 38th International Conference, SAFECOMP 2019, Turku, Finland, September 11-13, 2019, Proceedings},
  publisher = {Springer},
  year = {2019},
  volume = {11698},
  pages = {35--49},
  url = {https://doi.org/10.1007/978-3-030-26601-13},
  doi = {10.1007/978-3-030-26601-1\_3}
}
Botros L, Kannwischer MJ and Schwabe P (2019), "Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4", In Progress in Cryptology -- AFRICACRYPT 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9--11, 2019, Proceedings. Berlin Vol. 11627, pp. 209-228. Springer.
BibTeX:
@inproceedings{dis-2019-Botros-a,
  author = {Botros, L. and Kannwischer, M. J. and Schwabe, P.},
  editor = {Buchmann, J.},
  title = {Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4},
  booktitle = {Progress in Cryptology -- AFRICACRYPT 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9--11, 2019, Proceedings},
  publisher = {Springer},
  year = {2019},
  volume = {11627},
  pages = {209--228}
}
Carr S, Jansen N, Wimmer R, Serban AC, Becker B and Topcu U (2019), "Counterexample-Guided Strategy Improvement for POMDPs Using Recurrent Neural Networks", In IJCAI 2019: International Joint Conferences on Artificial Intelligence, Macao, P.R. China from August 10-16, 2019. S.l. , pp. 5532-5539. IJCAI.
BibTeX:
@inproceedings{dis-2019-Carr-a,
  author = {Carr, S. and Jansen, Nils and Wimmer, R. and Serban, A. C. and Becker, B. and Topcu, U.},
  editor = {Kraus, S.},
  title = {Counterexample-Guided Strategy Improvement for POMDPs Using Recurrent Neural Networks},
  booktitle = {IJCAI 2019: International Joint Conferences on Artificial Intelligence, Macao, P.R. China from August 10-16, 2019},
  publisher = {IJCAI},
  year = {2019},
  pages = {5532--5539},
  url = {http://hdl.handle.net/2066/207631}
}
Chen YL, Lambooij E and Mennink BJM (2019), "How to Build Pseudorandom Functions From Public Random Permutations", In Advances in Cryptology -- CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18--22, 2019, Proceedings, Part I. Cham Vol. 11692, pp. 266-293. Springer.
BibTeX:
@inproceedings{dis-2019-Chen-a,
  author = {Chen, Y. L. and Lambooij, Eran and Mennink, B. J. M.},
  editor = {Boldyreva, A.},
  title = {How to Build Pseudorandom Functions From Public Random Permutations},
  booktitle = {Advances in Cryptology -- CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18--22, 2019, Proceedings, Part I},
  publisher = {Springer},
  year = {2019},
  volume = {11692},
  pages = {266--293},
  url = {http://hdl.handle.net/2066/207814}
}
Chmielewski LM (2019), "Exploiting Horizontal Leakage in Public Key Cryptosystems" , pp. xii, 191. s.n..
BibTeX:
@phdthesis{dis-2019-Chmielewski-a,
  author = {Chmielewski, L. M.},
  title = {Exploiting Horizontal Leakage in Public Key Cryptosystems},
  publisher = {s.n.},
  year = {2019},
  pages = {xii, 191},
  url = {http://hdl.handle.net/2066/207470}
}
Cho K and Jacobs B (2019), "Disintegration and Bayesian inversion via string diagrams", Mathematical Structures in Computer Science. Vol. 29(7), pp. 938-971.
BibTeX:
@article{dis-2019-Cho-a,
  author = {Cho, K. and Jacobs, Bart},
  title = {Disintegration and Bayesian inversion via string diagrams},
  journal = {Mathematical Structures in Computer Science},
  year = {2019},
  volume = {29},
  number = {7},
  pages = {938--971},
  note = {Gevonden in WoS met onderzoeker 1037231 Jacobs, B.P.F. (Bart) Affil. (Radboud OR Nijmegen) 2 auteurs volgens WoS}
}
Cho K (2019), "Effectuses in Categorical Quantum Foundations" , pp. ix, 316. s.n..
BibTeX:
@phdthesis{dis-2019-Cho-b,
  author = {Cho, K.},
  title = {Effectuses in Categorical Quantum Foundations},
  publisher = {s.n.},
  year = {2019},
  pages = {ix, 316},
  url = {http://hdl.handle.net/2066/207521}
}
Colesky M, Demetzou AD, Fritsch L and Herold S (2019), "Helping Software Architects Familiarize with the General Data Protection Regulation", In ICSA-C 2019: 2019 IEEE International Conference on Software Architecture Companion. Proceedings of a meeting meeting held 25-26 March 2019, Hamburg, Germany.. Piscataway , pp. 226-229. IEEE.
BibTeX:
@inproceedings{dis-2019-Colesky-a,
  author = {Colesky, M. and Demetzou, A. D. and Fritsch, L. and Herold, S.},
  title = {Helping Software Architects Familiarize with the General Data Protection Regulation},
  booktitle = {ICSA-C 2019: 2019 IEEE International Conference on Software Architecture Companion. Proceedings of a meeting meeting held 25-26 March 2019, Hamburg, Germany.},
  publisher = {IEEE},
  year = {2019},
  pages = {226--229}
}
Daemen J and Peeters M (2019), "ENCRYPTION FUNCTION AND AUTHENTICATION OF A REPLACEABLE PRINTER COMPONENT". Jul, 2019.
BibTeX:
@misc{dis-2019-Daemen-a,
  author = {Daemen, J. and Peeters, M.},
  title = {ENCRYPTION FUNCTION AND AUTHENTICATION OF A REPLACEABLE PRINTER COMPONENT},
  year = {2019},
  volume = {US 2019 / 0222421 A1},
  pages = {1--13},
  url = {http://hdl.handle.net/2066/209197}
}
Dobraunig CE and Mennink BJM (2019), "Leakage Resilience of the Duplex Construction", In Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8--12, 2019, Proceedings, Part I. Cham Vol. 11921, pp. 225-255. Springer.
BibTeX:
@inproceedings{dis-2019-Dobraunig-a,
  author = {Dobraunig, C. E. and Mennink, B. J. M.},
  editor = {Galbraith, S. D.},
  title = {Leakage Resilience of the Duplex Construction},
  booktitle = {Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8--12, 2019, Proceedings, Part I},
  publisher = {Springer},
  year = {2019},
  volume = {11921},
  pages = {225--255}
}
van Eekelen M (2019), "Gewaardeerde ICT-opleider".
BibTeX:
@misc{dis-2019-Eekelen-a,
  author = {van Eekelen, M.},
  title = {Gewaardeerde ICT-opleider},
  publisher = {Cstories.nl},
  year = {2019},
  url = {https://cstories.nl/themes/gewaardeerde-it-opleider/}
}
van Eekelen M (2019), "Saving the World: A long and windy road towards sustainability and formal verification in practice", In A Research Agenda for Formal Methods in the Netherlands. Utrecht , pp. 31-34. Utrecht University.
BibTeX:
@inbook{dis-2019-Eekelen-b,
  author = {van Eekelen, M.},
  editor = {Huisman, M.},
  title = {Saving the World: A long and windy road towards sustainability and formal verification in practice},
  booktitle = {A Research Agenda for Formal Methods in the Netherlands},
  publisher = {Utrecht University},
  year = {2019},
  pages = {31--34},
  url = {http://hdl.handle.net/2066/207836}
}
Ferreira Torres C, Baden M, Norvill R and Jonker HL (2019), "Poster: Ãtextdaggergis: Smart Shielding of Smart Contracts", In CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom --- November 11 - 15, 2019. New York , pp. 2589-2591. ACM.
BibTeX:
@inproceedings{dis-2019-FerreiraTorres-a,
  author = {Ferreira Torres, C. and Baden, Mathis and Norvill, Robert and Jonker, H. L.},
  editor = {Cavallaro, L.},
  title = {Poster: Ãtextdaggergis: Smart Shielding of Smart Contracts},
  booktitle = {CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom --- November 11 - 15, 2019},
  publisher = {ACM},
  year = {2019},
  pages = {2589--2591}
}
Haag J, Vranken HPE and van Eekelen M (2019), "A Virtual Class Room for Cybersecurity Education", In Transactions on Edutainment XV. Berlin , pp. 173-208. Springer.
BibTeX:
@inbook{dis-2019-Haag-a,
  author = {Haag, J. and Vranken, H. P. E. and van Eekelen, M.},
  editor = {Pan, Z.},
  title = {A Virtual Class Room for Cybersecurity Education},
  booktitle = {Transactions on Edutainment XV},
  publisher = {Springer},
  year = {2019},
  pages = {173--208}
}
Herder E (2019), "The Need for Identifying Ways to Monetize Personalization and Recommendation", In UMAP'19: Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization, June 9-12, 2019, Larnaca, Cyprus. New York , pp. 291-294. ACM.
BibTeX:
@inproceedings{dis-2019-Herder-a,
  author = {Herder, E.},
  editor = {Papadopoulos, G. A.},
  title = {The Need for Identifying Ways to Monetize Personalization and Recommendation},
  booktitle = {UMAP'19: Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization, June 9-12, 2019, Larnaca, Cyprus},
  publisher = {ACM},
  year = {2019},
  pages = {291--294}
}
Herder E and Zhang B (2019), "Unexpected and Unpredictable: Factors That Make Personalized Advertisements Creepy", In ABIS '19: Proceedings of the 23rd International Workshop on Personalization and Recommendation on the Web and Beyond, Hof, Germany --- September 17 - 17, 2019. New York , pp. 1-6. ACM.
BibTeX:
@inproceedings{dis-2019-Herder-b,
  author = {Herder, E. and Zhang, B.},
  editor = {Herder, E.},
  title = {Unexpected and Unpredictable: Factors That Make Personalized Advertisements Creepy},
  booktitle = {ABIS '19: Proceedings of the 23rd International Workshop on Personalization and Recommendation on the Web and Beyond, Hof, Germany --- September 17 - 17, 2019},
  publisher = {ACM},
  year = {2019},
  pages = {1--6},
  url = {http://hdl.handle.net/2066/207847}
}
Hildebrandt M (2019), "'We willen niet afhankelijk zijn van wat een techbedrijf toevallig ethisch vindt'", Informatie Professional. Vol. 2019(09), pp. 18-21.
BibTeX:
@article{dis-2019-Hildebrandt-a,
  author = {Hildebrandt, Mireille},
  title = {'We willen niet afhankelijk zijn van wat een techbedrijf toevallig ethisch vindt'},
  journal = {Informatie Professional},
  year = {2019},
  volume = {2019},
  number = {09},
  pages = {18-21}
}
Hildebrandt M (2019), "1. Introduction: Textbook and Essay", In Law for Computer Scientists. Oxford , pp. 1-14. Oxford University Press.
BibTeX:
@inbook{dis-2019-Hildebrandt-b,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M.},
  title = {1. Introduction: Textbook and Essay},
  booktitle = {Law for Computer Scientists},
  publisher = {Oxford University Press},
  year = {2019},
  pages = {1--14},
  url = {https://lawforcomputerscientists.pubpub.org/pub/8dogehp7}
}
Hildebrandt M (2019), "10. `Legal by Design' or `Legal Protection by Design'?", In Law for Computer Scientists. Oxford , pp. 1-31. Oxford University Press.
BibTeX:
@inbook{dis-2019-Hildebrandt-c,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M.},
  title = {10. `Legal by Design' or `Legal Protection by Design'?},
  booktitle = {Law for Computer Scientists},
  publisher = {Oxford University Press},
  year = {2019},
  pages = {1--31},
  url = {https://lawforcomputerscientists.pubpub.org/pub/gfzd6k0g}
}
Hildebrandt M (2019), "11. Closure: on ethics, code and law", In Law for Computer Scientists. Oxford , pp. 1-38. Oxford University Press.
BibTeX:
@inbook{dis-2019-Hildebrandt-d,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M.},
  title = {11. Closure: on ethics, code and law},
  booktitle = {Law for Computer Scientists},
  publisher = {Oxford University Press},
  year = {2019},
  pages = {1--38},
  url = {https://lawforcomputerscientists.pubpub.org/pub/nx5zv2ux}
}
Hildebrandt M (2019), "2. Law, Democracy, and the Rule of Law", In Law for Computer Scientists. Oxford , pp. 1-22. Oxford University Press.
BibTeX:
@inbook{dis-2019-Hildebrandt-e,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M.},
  title = {2. Law, Democracy, and the Rule of Law},
  booktitle = {Law for Computer Scientists},
  publisher = {Oxford University Press},
  year = {2019},
  pages = {1--22},
  url = {https://lawforcomputerscientists.pubpub.org/pub/hx1s8lbt}
}
Hildebrandt M (2019), "3. Domains of Law: Private, Public, and Criminal Law", In Law for Computer Scientists. Oxford , pp. 1-35. Oxford University Press.
BibTeX:
@inbook{dis-2019-Hildebrandt-f,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M.},
  title = {3. Domains of Law: Private, Public, and Criminal Law},
  booktitle = {Law for Computer Scientists},
  publisher = {Oxford University Press},
  year = {2019},
  pages = {1--35},
  url = {https://lawforcomputerscientists.pubpub.org/pub/d3mzwako}
}
Hildebrandt M (2019), "4. International and Supranational Law", In Law for Computer Scientists. Oxford , pp. 1-22. Oxford University Press.
BibTeX:
@inbook{dis-2019-Hildebrandt-g,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M.},
  title = {4. International and Supranational Law},
  booktitle = {Law for Computer Scientists},
  publisher = {Oxford University Press},
  year = {2019},
  pages = {1--22},
  url = {https://lawforcomputerscientists.pubpub.org/pub/gpk4tqae}
}
Hildebrandt M (2019), "5. Privacy and Data Protection", In Law for Computer Scientists. Oxford , pp. 1-66. Oxford University Press.
BibTeX:
@inbook{dis-2019-Hildebrandt-h,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M.},
  title = {5. Privacy and Data Protection},
  booktitle = {Law for Computer Scientists},
  publisher = {Oxford University Press},
  year = {2019},
  pages = {1--66},
  url = {https://lawforcomputerscientists.pubpub.org/pub/doreuiyy}
}
Hildebrandt M (2019), "6. Cybercrime", In Law for Computer Scientists. Oxford , pp. 1-31. Oxford University Press.
BibTeX:
@inbook{dis-2019-Hildebrandt-i,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M.},
  title = {6. Cybercrime},
  booktitle = {Law for Computer Scientists},
  publisher = {Oxford University Press},
  year = {2019},
  pages = {1--31},
  url = {https://lawforcomputerscientists.pubpub.org/pub/pq3xqd3k}
}
Hildebrandt M (2019), "7. Copyright in Cyberspace", In Law for Computer Scientists. Oxford , pp. 1-31. Oxford University Press.
BibTeX:
@inbook{dis-2019-Hildebrandt-j,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M.},
  title = {7. Copyright in Cyberspace},
  booktitle = {Law for Computer Scientists},
  publisher = {Oxford University Press},
  year = {2019},
  pages = {1--31},
  url = {https://lawforcomputerscientists.pubpub.org/pub/yjwfiwk5}
}
Hildebrandt M (2019), "8. Private Law Liability for Faulty ICT", In Law for Computer Scientists. Oxford , pp. 1-18. Oxford University Press.
BibTeX:
@inbook{dis-2019-Hildebrandt-k,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M.},
  title = {8. Private Law Liability for Faulty ICT},
  booktitle = {Law for Computer Scientists},
  publisher = {Oxford University Press},
  year = {2019},
  pages = {1--18},
  url = {https://lawforcomputerscientists.pubpub.org/pub/cbjjftn9}
}
Hildebrandt M (2019), "9. Legal Personhood for AI?", In Law for Computer Scientists. Oxford , pp. 1-13. Oxford University Press.
BibTeX:
@inbook{dis-2019-Hildebrandt-l,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M.},
  title = {9. Legal Personhood for AI?},
  booktitle = {Law for Computer Scientists},
  publisher = {Oxford University Press},
  year = {2019},
  pages = {1--13},
  url = {https://lawforcomputerscientists.pubpub.org/pub/4swyxhx5}
}
Hildebrandt M (2019), "EU Data Protection Law: An Ally for Scientific Reproducibility?", In MM '19: Proceedings of the 27th ACM International Conference on Multimedia, Nice, France --- October 21 - 25, 2019. New York , pp. 1155-1156. ACM.
BibTeX:
@inproceedings{dis-2019-Hildebrandt-m,
  author = {Hildebrandt, M.},
  editor = {Amsaleg, L.},
  title = {EU Data Protection Law: An Ally for Scientific Reproducibility?},
  booktitle = {MM '19: Proceedings of the 27th ACM International Conference on Multimedia, Nice, France --- October 21 - 25, 2019},
  publisher = {ACM},
  year = {2019},
  pages = {1155--1156},
  url = {http://hdl.handle.net/2066/209275}
}
Hildebrandt M (2019), "Law for Computer Scientists" Oxford , pp. 1+-+. Oxford University Press.
BibTeX:
@book{dis-2019-Hildebrandt-n,
  author = {Hildebrandt, M.},
  title = {Law for Computer Scientists},
  publisher = {Oxford University Press},
  year = {2019},
  pages = {1+--+},
  url = {https://lawforcomputerscientists.pubpub.org/}
}
Hildebrandt M (2019), "Privacy As Protection of the Incomputable Self: From Agnostic to Agonistic Machine Learning", Theoretical Inquiries in Law. Vol. 20(2), pp. 83-121.
BibTeX:
@article{dis-2019-Hildebrandt-o,
  author = {Hildebrandt, M.},
  title = {Privacy As Protection of the Incomputable Self: From Agnostic to Agonistic Machine Learning},
  journal = {Theoretical Inquiries in Law},
  year = {2019},
  volume = {20},
  number = {2},
  pages = {83--121},
  url = {http://www7.tau.ac.il/ojs/index.php/til/article/view/1622/1723}
}
Hildebrandt M (2019), "Rude awakenings from behaviourist dreams. Methodological integrity and the GDPR", In RecSys '19: Proceedings of the 13th ACM Conference on Recommender Systems, Copenhagen, Denmark --- September 16 - 20, 2019. New York , pp. 1-1. ACM.
BibTeX:
@inproceedings{dis-2019-Hildebrandt-p,
  author = {Hildebrandt, M.},
  editor = {Bogers, T.},
  title = {Rude awakenings from behaviourist dreams. Methodological integrity and the GDPR},
  booktitle = {RecSys '19: Proceedings of the 13th ACM Conference on Recommender Systems, Copenhagen, Denmark --- September 16 - 20, 2019},
  publisher = {ACM},
  year = {2019},
  pages = {1--1}
}
Hoofnagle CJ, Sloot B and Zuiderveen Borgesius FJ (2019), "The European Union general data protection regulation: what it is and what it means", Information & Communications Technology Law. Vol. 28(1), pp. 65-98.
BibTeX:
@article{dis-2019-Hoofnagle-a,
  author = {Hoofnagle, C. J. and Sloot, B. and Zuiderveen Borgesius, F. J.},
  title = {The European Union general data protection regulation: what it is and what it means},
  journal = {Information & Communications Technology Law},
  year = {2019},
  volume = {28},
  number = {1},
  pages = {65--98}
}
Jacobs BPF (2019), "'Kies decentraal inlogmiddel voor burgers'".
BibTeX:
@misc{dis-2019-Jacobs-a,
  author = {Jacobs, B. P. F.},
  title = {'Kies decentraal inlogmiddel voor burgers'},
  publisher = {IBestuur Online},
  year = {2019},
  url = {https://ibestuur.nl/podium/kies-decentraal-inlogmiddel-voor-burgers}
}
Jacobs B, Zanasi F and Kissinger A (2019), "Causal Inference by String Diagram Surgery", In Foundations of Software Science and Computation Structures: 22nd International Conference, FOSSACS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6--11, 2019, Proceedings. Cham Vol. 11425, pp. 313-329. Springer.
BibTeX:
@inproceedings{dis-2019-Jacobs-b,
  author = {Jacobs, B. and Zanasi, Fabio and Kissinger, A.},
  editor = {Bojanczyk, M.},
  title = {Causal Inference by String Diagram Surgery},
  booktitle = {Foundations of Software Science and Computation Structures: 22nd International Conference, FOSSACS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6--11, 2019, Proceedings},
  publisher = {Springer},
  year = {2019},
  volume = {11425},
  pages = {313--329},
  url = {http://hdl.handle.net/2066/204510}
}
Jacobs B (2019), "Electronic Identities in Europe". 2019, 2019.
BibTeX:
@misc{dis-2019-Jacobs-c,
  author = {Jacobs, B.},
  title = {Electronic Identities in Europe},
  year = {2019},
  note = {unpublished conference paper},
  url = {https://youtu.be/vINtD58nLPQ}
}
Jacobs BPF (2019), "IRMA in de zorg. Op weg naar een authenticatie doorbraak". 2019, 2019.
BibTeX:
@misc{dis-2019-Jacobs-d,
  author = {Jacobs, B. P. F.},
  title = {IRMA in de zorg. Op weg naar een authenticatie doorbraak},
  year = {2019},
  note = {unpublished conference paper}
}
Jacobs B and Popma JAM (2019), "Medical research, Big Data and the need for privacy by design", Big Data & Society. Vol. 6(1), pp. 1-5.
BibTeX:
@article{dis-2019-Jacobs-e,
  author = {Jacobs, B. and Popma, J. A. M.},
  title = {Medical research, Big Data and the need for privacy by design},
  journal = {Big Data & Society},
  year = {2019},
  volume = {6},
  number = {1},
  pages = {1--5},
  url = {http://hdl.handle.net/2066/201652}
}
Jacobs B (2019), "Praktijklessen voor datakluizen".
BibTeX:
@misc{dis-2019-Jacobs-f,
  author = {Jacobs, B.},
  title = {Praktijklessen voor datakluizen},
  publisher = {iBestuur online},
  year = {2019},
  url = {https://ibestuur.nl/weblog/praktijklessen-voor-datakluizen}
}
Jacobs B (2019), "The Mathematics of Changing One's Mind, via Jeffrey's or via Pearl's Update Rule", The Journal of Artificial Intelligence Research. Vol. 65, pp. 783-806.
BibTeX:
@article{dis-2019-Jacobs-g,
  author = {Jacobs, Bart},
  title = {The Mathematics of Changing One's Mind, via Jeffrey's or via Pearl's Update Rule},
  journal = {The Journal of Artificial Intelligence Research},
  year = {2019},
  volume = {65},
  pages = {783--806},
  url = {http://hdl.handle.net/2066/207345}
}
Jacobs BPF (2019), "Zorgen om Huawei als leverancier van 5G - maar hoe veilig zijn de huidige netwerken?".
BibTeX:
@misc{dis-2019-Jacobs-h,
  author = {Jacobs, B. P. F.},
  title = {Zorgen om Huawei als leverancier van 5G - maar hoe veilig zijn de huidige netwerken?},
  publisher = {NPO2},
  year = {2019},
  url = {https://nos.nl/nieuwsuur/video/2285182-zorgen-om-huawei-als-leverancier-van-5g-maar-hoe-veilig-zijn-de-huidige-netwerken.html}
}
Jacobs B (2019), "Learning along a Channel: the Expectation part of Expectation-Maximisation", In Proceedings of the Thirty-Fifth Conference on the Mathematical Foundations of Programming Semantics, MFPS 2019, London, UK, June 4-7, 2019. Vol. 347, pp. 143-160. Elsevier.
BibTeX:
@inproceedings{dis-2019-Jacobs-i,
  author = {Jacobs, Bart},
  editor = {König, Barbara},
  title = {Learning along a Channel: the Expectation part of Expectation-Maximisation},
  booktitle = {Proceedings of the Thirty-Fifth Conference on the Mathematical Foundations of Programming Semantics, MFPS 2019, London, UK, June 4-7, 2019},
  publisher = {Elsevier},
  year = {2019},
  volume = {347},
  pages = {143--160},
  url = {https://doi.org/10.1016/j.entcs.2019.09.008},
  doi = {10.1016/j.entcs.2019.09.008}
}
Jacobs B and Sprunger D (2019), "Neural Nets via Forward State Transformation and Backward Loss Transformation", In Proceedings of the Thirty-Fifth Conference on the Mathematical Foundations of Programming Semantics, MFPS 2019, London, UK, June 4-7, 2019. Vol. 347, pp. 161-177. Elsevier.
BibTeX:
@inproceedings{dis-2019-Jacobs-j,
  author = {Jacobs, Bart and Sprunger, David},
  editor = {König, Barbara},
  title = {Neural Nets via Forward State Transformation and Backward Loss Transformation},
  booktitle = {Proceedings of the Thirty-Fifth Conference on the Mathematical Foundations of Programming Semantics, MFPS 2019, London, UK, June 4-7, 2019},
  publisher = {Elsevier},
  year = {2019},
  volume = {347},
  pages = {161--177},
  url = {https://doi.org/10.1016/j.entcs.2019.09.009},
  doi = {10.1016/j.entcs.2019.09.009}
}
Jongmans S-S, Lamers A and van Eekelen M (2019), "SOA and the Button Problem", In Formal Methods -- The Next 30 Years: Third World Congress, FM 2019, Porto, Portugal, October 7--11, 2019. Proceedings. Cham Vol. 11800, pp. 689-706. Springer.
BibTeX:
@inproceedings{dis-2019-Jongmans-a,
  author = {Jongmans, S.-S. and Lamers, A. and van Eekelen, M.},
  editor = {ter Beek, M. H.},
  title = {SOA and the Button Problem},
  booktitle = {Formal Methods -- The Next 30 Years: Third World Congress, FM 2019, Porto, Portugal, October 7--11, 2019. Proceedings},
  publisher = {Springer},
  year = {2019},
  volume = {11800},
  pages = {689--706}
}
Jonker H, Krumnow B and Vlot G (2019), "Fingerprint Surface-Based Detection of Web Bot Detectors", In Computer Security -- ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23--27, 2019, Proceedings, Part I. Cham Vol. 11735, pp. 586-605. Springer International Publishing.
BibTeX:
@inproceedings{dis-2019-Jonker-a,
  author = {Jonker, H. and Krumnow, B. and Vlot, G.},
  editor = {Sako, K.},
  title = {Fingerprint Surface-Based Detection of Web Bot Detectors},
  booktitle = {Computer Security -- ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23--27, 2019, Proceedings, Part I},
  publisher = {Springer International Publishing},
  year = {2019},
  volume = {11735},
  pages = {586--605}
}
Jovanovic P, Luykx A, Mennink B, Sasaki Y and Yasuda K (2019), "Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes", Journal of Cryptology. Vol. 32(3), pp. 895-940.
BibTeX:
@article{dis-2019-Jovanovic-a,
  author = {Jovanovic, Philipp and Luykx, A. and Mennink, Bart and Sasaki, Yu and Yasuda, Kan},
  title = {Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes},
  journal = {Journal of Cryptology},
  year = {2019},
  volume = {32},
  number = {3},
  pages = {895--940},
  url = {http://hdl.handle.net/2066/205635}
}
Kannwischer MJ, Rijneveld J and Schwabe P (2019), "Faster multiplication in ℤ2m[x] on Cortex-M4 to speed up NIST PQC candidates", In Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5--7, 2019, Proceedings. Berlin Vol. 11464, pp. 281-301. Springer.
BibTeX:
@inproceedings{dis-2019-Kannwischer-a,
  author = {Kannwischer, M. J. and Rijneveld, J. and Schwabe, P.},
  editor = {Deng, R. H.},
  title = {Faster multiplication in ℤ2m[x] on Cortex-M4 to speed up NIST PQC candidates},
  booktitle = {Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5--7, 2019, Proceedings},
  publisher = {Springer},
  year = {2019},
  volume = {11464},
  pages = {281--301}
}
Kannwischer MJ, Rijneveld J, Schwabe P and Stoffelen K (2019), "pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4", In Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019. , pp. 1-22. CSRC.
BibTeX:
@inproceedings{dis-2019-Kannwischer-b,
  author = {Kannwischer, M. J. and Rijneveld, J. and Schwabe, P. and Stoffelen, K.},
  title = {pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4},
  booktitle = {Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019},
  publisher = {CSRC},
  year = {2019},
  pages = {1--22},
  url = {https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/kannwischer-pqm4.pdf}
}
Keiren JJA (2019), "Practical Formal Methods", In A Research Agenda for Formal Methods in the Netherlands. Utrecht , pp. 21-22. Utrecht University.
BibTeX:
@inbook{dis-2019-Keiren-a,
  author = {Keiren, J. J. A.},
  editor = {Huisman, M.},
  title = {Practical Formal Methods},
  booktitle = {A Research Agenda for Formal Methods in the Netherlands},
  publisher = {Utrecht University},
  year = {2019},
  pages = {21--22},
  url = {https://hdl.handle.net/2066/207828}
}
Kissinger A and Uijlen S (2019), "A CATEGORICAL SEMANTICS FOR CAUSAL STRUCTURE", Logical Methods in Computer Science. Vol. 15(3), pp. 1-48.
BibTeX:
@article{dis-2019-Kissinger-a,
  author = {Kissinger, Aleks and Uijlen, S.},
  title = {A CATEGORICAL SEMANTICS FOR CAUSAL STRUCTURE},
  journal = {Logical Methods in Computer Science},
  year = {2019},
  volume = {15},
  number = {3},
  pages = {1--48},
  url = {http://hdl.handle.net/2066/207822 HTTPS://DX.DOI.ORG/10.23638/LMCS-15(3:15)2019}
}
Kissinger A and van de Wetering J (2019), "Universal MBQC with generalised parity-phase interactions and Pauli measurements", Quantum. Vol. 3, pp. 1-21.
BibTeX:
@article{dis-2019-Kissinger-b,
  author = {Kissinger, Aleks and van de Wetering, John},
  title = {Universal MBQC with generalised parity-phase interactions and Pauli measurements},
  journal = {Quantum},
  year = {2019},
  volume = {3},
  pages = {1--21},
  url = {http://hdl.handle.net/2066/204127}
}
Koens T and Poll E (2019), "Assessing interoperability solutions for distributed ledgers", Pervasive and Mobile Computing. Vol. 59, pp. 1-10.
BibTeX:
@article{dis-2019-Koens-a,
  author = {Koens, T. and Poll, E.},
  title = {Assessing interoperability solutions for distributed ledgers},
  journal = {Pervasive and Mobile Computing},
  year = {2019},
  volume = {59},
  pages = {1--10}
}
Liu F, Dobraunig CE, Mendel F, Isobe T, Wang G and Cao Z (2019), "Efficient Collision Attack Frameworks for RIPEMD-160", In Advances in Cryptology -- CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18--22, 2019, Proceedings, Part I. Cham Vol. 11692, pp. 117-149. Springer International Publishing.
BibTeX:
@inproceedings{dis-2019-Liu-a,
  author = {Liu, F. and Dobraunig, C. E. and Mendel, F. and Isobe, T. and Wang, G. and Cao, Z.},
  editor = {Boldyreva, A.},
  title = {Efficient Collision Attack Frameworks for RIPEMD-160},
  booktitle = {Advances in Cryptology -- CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18--22, 2019, Proceedings, Part I},
  publisher = {Springer International Publishing},
  year = {2019},
  volume = {11692},
  pages = {117--149}
}
Liu F, Dobraunig CE, Mendel F, Isobe T, Wang G and Cao Z (2019), "New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160", IACR Transactions on Symmetric Cryptology. Vol. 2019(3), pp. 169192.
BibTeX:
@article{dis-2019-Liu-b,
  author = {Liu, F. and Dobraunig, C. E. and Mendel, F. and Isobe, T. and Wang, G. and Cao, Z.},
  title = {New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160},
  journal = {IACR Transactions on Symmetric Cryptology},
  year = {2019},
  volume = {2019},
  number = {3},
  pages = {169192},
  url = {http://hdl.handle.net/2066/207825}
}
Maldini A, Samwel N, Picek S and Batina L (2019), "Optimizing Electromagnetic Fault Injection with Genetic Algorithms", In Automated Methods in Cryptographic Fault Analysis. Cham , pp. 281-300. Springer International Publishing.
BibTeX:
@inbook{dis-2019-Maldini-a,
  author = {Maldini, Antun and Samwel, N. and Picek, Stjepan and Batina, L.},
  editor = {Breier, J. and Hou, X. and Bhasin, S.},
  title = {Optimizing Electromagnetic Fault Injection with Genetic Algorithms},
  booktitle = {Automated Methods in Cryptographic Fault Analysis},
  publisher = {Springer International Publishing},
  year = {2019},
  pages = {281--300}
}
Masanet E, Shehabi A, Lei N, Vranken HPE, Koomey J and Malmodin J (2019), "Implausible projections overestimate near-term Bitcoin CO2 emissions", Nature Climate Change. Vol. 9(9), pp. 653-654.
BibTeX:
@article{dis-2019-Masanet-a,
  author = {Masanet, E. and Shehabi, A. and Lei, N. and Vranken, H. P. E. and Koomey, J. and Malmodin, J.},
  title = {Implausible projections overestimate near-term Bitcoin CO2 emissions},
  journal = {Nature Climate Change},
  year = {2019},
  volume = {9},
  number = {9},
  pages = {653--654},
  url = {http://hdl.handle.net/2066/207817}
}
Meijer CFJ and van Gastel BE (2019), "Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)", In 2019 IEEE Symposium on Security and Privacy (SP) May 20 2019 to May 22 2019 San Fransisco, CA, US. S.l9 Vol. 1, pp. 72-87. IEEE.
BibTeX:
@inproceedings{dis-2019-Meijer-a,
  author = {Meijer, C. F. J. and van Gastel, B. E.},
  title = {Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)},
  booktitle = {2019 IEEE Symposium on Security and Privacy (SP) May 20 2019 to May 22 2019 San Fransisco, CA, US},
  publisher = {IEEE},
  year = {2019},
  volume = {1},
  pages = {72--87},
  url = {http://hdl.handle.net/2066/207837}
}
Mennink B (2019), "Linking Stam's Bounds With Generalized Truncation", In Topics in Cryptology - CT-RSA 2019: The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4--8, 2019. Cham Vol. 11405 Springer.
BibTeX:
@inproceedings{dis-2019-Mennink-a,
  author = {Mennink, B.},
  editor = {Matsui, M.},
  title = {Linking Stam's Bounds With Generalized Truncation},
  booktitle = {Topics in Cryptology - CT-RSA 2019: The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4--8, 2019},
  publisher = {Springer},
  year = {2019},
  volume = {11405}
}
Modderkolk G and Jacobs BPF (2019), "Netwerk KLM, Shell en Schiphol was onbeveiligd" , pp. 6-7.
BibTeX:
@article{dis-2019-Modderkolk-a,
  author = {Modderkolk, G. and Jacobs, B. P. F.},
  title = {Netwerk KLM, Shell en Schiphol was onbeveiligd},
  year = {2019},
  pages = {6--7},
  url = {https://hdl.handle.net/2066/207824}
}
Naehrig M and Renes J (2019), "Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography", In Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8--12, 2019, Proceedings, Part I. Cham Vol. 11921, pp. 243-272. Springer.
BibTeX:
@inproceedings{dis-2019-Naehrig-a,
  author = {Naehrig, M. and Renes, J.},
  editor = {Galbraith, S. D.},
  title = {Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography},
  booktitle = {Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8--12, 2019, Proceedings, Part I},
  publisher = {Springer},
  year = {2019},
  volume = {11921},
  pages = {243--272}
}
Papachristodoulou L (2019), "Masking Curves: Side-Channel Attacks on Elliptic Curve Cryptography and Countermeasures" , pp. xxx, 204. s.n..
BibTeX:
@phdthesis{dis-2019-Papachristodoulou-a,
  author = {Papachristodoulou, L.},
  title = {Masking Curves: Side-Channel Attacks on Elliptic Curve Cryptography and Countermeasures},
  publisher = {s.n.},
  year = {2019},
  pages = {xxx, 204},
  url = {http://hdl.handle.net/2066/201163}
}
Papachristodoulou L, Fournaris AP, Papagiannopoulos K and Batina L (2019), "Practical Evaluation of Protected Residue Number System Scalar Multiplication", IACR Transactions on Cryptographic Hardware and Embedded Systems. Vol. 2019(1), pp. 259-282.
BibTeX:
@article{dis-2019-Papachristodoulou-b,
  author = {Papachristodoulou, L. and Fournaris, A. P. and Papagiannopoulos, K. and Batina, L.},
  title = {Practical Evaluation of Protected Residue Number System Scalar Multiplication},
  journal = {IACR Transactions on Cryptographic Hardware and Embedded Systems},
  year = {2019},
  volume = {2019},
  number = {1},
  pages = {259--282},
  url = {http://hdl.handle.net/2066/201657}
}
Picek S, Heuser A, Jovic A and Batina L (2019), "A Systematic Evaluation of Profiling Through Focused Feature Selection", IEEE Transactions on Very Large Scale Integration (VLSI) Systems. Vol. 27(12), pp. 2802-2815.
BibTeX:
@article{dis-2019-Picek-a,
  author = {Picek, S. and Heuser, A. and Jovic, A. and Batina, L.},
  title = {A Systematic Evaluation of Profiling Through Focused Feature Selection},
  journal = {IEEE Transactions on Very Large Scale Integration (VLSI) Systems},
  year = {2019},
  volume = {27},
  number = {12},
  pages = {2802--2815},
  url = {https://hdl.handle.net/2066/210202}
}
Pirotte N, Vliegen J, Batina L and Mentens N (2019), "Balancing elliptic curve coprocessors from bottom to top", Microprocessors and Microsystems. Vol. 71, pp. 1-11.
BibTeX:
@article{dis-2019-Pirotte-a,
  author = {Pirotte, N. and Vliegen, J. and Batina, L. and Mentens, N.},
  title = {Balancing elliptic curve coprocessors from bottom to top},
  journal = {Microprocessors and Microsystems},
  year = {2019},
  volume = {71},
  pages = {1--11}
}
Poll E (2019), "Formal Methods for Security?", In A Research Agenda for Formal Methods in the Netherlands. Utrecht , pp. 12-13. Utrecht University.
BibTeX:
@inbook{dis-2019-Poll-a,
  author = {Poll, Erik},
  editor = {Huisman, M.},
  title = {Formal Methods for Security?},
  booktitle = {A Research Agenda for Formal Methods in the Netherlands},
  publisher = {Utrecht University},
  year = {2019},
  pages = {12--13},
  url = {http://hdl.handle.net/2066/207807}
}
Poort J and Zuiderveen Borgesius FJ (2019), "Does everyone have a price? Understanding people's attitude towards online and offline price discrimination", Internet Policy Review. HIIG - Alexander von Humboldt Institute for Internet and Society.
BibTeX:
@article{dis-2019-Poort-a,
  author = {Poort, Joost and Zuiderveen Borgesius, Frederik J.},
  title = {Does everyone have a price? Understanding people's attitude towards online and offline price discrimination},
  journal = {Internet Policy Review},
  publisher = {HIIG - Alexander von Humboldt Institute for Internet and Society},
  year = {2019},
  url = {http://policyreview.info/node/1383},
  doi = {10.14763/2019.1.1383}
}
Poort J and Zuiderveen Borgesius FJ (2019), "Prijsdiscriminatie, privacy, en publieke opinie".
BibTeX:
@misc{dis-2019-Poort-b,
  author = {Poort, J. and Zuiderveen Borgesius, F. J.},
  title = {Prijsdiscriminatie, privacy, en publieke opinie},
  publisher = {Ars Aequi},
  year = {2019},
  url = {https://arsaequi.nl/product/prijsdiscriminatie-privacy-en-publieke-opinie/}
}
Renes JR (2019), "Security on the Line: Modern Curve-based Cryptography" , pp. xxvi, 264. s.n..
BibTeX:
@phdthesis{dis-2019-Renes-a,
  author = {Renes, J. R.},
  title = {Security on the Line: Modern Curve-based Cryptography},
  publisher = {s.n.},
  year = {2019},
  pages = {xxvi, 264},
  url = {http://hdl.handle.net/2066/204182}
}
Rennela MPA (2019), "Enrichment in Categorical Quantum Foundations" , pp. v, 143. s.n..
BibTeX:
@phdthesis{dis-2019-Rennela-a,
  author = {Rennela, M. P. A.},
  title = {Enrichment in Categorical Quantum Foundations},
  publisher = {s.n.},
  year = {2019},
  pages = {v, 143},
  url = {http://hdl.handle.net/2066/199721}
}
Rijneveld LCJ (2019), "Practical post-quantum cryptography" , pp. 261. s.n..
BibTeX:
@phdthesis{dis-2019-Rijneveld-a,
  author = {Rijneveld, L. C. J.},
  title = {Practical post-quantum cryptography},
  publisher = {s.n.},
  year = {2019},
  pages = {261},
  url = {https://hdl.handle.net/2066/208551}
}
Roessle I, Verbeek F and Ravindran B (2019), "Formally verified big step semantics out of x86-64 binaries", In Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs, CPP 2019, Cascais, Portugal, January 14-15, 2019. , pp. 181-195. ACM.
BibTeX:
@inproceedings{dis-2019-Roessle-a,
  author = {Roessle, Ian and Verbeek, Freek and Ravindran, Binoy},
  editor = {Mahboubi, Assia and Myreen, Magnus O.},
  title = {Formally verified big step semantics out of x86-64 binaries},
  booktitle = {Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs, CPP 2019, Cascais, Portugal, January 14-15, 2019},
  publisher = {ACM},
  year = {2019},
  pages = {181--195},
  url = {https://doi.org/10.1145/3293880.3294102},
  doi = {10.1145/3293880.3294102}
}
Samardjiska S, Santini P, Persichetti E and Banegas G (2019), "A Reaction Attack Against Cryptosystems Based on LRPC Codes", In Progress in Cryptology -- LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2--4, 2019, Proceedings. Cham Vol. 11774, pp. 197-216. Springer International Publishing.
BibTeX:
@inproceedings{dis-2019-Samardjiska-a,
  author = {Samardjiska, S. and Santini, P. and Persichetti, E. and Banegas, G.},
  editor = {Schwabe, P. and Thériault, N.},
  title = {A Reaction Attack Against Cryptosystems Based on LRPC Codes},
  booktitle = {Progress in Cryptology -- LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2--4, 2019, Proceedings},
  publisher = {Springer International Publishing},
  year = {2019},
  volume = {11774},
  pages = {197--216}
}
Sarbo JJ and Cozijn R (2019), "Belief in reasoning", Cognitive Systems Research. Vol. 55, pp. 245-256.
BibTeX:
@article{dis-2019-Sarbo-a,
  author = {Sarbo, J. J. and Cozijn, R.},
  title = {Belief in reasoning},
  journal = {Cognitive Systems Research},
  year = {2019},
  volume = {55},
  pages = {245--256}
}
Schwabe P and Theriault N (2019), "Progress in Cryptology -- LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2--4, 2019, Proceedings" Cham (11774), pp. X, 385. Springer.
BibTeX:
@book{dis-2019-Schwabe-a,
  author = {Schwabe, P. and Theriault, N.},
  title = {Progress in Cryptology -- LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2--4, 2019, Proceedings},
  publisher = {Springer},
  year = {2019},
  number = {11774},
  pages = {X, 385},
  note = {Event: Progress in Cryptology -- LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2--4, 2019}
}
Schwabe P and Sprenkels D (2019), "The Complete Cost of Cofactor h=1", In Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings. Vol. 11898, pp. 375-397. Springer.
BibTeX:
@inproceedings{dis-2019-Schwabe-b,
  author = {Schwabe, Peter and Sprenkels, Daan},
  editor = {Hao, Feng and Ruj, Sushmita and Gupta, Sourav Sen},
  title = {The Complete Cost of Cofactor h=1},
  booktitle = {Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
  publisher = {Springer},
  year = {2019},
  volume = {11898},
  pages = {375--397},
  url = {https://doi.org/10.1007/978-3-030-35423-719},
  doi = {10.1007/978-3-030-35423-7\_19}
}
Singh VK, André E, Boll S, Hildebrandt M, Shamma DA and Chua T-S (2019), "Legal and Ethical Challenges in Multimedia Research", In MM '19: 27th Proceedings of the ACM International Conference on Multimedia, Nice, France --- October 21 - 25, 2019. New York , pp. 2514-2515. ACM.
BibTeX:
@inproceedings{dis-2019-Singh-a,
  author = {Singh, V. K. and André, E. and Boll, S. and Hildebrandt, M. and Shamma, D. A. and Chua, T.-S.},
  editor = {Amsaleg, L.},
  title = {Legal and Ethical Challenges in Multimedia Research},
  booktitle = {MM '19: 27th Proceedings of the ACM International Conference on Multimedia, Nice, France --- October 21 - 25, 2019},
  publisher = {ACM},
  year = {2019},
  pages = {2514--2515},
  url = {http://hdl.handle.net/2066/209290}
}
Stoffelen K (2019), "Efficient Cryptography on the RISC-V Architecture", In Progress in Cryptology - LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings. Vol. 11774, pp. 323-340. Springer.
BibTeX:
@inproceedings{dis-2019-Stoffelen-a,
  author = {Stoffelen, Ko},
  editor = {Schwabe, Peter and Thériault, Nicolas},
  title = {Efficient Cryptography on the RISC-V Architecture},
  booktitle = {Progress in Cryptology - LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings},
  publisher = {Springer},
  year = {2019},
  volume = {11774},
  pages = {323--340},
  url = {https://doi.org/10.1007/978-3-030-30530-716},
  doi = {10.1007/978-3-030-30530-7\_16}
}
Uijlen S (2019), "Categorical approaches to computations in contextuality and causality" , pp. ix, 193. s.n..
BibTeX:
@phdthesis{dis-2019-Uijlen-a,
  author = {Uijlen, S.},
  title = {Categorical approaches to computations in contextuality and causality},
  publisher = {s.n.},
  year = {2019},
  pages = {ix, 193},
  url = {http://hdl.handle.net/2066/208548}
}
Verheul E, Hicks C and Garcia FD (2019), "IFAL: Issue First Activate Later Certificates for V2X", In EUROS&P 2019: 4th IEEE European Symposium on Security and Privacy, June 17-19, 2019 in Stockholm, Sweden. Proceedings. S.l. , pp. 279-293. IEEE.
BibTeX:
@inproceedings{dis-2019-Verheul-a,
  author = {Verheul, E. and Hicks, C. and Garcia, F. D.},
  editor = {Papadimitratos, P.},
  title = {IFAL: Issue First Activate Later Certificates for V2X},
  booktitle = {EUROS&P 2019: 4th IEEE European Symposium on Security and Privacy, June 17-19, 2019 in Stockholm, Sweden. Proceedings},
  publisher = {IEEE},
  year = {2019},
  pages = {279--293},
  url = {http://hdl.handle.net/2066/207815}
}
Walree TF (2019), "Eigen schuld van de betrokkene bij een onrechtmatige verwerking van zijn persoonsgegevens", Weekblad voor Privaatrecht, Notariaat en Registratie. Vol. 150(7246), pp. 516-527.
BibTeX:
@article{dis-2019-Walree-a,
  author = {Walree, T. F.},
  title = {Eigen schuld van de betrokkene bij een onrechtmatige verwerking van zijn persoonsgegevens},
  journal = {Weekblad voor Privaatrecht, Notariaat en Registratie},
  year = {2019},
  volume = {150},
  number = {7246},
  pages = {516--527},
  url = {http://hdl.handle.net/2066/205621}
}
Weissbart L, Picek S and Batina L (2019), "One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA", In Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Gandhinagar, India, December 3-7, 2019, Proceedings. Vol. 11947, pp. 86-105. Springer.
BibTeX:
@inproceedings{dis-2019-Weissbart-a,
  author = {Weissbart, Leo and Picek, Stjepan and Batina, Lejla},
  editor = {Bhasin, Shivam and Mendelson, Avi and Nandi, Mridul},
  title = {One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Gandhinagar, India, December 3-7, 2019, Proceedings},
  publisher = {Springer},
  year = {2019},
  volume = {11947},
  pages = {86--105},
  url = {https://doi.org/10.1007/978-3-030-35869-38},
  doi = {10.1007/978-3-030-35869-3\_8}
}
Welling W, Stikker M, Van der Linden M and Jacobs B (2019), "Explanation about online identities".
BibTeX:
@misc{dis-2019-Welling-a,
  author = {Welling, W. and Stikker, M. and Van der Linden, M. and Jacobs, B.},
  title = {Explanation about online identities},
  publisher = {Ministery of Internal Affairs},
  year = {2019},
  note = {Event: OMOOC Series},
  url = {https://youtu.be/ctz-GoIL6W0}
}
Westerbaan BE (2019), "Dagger and Dilation in the Category of Von Neumann Algebras" , pp. 193. s.n..
BibTeX:
@phdthesis{dis-2019-Westerbaan-a,
  author = {Westerbaan, B. E.},
  title = {Dagger and Dilation in the Category of Von Neumann Algebras},
  publisher = {s.n.},
  year = {2019},
  pages = {193},
  url = {http://hdl.handle.net/2066/201785}
}
Westerbaan A, Westerbaan BE and van de Wetering JMM (2019), "Pure Maps between Euclidean Jordan Algebras", Electronic Proceedings in Theoretical Computer Science. (287), pp. 345-364.
BibTeX:
@article{dis-2019-Westerbaan-b,
  author = {Westerbaan, Abraham and Westerbaan, B. E. and van de Wetering, J. M. M.},
  title = {Pure Maps between Euclidean Jordan Algebras},
  journal = {Electronic Proceedings in Theoretical Computer Science},
  year = {2019},
  number = {287},
  pages = {345--364},
  url = {http://hdl.handle.net/2066/207831}
}
Westerbaan AA (2019), "The Category of Von Neumann Algebras" , pp. 223. s.n..
BibTeX:
@phdthesis{dis-2019-Westerbaan-c,
  author = {Westerbaan, A. A.},
  title = {The Category of Von Neumann Algebras},
  publisher = {s.n.},
  year = {2019},
  pages = {223},
  url = {http://hdl.handle.net/2066/201611}
}
van de Wetering J (2019), "Sequential product spaces are Jordan algebras", Journal of Mathematical Physics. Vol. 60(6), pp. 1-16.
BibTeX:
@article{dis-2019-Wetering-a,
  author = {van de Wetering, John},
  title = {Sequential product spaces are Jordan algebras},
  journal = {Journal of Mathematical Physics},
  year = {2019},
  volume = {60},
  number = {6},
  pages = {1--16},
  note = {Gevonden in WoS met onderzoeker 1330584 Wetering, J.M.M. van de (John) Affil. (Radboud OR Nijmegen) 1 auteurs volgens WoS},
  url = {http://hdl.handle.net/2066/207337}
}
Weterings K, Bromuri S and van Eekelen M (2019), "Explaining Customer Activation with Deep Attention models", In Proceedings of the 27th European Conference on Information Systems (ECIS), Stockholm & Uppsala, Sweden, June 8-14, 2019. , pp. 1-15. Association for Information Systems.
BibTeX:
@inproceedings{dis-2019-Weterings-a,
  author = {Weterings, K. and Bromuri, S. and van Eekelen, M.},
  editor = {Johannesson, P.},
  title = {Explaining Customer Activation with Deep Attention models},
  booktitle = {Proceedings of the 27th European Conference on Information Systems (ECIS), Stockholm & Uppsala, Sweden, June 8-14, 2019},
  publisher = {Association for Information Systems},
  year = {2019},
  pages = {1--15}
}
Wiggers T (2019), "Energy-Efficient ARM64 Cluster with Cryptanalytic Applications - 80 Cores That Do Not Cost You an ARM and a Leg", In Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers. Vol. 11368, pp. 175-188. Springer.
BibTeX:
@inproceedings{dis-2019-Wiggers-a,
  author = {Wiggers, Thom},
  editor = {Lange, Tanja and Dunkelman, Orr},
  title = {Energy-Efficient ARM64 Cluster with Cryptanalytic Applications - 80 Cores That Do Not Cost You an ARM and a Leg},
  booktitle = {Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers},
  publisher = {Springer},
  year = {2019},
  volume = {11368},
  pages = {175--188},
  url = {https://doi.org/10.1007/978-3-030-25283-010},
  doi = {10.1007/978-3-030-25283-0\_10}
}
Wolters PTJ and Jacobs BPF (2019), "The security of access to accounts under the PSD2", Computer Law & Security Review. Vol. 35(1), pp. 29-41.
BibTeX:
@article{dis-2019-Wolters-a,
  author = {Wolters, P. T. J. and Jacobs, B. P. F.},
  title = {The security of access to accounts under the PSD2},
  journal = {Computer Law & Security Review},
  year = {2019},
  volume = {35},
  number = {1},
  pages = {29--41},
  url = {http://hdl.handle.net/2066/200965}
}
Yu R, D'Aquin M, Gasevic D, Kimmerle J, Herder E and Ewerth R (2019), "LILE2019: 8th International Workshop on Learning and Education with Web Data", In WebSci '19 Companion Publication of the 10th ACM Conference on Web Science, Boston, Massachusetts, USA --- June 30 - July 03, 2019. New York , pp. 15-16. ACM.
BibTeX:
@inproceedings{dis-2019-Yu-a,
  author = {Yu, R. and D'Aquin, M. and Gasevic, D. and Kimmerle, J. and Herder, E. and Ewerth, R.},
  title = {LILE2019: 8th International Workshop on Learning and Education with Web Data},
  booktitle = {WebSci '19 Companion Publication of the 10th ACM Conference on Web Science, Boston, Massachusetts, USA --- June 30 - July 03, 2019},
  publisher = {ACM},
  year = {2019},
  pages = {15--16}
}
Zuiderveen Borgesius FJ and Steenbruggen W (2019), "The Right to Communications Confidentiality in Europe: Protecting Privacy, Freedom of Expression, and Trust", Theoretical Inquiries in Law. Vol. 20(1), pp. 291-322.
BibTeX:
@article{dis-2019-ZuiderveenBorgesius-a,
  author = {Zuiderveen Borgesius, F. J. and Steenbruggen, W.},
  title = {The Right to Communications Confidentiality in Europe: Protecting Privacy, Freedom of Expression, and Trust},
  journal = {Theoretical Inquiries in Law},
  year = {2019},
  volume = {20},
  number = {1},
  pages = {291--322},
  url = {http://www7.tau.ac.il/ojs/index.php/til/article/view/1616/1717}
}
Zuiderveen Borgesius FJ, Möller J, Dobber T, Kruikemeier S, Irion K, Stapel S, Fathaigh RÓ, Bodo B and de Vreese C (2019), "Online politieke microtargeting. Een zegen of een vloek voor de democratie?".
BibTeX:
@misc{dis-2019-ZuiderveenBorgesius-b,
  author = {Zuiderveen Borgesius, F. J. and Möller, J. and Dobber, T. and Kruikemeier, S. and Irion, K. and Stapel, S. and Fathaigh, R. Ó and Bodo, B. and de Vreese, C.},
  title = {Online politieke microtargeting. Een zegen of een vloek voor de democratie?},
  publisher = {Nederlands Juristenblad ((NJB)},
  year = {2019},
  pages = {662--669}
}

2018

Adams R and Jacobs B (2018), "A Type Theory for Probabilistic and Bayesian Reasoning", In TYPES 2015: 21st International Conference on Types for Proofs and Programs. Schloss Dagstuhl , pp. 1:1-1:34. Dagstuhl Publishing.
BibTeX:
@inproceedings{dis-2018-Adams-a,
  author = {Adams, R. and Jacobs, B.},
  editor = {Uustalu, T.},
  title = {A Type Theory for Probabilistic and Bayesian Reasoning},
  booktitle = {TYPES 2015: 21st International Conference on Types for Proofs and Programs},
  publisher = {Dagstuhl Publishing},
  year = {2018},
  pages = {1:1--1:34},
  url = {http://hdl.handle.net/2066/191731}
}
Allais GX, Atkey R, Chapman J, McBride C and McKinna J (2018), "A type and scope safe universe of syntaxes with binding: their semantics and proofs", Proceedings of the ACM on Programming Languages. Vol. 2(ICFP), pp. 1-30.
BibTeX:
@article{dis-2018-Allais-a,
  author = {Allais, G. X. and Atkey, R. and Chapman, J. and McBride, C. and McKinna, Jam.},
  title = {A type and scope safe universe of syntaxes with binding: their semantics and proofs},
  journal = {Proceedings of the ACM on Programming Languages},
  year = {2018},
  volume = {2},
  number = {ICFP},
  pages = {1--30},
  url = {http://hdl.handle.net/2066/197728}
}
Ashur T, Eichlseder M, Lauridsen MM, Leurent G, Minaud B, Rotella Y, Sasaki Y and Viguier B (2018), "Cryptanalysis of MORUS", In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II. Vol. 11273, pp. 35-64. Springer.
BibTeX:
@inproceedings{dis-2018-Ashur-a,
  author = {Ashur, Tomer and Eichlseder, Maria and Lauridsen, Martin M. and Leurent, Gaëtan and Minaud, Brice and Rotella, Yann and Sasaki, Yu and Viguier, Benoît},
  editor = {Peyrin, Thomas and Galbraith, Steven D.},
  title = {Cryptanalysis of MORUS},
  booktitle = {Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II},
  publisher = {Springer},
  year = {2018},
  volume = {11273},
  pages = {35--64},
  url = {https://doi.org/10.1007/978-3-030-03329-32},
  doi = {10.1007/978-3-030-03329-3\_2}
}
van Aubel PJM, Colesky M, Hoepman J-H, Poll E and Montes Portela C (2018), "PRIVACY BY DESIGN FOR LOCAL ENERGY COMMUNITIES", In CIRED Workshop 2018 on Microgrids and Local Energy Communities, 7-8 June 2018 Ljubljana, Slovenia. S.l. , pp. 1-4. CIRED.
BibTeX:
@inbook{dis-2018-Aubel-a,
  author = {van Aubel, P. J. M. and Colesky, M. and Hoepman, J.-H. and Poll, E. and Montes Portela, C.},
  title = {PRIVACY BY DESIGN FOR LOCAL ENERGY COMMUNITIES},
  booktitle = {CIRED Workshop 2018 on Microgrids and Local Energy Communities, 7-8 June 2018 Ljubljana, Slovenia},
  publisher = {CIRED},
  year = {2018},
  pages = {1--4},
  url = {http://www.cired.net/publications/workshop2018/pdfs/Submission%200319%20-%20Paper%20(ID-21045).pdf}
}
Bar K, Kissinger A and Vicary J (2018), "GLOBULAR: AN ONLINE PROOF ASSISTANT FOR HIGHER-DIMENSIONAL REWRITING", Logical Methods in Computer Science. Vol. 14(1), pp. 1-18.
BibTeX:
@article{dis-2018-Bar-a,
  author = {Bar, K. and Kissinger, Aleks and Vicary, J.},
  title = {GLOBULAR: AN ONLINE PROOF ASSISTANT FOR HIGHER-DIMENSIONAL REWRITING},
  journal = {Logical Methods in Computer Science},
  year = {2018},
  volume = {14},
  number = {1},
  pages = {1--18},
  url = {http://hdl.handle.net/2066/187701}
}
Batina L, Kühne U and Mentens N (2018), "PROOFS 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with CHES 2018, Amsterdam, The Netherlands, September 13, 2018", In Kalpa Publications in Computing. Vol. 7 EasyChair.
BibTeX:
@inproceedings{dis-2018-Batina-a,
  author = {Batina, Lejla and Kühne, Ulrich and Mentens, Nele},
  title = {PROOFS 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with CHES 2018, Amsterdam, The Netherlands, September 13, 2018},
  booktitle = {Kalpa Publications in Computing},
  publisher = {EasyChair},
  year = {2018},
  volume = {7},
  url = {http://www.easychair.org/publications/volume/PROOFS2018}
}
Bayamlioglu E, Baraliuc I, Janssens L, Hildebrandt M, Tilburg Institute for Law T and (TILT) S (2018), "Being profiled" University of Amsterdam.
BibTeX:
@book{dis-2018-Bayamlioglu-a,
  author = {Bayamlioglu, Emre and Baraliuc, Irina and Janssens, Liisa and Hildebrandt, Mireille and Tilburg Institute for Law, Technology and (TILT), Society},
  title = {Being profiled},
  publisher = {University of Amsterdam},
  year = {2018},
  url = {https://research.tilburguniversity.edu/en/publications/6a1a2e78-7689-46d2-b867-0b1c775b3291}
}
Becker MJ and Jacobs B (2018), "Pas op met het uitwisselen van data, want het kostbaarste dat we hebben staat op het spel: onszelf" , pp. 8-11.
BibTeX:
@article{dis-2018-Becker-a,
  author = {Becker, M. J. and Jacobs, B.},
  title = {Pas op met het uitwisselen van data, want het kostbaarste dat we hebben staat op het spel: onszelf},
  year = {2018},
  pages = {8--11}
}
Berbers Y, Hildebrandt M, Vandewalle J and others (2018), "Privacy in an age of the internet, social networks and Big Data", Standpunten. Vol. 49 KVAB.
BibTeX:
@article{dis-2018-Berbers-a,
  author = {Berbers, Yolande and Hildebrandt, Mireille and Vandewalle, Joos and others},
  title = {Privacy in an age of the internet, social networks and Big Data},
  journal = {Standpunten},
  publisher = {KVAB},
  year = {2018},
  volume = {49}
}
Bertoni G, Daemen J, Peeters M, Van Assche G, Van Keer R and Viguier BGP (2018), "KangarooTwelve: Fast Hashing Based on KECCAK-p", In Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings. Cham , pp. 400-418. Springer International Publishing.
BibTeX:
@inbook{dis-2018-Bertoni-a,
  author = {Bertoni, G. and Daemen, J. and Peeters, M. and Van Assche, G. and Van Keer, R. and Viguier, B. G. P.},
  editor = {Preneel, B.},
  title = {KangarooTwelve: Fast Hashing Based on KECCAK-p},
  booktitle = {Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  publisher = {Springer International Publishing},
  year = {2018},
  pages = {400--418}
}
Bobbert Y (2018), "Dataset of the doctoral thesis ``Improving the maturity of Business Information Security''".
Abstract: This dataset accompanies the the doctoral thesis ``Improving the maturity of Business Information Security``. This research project was executed between 2010 and 2017. This dataset is divided per thesis chapter. Chapter 1 deals with the introduction of the thesis Chapter 2 deals with the research approach and strategies Chapter 3 deals with key concepts Chapter 4 deals with a Group Support System (GSS) and Delphi research into management interventions for BIS Chapter 5 deals with a literature review and Group Support System research into Governance practices for BIS Chapter 6 deals with a Design Science Research into design and development of a BIS artefact Chapter 7 deals with a Design Science Research into demonstrating, evaluating, comparing a BIS artefact Chapter 8 deals with the findings, conclusions and future research
BibTeX:
@misc{dis-2018-Bobbert-a,
  author = {Bobbert, Y.},
  title = {Dataset of the doctoral thesis ``Improving the maturity of Business Information Security''},
  publisher = {DANS EASY},
  year = {2018},
  url = {http://hdl.handle.net/2066/184037}
}
Bobbert Y (2018), "Improving the Maturity of Business Information Security" , pp. 373. s.n..
BibTeX:
@phdthesis{dis-2018-Bobbert-b,
  author = {Bobbert, Y.},
  title = {Improving the Maturity of Business Information Security},
  publisher = {s.n.},
  year = {2018},
  pages = {373},
  url = {http://hdl.handle.net/2066/192437}
}
Bonchi F, Gadducci F, Kissinger A, Sobocinski P and Zanasi F (2018), "Rewriting with Frobenius", In LICS '18: Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, Oxford, United Kingdom --- July 09 - 12, 2018. New York , pp. 165-174. ACM.
BibTeX:
@inbook{dis-2018-Bonchi-a,
  author = {Bonchi, F. and Gadducci, F. and Kissinger, A. and Sobocinski, P. and Zanasi, F.},
  title = {Rewriting with Frobenius},
  booktitle = {LICS '18: Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, Oxford, United Kingdom --- July 09 - 12, 2018},
  publisher = {ACM},
  year = {2018},
  pages = {165--174}
}
Bos J, Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schanck JM, Schwabe P and Stehle D (2018), "CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM", In EuroS&P 2018: 3rd IEEE European Symposium on Security and Privacy, 24-26 April 2018 in London, United Kingdom. Proceedings. Los Alamitos , pp. 1-16. IEEE.
BibTeX:
@inbook{dis-2018-Bos-a,
  author = {Bos, J. and Ducas, L. and Kiltz, E. and Lepoint, T. and Lyubashevsky, V. and Schanck, J. M. and Schwabe, P. and Stehle, D.},
  editor = {O'Conner, L.},
  title = {CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM},
  booktitle = {EuroS&P 2018: 3rd IEEE European Symposium on Security and Privacy, 24-26 April 2018 in London, United Kingdom. Proceedings},
  publisher = {IEEE},
  year = {2018},
  pages = {1--16},
  url = {http://hdl.handle.net/2066/195423}
}
Butz R, Hommersom A and van Eekelen MCJD (2018), "Explaining the Most Probable Explanation", In Scalable Uncertainty Management: 12th International Conference, SUM 2018, Milan, Italy, October 3-5, 2018. Proceedings. Cham , pp. 50-63. Springer.
BibTeX:
@inbook{dis-2018-Butz-a,
  author = {Butz, R. and Hommersom, A. and van Eekelen, M. C. J. D.},
  editor = {Ciucci, D.},
  title = {Explaining the Most Probable Explanation},
  booktitle = {Scalable Uncertainty Management: 12th International Conference, SUM 2018, Milan, Italy, October 3-5, 2018. Proceedings},
  publisher = {Springer},
  year = {2018},
  pages = {50--63}
}
Castryck W, Lange T, Martindale C, Panny L and Renes J (2018), "CSIDH: An Efficient Post-Quantum Commutative Group Action", In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III. Vol. 11274, pp. 395-427. Springer.
BibTeX:
@inproceedings{dis-2018-Castryck-a,
  author = {Castryck, Wouter and Lange, Tanja and Martindale, Chloe and Panny, Lorenz and Renes, Joost},
  editor = {Peyrin, Thomas and Galbraith, Steven D.},
  title = {CSIDH: An Efficient Post-Quantum Commutative Group Action},
  booktitle = {Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III},
  publisher = {Springer},
  year = {2018},
  volume = {11274},
  pages = {395--427},
  url = {https://doi.org/10.1007/978-3-030-03332-315},
  doi = {10.1007/978-3-030-03332-3\_15}
}
Chaves R, Chmielewski Ł, Regazzoni F and Batina L (2018), "SCA-Resistance for AES: How Cheap Can We Go?", In Progress in Cryptology -- AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7--9, 2018, Proceedings. Cham , pp. 107-123. Springer International Publishing.
BibTeX:
@inbook{dis-2018-Chaves-a,
  author = {Chaves, R. and Chmielewski, Ł and Regazzoni, F. and Batina, L.},
  editor = {Joux, A.},
  title = {SCA-Resistance for AES: How Cheap Can We Go?},
  booktitle = {Progress in Cryptology -- AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7--9, 2018, Proceedings},
  publisher = {Springer International Publishing},
  year = {2018},
  pages = {107--123}
}
Chen M-S, Hülsing A, Rijneveld J, Samardjiska S and Schwabe P (2018), "SOFIA: MQ-based signatures in the QROM", In Public-Key Cryptography -- PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II. Berlin , pp. 3-33. Springer.
BibTeX:
@inbook{dis-2018-Chen-a,
  author = {Chen, M.-S. and Hülsing, A. and Rijneveld, J. and Samardjiska, S. and Schwabe, P.},
  editor = {Abdalla, M.},
  title = {SOFIA: MQ-based signatures in the QROM},
  booktitle = {Public-Key Cryptography -- PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II},
  publisher = {Springer},
  year = {2018},
  pages = {3--33}
}
Chen YL, Mennink B and Nandi M (2018), "Short Variable Length Domain Extenders with Beyond Birthday Bound Security", In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I. Vol. 11272, pp. 244-274. Springer.
BibTeX:
@inproceedings{dis-2018-Chen-b,
  author = {Chen, Yu Long and Mennink, Bart and Nandi, Mridul},
  title = {Short Variable Length Domain Extenders with Beyond Birthday Bound Security},
  booktitle = {Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I},
  publisher = {Springer},
  year = {2018},
  volume = {11272},
  pages = {244--274},
  url = {https://doi.org/10.1007/978-3-030-03326-29},
  doi = {10.1007/978-3-030-03326-2\_9}
}
Chothia T, de Ruiter J and Smyth B (2018), "Modelling and Analysis of a Hierarchy of Distance Bounding Attacks", In Proceedings of the 27th USENIX Security Symposium. August 15--17, 2018 - Baltimore, MD, USA. S.l. , pp. 1563-1580. USENIX.
BibTeX:
@inbook{dis-2018-Chothia-a,
  author = {Chothia, T. and de Ruiter, J. and Smyth, B.},
  title = {Modelling and Analysis of a Hierarchy of Distance Bounding Attacks},
  booktitle = {Proceedings of the 27th USENIX Security Symposium. August 15--17, 2018 - Baltimore, MD, USA},
  publisher = {USENIX},
  year = {2018},
  pages = {1563--1580},
  url = {https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-chothia.pdf}
}
Coecke B and Kissinger A (2018), "Picturing Quantum Processes: A First Course on Quantum Theory and Diagrammatic Reasoning", In Diagrammatic Representation and Inference: 10th International Conference, Diagrams 2018, Edinburgh, UK, June 18-22, 2018, Proceedings. Cham , pp. 28-31. Springer International Publishing.
BibTeX:
@inbook{dis-2018-Coecke-a,
  author = {Coecke, B. and Kissinger, A.},
  editor = {Hapman, P.},
  title = {Picturing Quantum Processes: A First Course on Quantum Theory and Diagrammatic Reasoning},
  booktitle = {Diagrammatic Representation and Inference: 10th International Conference, Diagrams 2018, Edinburgh, UK, June 18-22, 2018, Proceedings},
  publisher = {Springer International Publishing},
  year = {2018},
  pages = {28--31}
}
Coecke B and Kissinger A (2018), "QPL 2017: Proceedings 14th International Conference on Quantum Physics and Logic, QPL 2017, Nijmegen, The Netherlands, 3-7 July 2017" S.l. (266), pp. 410. EPTCS.
BibTeX:
@book{dis-2018-Coecke-b,
  author = {Coecke, B. and Kissinger, A.},
  title = {QPL 2017: Proceedings 14th International Conference on Quantum Physics and Logic, QPL 2017, Nijmegen, The Netherlands, 3-7 July 2017},
  publisher = {EPTCS},
  year = {2018},
  number = {266},
  pages = {410},
  url = {https://doi.org/10.4204/EPTCS.266},
  doi = {10.4204/EPTCS.266}
}
Colesky M and Caiza JC (2018), "A System of Privacy Patterns for Informing Users: Creating a Pattern System", In Proceedings of the 23rd European Conference on Pattern Languages of Programs. New York, NY, USA , pp. 16:1-16:11. ACM.
BibTeX:
@inproceedings{dis-2018-Colesky-a,
  author = {Colesky, Michael and Caiza, Julio C.},
  title = {A System of Privacy Patterns for Informing Users: Creating a Pattern System},
  booktitle = {Proceedings of the 23rd European Conference on Pattern Languages of Programs},
  publisher = {ACM},
  year = {2018},
  pages = {16:1--16:11},
  url = {http://doi.acm.org/10.1145/3282308.3282325},
  doi = {10.1145/3282308.3282325}
}
Colesky M, Caiza JC, Del Alamo JM, Hoepman J-H and Martin Y-S (2018), "A System of Privacy Patterns for User Control", In SAC 2018: Proceedings of SAC 2018: Symposium on Applied Computing , Pau, France, April 9--13, 2018 (SAC 2018). New York , pp. 1-7. ACM.
BibTeX:
@inbook{dis-2018-Colesky-b,
  author = {Colesky, M. and Caiza, J. C. and Del Alamo, J. M. and Hoepman, J.-H. and Martin, Y.-S.},
  title = {A System of Privacy Patterns for User Control},
  booktitle = {SAC 2018: Proceedings of SAC 2018: Symposium on Applied Computing , Pau, France, April 9--13, 2018 (SAC 2018)},
  publisher = {ACM},
  year = {2018},
  pages = {1--7},
  url = {http://hdl.handle.net/2066/191709}
}
Cranen S, Keiren JJA and Willemse TAC (2018), "Parity game reductions", Acta Informatica. Vol. 55(5), pp. 401-444.
BibTeX:
@article{dis-2018-Cranen-a,
  author = {Cranen, Sjoerd and Keiren, J. J. A. and Willemse, T. A. C.},
  title = {Parity game reductions},
  journal = {Acta Informatica},
  year = {2018},
  volume = {55},
  number = {5},
  pages = {401--444},
  url = {http://hdl.handle.net/2066/193434}
}
Daemen J, Hoffert S, Assche GV and Keer RV (2018), "The design of Xoodoo and Xoofff", IACR Trans. Symmetric Cryptol.. Vol. 2018(4), pp. 1-38.
BibTeX:
@article{dis-2018-Daemen-a,
  author = {Daemen, Joan and Hoffert, Seth and Assche, Gilles Van and Keer, Ronny Van},
  title = {The design of Xoodoo and Xoofff},
  journal = {IACR Trans. Symmetric Cryptol.},
  year = {2018},
  volume = {2018},
  number = {4},
  pages = {1--38},
  url = {https://doi.org/10.13154/tosc.v2018.i4.1-38},
  doi = {10.13154/tosc.v2018.i4.1-38}
}
Daemen J, Iwata T, Leander NG and Nyberg K (2018), "Symmetric Cryptography (Dagstuhl Seminar 18021)", Dagstuhl Reports. Vol. 8(1), pp. 1-32.
BibTeX:
@article{dis-2018-Daemen-b,
  author = {Daemen, J. and Iwata, T. and Leander, N. G. and Nyberg, K.},
  title = {Symmetric Cryptography (Dagstuhl Seminar 18021)},
  journal = {Dagstuhl Reports},
  year = {2018},
  volume = {8},
  number = {1},
  pages = {1--32}
}
Daemen J, Mennink B and Assche GV (2018), "Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers", IACR Trans. Symmetric Cryptol.. Vol. 2018(4), pp. 197-228.
BibTeX:
@article{dis-2018-Daemen-c,
  author = {Daemen, Joan and Mennink, Bart and Assche, Gilles Van},
  title = {Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers},
  journal = {IACR Trans. Symmetric Cryptol.},
  year = {2018},
  volume = {2018},
  number = {4},
  pages = {197--228},
  url = {https://doi.org/10.13154/tosc.v2018.i4.197-228},
  doi = {10.13154/tosc.v2018.i4.197-228}
}
Daniel L-A, de Ruiter J and Poll E (2018), "Inferring OpenVPN State Machines Using Protocol State Fuzzing", In EUROS&PW 2018: 3rd IEEE European Symposium on Security and Privacy Workshops. 24--26 April 2018, London, United Kingdom. Proceedings. Los Alamitos , pp. 11-19. IEEE.
BibTeX:
@inbook{dis-2018-Daniel-a,
  author = {Daniel, L.-A. and de Ruiter, J. and Poll, E.},
  editor = {Smith, M.},
  title = {Inferring OpenVPN State Machines Using Protocol State Fuzzing},
  booktitle = {EUROS&PW 2018: 3rd IEEE European Symposium on Security and Privacy Workshops. 24--26 April 2018, London, United Kingdom. Proceedings},
  publisher = {IEEE},
  year = {2018},
  pages = {11--19},
  url = {http://hdl.handle.net/2066/195380}
}
Dietze S, D'Aquin M, Gasevic D, Herder E and Kimmerle J (2018), "WebSci'18 Linked Learning 2018, 27 May 2018, VU Amsterdam, The Netherlands. 7th International Workshop on Learning and Education with Web Data (LILE2018)" S.l. , pp. 32. s.n..
BibTeX:
@book{dis-2018-Dietze-a,
  author = {Dietze, S. and D'Aquin, M. and Gasevic, D. and Herder, E. and Kimmerle, J.},
  title = {WebSci'18 Linked Learning 2018, 27 May 2018, VU Amsterdam, The Netherlands. 7th International Workshop on Learning and Education with Web Data (LILE2018)},
  publisher = {s.n.},
  year = {2018},
  pages = {32},
  url = {https://websci18.webscience.org/wp-content/uploads/2018/01/WebSci18_Events_PreProceedings-4-Linked_Learning_2018-lres.pdf}
}
Dinu D and Kizhvatov I (2018), "EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread", IACR Transactions on Cryptographic Hardware and Embedded Systems. Vol. 2018(1), pp. 73-97.
BibTeX:
@article{dis-2018-Dinu-a,
  author = {Dinu, D. and Kizhvatov, I.},
  title = {EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread},
  journal = {IACR Transactions on Cryptographic Hardware and Embedded Systems},
  year = {2018},
  volume = {2018},
  number = {1},
  pages = {73--97},
  url = {http://hdl.handle.net/2066/184425}
}
Ducas L, Lepoint T, Lyubashevsky V, Schwabe P, Seiler G and Stehle D (2018), "CRYSTALS -- Dilithium: Digital Signatures from Module Lattices", IACR Transactions on Symmetric Cryptology. Vol. 2018(1), pp. 238-268.
BibTeX:
@article{dis-2018-Ducas-a,
  author = {Ducas, L. and Lepoint, T. and Lyubashevsky, V. and Schwabe, P. and Seiler, G. and Stehle, D.},
  title = {CRYSTALS -- Dilithium: Digital Signatures from Module Lattices},
  journal = {IACR Transactions on Symmetric Cryptology},
  year = {2018},
  volume = {2018},
  number = {1},
  pages = {238--268},
  url = {http://hdl.handle.net/2066/191703}
}
van Eekelen MCJD (2018), "ECA: Energy Consumption Analysis of software controlled system", Dagstuhl Reports. Vol. 7(7), pp. 84-84.
BibTeX:
@article{dis-2018-Eekelen-a,
  author = {van Eekelen, M. C. J. D.},
  title = {ECA: Energy Consumption Analysis of software controlled system},
  journal = {Dagstuhl Reports},
  year = {2018},
  volume = {7},
  number = {7},
  pages = {84--84},
  url = {http://hdl.handle.net/2066/184424}
}
van Eekelen MCJD and Schop E (2018), "Dit zijn de beste ICT Masters van ons land. Waar moet je wezen om een goede ICT-gerelateerde master te volgen? Interview".
BibTeX:
@misc{dis-2018-Eekelen-b,
  author = {van Eekelen, M. C. J. D. and Schop, E.},
  title = {Dit zijn de beste ICT Masters van ons land. Waar moet je wezen om een goede ICT-gerelateerde master te volgen? Interview},
  publisher = {AG-Connect},
  year = {2018},
  url = {https://www.agconnect.nl/artikel/dit-zijn-de-beste-ict-masters-van-ons-land}
}
Elejalde E, Ferres L and Herder E (2018), "On the nature of real and perceived bias in the mainstream media", PLoS One. Vol. 13(3), pp. 1-28.
BibTeX:
@article{dis-2018-Elejalde-a,
  author = {Elejalde, Erick and Ferres, Leo and Herder, Eelco},
  title = {On the nature of real and perceived bias in the mainstream media},
  journal = {PLoS One},
  year = {2018},
  volume = {13},
  number = {3},
  pages = {1--28},
  url = {http://hdl.handle.net/2066/191018}
}
Elejalde E, Ferres L, Herder E and Bollen J (2018), "Quantifying the ecological diversity and health of online news", Journal of Computational Science. Vol. 27, pp. 218-226.
BibTeX:
@article{dis-2018-Elejalde-b,
  author = {Elejalde, E. and Ferres, L. and Herder, E. and Bollen, J.},
  title = {Quantifying the ecological diversity and health of online news},
  journal = {Journal of Computational Science},
  year = {2018},
  volume = {27},
  pages = {218--226}
}
Erkin Z, Mennink B, Nateghizad M and Maulany C (2018), "Privacy-preserving Distributed Access Control for Medical Data", In ICETE 2018: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, July 26-28, 2018, in Porto, Portugal. Setubal , pp. 322-331. SCITEPRESS.
BibTeX:
@inbook{dis-2018-Erkin-a,
  author = {Erkin, Z. and Mennink, B. and Nateghizad, M. and Maulany, C.},
  editor = {Samarati, P.},
  title = {Privacy-preserving Distributed Access Control for Medical Data},
  booktitle = {ICETE 2018: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, July 26-28, 2018, in Porto, Portugal},
  publisher = {SCITEPRESS},
  year = {2018},
  pages = {322--331},
  url = {http://hdl.handle.net/2066/197708}
}
van Es E, Vranken HPE and Hommersom A (2018), "Denial-of-Service Attacks on LoRaWAN", In ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany --- August 27 - 30, 2018. New York , pp. 1-6. ACM.
BibTeX:
@inbook{dis-2018-Es-a,
  author = {van Es, E. and Vranken, H. P. E. and Hommersom, A.},
  title = {Denial-of-Service Attacks on LoRaWAN},
  booktitle = {ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany --- August 27 - 30, 2018},
  publisher = {ACM},
  year = {2018},
  pages = {1--6},
  note = {Article No. 17}
}
Faust S, Grosso V, Pozo SMD, Paglialonga C and Standaert F-X (2018), "Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model", IACR Transactions on Cryptographic Hardware and Embedded Systems. Vol. 2018(3), pp. 89-120.
BibTeX:
@article{dis-2018-Faust-a,
  author = {Faust, S. and Grosso, V. and Pozo, S. M. D. and Paglialonga, C. and Standaert, F.-X.},
  title = {Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model},
  journal = {IACR Transactions on Cryptographic Hardware and Embedded Systems},
  year = {2018},
  volume = {2018},
  number = {3},
  pages = {89--120}
}
Fehr S, Karpman P and Mennink B (2018), "Short Non-Malleable Codes from Related-Key Secure Block Ciphers", IACR Transactions on Symmetric Cryptology. Vol. 2018(1), pp. 1-17.
BibTeX:
@article{dis-2018-Fehr-a,
  author = {Fehr, S. and Karpman, P. and Mennink, B.},
  title = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers},
  journal = {IACR Transactions on Symmetric Cryptology},
  year = {2018},
  volume = {2018},
  number = {1},
  pages = {1--17},
  url = {http://hdl.handle.net/2066/191733}
}
Ferreira Torres C and Jonker H (2018), "Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications", In Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II. Cham , pp. 60-80. Springer International Publishing.
BibTeX:
@inbook{dis-2018-FerreiraTorres-a,
  author = {Ferreira Torres, C. and Jonker, H.},
  editor = {Lopez, J.},
  title = {Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications},
  booktitle = {Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II},
  publisher = {Springer International Publishing},
  year = {2018},
  pages = {60--80}
}
Fiterau-Brostean P, Poll E, Vaandrager FW, Lenaerts T, de Ruiter JEJ and Verleg P (2018), "Source code and data relevant for the paper 'Model Learning and Model Checking of SSH Implementations'".
BibTeX:
@misc{dis-2018-Fiterau-Brostean-a,
  author = {Fiterau-Brostean, P. and Poll, E. and Vaandrager, F. W. and Lenaerts, T. and de Ruiter, J. E. J. and Verleg, P.},
  title = {Source code and data relevant for the paper 'Model Learning and Model Checking of SSH Implementations'},
  publisher = {DANS EASY},
  year = {2018},
  url = {http://hdl.handle.net/2066/184275}
}
van Gastel P, van Gastel BE and van Eekelen MCJD (2018), "Detecting energy bugs and hotspots in control software using model checking", In Programming'18: Companion Conference Companion of the 2nd International Conference on Art, Science, and Engineering of Programming, Nice, France --- April 09 - 12, 2018. New York , pp. 93-98. ACM.
BibTeX:
@inproceedings{dis-2018-Gastel-a,
  author = {van Gastel, P. and van Gastel, B. E. and van Eekelen, M. C. J. D.},
  editor = {Marr, S.},
  title = {Detecting energy bugs and hotspots in control software using model checking},
  booktitle = {Programming'18: Companion Conference Companion of the 2nd International Conference on Art, Science, and Engineering of Programming, Nice, France --- April 09 - 12, 2018},
  publisher = {ACM},
  year = {2018},
  pages = {93--98}
}
Gregoire B, Papagiannopoulos K, Schwabe P and Stoffelen K (2018), "Vectorizing higher-order masking", In Constructive Side-Channel Analysis and Secure Design: 9th International Workshop, COSADE 2018, Singapore, April 23--24, 2018, Proceedings. Cham , pp. 23-43. Springer.
BibTeX:
@inbook{dis-2018-Gregoire-a,
  author = {Gregoire, B. and Papagiannopoulos, K. and Schwabe, P. and Stoffelen, K.},
  editor = {Fan, J.},
  title = {Vectorizing higher-order masking},
  booktitle = {Constructive Side-Channel Analysis and Secure Design: 9th International Workshop, COSADE 2018, Singapore, April 23--24, 2018, Proceedings},
  publisher = {Springer},
  year = {2018},
  pages = {23--43}
}
Grosso VML and Standaert F-X (2018), "Masking Proofs Are Tight and How to Exploit it in Security Evaluations", In Advances in Cryptology -- EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I. Cham , pp. 385-412. Springer International Publishing.
BibTeX:
@inbook{dis-2018-Grosso-a,
  author = {Grosso, V. M. L. and Standaert, F.-X.},
  editor = {Buus Nielsen, J.},
  title = {Masking Proofs Are Tight and How to Exploit it in Security Evaluations},
  booktitle = {Advances in Cryptology -- EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I},
  publisher = {Springer International Publishing},
  year = {2018},
  pages = {385--412}
}
Hasuo I, Kataoka T and Cho K (2018), "Coinductive predicates and final sequences in a fibration", Mathematical Structures in Computer Science. Vol. 28(4), pp. 562-611.
BibTeX:
@article{dis-2018-Hasuo-a,
  author = {Hasuo, Ichiro and Kataoka, T. and Cho, K.},
  title = {Coinductive predicates and final sequences in a fibration},
  journal = {Mathematical Structures in Computer Science},
  year = {2018},
  volume = {28},
  number = {4},
  pages = {562--611},
  url = {http://hdl.handle.net/2066/189769}
}
Herder E, Bielikova M, Cena F and Desmarais M (2018), "Introduction", New Review of Hypermedia and Multimedia. Vol. 24(3), pp. 131-132.
BibTeX:
@article{dis-2018-Herder-a,
  author = {Herder, E. and Bielikova, M. and Cena, F. and Desmarais, M.},
  title = {Introduction},
  journal = {New Review of Hypermedia and Multimedia},
  year = {2018},
  volume = {24},
  number = {3},
  pages = {131--132}
}
Hildebrandt M (2018), "Law As Computation in the Era of Artificial Legal Intelligence. Speaking Law to the Power of Statistics", University of Toronto Law Journal. Vol. 68(Suppl.1), pp. 12-35.
BibTeX:
@article{dis-2018-Hildebrandt-a,
  author = {Hildebrandt, Mireille},
  title = {Law As Computation in the Era of Artificial Legal Intelligence. Speaking Law to the Power of Statistics},
  journal = {University of Toronto Law Journal},
  year = {2018},
  volume = {68},
  number = {Suppl.1},
  pages = {12--35},
  url = {http://hdl.handle.net/2066/189773}
}
Hildebrandt M (2018), "Preregistration of Machine Learning Research Design. Against P-hacking", In Being profiled. University of Amsterdam.
BibTeX:
@inproceedings{dis-2018-Hildebrandt-b,
  author = {Hildebrandt, Mireille},
  editor = {Bayamlioglu, Emre and Baraliuc, Irina and Janssens, Liisa and Hildebrandt, Mireille and Tilburg Institute for Law, Technology and (TILT), Society},
  title = {Preregistration of Machine Learning Research Design. Against P-hacking},
  booktitle = {Being profiled},
  publisher = {University of Amsterdam},
  year = {2018}
}
Hildebrandt M (2018), "Primitives of Legal Protection in the Era of Data-Driven Platforms", SSRN Electronic Journal. Elsevier BV.
BibTeX:
@article{dis-2018-Hildebrandt-c,
  author = {Hildebrandt, Mireille},
  title = {Primitives of Legal Protection in the Era of Data-Driven Platforms},
  journal = {SSRN Electronic Journal},
  publisher = {Elsevier BV},
  year = {2018},
  url = {https://doi.org/10.2139/ssrn.3140594},
  doi = {10.2139/ssrn.3140594}
}
Hildebrandt M (2018), "Algorithmic regulation and the rule of law", Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences. Vol. 376(2128), pp. 20170355. The Royal Society Publishing.
BibTeX:
@article{dis-2018-Hildebrandt-d,
  author = {Hildebrandt, Mireille},
  title = {Algorithmic regulation and the rule of law},
  journal = {Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences},
  publisher = {The Royal Society Publishing},
  year = {2018},
  volume = {376},
  number = {2128},
  pages = {20170355}
}
Hoepman J-H (2018), "Het gebruik van blockchain technologie in het verkiezingsproces".
BibTeX:
@misc{dis-2018-Hoepman-a,
  author = {Hoepman, J.-H.},
  title = {Het gebruik van blockchain technologie in het verkiezingsproces},
  publisher = {PI.Lab},
  year = {2018},
  url = {https://pilab.nl/onewebmedia/het-gebruik-van-blockchaintechnologie-in-het-verkiezingsproces(3).pdf}
}
Hoepman J-H (2018), "Making Privacy By Design Concrete", In European Cyber Security Perspectives 2018. The Hague , pp. 26-28. KPN CISO Office.
BibTeX:
@inbook{dis-2018-Hoepman-b,
  author = {Hoepman, J.-H.},
  title = {Making Privacy By Design Concrete},
  booktitle = {European Cyber Security Perspectives 2018},
  publisher = {KPN CISO Office},
  year = {2018},
  pages = {26--28},
  url = {https://overons.kpn/content/downloads/news/Brochure_Cyber_security_2018_web.pdf}
}
Hoepman J-H (2018), "Privacy Design Strategies (The Little Blue Book)" Nijmegen , pp. 27. Radboud University.
BibTeX:
@book{dis-2018-Hoepman-c,
  author = {Hoepman, J.-H.},
  title = {Privacy Design Strategies (The Little Blue Book)},
  publisher = {Radboud University},
  year = {2018},
  pages = {27},
  url = {http://hdl.handle.net/2066/195397}
}
Hoepman J-H (2018), "Privacyontwerpstrategieën (Het Blauwe Boekje)" Nijmegen , pp. 29. Radboud Universiteit.
BibTeX:
@book{dis-2018-Hoepman-d,
  author = {Hoepman, J.-H.},
  title = {Privacyontwerpstrategieën (Het Blauwe Boekje)},
  publisher = {Radboud Universiteit},
  year = {2018},
  pages = {29},
  url = {http://hdl.handle.net/2066/195398}
}
Hülsing A, Butin D, Gazdag S-L, Rijneveld J and Mohaisen A (2018), "XMSS: eXtended Merkle Signature Scheme".
BibTeX:
@misc{dis-2018-Huelsing-a,
  author = {Hülsing, A. and Butin, D. and Gazdag, S.-L. and Rijneveld, J. and Mohaisen, A.},
  title = {XMSS: eXtended Merkle Signature Scheme},
  publisher = {RFC},
  year = {2018},
  url = {https://doi.org/10.17487/RFC8391},
  doi = {10.17487/RFC8391}
}
Jacobs B (2018), "A Note on Distances between Probabilistic and Quantum distributions", Electronic Notes in Theoretical Computer Science. Vol. 336, pp. 173-187.
BibTeX:
@article{dis-2018-Jacobs-a,
  author = {Jacobs, Bart},
  title = {A Note on Distances between Probabilistic and Quantum distributions},
  journal = {Electronic Notes in Theoretical Computer Science},
  year = {2018},
  volume = {336},
  pages = {173--187}
}
Jacobs B (2018), "AVG & eID".
BibTeX:
@misc{dis-2018-Jacobs-b,
  author = {Jacobs, B.},
  title = {AVG & eID},
  publisher = {iBestuur Online},
  year = {2018},
  url = {https://ibestuur.nl/weblog/avg-eid}
}
Jacobs B (2018), "An Update on Updating". 2018, 2018.
BibTeX:
@misc{dis-2018-Jacobs-c,
  author = {Jacobs, B.},
  title = {An Update on Updating},
  year = {2018},
  note = {unpublished conference paper},
  url = {http://www.cs.ru.nl/B.Jacobs/TALKS/quantum-interaction.pdf}
}
Jacobs B (2018), "Attribute-based Authentication and Signing with IRMA, Summer School on real-world crypto and privacy,". 2018, 2018.
BibTeX:
@misc{dis-2018-Jacobs-d,
  author = {Jacobs, B.},
  title = {Attribute-based Authentication and Signing with IRMA, Summer School on real-world crypto and privacy,},
  year = {2018},
  note = {unpublished conference paper},
  url = {https://summerschool-croatia.cs.ru.nl/2018/slides/Attribute-based%20identity%20management.pdf}
}
Jacobs B (2018), "Categorical aspects of Parameter Learning". 2018, 2018.
BibTeX:
@misc{dis-2018-Jacobs-e,
  author = {Jacobs, B.},
  title = {Categorical aspects of Parameter Learning},
  year = {2018},
  note = {unpublished conference paper},
  url = {http://www.cs.ru.nl/B.Jacobs/TALKS/learning.pdf}
}
Jacobs B (2018), "Coalgebras and Kleisli Maps for Probability, Invited talk at Coalgebra Now workshop at FLOCS'18, Oxford, 8/7/2018.". 2018, 2018.
BibTeX:
@misc{dis-2018-Jacobs-f,
  author = {Jacobs, B.},
  title = {Coalgebras and Kleisli Maps for Probability, Invited talk at Coalgebra Now workshop at FLOCS'18, Oxford, 8/7/2018.},
  year = {2018},
  note = {unpublished conference paper},
  url = {http://www.cs.ru.nl/B.Jacobs/TALKS/coalgebra-now.pdf}
}
Jacobs B (2018), "Een blockchain aan je been", Surf. Magazine over ICT voor het Hoger Onderwijs en Onderzoek. Vol. 2018(1), pp. 07-07.
BibTeX:
@article{dis-2018-Jacobs-g,
  author = {Jacobs, B.},
  title = {Een blockchain aan je been},
  journal = {Surf. Magazine over ICT voor het Hoger Onderwijs en Onderzoek},
  year = {2018},
  volume = {2018},
  number = {1},
  pages = {07--07},
  url = {http://hdl.handle.net/2066/191713}
}
Jacobs B (2018), "From probability monads to commutative effectuses", Journal of Logical and Algebraic Methods in Programming. Vol. 94, pp. 200-237.
BibTeX:
@article{dis-2018-Jacobs-h,
  author = {Jacobs, Bart},
  title = {From probability monads to commutative effectuses},
  journal = {Journal of Logical and Algebraic Methods in Programming},
  year = {2018},
  volume = {94},
  pages = {200--237},
  url = {http://hdl.handle.net/2066/182000}
}
Jacobs B (2018), "Gespetter en gesputter met de AVG".
BibTeX:
@misc{dis-2018-Jacobs-i,
  author = {Jacobs, B.},
  title = {Gespetter en gesputter met de AVG},
  publisher = {iBestuur Online},
  year = {2018},
  url = {https://ibestuur.nl/weblog/gespetter-en-gesputter-met-de-avg}
}
Jacobs B (2018), "Het woord is aan de Goeroe".
BibTeX:
@misc{dis-2018-Jacobs-j,
  author = {Jacobs, B.},
  title = {Het woord is aan de Goeroe},
  year = {2018},
  url = {https://www.bnr.nl/podcast/gdpr/10340046/het-woord-is-aan-de-goeroe}
}
Jacobs B, Levy P and Rot J (2018), "Steps and Traces", In Coalgebraic Methods in Computer Science: 14th IFIP WG 1.3 International Workshop, CMCS 2018, Colocated with ETAPS 2018, Thessaloniki, Greece, April 14--15, 2018. Revised Selected Papers. Cham Vol. 11202, pp. 122-143. Springer.
BibTeX:
@inproceedings{dis-2018-Jacobs-k,
  author = {Jacobs, B. and Levy, P. and Rot, J.},
  editor = {Cirstea, C.},
  title = {Steps and Traces},
  booktitle = {Coalgebraic Methods in Computer Science: 14th IFIP WG 1.3 International Workshop, CMCS 2018, Colocated with ETAPS 2018, Thessaloniki, Greece, April 14--15, 2018. Revised Selected Papers},
  publisher = {Springer},
  year = {2018},
  volume = {11202},
  pages = {122--143}
}
Jongmans SSTQ and Arbab F (2018), "Centralized coordination vs. partially-distributed coordination with Reo and constraint automata", Science of Computer Programming. Vol. 160, pp. 48-77.
BibTeX:
@article{dis-2018-Jongmans-a,
  author = {Jongmans, S. S. T. Q. and Arbab, F.},
  title = {Centralized coordination vs. partially-distributed coordination with Reo and constraint automata},
  journal = {Science of Computer Programming},
  year = {2018},
  volume = {160},
  pages = {48--77}
}
Kannwischer MJ, Genêt A, Butin D, Krämer J and Buchmann J (2018), "Differential Power Analysis of XMSS and SPHINCS", In Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings. Vol. 10815, pp. 168-188. Springer.
BibTeX:
@inproceedings{dis-2018-Kannwischer-a,
  author = {Kannwischer, Matthias J. and Genêt, Aymeric and Butin, Denis and Krämer, Juliane and Buchmann, Johannes},
  editor = {Fan, Junfeng and Gierlichs, Benedikt},
  title = {Differential Power Analysis of XMSS and SPHINCS},
  booktitle = {Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings},
  publisher = {Springer},
  year = {2018},
  volume = {10815},
  pages = {168--188},
  url = {https://doi.org/10.1007/978-3-319-89641-010},
  doi = {10.1007/978-3-319-89641-0\_10}
}
Kiljan S, Vranken H and van Eekelen MCJD (2018), "Evaluation of transaction authentication methods for online banking", Future Generation Computer Systems. Vol. 80, pp. 430-447.
BibTeX:
@article{dis-2018-Kiljan-a,
  author = {Kiljan, S. and Vranken, H. and van Eekelen, M. C. J. D.},
  title = {Evaluation of transaction authentication methods for online banking},
  journal = {Future Generation Computer Systems},
  year = {2018},
  volume = {80},
  pages = {430--447}
}
Kissinger A (2018), "Diagram Transformations Give a New Handle on Quantum Circuits and Foundations", Ercim News. Vol. 2018(112), pp. 24-26.
BibTeX:
@article{dis-2018-Kissinger-a,
  author = {Kissinger, A.},
  title = {Diagram Transformations Give a New Handle on Quantum Circuits and Foundations},
  journal = {Ercim News},
  year = {2018},
  volume = {2018},
  number = {112},
  pages = {24--26},
  url = {https://ercim-news.ercim.eu/en112/special/diagram-transformations-give-a-new-handle-on-quantum-circuits-and-foundations}
}
Koens T and Poll E (2018), "What Blockchain Alternative Do You Need?", In Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings. Cham , pp. 113-129. Springer.
BibTeX:
@inbook{dis-2018-Koens-a,
  author = {Koens, T. and Poll, E.},
  editor = {Garcia-Alfaro, J.},
  title = {What Blockchain Alternative Do You Need?},
  booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  publisher = {Springer},
  year = {2018},
  pages = {113--129}
}
Koens T and Poll E (2018), "The Drivers Behind Blockchain Adoption: The Rationality of Irrational Choices", In Euro-Par 2018: Parallel Processing Workshops - Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers. Vol. 11339, pp. 535-546. Springer.
BibTeX:
@inproceedings{dis-2018-Koens-b,
  author = {Koens, Tommy and Poll, Erik},
  editor = {Mencagli, Gabriele and Heras, Dora B. and Cardellini, Valeria and Casalicchio, Emiliano and Jeannot, Emmanuel and Wolf, Felix and Salis, Antonio and Schifanella, Claudio and Manumachu, Ravi Reddy and Ricci, Laura and Beccuti, Marco and Antonelli, Laura and Sanchez, José Daniel Garcia and Scott, Stephen L.},
  title = {The Drivers Behind Blockchain Adoption: The Rationality of Irrational Choices},
  booktitle = {Euro-Par 2018: Parallel Processing Workshops - Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers},
  publisher = {Springer},
  year = {2018},
  volume = {11339},
  pages = {535--546},
  url = {https://doi.org/10.1007/978-3-030-10549-542},
  doi = {10.1007/978-3-030-10549-5\_42}
}
Konoth RK, Vineti E, Moonsamy V, Lindorfer M, Kruegel C, Bos H and Vigna G (2018), "MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense", In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018. , pp. 1714-1730. ACM.
BibTeX:
@inproceedings{dis-2018-Konoth-a,
  author = {Konoth, Radhesh Krishnan and Vineti, Emanuele and Moonsamy, Veelasha and Lindorfer, Martina and Kruegel, Christopher and Bos, Herbert and Vigna, Giovanni},
  editor = {Lie, David and Mannan, Mohammad and Backes, Michael and Wang, XiaoFeng},
  title = {MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense},
  booktitle = {Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018},
  publisher = {ACM},
  year = {2018},
  pages = {1714--1730},
  url = {https://doi.org/10.1145/3243734.3243858},
  doi = {10.1145/3243734.3243858}
}
Krohnke L, Jansen J and Vranken HPE (2018), "Resilience of the Domain Name System: A case study of the .nl-domain", Computer Networks-The International Journal of Computer and Telecommunications Networking. Vol. 139, pp. 136-150.
BibTeX:
@article{dis-2018-Krohnke-a,
  author = {Krohnke, Lars and Jansen, Jelte and Vranken, H. P. E.},
  title = {Resilience of the Domain Name System: A case study of the .nl-domain},
  journal = {Computer Networks-The International Journal of Computer and Telecommunications Networking},
  year = {2018},
  volume = {139},
  pages = {136--150},
  url = {http://hdl.handle.net/2066/193092}
}
Kronjee J, Hommersom A and Vranken HPE (2018), "Discovering software vulnerabilities using data-flow analysis and machine learning", In ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany --- August 27 - 30, 2018. New York , pp. 6-1 - 6-10. ACM.
BibTeX:
@inbook{dis-2018-Kronjee-a,
  author = {Kronjee, J. and Hommersom, A. and Vranken, H. P. E.},
  title = {Discovering software vulnerabilities using data-flow analysis and machine learning},
  booktitle = {ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany --- August 27 - 30, 2018},
  publisher = {ACM},
  year = {2018},
  pages = {6--1 - 6-10},
  note = {Article No. 6}
}
Laan E, Poll E, Rijneveld J, de Ruiter J, Schwabe P and Verschuren J (2018), "Is Java Card Ready for Hash-Based Signatures?", In Advances in Information and Computer Security: 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings. Cham , pp. 127-142. Springer International Publishing.
BibTeX:
@inbook{dis-2018-Laan-a,
  author = {Laan, E. and Poll, E. and Rijneveld, J. and de Ruiter, J. and Schwabe, P. and Verschuren, J.},
  editor = {Inomata, A.},
  title = {Is Java Card Ready for Hash-Based Signatures?},
  booktitle = {Advances in Information and Computer Security: 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings},
  publisher = {Springer International Publishing},
  year = {2018},
  pages = {127--142}
}
Lee J, Luykx A, Mennink B and Minematsu K (2018), "Connecting tweakable and multi-key blockcipher security", Designs, Codes and Cryptography. Vol. 86(3), pp. 623-640.
BibTeX:
@article{dis-2018-Lee-a,
  author = {Lee, Jooyoung and Luykx, A. and Mennink, Bart and Minematsu, Kazuhiko},
  title = {Connecting tweakable and multi-key blockcipher security},
  journal = {Designs, Codes and Cryptography},
  year = {2018},
  volume = {86},
  number = {3},
  pages = {623--640},
  url = {http://hdl.handle.net/2066/186432}
}
Leeu M, Pieterse V and van Eekelen MCJD (2018), "How personality diversity influences team performance in student software engineering teams", In ICTAS: 2018 Conference on Information Communications Technology and Society, 8-9 March 2018 Durban, South Africa. Proceedings. Piscataway , pp. 1-6. IEEE.
BibTeX:
@inproceedings{dis-2018-Leeu-a,
  author = {Leeu, M. and Pieterse, V. and van Eekelen, M. C. J. D.},
  editor = {Millham, R.},
  title = {How personality diversity influences team performance in student software engineering teams},
  booktitle = {ICTAS: 2018 Conference on Information Communications Technology and Society, 8-9 March 2018 Durban, South Africa. Proceedings},
  publisher = {IEEE},
  year = {2018},
  pages = {1--6}
}
Linden Tvd and Walree TF (2018), "De collectieve procedure als oplossing voor het privaatrechtelijke handhavingstekort bij een datalek?", Aansprakelijkheid Verzekering en Schade,. Vol. 19(4), pp. 105-113.
BibTeX:
@article{dis-2018-Linden-a,
  author = {Linden, T.E. van der and Walree, T. F.},
  title = {De collectieve procedure als oplossing voor het privaatrechtelijke handhavingstekort bij een datalek?},
  journal = {Aansprakelijkheid Verzekering en Schade,},
  year = {2018},
  volume = {19},
  number = {4},
  pages = {105--113}
}
Maldini A, Samwel N, Picek S and Batina L (2018), "Genetic Algorithm-Based Electromagnetic Fault Injection", In 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2018, Amsterdam, The Netherlands, September 13, 2018. , pp. 35-42. IEEE Computer Society.
BibTeX:
@inproceedings{dis-2018-Maldini-a,
  author = {Maldini, Antun and Samwel, Niels and Picek, Stjepan and Batina, Lejla},
  title = {Genetic Algorithm-Based Electromagnetic Fault Injection},
  booktitle = {2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2018, Amsterdam, The Netherlands, September 13, 2018},
  publisher = {IEEE Computer Society},
  year = {2018},
  pages = {35--42},
  url = {https://doi.org/10.1109/FDTC.2018.00014},
  doi = {10.1109/FDTC.2018.00014}
}
McMahonStone C, Chothia T and de Ruiter J (2018), "Extending Automated Protocol State Learning for the 802.11 4-Way Handshake", In Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I. Cham , pp. 325-345. Springer International Publishing.
BibTeX:
@inbook{dis-2018-McMahonStone-a,
  author = {McMahonStone, C. and Chothia, T. and de Ruiter, J.},
  editor = {Lopez, J.},
  title = {Extending Automated Protocol State Learning for the 802.11 4-Way Handshake},
  booktitle = {Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I},
  publisher = {Springer International Publishing},
  year = {2018},
  pages = {325--345}
}
Mennink B (2018), "The Relation Between CENC and NEMO", In Cryptology and Network Security: 17th International Conference, CANS 2018, Naples, Italy, September 30 -- October 3, 2018, Proceedings. Cham Vol. 11124, pp. 177-189. Springer International Publishing.
BibTeX:
@inproceedings{dis-2018-Mennink-a,
  author = {Mennink, B.},
  editor = {Camenisch, J.},
  title = {The Relation Between CENC and NEMO},
  booktitle = {Cryptology and Network Security: 17th International Conference, CANS 2018, Naples, Italy, September 30 -- October 3, 2018, Proceedings},
  publisher = {Springer International Publishing},
  year = {2018},
  volume = {11124},
  pages = {177--189}
}
Mennink B (2018), "Towards Tight Security of Cascaded LRW2", In Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India, November 11--14, 2018. Cham Vol. 11240, pp. 192-222. Springer.
BibTeX:
@inproceedings{dis-2018-Mennink-b,
  author = {Mennink, B.},
  editor = {Beimel, A.},
  title = {Towards Tight Security of Cascaded LRW2},
  booktitle = {Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India, November 11--14, 2018},
  publisher = {Springer},
  year = {2018},
  volume = {11240},
  pages = {192--222}
}
Mennink B (2018), "Key Prediction Security of Keyed Sponges", IACR Trans. Symmetric Cryptol.. Vol. 2018(4), pp. 128-149.
BibTeX:
@article{dis-2018-Mennink-c,
  author = {Mennink, Bart},
  title = {Key Prediction Security of Keyed Sponges},
  journal = {IACR Trans. Symmetric Cryptol.},
  year = {2018},
  volume = {2018},
  number = {4},
  pages = {128--149},
  url = {https://doi.org/10.13154/tosc.v2018.i4.128-149},
  doi = {10.13154/tosc.v2018.i4.128-149}
}
Mols B and van Eekelen MCJD (2018), "Tunnels bewezen veiliger maken", I/O Magazine. Vol. 15(3), pp. 20-21.
BibTeX:
@article{dis-2018-Mols-a,
  author = {Mols, B. and van Eekelen, M. C. J. D.},
  title = {Tunnels bewezen veiliger maken},
  journal = {I/O Magazine},
  year = {2018},
  volume = {15},
  number = {3},
  pages = {20--21},
  url = {http://hdl.handle.net/2066/197730}
}
Oldenhave D, Sauren J, van der Weide T and Hoppenbrouwers S (2018), "Evaluating the Persuasive and Motivational Design Method: Supporting Design for Sustainable Behavior Change", Complex Systems Informatics and Modeling Quarterly. Vol. 2018(16), pp. 1-16.
BibTeX:
@article{dis-2018-Oldenhave-a,
  author = {Oldenhave, D. and Sauren, J. and van der Weide, T. and Hoppenbrouwers, S.},
  title = {Evaluating the Persuasive and Motivational Design Method: Supporting Design for Sustainable Behavior Change},
  journal = {Complex Systems Informatics and Modeling Quarterly},
  year = {2018},
  volume = {2018},
  number = {16},
  pages = {1--16}
}
Panagiotou M, Papagiannopoulos K, Rohling JH, Meijer JH and Deboer T (2018), "How Old Is Your Brain? Slow-Wave Activity in Non-rapid-eye-movement Sleep as a Marker of Brain Rejuvenation After Long-Term Exercise in Mice", Frontiers in Aging Neuroscience. Vol. 10, pp. 1-15.
BibTeX:
@article{dis-2018-Panagiotou-a,
  author = {Panagiotou, Maria and Papagiannopoulos, K. and Rohling, Jos H.T. and Meijer, Johanna H. and Deboer, Tom},
  title = {How Old Is Your Brain? Slow-Wave Activity in Non-rapid-eye-movement Sleep as a Marker of Brain Rejuvenation After Long-Term Exercise in Mice},
  journal = {Frontiers in Aging Neuroscience},
  year = {2018},
  volume = {10},
  pages = {1--15},
  url = {http://hdl.handle.net/2066/194618}
}
Papagiannopoulos K (2018), "Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information", IACR Trans. Cryptogr. Hardw. Embed. Syst.. Vol. 2018(3), pp. 524-546.
BibTeX:
@article{dis-2018-Papagiannopoulos-a,
  author = {Papagiannopoulos, Kostas},
  title = {Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information},
  journal = {IACR Trans. Cryptogr. Hardw. Embed. Syst.},
  year = {2018},
  volume = {2018},
  number = {3},
  pages = {524--546},
  url = {https://doi.org/10.13154/tches.v2018.i3.524-546},
  doi = {10.13154/tches.v2018.i3.524-546}
}
Pirotte N, Vliegen J, Batina L and Mentens N (2018), "Design of a Fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves", In DSD 2018: 21st Euromicro Conference on Digital System Design, 29 - 31 August 2018 Prague, Czech Republic. Proceedings. Los Alamitos , pp. 545-552. IEEE.
BibTeX:
@inproceedings{dis-2018-Pirotte-a,
  author = {Pirotte, N. and Vliegen, J. and Batina, L. and Mentens, N.},
  editor = {Novotny, M.},
  title = {Design of a Fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves},
  booktitle = {DSD 2018: 21st Euromicro Conference on Digital System Design, 29 - 31 August 2018 Prague, Czech Republic. Proceedings},
  publisher = {IEEE},
  year = {2018},
  pages = {545--552}
}
Poll E (2018), "(Some) Security by Construction Through a LangSec Approach (X-by-Construction)", In Leveraging Applications of Formal Methods, Verification and Validation. Modeling 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part I. Cham , pp. XI-XII. Springer.
BibTeX:
@inbook{dis-2018-Poll-a,
  author = {Poll, E.},
  editor = {Margaria, T.},
  title = {(Some) Security by Construction Through a LangSec Approach (X-by-Construction)},
  booktitle = {Leveraging Applications of Formal Methods, Verification and Validation. Modeling 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part I},
  publisher = {Springer},
  year = {2018},
  pages = {XI--XII},
  url = {https://link.springer.com/content/pdf/bfm%3A978-3-030-03418-4%2F1.pdf}
}
Poll E (2018), "LangSec revisited: input security flaws of the second kind", In SPW 2018: 2018 IEEE Symposium on Security and Privacy Workshops, 24 May 2018 San Francisco, California, USA. Proceedings. New York , pp. 329-334. IEEE.
BibTeX:
@inbook{dis-2018-Poll-b,
  author = {Poll, E.},
  editor = {Ciocarlie, G.},
  title = {LangSec revisited: input security flaws of the second kind},
  booktitle = {SPW 2018: 2018 IEEE Symposium on Security and Privacy Workshops, 24 May 2018 San Francisco, California, USA. Proceedings},
  publisher = {IEEE},
  year = {2018},
  pages = {329--334},
  url = {http://hdl.handle.net/2066/195385}
}
Quraishi M, Fafalios P and Herder E (2018), "Viewpoint Discovery and Understanding in Social Networks", In WebSci '18: Proceedings of the 10th ACM Conference on Web Science, Amsterdam, Netherlands --- May 27 - 30, 2018. New York , pp. 47-56. ACM.
BibTeX:
@inbook{dis-2018-Quraishi-a,
  author = {Quraishi, M. and Fafalios, P. and Herder, E.},
  editor = {Akkermans, H.},
  title = {Viewpoint Discovery and Understanding in Social Networks},
  booktitle = {WebSci '18: Proceedings of the 10th ACM Conference on Web Science, Amsterdam, Netherlands --- May 27 - 30, 2018},
  publisher = {ACM},
  year = {2018},
  pages = {47--56}
}
Renes J (2018), "Computing Isogenies Between Montgomery Curves Using the Action of (0, 0)", In Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings. Cham Vol. 10786, pp. 229-247. Springer International Publishing.
BibTeX:
@inproceedings{dis-2018-Renes-a,
  author = {Renes, J.},
  editor = {Lange, T.},
  title = {Computing Isogenies Between Montgomery Curves Using the Action of (0, 0)},
  booktitle = {Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  publisher = {Springer International Publishing},
  year = {2018},
  volume = {10786},
  pages = {229--247}
}
Rennela M and Staton S (2018), "Classical Control and Quantum Circuits in Enriched Category Theory", Electronic Notes in Theoretical Computer Science. Vol. 336, pp. 257-279.
BibTeX:
@article{dis-2018-Rennela-a,
  author = {Rennela, M. and Staton, Sam},
  title = {Classical Control and Quantum Circuits in Enriched Category Theory},
  journal = {Electronic Notes in Theoretical Computer Science},
  year = {2018},
  volume = {336},
  pages = {257--279}
}
Rokicki M, Trattner C and Herder E (2018), "The Impact of Recipe Features, Social Cues and Demographics on Estimating the Healthiness of Online Recipes", In Proceedings of the Twelfth International Conference on Web and Social Media, ICWSM 2018, Stanford, California, USA, June 25-28, 2018.. , pp. 310-319. AAAI Press.
BibTeX:
@inproceedings{dis-2018-Rokicki-a,
  author = {Rokicki, Markus and Trattner, Christoph and Herder, Eelco},
  title = {The Impact of Recipe Features, Social Cues and Demographics on Estimating the Healthiness of Online Recipes},
  booktitle = {Proceedings of the Twelfth International Conference on Web and Social Media, ICWSM 2018, Stanford, California, USA, June 25-28, 2018.},
  publisher = {AAAI Press},
  year = {2018},
  pages = {310--319},
  url = {https://aaai.org/ocs/index.php/ICWSM/ICWSM18/paper/view/17900}
}
van Roosmalen J, Vranken HPE and van Eekelen MCJD (2018), "Applying Deep Learning on Packet Flows for Botnet Detection", In SAC18: The 17th edition of the Computer Security track at the 33rd ACM Symposium on Applied Computing, 9-13 April 2018, Pau, France. New York , pp. 1629-1637. ACM.
BibTeX:
@inproceedings{dis-2018-Roosmalen-a,
  author = {van Roosmalen, J. and Vranken, H. P. E. and van Eekelen, M. C. J. D.},
  editor = {Haddad, H. H.},
  title = {Applying Deep Learning on Packet Flows for Botnet Detection},
  booktitle = {SAC18: The 17th edition of the Computer Security track at the 33rd ACM Symposium on Applied Computing, 9-13 April 2018, Pau, France},
  publisher = {ACM},
  year = {2018},
  pages = {1629--1637}
}
Roubtsova E, Roubtsov S and Alpár G (2018), "Presence Patterns and Privacy Analysis", In Business Modeling and Software Design: 8th International Symposium, BMSD 2018, Vienna, Austria, July 2-4, 2018, Proceedings. Cham Vol. 319, pp. 298-307. Springer International Publishing.
BibTeX:
@inproceedings{dis-2018-Roubtsova-a,
  author = {Roubtsova, E. and Roubtsov, S. and Alpár, G.},
  editor = {Shishkov, B.},
  title = {Presence Patterns and Privacy Analysis},
  booktitle = {Business Modeling and Software Design: 8th International Symposium, BMSD 2018, Vienna, Austria, July 2-4, 2018, Proceedings},
  publisher = {Springer International Publishing},
  year = {2018},
  volume = {319},
  pages = {298--307}
}
Samwel N and Batina L (2018), "Practical Fault Injection on Deterministic Signatures: The Case of EdDSA", In Progress in Cryptology -- AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7--9, 2018, Proceedings. Cham , pp. 306-321. Springer International Publishing.
BibTeX:
@inbook{dis-2018-Samwel-a,
  author = {Samwel, N. and Batina, L.},
  editor = {Joux, A.},
  title = {Practical Fault Injection on Deterministic Signatures: The Case of EdDSA},
  booktitle = {Progress in Cryptology -- AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7--9, 2018, Proceedings},
  publisher = {Springer International Publishing},
  year = {2018},
  pages = {306--321}
}
Samwel N, Batina L, Bertoni G, Daemen J and Susella R (2018), "Breaking Ed25519 in WolfSSL", In Topics in Cryptology -- CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. Cham Vol. 10808, pp. 1-20. Springer International Publishing.
BibTeX:
@inproceedings{dis-2018-Samwel-b,
  author = {Samwel, N. and Batina, L. and Bertoni, G. and Daemen, J. and Susella, R.},
  editor = {Smart, N. P.},
  title = {Breaking Ed25519 in WolfSSL},
  booktitle = {Topics in Cryptology -- CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings},
  publisher = {Springer International Publishing},
  year = {2018},
  volume = {10808},
  pages = {1--20}
}
Serban AC, Poll E and Visser J (2018), "A Security Analysis of the ETSI ITS Vehicular Communications", In Computer Safety, Reliability, and Security: SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Västerås, Sweden, September 18, 2018. Proceedings. Berlin Vol. 11094, pp. 365-373. Springer International Publishing.
BibTeX:
@inproceedings{dis-2018-Serban-a,
  author = {Serban, A. C. and Poll, E. and Visser, J.},
  editor = {Gallina, B.},
  title = {A Security Analysis of the ETSI ITS Vehicular Communications},
  booktitle = {Computer Safety, Reliability, and Security: SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Västerås, Sweden, September 18, 2018. Proceedings},
  publisher = {Springer International Publishing},
  year = {2018},
  volume = {11094},
  pages = {365--373},
  url = {http://hdl.handle.net/2066/195258}
}
Serban AC, Poll E and Visser J (2018), "A standard driven functional software architecture for fully autonomous vehicles", In ICSA-C 2018:2018 IEEE 15th International Conference on Software Architecture Companion, 30 April -- 4 May 2018 Seattle, Washington Los Alamitos. Proceedings. Los Alamitos , pp. 120-127. IEEE.
BibTeX:
@inbook{dis-2018-Serban-b,
  author = {Serban, A. C. and Poll, E. and Visser, J.},
  title = {A standard driven functional software architecture for fully autonomous vehicles},
  booktitle = {ICSA-C 2018:2018 IEEE 15th International Conference on Software Architecture Companion, 30 April -- 4 May 2018 Seattle, Washington Los Alamitos. Proceedings},
  publisher = {IEEE},
  year = {2018},
  pages = {120--127},
  url = {http://hdl.handle.net/2066/195379}
}
Serban AC, Poll E and Visser J (2018), "Tactical Safety Reasoning. A Case for Autonomous Vehicles", In 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal 3-6 June 2018. Proceedings. Los Alamitos , pp. 1-5. IEEE.
BibTeX:
@inproceedings{dis-2018-Serban-c,
  author = {Serban, A. C. and Poll, E. and Visser, J.},
  editor = {Cruz, J. R.},
  title = {Tactical Safety Reasoning. A Case for Autonomous Vehicles},
  booktitle = {2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal 3-6 June 2018. Proceedings},
  publisher = {IEEE},
  year = {2018},
  pages = {1--5},
  url = {http://hdl.handle.net/2066/195306}
}
Shkaravska O and van Eekelen MCJD (2018), "Polynomial solutions of algebraic dierence equations and homogeneous symmetric polynomials" Nijmegen ICIS.
BibTeX:
@techreport{dis-2018-Shkaravska-a,
  author = {Shkaravska, O. and van Eekelen, M. C. J. D.},
  title = {Polynomial solutions of algebraic dierence equations and homogeneous symmetric polynomials},
  publisher = {ICIS},
  year = {2018},
  url = {http://hdl.handle.net/2066/197704}
}
Spreitzer R, Moonsamy V, Korak T and Mangard S (2018), "Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices", IEEE Communications Surveys and Tutorials. Vol. 20(1), pp. 465-488.
BibTeX:
@article{dis-2018-Spreitzer-a,
  author = {Spreitzer, Raphael and Moonsamy, V. and Korak, Thomas and Mangard, Stefan},
  title = {Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices},
  journal = {IEEE Communications Surveys and Tutorials},
  year = {2018},
  volume = {20},
  number = {1},
  pages = {465--488},
  url = {http://hdl.handle.net/2066/187230}
}
Staton S and Uijlen S (2018), "Effect algebras, presheaves, non-locality and contextuality", Information and Computation. Vol. 261, pp. 336-354.
BibTeX:
@article{dis-2018-Staton-a,
  author = {Staton, Sam and Uijlen, S.},
  title = {Effect algebras, presheaves, non-locality and contextuality},
  journal = {Information and Computation},
  year = {2018},
  volume = {261},
  pages = {336--354},
  url = {http://hdl.handle.net/2066/193535}
}
Stoffelen K and Daemen J (2018), "Column Parity Mixers", IACR Transactions on Symmetric Cryptology. Vol. 2018(1), pp. 126-159.
BibTeX:
@article{dis-2018-Stoffelen-a,
  author = {Stoffelen, K. and Daemen, J.},
  title = {Column Parity Mixers},
  journal = {IACR Transactions on Symmetric Cryptology},
  year = {2018},
  volume = {2018},
  number = {1},
  pages = {126--159},
  url = {http://hdl.handle.net/2066/191706}
}
Ter Heerdt G, Jacobs B, Kappé T and Silva A (2018), "Learning to Coordinate", In It's All About Coordination: Essays to Celebrate the Lifelong Scientific Achievements of Farhad Arbab. Cham , pp. 139-159. Springer International Publishing.
BibTeX:
@inbook{dis-2018-TerHeerdt-a,
  author = {Ter Heerdt, G. and Jacobs, B. and Kappé, T. and Silva, A.},
  editor = {de Boer, F. and Bonsangue, M. and Rutten, J.},
  title = {Learning to Coordinate},
  booktitle = {It's All About Coordination: Essays to Celebrate the Lifelong Scientific Achievements of Farhad Arbab},
  publisher = {Springer International Publishing},
  year = {2018},
  pages = {139--159}
}
Tulinayo P(F, van der Weide TP and van Bommel P (2018), "Decomposition and Conceptualization to Support System Dynamics Behavior Modeling", CSIMQ. Vol. 15, pp. 45-71.
BibTeX:
@article{dis-2018-Tulinayo-a,
  author = {Tulinayo, P. (Fiona) and van der Weide, Theo P. and van Bommel, Patrick},
  title = {Decomposition and Conceptualization to Support System Dynamics Behavior Modeling},
  journal = {CSIMQ},
  year = {2018},
  volume = {15},
  pages = {45--71},
  url = {https://doi.org/10.7250/csimq.2018-15.03},
  doi = {10.7250/csimq.2018-15.03}
}
Walree TF (2018), "Het Cambridge Analytica-schandaal. Wat kan de Nederlandse Facebook-gebruiker claimen?", Tijdschrift voor Internetrecht. Vol. 11(4), pp. 134-143.
BibTeX:
@article{dis-2018-Walree-a,
  author = {Walree, T. F.},
  title = {Het Cambridge Analytica-schandaal. Wat kan de Nederlandse Facebook-gebruiker claimen?},
  journal = {Tijdschrift voor Internetrecht},
  year = {2018},
  volume = {11},
  number = {4},
  pages = {134--143},
  url = {https://denhollander.info/artikel/15229}
}
van der Weide T (2018), "Self-Esteem During the Ageing Process", In Handbook of Research on Multicultural Perspectives on Gender and Aging. , pp. 88-105. IGI Global.
BibTeX:
@inbook{dis-2018-Weide-a,
  author = {van der Weide, Theo},
  title = {Self-Esteem During the Ageing Process},
  booktitle = {Handbook of Research on Multicultural Perspectives on Gender and Aging},
  publisher = {IGI Global},
  year = {2018},
  pages = {88--105}
}
van de Wetering J (2018), "Quantum Theory is a Quasi-stochastic Process Theory", Electronic Proceedings in Theoretical Computer Science. (266), pp. 179-196.
BibTeX:
@article{dis-2018-Wetering-a,
  author = {van de Wetering, John},
  title = {Quantum Theory is a Quasi-stochastic Process Theory},
  journal = {Electronic Proceedings in Theoretical Computer Science},
  year = {2018},
  number = {266},
  pages = {179--196},
  url = {http://hdl.handle.net/2066/195400}
}
van de Wetering J (2018), "Three characterisations of the sequential product", Journal of Mathematical Physics. Vol. 59(8), pp. 1-20.
BibTeX:
@article{dis-2018-Wetering-b,
  author = {van de Wetering, John},
  title = {Three characterisations of the sequential product},
  journal = {Journal of Mathematical Physics},
  year = {2018},
  volume = {59},
  number = {8},
  pages = {1--20}
}
van de Wetering JMM (2018), "Ordering quantum states and channels based on positive Bayesian evidence", Journal of Mathematical Physics. Vol. 59(10), pp. 1-19.
BibTeX:
@article{dis-2018-Wetering-c,
  author = {van de Wetering, J. M. M.},
  title = {Ordering quantum states and channels based on positive Bayesian evidence},
  journal = {Journal of Mathematical Physics},
  year = {2018},
  volume = {59},
  number = {10},
  pages = {1--19}
}
van de Wetering JMM (2018), "Quantum Theory is a Quasi-stochastic Process Theory", Electronic Proceedings in Theoretical Computer Science. Vol. 266, pp. 179-196.
BibTeX:
@article{dis-2018-Wetering-d,
  author = {van de Wetering, J. M. M.},
  title = {Quantum Theory is a Quasi-stochastic Process Theory},
  journal = {Electronic Proceedings in Theoretical Computer Science},
  year = {2018},
  volume = {266},
  pages = {179--196},
  url = {http://hdl.handle.net/2066/195400}
}
Wolters PTJ and Jacobs BPF (2018), "De toegang tot betaalrekeningen onder PSD2", Ondernemingsrecht. Vol. 2018(5), pp. 228-238.
BibTeX:
@article{dis-2018-Wolters-a,
  author = {Wolters, P. T. J. and Jacobs, B. P. F.},
  title = {De toegang tot betaalrekeningen onder PSD2},
  journal = {Ondernemingsrecht},
  year = {2018},
  volume = {2018},
  number = {5},
  pages = {228--238}
}
Wolters PTJ and Jacobs BPF (2018), "The security of access to accounts under the PSD2", Computer Law & Security Review., nov, 2018. Elsevier BV.
BibTeX:
@article{dis-2018-Wolters-b,
  author = {Wolters, P. T. J. and Jacobs, B. P. F.},
  title = {The security of access to accounts under the PSD2},
  journal = {Computer Law & Security Review},
  publisher = {Elsevier BV},
  year = {2018},
  url = {https://doi.org/10.1016/j.clsr.2018.10.005},
  doi = {10.1016/j.clsr.2018.10.005}
}

2017

van Gastel B (2017), "Analysing energy consumption of systems controlled by software", In Companion to the first International Conference on the Art, Science and Engineering of Programming, Programming 2017, Brussels, Belgium, April 3-6, 2017. , pp. 19:1-19:2. ACM.
BibTeX:
@inproceedings{dis-2017-Gastel-a,
  author = {Bernard van Gastel},
  editor = {Jennifer B. Sartor and Theo D'Hondt and Wolfgang De Meuter},
  title = {Analysing energy consumption of systems controlled by software},
  booktitle = {Companion to the first International Conference on the Art, Science and Engineering of Programming, Programming 2017, Brussels, Belgium, April 3-6, 2017},
  publisher = {ACM},
  year = {2017},
  pages = {19:1--19:2},
  url = {http://doi.acm.org/10.1145/3079368.3079396},
  doi = {10.1145/3079368.3079396}
}
van Gastel B and van Eekelen MCJD (2017), "Towards Practical, Precise and Parametric Energy Analysis of IT Controlled Systems", In Proceedings 8th Workshop on Developments in Implicit Computational Complexity and 5th Workshop on Foundational and Practical Aspects of Resource Analysis, DICE-FOPARA@ETAPS 2017, and 5th Workshop on FOundational and Practical Aspects of Resource Analysis Uppsala, Sweden, April 22-23, 2017.. Vol. 248, pp. 24-37.
BibTeX:
@inproceedings{dis-2017-Gastel-c,
  author = {Bernard van Gastel and Marko C. J. D. van Eekelen},
  editor = {Guillaume Bonfante and Georg Moser},
  title = {Towards Practical, Precise and Parametric Energy Analysis of IT Controlled Systems},
  booktitle = {Proceedings 8th Workshop on Developments in Implicit Computational Complexity and 5th Workshop on Foundational and Practical Aspects of Resource Analysis, DICE-FOPARA@ETAPS 2017, and 5th Workshop on FOundational and Practical Aspects of Resource Analysis Uppsala, Sweden, April 22-23, 2017.},
  year = {2017},
  volume = {248},
  pages = {24--37},
  url = {https://doi.org/10.4204/EPTCS.248.7},
  doi = {10.4204/EPTCS.248.7}
}
Allais GX, Chapman J, McBride C and McKinna J (2017), "Type-and-scope safe programs and their proofs", In CPP 2017: Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs, Paris, France - January 16-17, 2017. New York , pp. 195-207. ACM.
BibTeX:
@inproceedings{dis-2017-Allais-a,
  author = {Allais, G. X. and Chapman, J. and McBride, C. and McKinna, Jam.},
  editor = {Bertot, Y.},
  title = {Type-and-scope safe programs and their proofs},
  booktitle = {CPP 2017: Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs, Paris, France - January 16-17, 2017},
  publisher = {ACM},
  year = {2017},
  pages = {195--207},
  url = {http://hdl.handle.net/2066/168735},
  doi = {10.1145/3018610.3018613}
}
Alpár G, van den Broek F, Hampiholi B, Jacobs B, Lueks W and Ringers S (2017), "IRMA: practical, decentralized and privacy-friendly identity management using smartphones", In 10th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2017).
BibTeX:
@inproceedings{dis-2017-Alpar-a,
  author = {G. Alpár and F. van den Broek and B. Hampiholi and B. Jacobs and W. Lueks and S. Ringers},
  title = {IRMA: practical, decentralized and privacy-friendly identity management using smartphones},
  booktitle = {10th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2017)},
  year = {2017}
}
Batina L, Bhunia S and Schaumont P (2017), "Foundations of Secure Scaling: Report from Dagstuhl Seminar 16342", Dagstuhl Reports. Vol. 6(8), pp. 65-90.
BibTeX:
@article{dis-2017-Batina-a,
  author = {Batina, L. and Bhunia, S. and Schaumont, P.},
  title = {Foundations of Secure Scaling: Report from Dagstuhl Seminar 16342},
  journal = {Dagstuhl Reports},
  year = {2017},
  volume = {6},
  number = {8},
  pages = {65--90},
  url = {http://hdl.handle.net/2066/166122},
  doi = {10.4230/DagRep.6.8.65}
}
Batina L and Conti M (2017), "SEMS 2017: Workshop on Security for Embedded and Mobile Systems, 30 april 2017, Paris, France".
BibTeX:
@misc{dis-2017-Batina-b,
  author = {Batina, L. and Conti, M.},
  title = {SEMS 2017: Workshop on Security for Embedded and Mobile Systems, 30 april 2017, Paris, France},
  year = {2017},
  url = {http://sems2017.cs.ru.nl/}
}
Becker MJ and Jacobs B (2017), "Kijk uit, nepnieuws!", Trouw. , pp. 4-9.
BibTeX:
@article{dis-2017-Becker-a,
  author = {Becker, M. J. and Jacobs, B.},
  title = {Kijk uit, nepnieuws!},
  journal = {Trouw},
  year = {2017},
  pages = {4--9},
  url = {http://www.trouw.nl/tr/nl/39683/nbsp/article/detail/4448499/2017/01/14/Kijk-uit-nepnieuws.dhtml}
}
Bella G, Butin D and Jonker HL (2017), "Analysing Privacy Analyses", In ITASEC 2017: Proceedings of the First Italian Conference on Cybersecurity, Venice, Italy January 17-20, 2017. s.l. Vol. 1816, pp. 19-28. CEUR.
BibTeX:
@inproceedings{dis-2017-Bella-a,
  author = {Bella, G. and Butin, D. and Jonker, H. L.},
  editor = {Armando, A.},
  title = {Analysing Privacy Analyses},
  booktitle = {ITASEC 2017: Proceedings of the First Italian Conference on Cybersecurity, Venice, Italy January 17-20, 2017},
  publisher = {CEUR},
  year = {2017},
  volume = {1816},
  pages = {19--28},
  url = {http://ceur-ws.org/Vol-1816/paper-03.pdf}
}
Bernstein DJ, Kölbl S, Lucks S, Massolino PM, Mendel F, Nawaz K, Schneider T, Schwabe P, Standaert F-X, Todo Y and Viguier B (2017), "Gimli: a cross-platform permutation", In CHES 2017: Cryptographic Hardware and Embedded Systems: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Cham , pp. 299-320. Springer.
BibTeX:
@incollection{dis-2017-Bernstein-a,
  author = {Bernstein, D. J. and Kölbl, S. and Lucks, S. and Massolino, P. M. and Mendel, F. and Nawaz, K. and Schneider, T. and Schwabe, P. and Standaert, F.-X. and Todo, Y. and Viguier, B.},
  editor = {Fischer, W.},
  title = {Gimli: a cross-platform permutation},
  booktitle = {CHES 2017: Cryptographic Hardware and Embedded Systems: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  publisher = {Springer},
  year = {2017},
  pages = {299--320},
  url = {http://hdl.handle.net/2066/178453},
  doi = {10.1007/978-3-319-66787-4_15}
}
Bielikova M, Herder E, Cena F and Desmarais M (2017), "Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization, UMAP 2017, Bratislava, Slovakia, July 09 - 12, 2017" New York , pp. 438. ACM.
BibTeX:
@book{dis-2017-Bielikova-a,
  author = {Bielikova, M. and Herder, E. and Cena, F. and Desmarais, M.},
  title = {Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization, UMAP 2017, Bratislava, Slovakia, July 09 - 12, 2017},
  publisher = {ACM},
  year = {2017},
  pages = {438}
}
Bielikova M, Herder E, Cena F and Desmarais M (2017), "UMAP '17: Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, Bratislava, Slovakia --- July 09 - 12, 2017" New York , pp. 402. ACM.
BibTeX:
@book{dis-2017-Bielikova-b,
  author = {Bielikova, M. and Herder, E. and Cena, F. and Desmarais, M.},
  title = {UMAP '17: Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, Bratislava, Slovakia --- July 09 - 12, 2017},
  publisher = {ACM},
  year = {2017},
  pages = {402}
}
de Boer MHT, Lu Y, Zhang H, Schutte K, Ngo C-W and Kraaij W (2017), "Semantic Reasoning in Zero Example Video Event Retrieval", ACM Transactions on Multimedia Computing Communications and Applications. Vol. 13(4), pp. 1-17.
BibTeX:
@article{dis-2017-Boer-a,
  author = {de Boer, M. H. T. and Lu, Y. and Zhang, H. and Schutte, K. and Ngo, C.-W. and Kraaij, W.},
  title = {Semantic Reasoning in Zero Example Video Event Retrieval},
  journal = {ACM Transactions on Multimedia Computing Communications and Applications},
  year = {2017},
  volume = {13},
  number = {4},
  pages = {1--17},
  url = {http://hdl.handle.net/2066/178704},
  doi = {10.1145/3131288}
}
Bonchi F, Gadducci F, Kissinger A, Sobociʼnski P and Zanasi F (2017), "Confluence of Graph Rewriting with Interfaces", In Programming Languages and Systems: 26th European Symposium on Programming, ESOP 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22--29, 2017, Proceedings. Berlin, Heidelberg , pp. 141-169. Springer Berlin Heidelberg.
BibTeX:
@incollection{dis-2017-Bonchi-a,
  author = {Bonchi, F. and Gadducci, F. and Kissinger, A. and Sobociʼnski, P. and Zanasi, F.},
  editor = {Yang, H.},
  title = {Confluence of Graph Rewriting with Interfaces},
  booktitle = {Programming Languages and Systems: 26th European Symposium on Programming, ESOP 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22--29, 2017, Proceedings},
  publisher = {Springer Berlin Heidelberg},
  year = {2017},
  pages = {141--169},
  url = {https://doi.org/10.1007/978-3-662-54434-1_6},
  doi = {10.1007/978-3-662-54434-1_6}
}
Bonchi F, Sobocinski P and Zanasi F (2017), "Interacting Hopf algebras", Journal of Pure and Applied Algebra. Vol. 221(1), pp. 144-184.
BibTeX:
@article{dis-2017-Bonchi-b,
  author = {Bonchi, F. and Sobocinski, P. and Zanasi, F.},
  title = {Interacting Hopf algebras},
  journal = {Journal of Pure and Applied Algebra},
  year = {2017},
  volume = {221},
  number = {1},
  pages = {144--184},
  url = {http://hdl.handle.net/2066/161268},
  doi = {10.1016/j.jpaa.2016.06.002}
}
(2017), "Proceedings 8th Workshop on Developments in Implicit Computational Complexity and 5th Workshop on Foundational and Practical Aspects of Resource Analysis, DICE-FOPARA@ETAPS 2017, and 5th Workshop on FOundational and Practical Aspects of Resource Analysis Uppsala, Sweden, April 22-23, 2017" Vol. 248
BibTeX:
@proceedings{dis-2017-Bonfante-a,,
  editor = {Guillaume Bonfante and Georg Moser},
  title = {Proceedings 8th Workshop on Developments in Implicit Computational Complexity and 5th Workshop on Foundational and Practical Aspects of Resource Analysis, DICE-FOPARA@ETAPS 2017, and 5th Workshop on FOundational and Practical Aspects of Resource Analysis Uppsala, Sweden, April 22-23, 2017},
  year = {2017},
  volume = {248},
  url = {http://arxiv.org/abs/1704.05169}
}
Chaum D, Das D, Javani F, Kate A, Krasnova A, de Ruiter J and Sherman AT (2017), "cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operation", In Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Cham , pp. 557-578. Springer.
BibTeX:
@incollection{dis-2017-Chaum-a,
  author = {Chaum, D. and Das, D. and Javani, F. and Kate, A. and Krasnova, A. and de Ruiter, J. and Sherman, A. T.},
  editor = {Gollmann, D.},
  title = {cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operation},
  booktitle = {Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  publisher = {Springer},
  year = {2017},
  pages = {557--578},
  url = {https://doi.org/10.1007/978-3-319-61204-1_28},
  doi = {10.1007/978-3-319-61204-1_28}
}
Chen YL, Luykx A, Mennink B and Preneel B (2017), "Efficient Length Doubling from Tweakable Block Ciphers", IACR Transaction of Symmetric Cryptology. Vol. 2017(3), pp. 253-270.
BibTeX:
@article{dis-2017-Chen-a,
  author = {Chen, Y. L. and Luykx, A. and Mennink, B. and Preneel, B.},
  title = {Efficient Length Doubling from Tweakable Block Ciphers},
  journal = {IACR Transaction of Symmetric Cryptology},
  year = {2017},
  volume = {2017},
  number = {3},
  pages = {253--270},
  url = {http://hdl.handle.net/2066/178450},
  doi = {10.13154/tosc.v2017.i3.253-270}
}
Cheng H, Rokicki M and Herder E (2017), "The Influence of City Size on Dietary Choices", In UMAP '17 Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization, Bratislava, Slovakia --- July 09 - 12, 2017. New York , pp. 231-236. ACM.
BibTeX:
@inproceedings{dis-2017-Cheng-a,
  author = {Cheng, H. and Rokicki, M. and Herder, E.},
  editor = {Tkalcic, M.},
  title = {The Influence of City Size on Dietary Choices},
  booktitle = {UMAP '17 Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization, Bratislava, Slovakia --- July 09 - 12, 2017},
  publisher = {ACM},
  year = {2017},
  pages = {231--236},
  url = {https://doi.org/10.1145/3099023.3099058},
  doi = {10.1145/3099023.3099058}
}
Cheng H, Rokicki M and Herder E (2017), "The Influence of City Size on Dietary Choices and Food Recommendation", In Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization. New York, NY, USA , pp. 359-360. ACM.
BibTeX:
@inproceedings{dis-2017-Cheng-b,
  author = {Cheng, Hao and Rokicki, Markus and Herder, Eelco},
  title = {The Influence of City Size on Dietary Choices and Food Recommendation},
  booktitle = {Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization},
  publisher = {ACM},
  year = {2017},
  pages = {359--360},
  url = {http://doi.acm.org/10.1145/3079628.3079641},
  doi = {10.1145/3079628.3079641}
}
Chmielewski Ł, Massolino P, Vliegen J, Batina L and Mentens N (2017), "Completing the Complete ECC Formulae with Countermeasures", Journal of Low Power Electronics and Applications. Vol. 7(1), pp. 1-13.
BibTeX:
@article{dis-2017-Chmielewski-a,
  author = {Chmielewski, Ł and Massolino, P. and Vliegen, J. and Batina, L. and Mentens, N.},
  title = {Completing the Complete ECC Formulae with Countermeasures},
  journal = {Journal of Low Power Electronics and Applications},
  year = {2017},
  volume = {7},
  number = {1},
  pages = {1--13},
  url = {http://hdl.handle.net/2066/168750},
  doi = {10.3390/jlpea7010003}
}
Cho K and Jacobs B (2017), "The EfProb Library for Probabilistic Calculations", In CALCO 2017: 7th Conference on Algebra and Coalgebra in Computer Science, June 12-16, 2017 - Ljubljana, Slovenia. Dagstuhl , pp. 25:1-25:8. LIPICS.
BibTeX:
@incollection{dis-2017-Cho-a,
  author = {Cho, K. and Jacobs, B.},
  editor = {Bonchi, F.},
  title = {The EfProb Library for Probabilistic Calculations},
  booktitle = {CALCO 2017: 7th Conference on Algebra and Coalgebra in Computer Science, June 12-16, 2017 - Ljubljana, Slovenia},
  publisher = {LIPICS},
  year = {2017},
  pages = {25:1--25:8},
  url = {http://hdl.handle.net/2066/180475},
  doi = {10.4230/LIPIcs.CALCO.2017.25}
}
Chothia T, Ordean M, de Ruiter J and Thomas RJ (2017), "An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols", In ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates --- April 02 - 06, 2017. New York , pp. 743-756. ACM.
BibTeX:
@inproceedings{dis-2017-Chothia-a,
  author = {Chothia, T. and Ordean, M. and de Ruiter, J. and Thomas, R. J.},
  editor = {Karri, R.},
  title = {An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols},
  booktitle = {ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates --- April 02 - 06, 2017},
  publisher = {ACM},
  year = {2017},
  pages = {743--756},
  url = {https://doi.org/10.1145/3052973.3053027},
  doi = {10.1145/3052973.3053027}
}
Coecke B and Kissinger A (2017), "Picturing Quantum Processes: A First Course in Quantum Theory and Diagrammatic Reasoning" Cambridge , pp. 827. Cambridge University Press.
BibTeX:
@book{dis-2017-Coecke-a,
  author = {Coecke, B. and Kissinger, A.},
  title = {Picturing Quantum Processes: A First Course in Quantum Theory and Diagrammatic Reasoning},
  publisher = {Cambridge University Press},
  year = {2017},
  pages = {827},
  url = {https://doi.org/10.1017/9781316219317},
  doi = {10.1017/9781316219317}
}
Costello C, Jao D, Longa P, Naehrig M, Renes J and Urbanik D (2017), "Efficient Compression of SIDH Public Keys", In Advances in Cryptology -- EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 -- May 4, 2017, Proceedings, Part I. Cham , pp. 679-706. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Costello-a,
  author = {Costello, C. and Jao, D. and Longa, P. and Naehrig, M. and Renes, J. and Urbanik, D.},
  editor = {Coron, J.-S. and Nielsen, J. B.},
  title = {Efficient Compression of SIDH Public Keys},
  booktitle = {Advances in Cryptology -- EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 -- May 4, 2017, Proceedings, Part I},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {679--706},
  url = {https://doi.org/10.1007/978-3-319-56620-7_24},
  doi = {10.1007/978-3-319-56620-7_24}
}
Cranen S, Keiren J and Willemse T (2017), "Parity game reductions", Acta Informatica., Aug, 2017.
BibTeX:
@article{dis-2017-Cranen-a,
  author = {Cranen, S. and Keiren, J.J.A. and Willemse, T.A.C.},
  title = {Parity game reductions},
  journal = {Acta Informatica},
  year = {2017},
  url = {https://doi.org/10.1007/s00236-017-0301-x},
  doi = {10.1007/s00236-017-0301-x}
}
Daemen J (2017), "Symmetrische cryptografie 2.0", Nieuw Archief voor Wiskunde. Vol. 18(3), pp. 161-167.
BibTeX:
@article{dis-2017-Daemen-a,
  author = {Daemen, J.J.C},
  title = {Symmetrische cryptografie 2.0},
  journal = {Nieuw Archief voor Wiskunde},
  year = {2017},
  volume = {18},
  number = {3},
  pages = {161--167}
}
Daemen JJC (2017), "Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing", In Cryptographic Hardware and Embedded Systems -- CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Cham , pp. 137-153. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Daemen-b,
  author = {Daemen, J. J. C.},
  editor = {Fischer, W. and Homma, N.},
  title = {Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing},
  booktitle = {Cryptographic Hardware and Embedded Systems -- CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {137--153},
  url = {https://doi.org/10.1007/978-3-319-66787-4_7},
  doi = {10.1007/978-3-319-66787-4_7}
}
Daemen JJC, Mennink B and Van Assche G (2017), "Full-State Keyed Duplex With Built-In Multi-User Support", In Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II. Cham , pp. 606-637. Springer.
BibTeX:
@incollection{dis-2017-Daemen-c,
  author = {Daemen, J. J. C. and Mennink, B. and Van Assche, G.},
  editor = {Takagi, T.},
  title = {Full-State Keyed Duplex With Built-In Multi-User Support},
  booktitle = {Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II},
  publisher = {Springer},
  year = {2017},
  pages = {606--637},
  url = {http://hdl.handle.net/2066/179010},
  doi = {10.1007/978-3-319-70697-9_21}
}
Datta N, Luykx A, Mennink B and Nandi M (2017), "Understanding RUP Integrity of COLM", IACR Transaction of Symmetric Cryptology. Vol. 2017(2), pp. 143-161.
BibTeX:
@article{dis-2017-Datta-a,
  author = {Datta, N. and Luykx, A. and Mennink, B. and Nandi, M.},
  title = {Understanding RUP Integrity of COLM},
  journal = {IACR Transaction of Symmetric Cryptology},
  year = {2017},
  volume = {2017},
  number = {2},
  pages = {143--161},
  url = {http://hdl.handle.net/2066/176620},
  doi = {10.13154/tosc.v2017.i2.143-161}
}
Dokter K, Jongmans S-S, Arbab F and Bliudze S (2017), "Combine and conquer: Relating BIP and Reo", Journal of Logical and Algebraic Methods in Programming. Vol. 86(1), pp. 134-156.
BibTeX:
@article{dis-2017-Dokter-a,
  author = {Dokter, K. and Jongmans, S.-S. and Arbab, F. and Bliudze, S.},
  title = {Combine and conquer: Relating BIP and Reo},
  journal = {Journal of Logical and Algebraic Methods in Programming},
  year = {2017},
  volume = {86},
  number = {1},
  pages = {134--156},
  url = {http://hdl.handle.net/2066/168739},
  doi = {10.1016/j.jlamp.2016.09.008}
}
Dong N, Jonker HL and Pang J (2017), "Formal modelling and analysis of receipt-free auction protocols in applied pi", Computers & Security. Vol. 65, pp. 405-432.
BibTeX:
@article{dis-2017-Dong-a,
  author = {Dong, N. and Jonker, H. L. and Pang, J.},
  title = {Formal modelling and analysis of receipt-free auction protocols in applied pi},
  journal = {Computers & Security},
  year = {2017},
  volume = {65},
  pages = {405--432},
  url = {http://hdl.handle.net/2066/173190},
  doi = {10.1016/j.cose.2016.09.002}
}
van Eekelen M (2017), "Hoe voorkom je een ramp met een kerncentrale, raket of waterkering?".
BibTeX:
@misc{dis-2017-Eekelen-a,
  author = {van Eekelen, M.},
  title = {Hoe voorkom je een ramp met een kerncentrale, raket of waterkering?},
  publisher = {Universiteit van NederlandVideo},
  year = {2017},
  note = {Video: 13.55 m},
  url = {http://www.universiteitvannederland.nl/college/hoe-beveilig-je-een-kerncentrale/}
}
Elejalde E, Ferres L and Herder E (2017), "The Nature of Real and Perceived Bias in Chilean Media", In Proceedings of the 28th ACM Conference on Hypertext and Social Media. New York, NY, USA , pp. 95-104. ACM.
BibTeX:
@inproceedings{dis-2017-Elejalde-a,
  author = {Elejalde, Erick and Ferres, Leo and Herder, Eelco},
  title = {The Nature of Real and Perceived Bias in Chilean Media},
  booktitle = {Proceedings of the 28th ACM Conference on Hypertext and Social Media},
  publisher = {ACM},
  year = {2017},
  pages = {95--104},
  url = {http://doi.acm.org/10.1145/3078714.3078724},
  doi = {10.1145/3078714.3078724}
}
Fiterau-Brostean P, Lenarts T, Poll E, de Ruiter J, Vaandrager FW and Verleg P (2017), "Model Learning and Model Checking of SSH Implementations", In SPIN 2017: Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, Santa Barbara, CA, USA --- July 13 - 14, 2017. New York , pp. 142-151. ACM.
BibTeX:
@inproceedings{dis-2017-Fiterau-Brostean-a,
  author = {Fiterau-Brostean, P. and Lenarts, T. and Poll, E. and de Ruiter, J. and Vaandrager, F. W. and Verleg, P.},
  editor = {Erdogmus, H.},
  title = {Model Learning and Model Checking of SSH Implementations},
  booktitle = {SPIN 2017: Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, Santa Barbara, CA, USA --- July 13 - 14, 2017},
  publisher = {ACM},
  year = {2017},
  pages = {142--151},
  url = {https://doi.org/10.1145/3092282.3092289},
  doi = {10.1145/3092282.3092289}
}
Fournaris AP, Papachristodoulou L and Sklavos N (2017), "Secure and Efficient RNS Software Implementation for Elliptic Curve Cryptography", In EUROS&PW 2017: 2nd IEEE European Symposium on Security and Privacy Workshops, 29-30 April 2017 Paris, France. Proceedings. Los Alamitos , pp. 86-93. IEEE.
BibTeX:
@inproceedings{dis-2017-Fournaris-a,
  author = {Fournaris, A. P. and Papachristodoulou, L. and Sklavos, N.},
  title = {Secure and Efficient RNS Software Implementation for Elliptic Curve Cryptography},
  booktitle = {EUROS&PW 2017: 2nd IEEE European Symposium on Security and Privacy Workshops, 29-30 April 2017 Paris, France. Proceedings},
  publisher = {IEEE},
  year = {2017},
  pages = {86--93},
  url = {http://hdl.handle.net/2066/178472},
  doi = {10.1109/EuroSPW.2017.56}
}
de Frutos Escrig D, Keiren J and Willemse T (2017), "Games for Bisimulation and Abstraction", Logical Methods in Computer Science., November, 2017. Vol. 13
BibTeX:
@article{dis-2017-FrutosEscrig-a,
  author = {D. de Frutos Escrig and J.J.A. Keiren and T.A.C. Willemse},
  title = {Games for Bisimulation and Abstraction},
  journal = {Logical Methods in Computer Science},
  year = {2017},
  volume = {13},
  url = {http://lmcs.episciences.org/4099},
  doi = {10.23638/LMCS-13(4:15)2017}
}
Furber RWJ (2017), "Categorical Duality in Probability and Quantum Foundations". Thesis at: Radboud University. , pp. i, 267. s.n..
BibTeX:
@phdthesis{dis-2017-Furber-a,
  author = {Furber, R. W. J.},
  title = {Categorical Duality in Probability and Quantum Foundations},
  publisher = {s.n.},
  school = {Radboud University},
  year = {2017},
  pages = {i, 267},
  url = {http://hdl.handle.net/2066/175862}
}
van Gastel B and van Eekelen M (2017), "Towards Practical, Precise and Parametric Energy Analysis of IT Controlled Systems", Electronic Proceedings in Theoretical Computer Science. Vol. 248, pp. 24-37.
BibTeX:
@article{dis-2017-Gastel-b,
  author = {van Gastel, B. and van Eekelen, M.},
  title = {Towards Practical, Precise and Parametric Energy Analysis of IT Controlled Systems},
  journal = {Electronic Proceedings in Theoretical Computer Science},
  year = {2017},
  volume = {248},
  pages = {24--37},
  url = {http://hdl.handle.net/2066/173231},
  doi = {10.4204/eptcs.248.7}
}
van Gastel BE (2017), "Analysing energy consumption of systems controlled by software", In Programming '17: Companion to the first International Conference on the Art, Science and Engineering of Programming, Brussels, Belgium --- April 03 - 06, 2017.Proceeding. New York , pp. 19:1-19:2. ACM.
BibTeX:
@inproceedings{dis-2017-Gastel-d,
  author = {van Gastel, B. E.},
  editor = {Sartor, J. B.},
  title = {Analysing energy consumption of systems controlled by software},
  booktitle = {Programming '17: Companion to the first International Conference on the Art, Science and Engineering of Programming, Brussels, Belgium --- April 03 - 06, 2017.Proceeding},
  publisher = {ACM},
  year = {2017},
  pages = {19:1--19:2},
  url = {http://hdl.handle.net/2066/179777},
  doi = {10.1145/3079368.3079396}
}
de Groot W, Papagiannopoulos K, de la Piedra A, Schneider E and Batina L (2017), "Bitsliced Masking and ARM: Friends or Foes?", In Lightweight Cryptography for Security and Privacy: 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers. Cham , pp. 91-109. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Groot-a,
  author = {de Groot, W. and Papagiannopoulos, K. and de la Piedra, A. and Schneider, E. and Batina, L.},
  editor = {Bogdanov, A.},
  title = {Bitsliced Masking and ARM: Friends or Foes?},
  booktitle = {Lightweight Cryptography for Security and Privacy: 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {91--109},
  url = {http://hdl.handle.net/2066/173237},
  doi = {10.1007/978-3-319-55714-4_7}
}
Groote JF, Jansen DN, Keiren JJA and Wijs AJ (2017), "An O(mlog n) Algorithm for Computing Stuttering Equivalence and Branching Bisimulation", ACM Transactions on Computational Logic. Vol. 18(2), pp. 1-34.
BibTeX:
@article{dis-2017-Groote-a,
  author = {Groote, J. F. and Jansen, D. N. and Keiren, J. J. A. and Wijs, A. J.},
  title = {An O(mlog n) Algorithm for Computing Stuttering Equivalence and Branching Bisimulation},
  journal = {ACM Transactions on Computational Logic},
  year = {2017},
  volume = {18},
  number = {2},
  pages = {1--34},
  url = {https://doi.org/10.1145/3060140},
  doi = {10.1145/3060140}
}
Hampiholi B and Alpár G (2017), "Privacy-Preserving Webshopping with Attributes", In PAC 2017: 2017 IEEE Symposium on Privacy-Aware Computing, Washington DC, DC, USA 1-3 August 2017. Proceedings. Los Alamitos , pp. 25-36. IEEE.
BibTeX:
@inproceedings{dis-2017-Hampiholi-a,
  author = {Hampiholi, B. and Alpár, G.},
  title = {Privacy-Preserving Webshopping with Attributes},
  booktitle = {PAC 2017: 2017 IEEE Symposium on Privacy-Aware Computing, Washington DC, DC, USA 1-3 August 2017. Proceedings},
  publisher = {IEEE},
  year = {2017},
  pages = {25--36},
  url = {https://doi.org/10.1109/PAC.2017.34},
  doi = {10.1109/PAC.2017.34}
}
Herder E, Sosnovsky S and Dimitrova V (2017), "Adaptive Intelligent Learning Environments", In Technology Enhanced Learning: Research Themes. Cham , pp. 109-114. Springer International Publishing.
BibTeX:
@inbook{dis-2017-Herder-a,
  author = {Herder, Eelco and Sosnovsky, Sergey and Dimitrova, Vania},
  title = {Adaptive Intelligent Learning Environments},
  booktitle = {Technology Enhanced Learning: Research Themes},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {109--114},
  url = {https://doi.org/10.1007/978-3-319-02600-8_10},
  doi = {10.1007/978-3-319-02600-8_10}
}
Hildebrandt M (2017), "Law as an affordance: The Devil Is in the Vanishing Point(s)", Critical Analysis of Law. Vol. 4(1), pp. 116-128.
BibTeX:
@article{dis-2017-Hildebrandt-a,
  author = {Hildebrandt, M.},
  title = {Law as an affordance: The Devil Is in the Vanishing Point(s)},
  journal = {Critical Analysis of Law},
  year = {2017},
  volume = {4},
  number = {1},
  pages = {116--128},
  url = {http://cal.library.utoronto.ca/index.php/cal/article/view/28154/20742}
}
Hildebrandt M (2017), "Learning as a Machine: Crossovers between Humans and Machines", Journal of Learning Analytics. Vol. 4(1), pp. 6-23.
BibTeX:
@article{dis-2017-Hildebrandt-b,
  author = {Hildebrandt, M.},
  title = {Learning as a Machine: Crossovers between Humans and Machines},
  journal = {Journal of Learning Analytics},
  year = {2017},
  volume = {4},
  number = {1},
  pages = {6--23},
  url = {http://hdl.handle.net/2066/173205},
  doi = {10.18608/jla.2017.41.3}
}
Hildebrandt M (2017), "Saved by Design? The Case of Legal Protection by Design", Nanoethics. Vol. 11(3), pp. 307-311.
BibTeX:
@article{dis-2017-Hildebrandt-c,
  author = {Hildebrandt, M.},
  title = {Saved by Design? The Case of Legal Protection by Design},
  journal = {Nanoethics},
  year = {2017},
  volume = {11},
  number = {3},
  pages = {307--311},
  url = {https://doi.org/10.1007/s11569-017-0299-0},
  doi = {10.1007/s11569-017-0299-0}
}
Hildebrandt M (2017), "The Virtuality of Territorial Borders", Utrecht Law Review. Vol. 13(2), pp. 14-27.
BibTeX:
@article{dis-2017-Hildebrandt-d,
  author = {Hildebrandt, M.},
  title = {The Virtuality of Territorial Borders},
  journal = {Utrecht Law Review},
  year = {2017},
  volume = {13},
  number = {2},
  pages = {14--27},
  url = {http://hdl.handle.net/2066/176613},
  doi = {10.18352/ulr.380}
}
Hildebrandt M (2017), "Leven met robo's", In Data is macht. Over Big Data en de toekomst. Vol. 86, pp. 70-71. Stichting Toekomstbeeld der Techniek.
BibTeX:
@incollection{dis-2017-Hildebrandt-e,
  author = {Mireille Hildebrandt},
  editor = {Dhoya Snijders},
  title = {Leven met robo's},
  booktitle = {Data is macht. Over Big Data en de toekomst},
  publisher = {Stichting Toekomstbeeld der Techniek},
  year = {2017},
  volume = {86},
  pages = {70--71}
}
Hildebrandt M (2017), "Wat weet mijn auto nog meer?", Ars Aequi. Vol. 2
BibTeX:
@article{dis-2017-Hildebrandt-f,
  author = {Hildebrandt, Mireille},
  title = {Wat weet mijn auto nog meer?},
  journal = {Ars Aequi},
  year = {2017},
  volume = {2},
  url = {http://www.arsaequi.nl/maandbladartikel/15891/Wat_weet_mijn_auto_nog_meer%3F_.html}
}
Hildebrandt M (2017), "The Force of Law and the Force of Technology", In The Routledge Handbook for Technology, Crime and Justice. , pp. 579-608. Routledge.
BibTeX:
@incollection{dis-2017-Hildebrandt-g,
  author = {Mireille Hildebrandt},
  editor = {M. McGuire and T. Holt},
  title = {The Force of Law and the Force of Technology},
  booktitle = {The Routledge Handbook for Technology, Crime and Justice},
  publisher = {Routledge},
  year = {2017},
  pages = {579--608}
}
Hoepman J-H (2017), "Oneerlijk ontwerpen", In Waar verzet jij je tegen? : 101 wetenschappers, ondernemers en kunstenaars geven antwoord op de vraag van Anton Corbijn. Amsterdam , pp. 184-185. Maven Publishing.
BibTeX:
@incollection{dis-2017-Hoepman-a,
  author = {Hoepman, J.-H.},
  editor = {Geels, M.},
  title = {Oneerlijk ontwerpen},
  booktitle = {Waar verzet jij je tegen? : 101 wetenschappers, ondernemers en kunstenaars geven antwoord op de vraag van Anton Corbijn},
  publisher = {Maven Publishing},
  year = {2017},
  pages = {184--185}
}
Hoepman J-H (2017), "Privacy Friendly Aggregation of Smart Meter Readings, Even When Meters Crash", In CPSR-SG'17: Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, Pittsburgh, PA, USA --- April 18 - 21, 2017. New york , pp. 3-7. ACM.
BibTeX:
@inproceedings{dis-2017-Hoepman-b,
  author = {Hoepman, J.-H.},
  title = {Privacy Friendly Aggregation of Smart Meter Readings, Even When Meters Crash},
  booktitle = {CPSR-SG'17: Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, Pittsburgh, PA, USA --- April 18 - 21, 2017},
  publisher = {ACM},
  year = {2017},
  pages = {3--7},
  url = {https://doi.org/10.1145/3055386.3055389},
  doi = {10.1145/3055386.3055389}
}
Hülsing A, Rijneveld J, Schanck J and Schwabe P (2017), "High-Speed Key Encapsulation from NTRU", In Cryptographic Hardware and Embedded Systems -- CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Cham , pp. 232-252. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Huelsing-a,
  author = {Hülsing, A. and Rijneveld, J. and Schanck, J. and Schwabe, P.},
  editor = {Fischer, W. and Homma, N.},
  title = {High-Speed Key Encapsulation from NTRU},
  booktitle = {Cryptographic Hardware and Embedded Systems -- CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {232--252},
  url = {http://hdl.handle.net/2066/178454},
  doi = {10.1007/978-3-319-66787-4_12}
}
Hwang HK, Herder E and Ronchetti M (2017), "A Link Back to MemoryLane: The Role of Context in Bookmarking and Refinding", In CHItaly '17: Proceedings of the 12th Biannual Conference on Italian SIGCHI Chapter, Cagliari, Italy --- September 18 - 20, 2017. New York , pp. 1-10. ACM.
BibTeX:
@inproceedings{dis-2017-Hwang-a,
  author = {Hwang, H. K. and Herder, E. and Ronchetti, M.},
  editor = {Paterno, F.},
  title = {A Link Back to MemoryLane: The Role of Context in Bookmarking and Refinding},
  booktitle = {CHItaly '17: Proceedings of the 12th Biannual Conference on Italian SIGCHI Chapter, Cagliari, Italy --- September 18 - 20, 2017},
  publisher = {ACM},
  year = {2017},
  pages = {1--10},
  url = {https://doi.org/10.1145/3125571.3125586},
  doi = {10.1145/3125571.3125586}
}
Jacobs B (2017), "A Recipe for State-and-Effect Triangles", Logical Methods in Computer Science. Vol. 13(2), pp. 1-26.
BibTeX:
@article{dis-2017-Jacobs-a,
  author = {Jacobs, B.},
  title = {A Recipe for State-and-Effect Triangles},
  journal = {Logical Methods in Computer Science},
  year = {2017},
  volume = {13},
  number = {2},
  pages = {1--26},
  url = {http://hdl.handle.net/2066/176594},
  doi = {10.23638/LMCS-13(2:6)2017}
}
Jacobs B (2017), "Hyper Normalisation and Conditioning for Discrete Probability Distributions", Logical Methods in Computer Science. Vol. 13(3), pp. 1-29.
BibTeX:
@article{dis-2017-Jacobs-b,
  author = {Jacobs, B.},
  title = {Hyper Normalisation and Conditioning for Discrete Probability Distributions},
  journal = {Logical Methods in Computer Science},
  year = {2017},
  volume = {13},
  number = {3},
  pages = {1--29},
  url = {http://hdl.handle.net/2066/178455},
  doi = {10.23638/LMCS-13(3:17)2017}
}
Jacobs B (2017), "Medical privacy". 2017, 2017.
BibTeX:
@misc{dis-2017-Jacobs-c,
  author = {Jacobs, B.},
  title = {Medical privacy},
  year = {2017},
  note = {Lecture given at: Radboud Grand Round - 58, Nijmegen},
  url = {https://www.youtube.com/watch?v=zhhVzu1oZzg}
}
Jacobs B (2017), "PSD2, een Europese strategische blunder".
BibTeX:
@misc{dis-2017-Jacobs-d,
  author = {Jacobs, B.},
  title = {PSD2, een Europese strategische blunder},
  publisher = {iBestuur Online},
  year = {2017},
  url = {https://ibestuur.nl/weblog/PSD2-een-Europese-strategische-blunder}
}
Jacobs B (2017), "Quantum effect logic in cognition", Journal of Mathematical Psychology. Vol. 81(December), pp. 1-10.
BibTeX:
@article{dis-2017-Jacobs-e,
  author = {Jacobs, B.},
  title = {Quantum effect logic in cognition},
  journal = {Journal of Mathematical Psychology},
  year = {2017},
  volume = {81},
  number = {December},
  pages = {1--10},
  url = {https://doi.org/10.1016/j.jmp.2017.08.004},
  doi = {10.1016/j.jmp.2017.08.004}
}
Jacobs B (2017), "Zonder privacy is er geen vrijheid", Trouw. , pp. 14-18.
BibTeX:
@article{dis-2017-Jacobs-f,
  author = {Jacobs, Bart},
  title = {Zonder privacy is er geen vrijheid},
  journal = {Trouw},
  year = {2017},
  pages = {14--18},
  url = {https://www.trouw.nl/samenleving/zonder-privacy-is-er-geen-vrijheid a65d2b56/}
}
Jacobs B (2017), "From Probability Monads to Commutative Effectuses", Journ. of Logical and Algebraic Methods in Programming. Vol. 94, pp. 200-237.
BibTeX:
@article{dis-2017-Jacobs-g,
  author = {B. Jacobs},
  title = {From Probability Monads to Commutative Effectuses},
  journal = {Journ. of Logical and Algebraic Methods in Programming},
  year = {2017},
  volume = {94},
  pages = {200--237}
}
Jacobs B (2017), "Vertrouwen en Authenticatie", In Vertrouwen in het burgelijke recht. Liber amicorum prof. mr. S.C.J.J. Kortmann. , pp. 239-245. Wolters Kluwer.
BibTeX:
@incollection{dis-2017-Jacobs-h,
  author = {B. Jacobs},
  editor = {S. Bartels and C. Jansen and B. Schuijling and N. Vermunt},
  title = {Vertrouwen en Authenticatie},
  booktitle = {Vertrouwen in het burgelijke recht. Liber amicorum prof. mr. S.C.J.J. Kortmann},
  publisher = {Wolters Kluwer},
  year = {2017},
  pages = {239--245}
}
Jacobs B (2017), "Reason yourself out of blockchains".
BibTeX:
@misc{dis-2017-Jacobs-i,
  author = {Jacobs, B.},
  title = {Reason yourself out of blockchains},
  publisher = {iBestuur Online},
  year = {2017},
  url = {https://ibestuur.nl/weblog/reason-yourself-out-of-blockchains}
}
Jacobs B and Zanasi F (2017), "A Formal Semantics of Influence in Bayesian Reasoning", In MFCS 2017: 42nd International Symposium on Mathematical Foundations of Computer Science. Dagstuhl , pp. 21:1-21:14. LIPICS.
BibTeX:
@incollection{dis-2017-Jacobs-j,
  author = {Jacobs, B. and Zanasi, F.},
  editor = {Larsen, K. G.},
  title = {A Formal Semantics of Influence in Bayesian Reasoning},
  booktitle = {MFCS 2017: 42nd International Symposium on Mathematical Foundations of Computer Science},
  publisher = {LIPICS},
  year = {2017},
  pages = {21:1--21:14},
  url = {http://hdl.handle.net/2066/180403},
  doi = {10.4230/LIPIcs.MFCS.2017.21}
}
Jongmans SSTQ, Kappé T and Arbab F (2017), "Constraint automata with memory cells and their composition", Science of Computer Programming. Vol. 146, pp. 50-86.
BibTeX:
@article{dis-2017-Jongmans-a,
  author = {Jongmans, S. S. T. Q. and Kappé, T. and Arbab, F.},
  title = {Constraint automata with memory cells and their composition},
  journal = {Science of Computer Programming},
  year = {2017},
  volume = {146},
  pages = {50--86},
  url = {https://doi.org/10.1016/j.scico.2017.03.006},
  doi = {10.1016/j.scico.2017.03.006}
}
Jonker H (2017), "A Security Perspective on Publication Metrics (Transcript of Discussion)", In Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20--22, 2017, Revised Selected Papers. Cham , pp. 201-213. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Jonker-a,
  author = {Jonker, H.},
  editor = {Stajano, F. and Anderson, J. and Christianson, B. and Matyáš, V.},
  title = {A Security Perspective on Publication Metrics (Transcript of Discussion)},
  booktitle = {Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20--22, 2017, Revised Selected Papers},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {201--213},
  url = {https://doi.org/10.1007/978-3-319-71075-4_22},
  doi = {10.1007/978-3-319-71075-4_22}
}
Jonker H and Mauw S (2017), "A Security Perspective on Publication Metrics", In Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. Berlin , pp. 186-200. Springer.
BibTeX:
@incollection{dis-2017-Jonker-b,
  author = {Jonker, H. and Mauw, S.},
  editor = {Stajano, F.},
  title = {A Security Perspective on Publication Metrics},
  booktitle = {Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers},
  publisher = {Springer},
  year = {2017},
  pages = {186--200},
  url = {https://doi.org/10.1007/978-3-319-71075-4_21},
  doi = {10.1007/978-3-319-71075-4_21}
}
Jonker H, Mauw S and Schmitz T (2017), "Reverse Bayesian poisoning: how to use spam filters to manipulate online elections", In Electronic Voting: Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2016, Proceedings. Cham , pp. 183-197. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Jonker-c,
  author = {Jonker, H. and Mauw, S. and Schmitz, T.},
  editor = {Krimmer, R.},
  title = {Reverse Bayesian poisoning: how to use spam filters to manipulate online elections},
  booktitle = {Electronic Voting: Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2016, Proceedings},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {183--197},
  url = {http://hdl.handle.net/2066/178465},
  doi = {10.1007/978-3-319-68687-5_11}
}
Jonker H, Mauw S and Trujillo-Rasua R (2017), "Man-in-the-middle attacks evolved... but our security models didn't", In Security Protocols XXIV: 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers. Cham , pp. 19-25. Springer.
BibTeX:
@incollection{dis-2017-Jonker-d,
  author = {Jonker, H. and Mauw, S. and Trujillo-Rasua, R.},
  editor = {Anderson, J.},
  title = {Man-in-the-middle attacks evolved... but our security models didn't},
  booktitle = {Security Protocols XXIV: 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers},
  publisher = {Springer},
  year = {2017},
  pages = {19--25},
  url = {https://doi.org/10.1007/978-3-319-62033-6_3},
  doi = {10.1007/978-3-319-62033-6_3}
}
Keiren JJA, Fontana P and Cleaveland R (2017), "Corrections to ``A Menagerie of Timed Automata''", ACM Computing Surveys. Vol. 50(3), pp. 1-8.
BibTeX:
@article{dis-2017-Keiren-a,
  author = {Keiren, J. J. A. and Fontana, P. and Cleaveland, R.},
  title = {Corrections to ``A Menagerie of Timed Automata''},
  journal = {ACM Computing Surveys},
  year = {2017},
  volume = {50},
  number = {3},
  pages = {1--8},
  url = {https://doi.org/10.1145/3078809},
  doi = {10.1145/3078809}
}
Kiljan S, Simoens K, Cock DD, van Eekelen M and Vranken HPE (2017), "A Survey of Authentication and Communications Security in Online Banking", ACM Computing Surveys. Vol. 49(4), pp. 1-35.
BibTeX:
@article{dis-2017-Kiljan-a,
  author = {Kiljan, S. and Simoens, K. and Cock, D. D. and van Eekelen, M. and Vranken, H. P. E.},
  title = {A Survey of Authentication and Communications Security in Online Banking},
  journal = {ACM Computing Surveys},
  year = {2017},
  volume = {49},
  number = {4},
  pages = {1--35},
  url = {http://doi.acm.org/10.1145/3002170},
  doi = {10.1145/3002170}
}
Kissinger A and Uijlen SM (2017), "A Categorical Semantics for Causal Structure", In LICS 2017: Thirty-Second Annual ACM/IEEE Symposium on Logic in Computer Science, 20-23 June 2017, Reykjavik. New york , pp. 1-12. IEEE.
BibTeX:
@inproceedings{dis-2017-Kissinger-a,
  author = {Kissinger, A. and Uijlen, S. M.},
  editor = {Ouaknine, J.},
  title = {A Categorical Semantics for Causal Structure},
  booktitle = {LICS 2017: Thirty-Second Annual ACM/IEEE Symposium on Logic in Computer Science, 20-23 June 2017, Reykjavik},
  publisher = {IEEE},
  year = {2017},
  pages = {1--12},
  url = {https://doi.org/10.1109/LICS.2017.8005095},
  doi = {10.1109/LICS.2017.8005095}
}
Kranz T, Leander G, Stoffelen K and Wiemer F (2017), "Shorter Linear Straight-Line Programs for MDS Matrices", IACR Transactions on Symmetric Cryptology. Vol. 2017(4), pp. 188-211. Ruhr-Universität Bochum.
BibTeX:
@article{dis-2017-Kranz-a,
  author = {Thorsten Kranz and Gregor Leander and Ko Stoffelen and Friedrich Wiemer},
  title = {Shorter Linear Straight-Line Programs for MDS Matrices},
  journal = {IACR Transactions on Symmetric Cryptology},
  publisher = {Ruhr-Universität Bochum},
  year = {2017},
  volume = {2017},
  number = {4},
  pages = {188--211},
  url = {https://tosc.iacr.org/index.php/ToSC/article/view/813},
  doi = {10.13154/tosc.v2017.i4.188-211}
}
Krasnova A (2017), "Smart invaders of private matters: Privacy of communication on the Internet and in the Internet of Things (IoT)". Thesis at: Radboud University. , pp. XXV, 203.
BibTeX:
@phdthesis{dis-2017-Krasnova-a,
  author = {Krasnova, A.},
  title = {Smart invaders of private matters: Privacy of communication on the Internet and in the Internet of Things (IoT)},
  school = {Radboud University},
  year = {2017},
  pages = {XXV, 203},
  url = {http://hdl.handle.net/2066/175985}
}
Luckow K, Kersten RWJ and Pasareanu C (2017), "Symbolic Complexity Analysis using Context-preserving Histories", In ICST 2017: 10th IEEE International Conference on Software Testing, Verification and Validation, 13-17 March 2017, Tokyo, Japan. Proceedings. Los Alamitos , pp. 58-68. IEEE.
BibTeX:
@inproceedings{dis-2017-Luckow-a,
  author = {Luckow, K. and Kersten, R. W. J. and Pasareanu, C.},
  editor = {Bilof, R.},
  title = {Symbolic Complexity Analysis using Context-preserving Histories},
  booktitle = {ICST 2017: 10th IEEE International Conference on Software Testing, Verification and Validation, 13-17 March 2017, Tokyo, Japan. Proceedings},
  publisher = {IEEE},
  year = {2017},
  pages = {58--68},
  url = {https://doi.org/10.1109/ICST.2017.13},
  doi = {10.1109/ICST.2017.13}
}
Lueks W (2017), "Security and Privacy via Cryptography Having your cake and eating it too". Thesis at: Radboud University. , pp. xvi, 219. s.n..
BibTeX:
@phdthesis{dis-2017-Lueks-a,
  author = {Lueks, W.},
  title = {Security and Privacy via Cryptography Having your cake and eating it too},
  publisher = {s.n.},
  school = {Radboud University},
  year = {2017},
  pages = {xvi, 219},
  url = {http://hdl.handle.net/2066/176475}
}
Lueks W, Alpár G, Hoepman J-H and Vullers P (2017), "Fast revocation of attribute-based credentials for both users and verifiers", Computers & Security. Vol. 67(June), pp. 308-323.
BibTeX:
@article{dis-2017-Lueks-b,
  author = {Lueks, W. and Alpár, G. and Hoepman, J.-H. and Vullers, P.},
  title = {Fast revocation of attribute-based credentials for both users and verifiers},
  journal = {Computers & Security},
  year = {2017},
  volume = {67},
  number = {June},
  pages = {308--323},
  url = {http://hdl.handle.net/2066/173188},
  doi = {10.1016/j.cose.2016.11.018}
}
Luykx A, Mennink B and Paterson KG (2017), "Analyzing Multi-Key Security Degradation", In Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II. Cham , pp. 575-605. Springer.
BibTeX:
@incollection{dis-2017-Luykx-a,
  author = {Luykx, A. and Mennink, B. and Paterson, K. G.},
  editor = {Takagi, T.},
  title = {Analyzing Multi-Key Security Degradation},
  booktitle = {Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II},
  publisher = {Springer},
  year = {2017},
  pages = {575--605},
  url = {http://hdl.handle.net/2066/179039},
  doi = {10.1007/978-3-319-70697-9_20}
}
Massolino PM, Batina L, Chaves R and Mentens N (2017), "Area-optimized montgomery multiplication on IGLOO 2 FPGAs", In 2017 27th International Conference on Field Programmable Logic and Applications (FPL) September 4-6, 2017 Gent, Belgium. New York , pp. 1-4. ACM.
BibTeX:
@inproceedings{dis-2017-Massolino-a,
  author = {Massolino, P. M. and Batina, L. and Chaves, R. and Mentens, N.},
  editor = {Santambrogio, M.},
  title = {Area-optimized montgomery multiplication on IGLOO 2 FPGAs},
  booktitle = {2017 27th International Conference on Field Programmable Logic and Applications (FPL) September 4-6, 2017 Gent, Belgium},
  publisher = {ACM},
  year = {2017},
  pages = {1--4},
  url = {https://doi.org/10.23919/FPL.2017.8056762},
  doi = {10.23919/FPL.2017.8056762}
}
Mella S, Daemen JJC and Van Assche G (2017), "New techniques for trail bounds and application to differential trails in Keccak", IACR Transaction of Symmetric Cryptology. Vol. 2017(1), pp. 329-357.
BibTeX:
@article{dis-2017-Mella-a,
  author = {Mella, S. and Daemen, J. J. C. and Van Assche, G.},
  title = {New techniques for trail bounds and application to differential trails in Keccak},
  journal = {IACR Transaction of Symmetric Cryptology},
  year = {2017},
  volume = {2017},
  number = {1},
  pages = {329--357},
  url = {http://hdl.handle.net/2066/173213},
  doi = {10.13154/tosc.v2017.i1.329-357}
}
Mennink B (2017), "De verjaardagsparadox in de cryptografie", Nieuw Archief voor Wiskunde. Vol. 18(3), pp. 190-194.
BibTeX:
@article{dis-2017-Mennink-a,
  author = {Mennink, B.},
  title = {De verjaardagsparadox in de cryptografie},
  journal = {Nieuw Archief voor Wiskunde},
  year = {2017},
  volume = {18},
  number = {3},
  pages = {190--194}
}
Mennink B (2017), "Optimal collision security in double block length hashing with single length key", Des. Codes Cryptography. Vol. 83(2), pp. 357-406.
BibTeX:
@article{dis-2017-Mennink-b,
  author = {Mennink, B.},
  title = {Optimal collision security in double block length hashing with single length key},
  journal = {Des. Codes Cryptography},
  year = {2017},
  volume = {83},
  number = {2},
  pages = {357--406},
  url = {https://doi.org/10.1007/s10623-016-0227-2},
  doi = {10.1007/s10623-016-0227-2}
}
Mennink B (2017), "Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security".
BibTeX:
@misc{dis-2017-Mennink-c,
  author = {Mennink, B.},
  title = {Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security},
  publisher = {Youtube},
  year = {2017},
  note = {Event: Advances in Cryptology -- CRYPTO 2017: 37th Annual International Cryptology Conference, 2017-08-20 - 2017-08-24},
  url = {https://www.youtube.com/watch?v=_4Djup9DmUE}
}
Mennink B (2017), "Weak Keys for AEZ, and the External Key Padding Attack", In Topics in Cryptology -- CT-RSA 2017: The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14--17, 2017, Proceedings. Cham , pp. 223-237. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Mennink-d,
  author = {Mennink, B.},
  editor = {Handschuh, H.},
  title = {Weak Keys for AEZ, and the External Key Padding Attack},
  booktitle = {Topics in Cryptology -- CT-RSA 2017: The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14--17, 2017, Proceedings},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {223--237},
  url = {https://doi.org/10.1007/978-3-319-52153-4_13},
  doi = {10.1007/978-3-319-52153-4_13}
}
Mennink B and Neves S (2017), "Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory", In Advances in Cryptology -- CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20--24, 2017, Proceedings, Part III. Cham , pp. 556-583. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Mennink-e,
  author = {Mennink, B. and Neves, S.},
  editor = {Katz, J. and Shacham, H.},
  title = {Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory},
  booktitle = {Advances in Cryptology -- CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20--24, 2017, Proceedings, Part III},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {556--583},
  url = {https://doi.org/10.1007/978-3-319-63697-9_19},
  doi = {10.1007/978-3-319-63697-9_19}
}
Mennink B and Neves S (2017), "Optimal PRFs from Blockcipher Designs", IACR Transaction of Symmetric Cryptology. Vol. 2017(3), pp. 228-252.
BibTeX:
@article{dis-2017-Mennink-f,
  author = {Mennink, B. and Neves, S.},
  title = {Optimal PRFs from Blockcipher Designs},
  journal = {IACR Transaction of Symmetric Cryptology},
  year = {2017},
  volume = {2017},
  number = {3},
  pages = {228--252},
  url = {http://hdl.handle.net/2066/178460},
  doi = {10.13154/tosc.v2017.i3.228-252}
}
Mennink B and Stevens M (2017), "Wiskunde in de cryptografie (Redactioneel)", Nieuw Archief voor Wiskunde. Vol. 18(3), pp. 155-155.
BibTeX:
@article{dis-2017-Mennink-g,
  author = {Mennink, B. and Stevens, M.},
  title = {Wiskunde in de cryptografie (Redactioneel)},
  journal = {Nieuw Archief voor Wiskunde},
  year = {2017},
  volume = {18},
  number = {3},
  pages = {155--155}
}
Mennink B and Szepieniec A (2017), "XOR of PRPs in a Quantum World", In Post-Quantum Cryptography : 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings. Cham , pp. 367-383. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Mennink-h,
  author = {Mennink, B. and Szepieniec, A.},
  editor = {Lange, T. and Takagi, T.},
  title = {XOR of PRPs in a Quantum World},
  booktitle = {Post-Quantum Cryptography : 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {367--383},
  url = {https://doi.org/10.1007/978-3-319-59879-6_21},
  doi = {10.1007/978-3-319-59879-6_21}
}
Nascimento E, Chmielewski L, Oswald D and Schwabe P (2017), "Attacking embedded ECC implementations through cmov side channels", In Selected Areas in Cryptology -- SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers. Berlin , pp. 99-119. Springer.
BibTeX:
@incollection{dis-2017-Nascimento-a,
  author = {Nascimento, E. and Chmielewski, L. and Oswald, D. and Schwabe, P.},
  editor = {Avanzi, R.},
  title = {Attacking embedded ECC implementations through cmov side channels},
  booktitle = {Selected Areas in Cryptology -- SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  publisher = {Springer},
  year = {2017},
  pages = {99--119},
  url = {https://doi.org/10.1007/978-3-319-69453-5_6},
  doi = {10.1007/978-3-319-69453-5_6}
}
Papachristodoulou L, Batina L and Mentens N (2017), "Recent Developments in Side-Channel Analysis on Elliptic Curve Cryptography Implementations", In Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment. Cham , pp. 49-76. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Papachristodoulou-a,
  author = {Papachristodoulou, L. and Batina, L. and Mentens, N.},
  editor = {Sklavos, N. and Chaves, R. and Di Natale, G. and Regazzoni, F.},
  title = {Recent Developments in Side-Channel Analysis on Elliptic Curve Cryptography Implementations},
  booktitle = {Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {49--76},
  url = {https://doi.org/10.1007/978-3-319-44318-8_3},
  doi = {10.1007/978-3-319-44318-8_3}
}
van Puijenbroek JPM and Hoepman J-H (2017), "Privacy Impact Assessments in Practice: Outcome of a Descriptive Field Research in the Netherlands", In IWPE 2017: International Workshop on Privacy Engineering: Proceedings of the 3rd International Workshop on Privacy Engineering, co-located with 38th IEEE Symposium on Security and Privacy (S&P 2017) San Jose (CA), USA, May 25, 2017. S.l. Vol. 1873, pp. 1-8. CEUR.
BibTeX:
@inproceedings{dis-2017-Puijenbroek-a,
  author = {van Puijenbroek, J. P. M. and Hoepman, J.-H.},
  editor = {del Alamo, J. M.},
  title = {Privacy Impact Assessments in Practice: Outcome of a Descriptive Field Research in the Netherlands},
  booktitle = {IWPE 2017: International Workshop on Privacy Engineering: Proceedings of the 3rd International Workshop on Privacy Engineering, co-located with 38th IEEE Symposium on Security and Privacy (S&P 2017) San Jose (CA), USA, May 25, 2017},
  publisher = {CEUR},
  year = {2017},
  volume = {1873},
  pages = {1--8},
  url = {http://ceur-ws.org/Vol-1873/IWPE17_paper_7.pdf}
}
Renes J and Smith B (2017), "qDSA: Small and Secure Digital Signatures with Curve-Based Diffie--Hellman Key Pairs", In Advances in Cryptology -- ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II. Cham , pp. 273-302. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Renes-a,
  author = {Renes, J. and Smith, B.},
  editor = {Takagi, T.},
  title = {qDSA: Small and Secure Digital Signatures with Curve-Based Diffie--Hellman Key Pairs},
  booktitle = {Advances in Cryptology -- ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {273--302},
  url = {http://hdl.handle.net/2066/179047},
  doi = {10.1007/978-3-319-70697-9_10}
}
Ringers S, Verheul ER and Hoepman J (2017), "An Efficient Self-blindable Attribute-Based Credential Scheme", In Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Vol. 10322, pp. 3-20. Springer.
BibTeX:
@inproceedings{dis-2017-Ringers-a,
  author = {Sietse Ringers and Eric R. Verheul and Jaap-Henk Hoepman},
  editor = {Aggelos Kiayias},
  title = {An Efficient Self-blindable Attribute-Based Credential Scheme},
  booktitle = {Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  publisher = {Springer},
  year = {2017},
  volume = {10322},
  pages = {3--20},
  doi = {10.1007/978-3-319-70972-7_1}
}
Samwel N and Daemen JJC (2017), "DPA on hardware implementations of Ascon and Keyak", In CF'17 Proceedings of the Computing Frontiers Conference: Siena, Italy --- May 15 - 17, 2017. New York , pp. 415-424. ACM.
BibTeX:
@inproceedings{dis-2017-Samwel-a,
  author = {Samwel, N. and Daemen, J. J. C.},
  editor = {Giorgi, R.},
  title = {DPA on hardware implementations of Ascon and Keyak},
  booktitle = {CF'17 Proceedings of the Computing Frontiers Conference: Siena, Italy --- May 15 - 17, 2017},
  publisher = {ACM},
  year = {2017},
  pages = {415--424},
  url = {https://doi.org/10.1145/3075564.3079067},
  doi = {10.1145/3075564.3079067}
}
(2017), "Companion to the first International Conference on the Art, Science and Engineering of Programming, Programming 2017, Brussels, Belgium, April 3-6, 2017" ACM.
BibTeX:
@proceedings{dis-2017-Sartor-a,,
  editor = {Jennifer B. Sartor and Theo D'Hondt and Wolfgang De Meuter},
  title = {Companion to the first International Conference on the Art, Science and Engineering of Programming, Programming 2017, Brussels, Belgium, April 3-6, 2017},
  publisher = {ACM},
  year = {2017},
  url = {http://doi.acm.org/10.1145/3079368},
  doi = {10.1145/3079368}
}
Schoolderman M (2017), "Verifying Branch-Free Assembly Code in Why3", In Verified Software. Theories, Tools, and Experiments: 9th International Conference, VSTTE 2017, Heidelberg, Germany, July 22-23, 2017, Revised Selected Papers. Cham , pp. 66-83. Springer International Publishing.
BibTeX:
@inproceedings{dis-2017-Schoolderman-a,
  author = {Schoolderman, Marc},
  editor = {Paskevich, A. and Wies, T.},
  title = {Verifying Branch-Free Assembly Code in Why3},
  booktitle = {Verified Software. Theories, Tools, and Experiments: 9th International Conference, VSTTE 2017, Heidelberg, Germany, July 22-23, 2017, Revised Selected Papers},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {66--83},
  url = {https://doi.org/10.1007/978-3-319-72308-2_5},
  doi = {10.1007/978-3-319-72308-2_5}
}
Schwabe P and Stoffelen K (2017), "All the AES You Need on Cortex-M3 and M4", In Selected Areas in Cryptography -- SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers. Cham , pp. 180-194. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Schwabe-a,
  author = {Schwabe, P. and Stoffelen, K.},
  editor = {Avanzi, R. and Heys, H.},
  title = {All the AES You Need on Cortex-M3 and M4},
  booktitle = {Selected Areas in Cryptography -- SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {180--194},
  url = {http://hdl.handle.net/2066/178459},
  doi = {10.1007/978-3-319-69453-5_10}
}
Smetsers-Weeda R and Smetsers S (2017), "Problem Solving and Algorithmic Development with Flowcharts", In WiPSCE '17: Proceedings of the 12th Workshop on Primary and Secondary Computing Education, Nijmegen, Netherlands --- November 08 - 10, 2017. New York , pp. 25-34. ACM.
BibTeX:
@incollection{dis-2017-Smetsers-Weeda-a,
  author = {Smetsers-Weeda, R. and Smetsers, S.},
  editor = {Barendsen, E.},
  title = {Problem Solving and Algorithmic Development with Flowcharts},
  booktitle = {WiPSCE '17: Proceedings of the 12th Workshop on Primary and Secondary Computing Education, Nijmegen, Netherlands --- November 08 - 10, 2017},
  publisher = {ACM},
  year = {2017},
  pages = {25--34},
  url = {https://doi.org/10.1145/3137065.3137080},
  doi = {10.1145/3137065.3137080}
}
Soesman L, Eekelen Mv and Houtum Bv (2017), "De Wiskunde van Rubik's Kubus" Amsterdam , pp. 65. Epsilon Uitgaven.
BibTeX:
@book{dis-2017-Soesman-a,
  author = {Soesman, L. and Eekelen, M. van and Houtum, B. van},
  title = {De Wiskunde van Rubik's Kubus},
  publisher = {Epsilon Uitgaven},
  year = {2017},
  pages = {65}
}
Spolaor R, Abudahi L, Moonsamy V, Conti M and Poovendran R (2017), "No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices", In Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Cham , pp. 83-102. Springer International Publishing.
BibTeX:
@incollection{dis-2017-Spolaor-a,
  author = {Spolaor, R. and Abudahi, L. and Moonsamy, V. and Conti, M. and Poovendran, R.},
  editor = {Gollmann, D. and Miyaji, A. and Kikuchi, H.},
  title = {No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices},
  booktitle = {Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  publisher = {Springer International Publishing},
  year = {2017},
  pages = {83--102},
  url = {https://doi.org/10.1007/978-3-319-61204-1_5},
  doi = {10.1007/978-3-319-61204-1_5}
}
Symeonidis I, Abdelrahaman A, Mustafa MA, Mennink B, Dhooghe S and Preneel B (2017), "SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision", In Computer Security - ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017. Berlin , pp. 475-493. Springer.
BibTeX:
@incollection{dis-2017-Symeonidis-a,
  author = {Symeonidis, I. and Abdelrahaman, A. and Mustafa, M. A. and Mennink, B. and Dhooghe, S. and Preneel, B.},
  editor = {Foley, S. N.},
  title = {SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision},
  booktitle = {Computer Security - ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017},
  publisher = {Springer},
  year = {2017},
  pages = {475--493},
  url = {http://hdl.handle.net/2066/178466},
  doi = {10.1007/978-3-319-66399-9_26}
}
Thomas RJ, Ordean M, Chothia T and de Ruiter J (2017), "TRAKS: A Universal Key Management Scheme for ERTMS", In ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA --- December 04 - 08, 2017. Proceedings. New York , pp. 327-338. ACM.
BibTeX:
@inproceedings{dis-2017-Thomas-a,
  author = {Thomas, R. J. and Ordean, M. and Chothia, T. and de Ruiter, J.},
  title = {TRAKS: A Universal Key Management Scheme for ERTMS},
  booktitle = {ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA --- December 04 - 08, 2017. Proceedings},
  publisher = {ACM},
  year = {2017},
  pages = {327--338},
  url = {https://doi.org/10.1145/3134600.3134631},
  doi = {10.1145/3134600.3134631}
}
Trattner C, Rokicki M and Herder E (2017), "On the Relations Between Cooking Interests, Hobbies and Nutritional Values of Online Recipes", In UMAP '17 Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization, Bratislava, Slovakia --- July 09 - 12, 2017. New York , pp. 59-64. ACM.
BibTeX:
@inproceedings{dis-2017-Trattner-a,
  author = {Trattner, C. and Rokicki, M. and Herder, E.},
  editor = {Tkalcic, M.},
  title = {On the Relations Between Cooking Interests, Hobbies and Nutritional Values of Online Recipes},
  booktitle = {UMAP '17 Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization, Bratislava, Slovakia --- July 09 - 12, 2017},
  publisher = {ACM},
  year = {2017},
  pages = {59--64},
  url = {https://doi.org/10.1145/3099023.3099072},
  doi = {10.1145/3099023.3099072}
}
Vandewalle J, Berbers Y, Hildebrandt M, Debeuckelaere W, De Hert P, Desmedt Y, De Smet F, Poels K, Pierson J and Preneel B (2017), "Privacy in tijden van internet, sociale netwerken en big data", Standpunten Koninklijke Vlaamse Academie van België voor Wetenschappen en Kunsten. Vol. 49
BibTeX:
@article{dis-2017-Vandewalle-a,
  author = {Vandewalle, Joos and Berbers, Yolande and Hildebrandt, Mireille and Debeuckelaere, Willem and De Hert, Paul and Desmedt, Yvo and De Smet, Frank and Poels, Karolien and Pierson, Jo and Preneel, Bart},
  title = {Privacy in tijden van internet, sociale netwerken en big data},
  journal = {Standpunten Koninklijke Vlaamse Academie van België voor Wetenschappen en Kunsten},
  year = {2017},
  volume = {49},
  url = {http://www.kvab.be/standpunten/privacy-tijden-van-internet-sociale-netwerken-en-big-data}
}
Verbeek F and van Vugt N (2017), "Estimating worst-case latency of on-chip interconnects with formal simulation", In fmcad.17 :Proceedings of the 17th Conference on Formal Methods in Computer-Aided Design (FMCAD 2017) TU Wien, Vienna, Austria, October 2-6, 2017. New York , pp. 204-211. ACM;IEEE.
BibTeX:
@inproceedings{dis-2017-Verbeek-a,
  author = {Verbeek, F. and van Vugt, N.},
  editor = {Stewart, D.},
  title = {Estimating worst-case latency of on-chip interconnects with formal simulation},
  booktitle = {fmcad.17 :Proceedings of the 17th Conference on Formal Methods in Computer-Aided Design (FMCAD 2017) TU Wien, Vienna, Austria, October 2-6, 2017},
  publisher = {ACM;IEEE},
  year = {2017},
  pages = {204--211},
  url = {https://doi.org/10.23919/fmcad.2017.8102261},
  doi = {10.23919/fmcad.2017.8102261}
}
Verbeek F, Yaghini PM, Eghbal A and Bagherzadeh N (2017), "Deadlock Verification of Cache Coherence Protocols and Communication Fabrics", IEEE Transactions on Computers. Vol. 66(2), pp. 272-284.
BibTeX:
@article{dis-2017-Verbeek-b,
  author = {Verbeek, F. and Yaghini, P. M. and Eghbal, A. and Bagherzadeh, N.},
  title = {Deadlock Verification of Cache Coherence Protocols and Communication Fabrics},
  journal = {IEEE Transactions on Computers},
  year = {2017},
  volume = {66},
  number = {2},
  pages = {272--284},
  url = {https://doi.org/10.1109/TC.2016.2584060},
  doi = {10.1109/TC.2016.2584060}
}
Verheul E (2017), "The polymorphic eIDAS token - the privacy-friendliness of the eIDAS token and the efficiency of a federated setup", Keesing Journal of Documents & Identity. Vol. 2
BibTeX:
@article{dis-2017-Verheul-a,
  author = {Verheul, E.R.},
  title = {The polymorphic eIDAS token - the privacy-friendliness of the eIDAS token and the efficiency of a federated setup},
  journal = {Keesing Journal of Documents & Identity},
  year = {2017},
  volume = {2},
  url = {http://www.betaidacademy.com/2017/07/19/the-polymorphic-eidas-token/}
}
Verheul E and Jacobs B (2017), "Polymorphic Encryption and Pseudonymisation in Identity Management and Medical Research", Nieuw Archief voor Wiskunde. Vol. 18(3), pp. 168-172.
BibTeX:
@article{dis-2017-Verheul-b,
  author = {Verheul, E. and Jacobs, B.},
  title = {Polymorphic Encryption and Pseudonymisation in Identity Management and Medical Research},
  journal = {Nieuw Archief voor Wiskunde},
  year = {2017},
  volume = {18},
  number = {3},
  pages = {168--172},
  url = {http://hdl.handle.net/2066/178461}
}
Verheul E, Ringers S and Hoepman J-H (2017), "The Self-blindable U-Prove Scheme from FC'14 Is Forgeable (Short Paper)", In Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22--26, 2016, Revised Selected Papers. Berlin, Heidelberg , pp. 339-345. Springer Berlin Heidelberg.
BibTeX:
@incollection{dis-2017-Verheul-c,
  author = {Verheul, E. and Ringers, S. and Hoepman, J.-H.},
  editor = {Grossklags, J. and Preneel, B.},
  title = {The Self-blindable U-Prove Scheme from FC'14 Is Forgeable (Short Paper)},
  booktitle = {Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22--26, 2016, Revised Selected Papers},
  publisher = {Springer Berlin Heidelberg},
  year = {2017},
  pages = {339--345},
  url = {https://doi.org/10.1007/978-3-662-54970-4_20},
  doi = {10.1007/978-3-662-54970-4_20}
}
Volokitin S and Poll E (2017), "Logical Attacks on Secured Containers of the Java Card Platform", In Smart Card Research and Advanced Applications: 15th International Conference, CARDIS 2016, Cannes, France, November 7--9, 2016, Revised Selected Papers. Berlin Vol. 10146, pp. 122-136. Springer.
BibTeX:
@inproceedings{dis-2017-Volokitin-a,
  author = {Volokitin, S. and Poll, E.},
  editor = {Lemke-Rust, K.},
  title = {Logical Attacks on Secured Containers of the Java Card Platform},
  booktitle = {Smart Card Research and Advanced Applications: 15th International Conference, CARDIS 2016, Cannes, France, November 7--9, 2016, Revised Selected Papers},
  publisher = {Springer},
  year = {2017},
  volume = {10146},
  pages = {122--136},
  url = {https://doi.org/10.1007/978-3-319-54669-8_8},
  doi = {10.1007/978-3-319-54669-8_8}
}
Vranken HPE (2017), "Sustainability of bitcoin and blockchains", Current Opinion in Environmental Sustainability. Vol. 28(Supplement C), pp. 1-9.
BibTeX:
@article{dis-2017-Vranken-a,
  author = {Vranken, H. P. E.},
  title = {Sustainability of bitcoin and blockchains},
  journal = {Current Opinion in Environmental Sustainability},
  year = {2017},
  volume = {28},
  number = {Supplement C},
  pages = {1--9},
  url = {https://doi.org/10.1016/j.cosust.2017.04.011},
  doi = {10.1016/j.cosust.2017.04.011}
}
Walree TF (2017), "De vergoedbare schade bij de onrechtmatige verwerking van persoonsgegevens", Weekblad voor Privaatrecht, Notariaat en Registratie. Vol. 148(7172), pp. 921-930.
BibTeX:
@article{dis-2017-Walree-a,
  author = {Walree, T. F.},
  title = {De vergoedbare schade bij de onrechtmatige verwerking van persoonsgegevens},
  journal = {Weekblad voor Privaatrecht, Notariaat en Registratie},
  year = {2017},
  volume = {148},
  number = {7172},
  pages = {921--930}
}
Westerbaan B, Westerbaan B, Kuyper R, Tankink C, Viehoff R and Barendregt H (2017), "Statman's Hierarchy Theorem", Logical Methods in Computer Science. Vol. 13(4), pp. 1-39.
BibTeX:
@article{dis-2017-Westerbaan-a,
  author = {Westerbaan, B. and Westerbaan, Bas and Kuyper, R. and Tankink, C. and Viehoff, R. and Barendregt, H.},
  title = {Statman's Hierarchy Theorem},
  journal = {Logical Methods in Computer Science},
  year = {2017},
  volume = {13},
  number = {4},
  pages = {1--39},
  url = {https://doi.org/10.23638/LMCS-13(4:19)2017},
  doi = {10.23638/LMCS-13(4:19)2017}
}

2016

Alkim E, Ducas L, Pöppelmann T and Schwabe P (2016), "Post-quantum key exchange -- a new hope", In Proceedings of the 25th USENIX Security Symposium. USENIX Association.
BibTeX:
@inproceedings{dis-2016-Alkim-a,
  author = {Erdem Alkim and Léo Ducas and Thomas Pöppelmann and Peter Schwabe},
  title = {Post-quantum key exchange -- a new hope},
  booktitle = {Proceedings of the 25th USENIX Security Symposium},
  publisher = {USENIX Association},
  year = {2016},
  note = {http://cryptojedi.org/papers/\#newhope}
}
Alkim E, Jakubeit P and Schwabe P (2016), "A new hope on ARM Cortex-M", In Security, Privacy, and Advanced Cryptography Engineering. Springer-Verlag Berlin Heidelberg.
BibTeX:
@inproceedings{dis-2016-Alkim-b,
  author = {Erdem Alkim and Philipp Jakubeit and Peter Schwabe},
  editor = {Claude Carlet and Anwar Hasan and Vishal Saraswat},
  title = {A new hope on ARM Cortex-M},
  booktitle = {Security, Privacy, and Advanced Cryptography Engineering},
  publisher = {Springer-Verlag Berlin Heidelberg},
  year = {2016},
  note = {http://cryptojedi.org/papers/\#newhopearm}
}
Alpár G, Batina L, Batten L, Moonsamy V, Krasnova A, Guellier A and Natgunanathan I (2016), "New directions in IoT privacy using attribute-based authentication", In Proceedings of the ACM International Conference on Computing Frontiers. , pp. 461-466.
BibTeX:
@inproceedings{dis-2016-Alpar-a,
  author = {Alpár, Gergely and Batina, Lejla and Batten, Lynn and Moonsamy, Veelasha and Krasnova, Anna and Guellier, Antoine and Natgunanathan, Iynkaran},
  title = {New directions in IoT privacy using attribute-based authentication},
  booktitle = {Proceedings of the ACM International Conference on Computing Frontiers},
  year = {2016},
  pages = {461--466}
}
Batina L, Bhunia S, Schaumont P and Seifert J (2016), "Foundations of Secure Scaling (Dagstuhl Seminar 16342)", Dagstuhl Reports. Vol. 6(8), pp. 65-90.
BibTeX:
@article{dis-2016-Batina-a,
  author = {Lejla Batina and Swarup Bhunia and Patrick Schaumont and Jean-Pierre Seifert},
  title = {Foundations of Secure Scaling (Dagstuhl Seminar 16342)},
  journal = {Dagstuhl Reports},
  year = {2016},
  volume = {6},
  number = {8},
  pages = {65--90}
}
Bertoni G, Daemen J, Peeters M, Assche GV and Keer RV (2016), "KangarooTwelve: fast hashing based on Keccak-p", IACR Cryptology ePrint Archive. Vol. 2016, pp. 770.
BibTeX:
@article{dis-2016-Bertoni-a,
  author = {Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche and Ronny Van Keer},
  title = {KangarooTwelve: fast hashing based on Keccak-p},
  journal = {IACR Cryptology ePrint Archive},
  year = {2016},
  volume = {2016},
  pages = {770},
  url = {http://eprint.iacr.org/2016/770}
}
Bertoni G, Daemen J, Peeters M, Assche GV and Keer RV (2016), "Farfalle: parallel permutation-based cryptography", Cryptology ePrint Archive, Report 2016/1188.
BibTeX:
@misc{dis-2016-Bertoni-b,
  author = {Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche and Ronny Van Keer},
  title = {Farfalle: parallel permutation-based cryptography},
  howpublished = {Cryptology ePrint Archive, Report 2016/1188},
  year = {2016},
  note = {http://eprint.iacr.org/2016/1188}
}
van den Broek F (2016), "Mobile communication security". Thesis at: Radboud University, Nijmegen.
BibTeX:
@phdthesis{dis-2016-Broek-a,
  author = {Fabian van den Broek},
  title = {Mobile communication security},
  school = {Radboud University, Nijmegen},
  year = {2016}
}
van den Broek F, Hampiholi B and Jacobs B (2016), "Securely Derived Identity Credentials on Smart Phones via Self-enrolment", In Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Cham , pp. 106-121. Springer International Publishing.
BibTeX:
@inproceedings{dis-2016-Broek-b,
  author = {van den Broek, Fabian and Hampiholi, Brinda and Jacobs, Bart},
  editor = {Barthe, Gilles and Markatos, Evangelos and Samarati, Pierangela},
  title = {Securely Derived Identity Credentials on Smart Phones via Self-enrolment},
  booktitle = {Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  publisher = {Springer International Publishing},
  year = {2016},
  pages = {106--121},
  url = {http://dx.doi.org/10.1007/978-3-319-46598-2_8},
  doi = {10.1007/978-3-319-46598-2_8}
}
(2016), "Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings" Vol. 10076 Springer.
BibTeX:
@proceedings{dis-2016-Carlet-a,,
  editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat},
  title = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings},
  publisher = {Springer},
  year = {2016},
  volume = {10076},
  url = {http://dx.doi.org/10.1007/978-3-319-49445-6},
  doi = {10.1007/978-3-319-49445-6}
}
Chen M-S, Hülsing A, Rijneveld J, Samardjiska S and Schwabe P (2016), "From 5-pass MQ-based identification to MQ-based signatures", In Advances in Cryptology -- ASIACRYPT 2016. Vol. 10032, pp. 135-165. Springer.
BibTeX:
@inproceedings{dis-2016-Chen-a,
  author = {Ming-Shing Chen and Andreas Hülsing and Joost Rijneveld and Simona Samardjiska and Peter Schwabe},
  editor = {Jung Hee Cheon and Tsuyoshi Takagi},
  title = {From 5-pass MQ-based identification to MQ-based signatures},
  booktitle = {Advances in Cryptology -- ASIACRYPT 2016},
  publisher = {Springer},
  year = {2016},
  volume = {10032},
  pages = {135--165},
  doi = {10.1007/978-3-662-53890-6_5}
}
Cho K (2016), "Semantics for a Quantum Programming Language by Operator Algebras", New Generation Computing. Vol. 34(1), pp. 25-68.
BibTeX:
@article{dis-2016-Cho-a,
  author = {Kenta Cho},
  title = {Semantics for a Quantum Programming Language by Operator Algebras},
  journal = {New Generation Computing},
  year = {2016},
  volume = {34},
  number = {1},
  pages = {25--68},
  doi = {10.1007/s00354-016-0204-3}
}
Chothia T and de Ruiter J (2016), "Learning From Others’ Mistakes: Penetration Testing IoT Devices in the Classroom", In 2016 USENIX Workshop on Advances in Security Education (ASE 16). Austin, TX, August, 2016. USENIX Association.
BibTeX:
@inproceedings{dis-2016-Chothia-a,
  author = {Tom Chothia and Joeri de Ruiter},
  title = {Learning From Others’ Mistakes: Penetration Testing IoT Devices in the Classroom},
  booktitle = {2016 USENIX Workshop on Advances in Security Education (ASE 16)},
  publisher = {USENIX Association},
  year = {2016}
}
Colesky M and Ghanavati S (2016), "Privacy Shielding by Design - A Strategies Case for Near-Compliance", In RELAW. IEEE Computer Society.
BibTeX:
@inproceedings{dis-2016-Colesky-a,
  author = {Colesky, Michael and Ghanavati, Sepideh},
  title = {Privacy Shielding by Design - A Strategies Case for Near-Compliance},
  booktitle = {RELAW},
  publisher = {IEEE Computer Society},
  year = {2016},
  url = {https://www.computer.org/csdl/proceedings/relaw/index.html}
}
Colesky M, Hoepman J-H and Hillen C (2016), "A Critical Analysis of Privacy Design Strategies", In 2016 International Workshop on Privacy Engineering -- IWPE'16. San Jose, CA, USA, May 26, 2016. , pp. 33-40.
BibTeX:
@inproceedings{dis-2016-Colesky-b,
  author = {Michael Colesky and Jaap-Henk Hoepman and Christiaan Hillen},
  title = {A Critical Analysis of Privacy Design Strategies},
  booktitle = {2016 International Workshop on Privacy Engineering -- IWPE'16},
  year = {2016},
  pages = {33--40}
}
Colesky M, Hoepman J-h and Hillen C (2016), "A Critical Analysis of Privacy Design Strategies", In IWPE. San Jose, CA IEEE.
BibTeX:
@inproceedings{dis-2016-Colesky-c,
  author = {Colesky, Michael and Hoepman, Jaap-henk and Hillen, Christiaan},
  title = {A Critical Analysis of Privacy Design Strategies},
  booktitle = {IWPE},
  publisher = {IEEE},
  year = {2016},
  url = {http://ieee-security.org/TC/SPW2016/IWPE/}
}
Cranen S, Keiren J and Willemse T (2016), "Parity Game Reductions"
BibTeX:
@techreport{dis-2016-Cranen-a,
  author = {Cranen, S. and Keiren, J.J.A. and Willemse, T.A.C.},
  title = {Parity Game Reductions},
  year = {2016},
  note = {arXiv:1603.06422 [cs.LO]},
  url = {https://arxiv.org/abs/1603.06422}
}
Daemen J (2016), "Spectral Characterization of Iterating Lossy Mappings", In Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings. , pp. 159-178.
BibTeX:
@inproceedings{dis-2016-Daemen-a,
  author = {Joan Daemen},
  title = {Spectral Characterization of Iterating Lossy Mappings},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings},
  year = {2016},
  pages = {159--178},
  url = {http://dx.doi.org/10.1007/978-3-319-49445-6_9},
  doi = {10.1007/978-3-319-49445-6_9}
}
Daemen J (2016), "Spectral characterization of iterating lossy mappings", IACR Cryptology ePrint Archive. Vol. 2016, pp. 90.
BibTeX:
@article{dis-2016-Daemen-b,
  author = {Joan Daemen},
  title = {Spectral characterization of iterating lossy mappings},
  journal = {IACR Cryptology ePrint Archive},
  year = {2016},
  volume = {2016},
  pages = {90},
  url = {http://eprint.iacr.org/2016/090}
}
Daemen J (2016), "Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing", IACR Cryptology ePrint Archive. Vol. 2016, pp. 1061.
BibTeX:
@article{dis-2016-Daemen-c,
  author = {Joan Daemen},
  title = {Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing},
  journal = {IACR Cryptology ePrint Archive},
  year = {2016},
  volume = {2016},
  pages = {1061},
  url = {http://eprint.iacr.org/2016/1061}
}
Daemen J (2016), "On Non-uniformity in Threshold Sharings", In Proceedings of the 2016 ACM Workshop on Theory of Implementation Security. New York, NY, USA , pp. 41-41. ACM.
BibTeX:
@inproceedings{dis-2016-Daemen-d,
  author = {Daemen, Joan},
  title = {On Non-uniformity in Threshold Sharings},
  booktitle = {Proceedings of the 2016 ACM Workshop on Theory of Implementation Security},
  publisher = {ACM},
  year = {2016},
  pages = {41--41},
  url = {http://doi.acm.org/10.1145/2996366.2996374},
  doi = {10.1145/2996366.2996374}
}
Dokter K, Jongmans S-S and Arbab F (2016), "Scheduling Games for Concurrent Systems", In Proceedings of COORDINATION 2016. Vol. 9686, pp. 84-100. Springer.
BibTeX:
@incollection{dis-2016-Dokter-a,
  author = {Kasper Dokter and Sung-Shik Jongmans and Farhad Arbab},
  editor = {Alberto Lluch-Lafuente and José Proença},
  title = {Scheduling Games for Concurrent Systems},
  booktitle = {Proceedings of COORDINATION 2016},
  publisher = {Springer},
  year = {2016},
  volume = {9686},
  pages = {84--100},
  doi = {10.1007/978-3-319-39519-7_6}
}
Dugardin M, Papachristodoulou L, Najm Z, Batina L, Danger J and Guilley S (2016), "Dismantling Real-World ECC with Horizontal and Vertical Template Attacks", In Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers. , pp. 88-108.
BibTeX:
@inproceedings{dis-2016-Dugardin-a,
  author = {Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guilley},
  title = {Dismantling Real-World ECC with Horizontal and Vertical Template Attacks},
  booktitle = {Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers},
  year = {2016},
  pages = {88--108}
}
(2016), "Resource Aware Computing - Proceedings of First International Workshop, RAC 2016, ETAPS, Eindhoven, The Netherlands, 2016", In Resource Aware Computing (RAC2016). Vol. 330, 46 pages Elsevier.
BibTeX:
@proceedings{dis-2016-Eekelen-a,,
  editor = {Marko van Eekelen and Kerstin Eder},
  title = {Resource Aware Computing - Proceedings of First International Workshop, RAC 2016, ETAPS, Eindhoven, The Netherlands, 2016},
  booktitle = {Resource Aware Computing (RAC2016)},
  publisher = {Elsevier},
  year = {2016},
  volume = {330, 46 pages}
}
van Eekelen M and Eder K (2016), "RAC 2016 - Resource Aware Computing. Preface in Marko van Eekelen and Kerstin Eder (Eds.). Proceedings of Resource Aware Computing (RAC2016) at ETAPS, Eindhoven".
BibTeX:
@misc{dis-2016-Eekelen-b,
  author = {Marko van Eekelen and Kerstin Eder},
  title = {RAC 2016 - Resource Aware Computing. Preface in Marko van Eekelen and Kerstin Eder (Eds.). Proceedings of Resource Aware Computing (RAC2016) at ETAPS, Eindhoven},
  year = {2016},
  volume = {330},
  pages = {1-3}
}
van Eekelen M and van Gastel B (2016), "Analysing energy consumption by software".
BibTeX:
@misc{dis-2016-Eekelen-c,
  author = {Marko van Eekelen and Bernard van Gastel},
  title = {Analysing energy consumption by software},
  year = {2016},
  note = {Technical report: ICIS-R16001, November, Radboud University Nijmegen, 2016. TACLe EU Cost Action. Summerschool Lecture Notes, Yspertal 2016}
}
(2016), "Foundational and Practical Aspects of Resource Analysis, 4th international workshop (FOPARA) 2015. Revised selected papers. Co-located with DICE 2015 at ETAPS, London", In Proceedings of Foundational and Practical Aspects of Resource Analysis 2015 (FOPARA '15). Vol. 9964 Springer International Publishing AG 2016, 127 pages.
BibTeX:
@proceedings{dis-2016-Eekelen-d,,
  editor = {Marko van Eekelen and Ugo Dal Lago},
  title = {Foundational and Practical Aspects of Resource Analysis, 4th international workshop (FOPARA) 2015. Revised selected papers. Co-located with DICE 2015 at ETAPS, London},
  booktitle = {Proceedings of Foundational and Practical Aspects of Resource Analysis 2015 (FOPARA '15)},
  publisher = {Springer International Publishing AG 2016, 127 pages},
  year = {2016},
  volume = {9964}
}
van Eekelen M and Lago UD (2016), "Preface of the FOPARA 2015 proceedings, pages i-ii. In Marko van Eekelen and Ugo Dal Lago (Eds.). Foundational and Practical Aspects of Resource Analysis, 4th international workshop (FOPARA) 2015. Revised selected papers. Co-located with DICE 2015 at ETAPS, London".
BibTeX:
@misc{dis-2016-Eekelen-e,
  author = {Marko van Eekelen and Ugo Dal Lago},
  title = {Preface of the FOPARA 2015 proceedings, pages i-ii. In Marko van Eekelen and Ugo Dal Lago (Eds.). Foundational and Practical Aspects of Resource Analysis, 4th international workshop (FOPARA) 2015. Revised selected papers. Co-located with DICE 2015 at ETAPS, London},
  year = {2016},
  volume = {9964}
}
Fereidooni H, Moonsamy V, Conti M and Batina L (2016), "Efficient Classification of Android Malware in the Wild Using Robust Static Features", In Protecting Mobile Networks and Devices., 2017/01/16, 2016. , pp. 179-208. CRC Press.
BibTeX:
@inbook{dis-2016-Fereidooni-a,
  author = {Hossein Fereidooni and Veelasha Moonsamy and Mauro Conti and Lejla Batina},
  title = {Efficient Classification of Android Malware in the Wild Using Robust Static Features},
  booktitle = {Protecting Mobile Networks and Devices},
  publisher = {CRC Press},
  year = {2016},
  pages = {179-208}
}
Fournaris AP, Papachristodoulou L, Batina L and Sklavos N (2016), "Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography", In 2016 International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2016, Istanbul, Turkey, April 12-14, 2016. , pp. 1-4.
BibTeX:
@inproceedings{dis-2016-Fournaris-a,
  author = {Apostolos P. Fournaris and Louiza Papachristodoulou and Lejla Batina and Nicolas Sklavos},
  title = {Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography},
  booktitle = {2016 International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2016, Istanbul, Turkey, April 12-14, 2016},
  year = {2016},
  pages = {1--4}
}
de Frutos Escrig D, Keiren J and Willemse T (2016), "Branching bisimulation games", In Proceedings of FORTE 2016. Vol. 9688, pp. 142-157. Springer.
BibTeX:
@incollection{dis-2016-deFrutosEscrig-a,
  author = {D. de Frutos Escrig and J.J.A. Keiren and T.A.C. Willemse},
  editor = {E. Albert and I. Lanese},
  title = {Branching bisimulation games},
  booktitle = {Proceedings of FORTE 2016},
  publisher = {Springer},
  year = {2016},
  volume = {9688},
  pages = {142--157},
  doi = {10.1007/978-3-319-39570-8_10}
}
de Frutos Escrig D, Keiren J and Willemse T (2016), "Games for Bisimulation and Abstraction"
BibTeX:
@techreport{dis-2016-deFrutosEscrig-b,
  author = {D. de Frutos Escrig and J.J.A. Keiren and T.A.C. Willemse},
  title = {Games for Bisimulation and Abstraction},
  year = {2016},
  note = {arXiv:1611.00401 [cs.LO]},
  url = {https://arxiv.org/abs/1611.00401}
}
Garcia F and Jacobs B (2016), "The Fall of a Tiny Star", In The New Codebreakers -- Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. (9100), pp. 69-87. Springer, Berlin.
BibTeX:
@inproceedings{dis-2016-Garcia-a,
  author = {F. Garcia and B. Jacobs},
  editor = {P. Ryan and D. Naccache and J.-J. Quisquater},
  title = {The Fall of a Tiny Star},
  booktitle = {The New Codebreakers -- Essays Dedicated to David Kahn on the Occasion of His 85th Birthday},
  publisher = {Springer, Berlin},
  year = {2016},
  number = {9100},
  pages = {69--87}
}
van Gastel B (2016), "Assessing sustainability of software; analysing correctness, memory and energy consumption". Thesis at: Open Universiteit.
BibTeX:
@phdthesis{dis-2016-Gastel-a,
  author = {Bernard van Gastel},
  title = {Assessing sustainability of software; analysing correctness, memory and energy consumption},
  school = {Open Universiteit},
  year = {2016},
  note = {In collaboration with the Radboud University.}
}
van Gastel B, Kersten R and van Eekelen M (2016), "Using Dependent Types to Define Energy Augmented Semantics of Programs", In FOPARA 2015. Vol. 9964, pp. 20-39. Springer-Verlag.
BibTeX:
@inproceedings{dis-2016-Gastel-b,
  author = {Bernard van Gastel and Rody Kersten and Marko van Eekelen},
  editor = {M. van Eekelen and U. Dal Lago},
  title = {Using Dependent Types to Define Energy Augmented Semantics of Programs},
  booktitle = {FOPARA 2015},
  publisher = {Springer-Verlag},
  year = {2016},
  volume = {9964},
  pages = {20-39}
}
Hansen M, Hoepman J-H and Jensen M (2016), "Towards Measuring Maturity of Privacy-Enhancing Technologies", In Annual Privacy Forum (APF 2015). , pp. 3-20.
BibTeX:
@inproceedings{dis-2016-Hansen-a,
  author = {Marit Hansen and Jaap-Henk Hoepman and Meiko Jensen},
  title = {Towards Measuring Maturity of Privacy-Enhancing Technologies},
  booktitle = {Annual Privacy Forum (APF 2015)},
  year = {2016},
  pages = {3--20}
}
Herrmann M, Hildebrandt M, Tielemans L and Diaz C (2016), "Privacy in Location-Based Services: An Interdisciplinary Approach", SCRIPTed., August, 2016. Vol. 13(2), pp. 144.
BibTeX:
@article{dis-2016-Herrmann-a,
  author = {Herrmann, Michael and Hildebrandt, Mireille and Tielemans, Laura and Diaz, Claudia},
  title = {Privacy in Location-Based Services: An Interdisciplinary Approach},
  journal = {SCRIPTed},
  year = {2016},
  volume = {13},
  number = {2},
  pages = {144},
  url = {https://script-ed.org/article/privacy-in-location-based-services-an-interdisciplinary-approach/},
  doi = {10.2966/scrip.130216.144}
}
Hildebrandt M (2016), "Law as Information in the Era of Data-Driven Agency", The Modern Law Review. Vol. 79(1), pp. 1-30.
BibTeX:
@article{dis-2016-Hildebrandt-a,
  author = {Hildebrandt, Mireille},
  title = {Law as Information in the Era of Data-Driven Agency},
  journal = {The Modern Law Review},
  year = {2016},
  volume = {79},
  number = {1},
  pages = {1--30},
  url = {http://dx.doi.org/10.1111/1468-2230.12165},
  doi = {10.1111/1468-2230.12165}
}
Hildebrandt M (2016), "Introduction. Information, freedom and property", In Information, Freedom and Property: The Philosophy of Law Meets the Philosophy of Technology. , pp. 1-6. Routledge.
BibTeX:
@incollection{dis-2016-Hildebrandt-b,
  author = {Hildebrandt, Mireille},
  editor = {Hildebrandt, M. and van den Berg, B.},
  title = {Introduction. Information, freedom and property},
  booktitle = {Information, Freedom and Property: The Philosophy of Law Meets the Philosophy of Technology},
  publisher = {Routledge},
  year = {2016},
  pages = {1--6},
  url = {https://books.google.nl/books?id=tHscjwEACAAJ}
}
Hildebrandt M (2016), "Properties, property and appropriateness of information", In Information, Freedom and Property: The Philosophy of Law Meets the Philosophy of Technology. , pp. 34-53. Routledge.
BibTeX:
@incollection{dis-2016-Hildebrandt-c,
  author = {Hildebrandt, Mireille},
  editor = {Hildebrandt, M. and van den Berg, B.},
  title = {Properties, property and appropriateness of information},
  booktitle = {Information, Freedom and Property: The Philosophy of Law Meets the Philosophy of Technology},
  publisher = {Routledge},
  year = {2016},
  pages = {34--53},
  url = {https://books.google.nl/books?id=tHscjwEACAAJ}
}
Hildebrandt M (2016), "New Animism in Policing: Re-animating the Rule of Law?", In The SAGE Handbook of Global Policing. 55 City Road, Dec, 2016. , pp. 406-428. SAGE Publications Ltd.
BibTeX:
@incollection{dis-2016-Hildebrandt-d,
  author = {Hildebrandt, Mireille},
  title = {New Animism in Policing: Re-animating the Rule of Law?},
  booktitle = {The SAGE Handbook of Global Policing},
  publisher = {SAGE Publications Ltd},
  year = {2016},
  pages = {406--428},
  url = {http://sk.sagepub.com/reference/the-sage-handbook-of-global-policing},
  doi = {10.4135/9781473957923}
}
Hildebrandt M (2016), "Datagestuurde Intelligentie in het Strafrecht, Preadvies Nederlandse Juristenvereniging 2016", In Homo Digitalis. Handelingen Nederlandse Juristenvereniging. Vol. 146, pp. 137-240.
BibTeX:
@article{dis-2016-Hildebrandt-e,
  author = {Hildebrandt, Mireille},
  title = {Datagestuurde Intelligentie in het Strafrecht, Preadvies Nederlandse Juristenvereniging 2016},
  booktitle = {Homo Digitalis. Handelingen Nederlandse Juristenvereniging},
  year = {2016},
  volume = {146},
  pages = {137--240},
  doi = {10.5117/9789462984493}
}
Hildebrandt M (2016), "The New Imbroglio. Living with machine algorithms", In The Art of Ethics in the Information Society. , pp. 55-60. Amsterdam University Press.
BibTeX:
@incollection{dis-2016-Hildebrandt-f,
  author = {Hildebrandt, Mireille},
  editor = {Liisa Janssens},
  title = {The New Imbroglio. Living with machine algorithms},
  booktitle = {The Art of Ethics in the Information Society},
  publisher = {Amsterdam University Press},
  year = {2016},
  pages = {55--60},
  doi = {10.5117/9789462984493}
}
Hildebrandt M (2016), "Datagedreven Onderwijs. Wijs of Onwijs?, Privacyrede 2016", SetUp Magazine 2016.
BibTeX:
@article{dis-2016-Hildebrandt-g,
  author = {M. Hildebrandt},
  title = {Datagedreven Onderwijs. Wijs of Onwijs?, Privacyrede 2016},
  journal = {SetUp Magazine 2016},
  year = {2016},
  url = {https://www.setup.nl/magazine/2016/09/privacyrede-2016}
}
(2016), "Information, Freedom and Property: The Philosophy of Law Meets the Philosophy of Technology" Routledge.
BibTeX:
@book{dis-2016-Hildebrandt-h,,
  editor = {Hildebrandt, M. and van den Berg, B.},
  title = {Information, Freedom and Property: The Philosophy of Law Meets the Philosophy of Technology},
  publisher = {Routledge},
  year = {2016},
  url = {https://books.google.nl/books?id=tHscjwEACAAJ}
}
Hino W, Hasuo HKI and Jacobs B (2016), "Healthiness from Duality" Computer Science Press.
BibTeX:
@unpublished{dis-2016-Hino-a,
  author = {W. Hino and H. Kobayashi I. Hasuo and B. Jacobs},
  title = {Healthiness from Duality},
  publisher = {Computer Science Press},
  year = {2016},
  note = {Logic in Computer Science}
}
(2016), "ICT Systems Security and Privacy Protection. 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings" Vol. 471 Springer.
BibTeX:
@proceedings{dis-2016-Hoepman-a,,
  editor = {J.-H. Hoepman and Stefan Katzenbeisser},
  title = {ICT Systems Security and Privacy Protection. 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings},
  publisher = {Springer},
  year = {2016},
  volume = {471},
  url = {https://link.springer.com/content/pdf/10.1007%2F978-3-319-33630-5.pdf}
}
Huisman M, Monahan R, Muller P and Poll E (2016), "VerifyThis 2016: A Program Verification Competition".
BibTeX:
@misc{dis-2016-Huisman-a,
  author = {Marieke Huisman and Rosemary Monahan and Peter Muller and Erik Poll},
  title = {VerifyThis 2016: A Program Verification Competition},
  publisher = {University of Twente, Centre for Telematics and Information Technology (CTIT)},
  year = {2016},
  number = {TR-CTIT-16-07}
}
Hülsing A, Rijneveld J and Schwabe P (2016), "ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM", In Public Key Cryptography -- PKC 2016. Vol. 9614, pp. 446-470. Springer.
BibTeX:
@inproceedings{dis-2016-Huelsing-a,
  author = {Andreas Hülsing and Joost Rijneveld and Peter Schwabe},
  editor = {Giuseppe Persiano and Bo-Yin Yang},
  title = {ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM},
  booktitle = {Public Key Cryptography -- PKC 2016},
  publisher = {Springer},
  year = {2016},
  volume = {9614},
  pages = {446--470},
  doi = {10.1007/978-3-662-49384-7_17}
}
Hülsing A, Rijneveld J and Song F (2016), "Mitigating Multi-Target Attacks in Hash-based Signatures", In Public Key Cryptography -- PKC 2016. Vol. 9614, pp. 387-416. Springer.
BibTeX:
@inproceedings{dis-2016-Huelsing-b,
  author = {Andreas Hülsing and Joost Rijneveld and Fang Song},
  editor = {Giuseppe Persiano and Bo-Yin Yang},
  title = {Mitigating Multi-Target Attacks in Hash-based Signatures},
  booktitle = {Public Key Cryptography -- PKC 2016},
  publisher = {Springer},
  year = {2016},
  volume = {9614},
  pages = {387--416},
  doi = {10.1007/978-3-662-49384-7_15}
}
(2016), "26th International Conference on Field Programmable Logic and Applications, FPL 2016, Lausanne, Switzerland, August 29 - September 2, 2016" IEEE.
BibTeX:
@proceedings{dis-2016-Ienne-a,,
  editor = {Paolo Ienne and Walid A. Najjar and Jason Anderson and Philip Brisk and Walter Stechele},
  title = {26th International Conference on Field Programmable Logic and Applications, FPL 2016, Lausanne, Switzerland, August 29 - September 2, 2016},
  publisher = {IEEE},
  year = {2016},
  url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7573873}
}
Jacobs B (2016), "Affine Monads and Side-Effect-Freeness", In Coalgebraic Methods in Computer Science (CMCS 2016). (9608), pp. 53-72. Springer, Berlin.
BibTeX:
@inproceedings{dis-2016-Jacobs-a,
  author = {B. Jacobs},
  editor = {I. Hasuo},
  title = {Affine Monads and Side-Effect-Freeness},
  booktitle = {Coalgebraic Methods in Computer Science (CMCS 2016)},
  publisher = {Springer, Berlin},
  year = {2016},
  number = {9608},
  pages = {53--72}
}
Jacobs B (2016), "Effectuses from Monads", In Math. Found. of Programming Semantics. (325), pp. 169-183. Elsevier, Amsterdam.
BibTeX:
@inproceedings{dis-2016-Jacobs-b,
  author = {B. Jacobs},
  editor = {L. Birkedal},
  title = {Effectuses from Monads},
  booktitle = {Math. Found. of Programming Semantics},
  publisher = {Elsevier, Amsterdam},
  year = {2016},
  number = {325},
  pages = {169--183}
}
Jacobs B (2016), "Select while you collect. Over de voorgestelde interceptiebevoegdheden voor inlichtingen- en veiligheidsdiensten", Ned. Juristen Blad. Vol. 4, pp. 256-261.
BibTeX:
@article{dis-2016-Jacobs-c,
  author = {B. Jacobs},
  title = {Select while you collect. Over de voorgestelde interceptiebevoegdheden voor inlichtingen- en veiligheidsdiensten},
  journal = {Ned. Juristen Blad},
  year = {2016},
  volume = {4},
  pages = {256--261}
}
Jacobs B (2016), "Introduction to Coalgebra. Towards Mathematics of States and Observations" (59) Cambridge Univ. Press.
BibTeX:
@book{dis-2016-Jacobs-d,
  author = {B. Jacobs},
  title = {Introduction to Coalgebra. Towards Mathematics of States and Observations},
  publisher = {Cambridge Univ. Press},
  year = {2016},
  number = {59}
}
(2016), "", In Foundations of Software Science and Computation Structures. (9634) Springer, Berlin.
BibTeX:
@proceedings{dis-2016-Jacobs-e,,
  editor = {B. Jacobs and C. Löding},
  booktitle = {Foundations of Software Science and Computation Structures},
  publisher = {Springer, Berlin},
  year = {2016},
  number = {9634}
}
Jacobs B and Mandemaker J (2016), "Relating Operator Spaces via Adjunctions", In Logic and Algebraic Structures in Quantum Computing. Vol. 45, pp. 123-150. Cambridge Univ. Press.
BibTeX:
@incollection{dis-2016-Jacobs-f,
  author = {B. Jacobs and J. Mandemaker},
  editor = {J. Chubb and A. Eskandarian and V. Harizanov},
  title = {Relating Operator Spaces via Adjunctions},
  booktitle = {Logic and Algebraic Structures in Quantum Computing},
  publisher = {Cambridge Univ. Press},
  year = {2016},
  volume = {45},
  pages = {123--150}
}
Jacobs B, Mandemaker J and Furber R (2016), "The Expectation Monad in Quantum Foundations" Vol. 250, pp. 87-114.
BibTeX:
@unpublished{dis-2016-Jacobs-g,
  author = {B. Jacobs and J. Mandemaker and R. Furber},
  title = {The Expectation Monad in Quantum Foundations},
  year = {2016},
  volume = {250},
  pages = {87--114},
  note = {Inf. & Comp.}
}
Jacobs B and Zanasi F (2016), "A predicate/state transformer semantics for Bayesian learning", In Math. Found. of Programming Semantics. (325), pp. 185-200. Elsevier, Amsterdam.
BibTeX:
@inproceedings{dis-2016-Jacobs-h,
  author = {B. Jacobs and F. Zanasi},
  editor = {L. Birkedal},
  title = {A predicate/state transformer semantics for Bayesian learning},
  booktitle = {Math. Found. of Programming Semantics},
  publisher = {Elsevier, Amsterdam},
  year = {2016},
  number = {325},
  pages = {185--200}
}
Jansen DN and Keiren J (2016), "Stuttering equivalence is too slow!"
BibTeX:
@techreport{dis-2016-Jansen-a,
  author = {Jansen, D. N. and Keiren, J.J.A.},
  title = {Stuttering equivalence is too slow!},
  year = {2016},
  note = {arXiv:1603.05789 [cs.LO]},
  url = {http://arxiv.org/abs/1603.05789}
}
Jiang K, Eles P, Peng Z, Chattopadhyay S and Batina L (2016), "SPARTA: A scheduling policy for thwarting differential power analysis attacks", In 21st Asia and South Pacific Design Automation Conference, ASP-DAC 2016, Macao, Macao, January 25-28, 2016. , pp. 667-672.
BibTeX:
@inproceedings{dis-2016-Jiang-a,
  author = {Ke Jiang and Petru Eles and Zebo Peng and Sudipta Chattopadhyay and Lejla Batina},
  title = {SPARTA: A scheduling policy for thwarting differential power analysis attacks},
  booktitle = {21st Asia and South Pacific Design Automation Conference, ASP-DAC 2016, Macao, Macao, January 25-28, 2016},
  year = {2016},
  pages = {667--672}
}
Jongmans S-S and Arbab F (2016), "Data Optimizations for Constraint Automata", Logical Methods in Computer Science. Vol. 12(3), pp. 11.1-11.38.
BibTeX:
@article{dis-2016-Jongmans-a,
  author = {Sung-Shik Jongmans and Farhad Arbab},
  title = {Data Optimizations for Constraint Automata},
  journal = {Logical Methods in Computer Science},
  year = {2016},
  volume = {12},
  number = {3},
  pages = {11.1--11.38},
  doi = {10.2168/LMCS-12(3:11)2016}
}
Jongmans S-S and Arbab F (2016), "PrDK: Protocol Programming with Automata", In Proceedings of TACAS 2016. Vol. 9636, pp. 547-552. Springer.
BibTeX:
@incollection{dis-2016-Jongmans-b,
  author = {Sung-Shik Jongmans and Farhad Arbab},
  editor = {Marsha Chechik and Jean-François Raskin},
  title = {PrDK: Protocol Programming with Automata},
  booktitle = {Proceedings of TACAS 2016},
  publisher = {Springer},
  year = {2016},
  volume = {9636},
  pages = {547--552},
  doi = {10.1007/978-3-662-49674-9_33}
}
Jongmans S-S, Kappé T and Arbab F (2016), "Composing Constraint Automata, State-by-State", In Proceedings of FACS 2015. Vol. 9539, pp. 217-236. Springer.
BibTeX:
@incollection{dis-2016-Jongmans-c,
  author = {Sung-Shik Jongmans and Tobias Kappé and Farhad Arbab},
  editor = {Christiano Braga and Peter Csaba Ölveczky},
  title = {Composing Constraint Automata, State-by-State},
  booktitle = {Proceedings of FACS 2015},
  publisher = {Springer},
  year = {2016},
  volume = {9539},
  pages = {217--236},
  doi = {10.1007/978-3-319-28934-2_12}
}
Keiren J, Fontana P and Cleaveland R (2016), "Corrections to A Menagerie of Timed Automata" (1602.07165)
BibTeX:
@techreport{dis-2016-Keiren-a,
  author = {Keiren, J.J.A. and Fontana, P. and Cleaveland, R.},
  title = {Corrections to A Menagerie of Timed Automata},
  year = {2016},
  number = {1602.07165},
  note = {arXiv:1602.07165 [cs.FL]},
  url = {http://arxiv.org/abs/1602.07165}
}
Kiljan S, Eekelen Mv and Vranken H (2016), "Towards A Virtual Bank For Evaluating Security Aspects With Focus On User Behavior", In Proceedings of 2016 SAI Computing Conference. , pp. 1068-1075. IEEE.
BibTeX:
@inproceedings{dis-2016-Kiljan-a,
  author = {Kiljan, Sven and Eekelen, Marko van and Vranken, Harald},
  title = {Towards A Virtual Bank For Evaluating Security Aspects With Focus On User Behavior},
  booktitle = {Proceedings of 2016 SAI Computing Conference},
  publisher = {IEEE},
  year = {2016},
  pages = {1068-1075},
  doi = {10.1109/SAI.2016.7556110}
}
Kiljan S, Simoens K, Cock DD, Eekelen Mv and Vranken H (2016), "A Survey of Authentication and Communications Security in Online Banking", ACM Computing Surveys., December, 2016. Vol. 49(4), pp. 61:1-61:35. ACM.
BibTeX:
@article{dis-2016-Kiljan-b,
  author = {Kiljan, Sven and Simoens, Koen and Cock, Danny De and Eekelen, Marko van and Vranken, Harald},
  title = {A Survey of Authentication and Communications Security in Online Banking},
  journal = {ACM Computing Surveys},
  publisher = {ACM},
  year = {2016},
  volume = {49},
  number = {4},
  pages = {61:1--61:35},
  url = {http://doi.acm.org/10.1145/3002170},
  doi = {10.1145/3002170}
}
Kiljan S, Vranken H and Eekelen Mv (2016), "User-friendly Manual Transfer of Authenticated Online Banking Transaction Data - A Case Study that Applies the What You Enter Is What You Sign Transaction Authorization Information Scheme", In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications. Vol. 4: Proceedings of the 13th International Conference on Security and Cryptography (SECRYPT 2016), pp. 259-270. SCITEPRESS.
BibTeX:
@inproceedings{dis-2016-Kiljan-c,
  author = {Kiljan, Sven and Vranken, Harald and Eekelen, Marko van},
  title = {User-friendly Manual Transfer of Authenticated Online Banking Transaction Data - A Case Study that Applies the What You Enter Is What You Sign Transaction Authorization Information Scheme},
  booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications},
  publisher = {SCITEPRESS},
  year = {2016},
  volume = {4: Proceedings of the 13th International Conference on Security and Cryptography (SECRYPT 2016)},
  pages = {259-270},
  doi = {10.5220/0005965102590270}
}
Lamers A and van Eekelen M (2016), "A Lightweight Method for Analysing Performance Dependencies between Services", In Fifth International Workshop on Adaptive Services for the Future Internet (WAS4FI2015), ESOCC 2015 Workshops, Taormina, Italy. Vol. 567, pp. 93-110. Springer-Verlag.
BibTeX:
@inproceedings{dis-2016-Lamers-a,
  author = {Arjan Lamers and Marko van Eekelen},
  editor = {A. Celesti and P. Leitner},
  title = {A Lightweight Method for Analysing Performance Dependencies between Services},
  booktitle = {Fifth International Workshop on Adaptive Services for the Future Internet (WAS4FI2015), ESOCC 2015 Workshops, Taormina, Italy},
  publisher = {Springer-Verlag},
  year = {2016},
  volume = {567},
  pages = {93-110}
}
Lueks W, Alpár G, Hoepman J-H and Vullers P (2016), "Fast revocation of attribute-based credentials for both users and verifiers", Computers & Security. , pp. -.
BibTeX:
@article{dis-2016-Lueks-a,
  author = {Wouter Lueks and Gergely Alpár and Jaap-Henk Hoepman and Pim Vullers},
  title = {Fast revocation of attribute-based credentials for both users and verifiers},
  journal = {Computers & Security},
  year = {2016},
  pages = {-},
  url = {http://www.sciencedirect.com/science/article/pii/S0167404816301729},
  doi = {10.1016/j.cose.2016.11.018}
}
Lueks W, Everts M and Hoepman J-H (2016), "Vote to Link: recovering from misbehaving anonymous users", In Workshop on Privacy in the Electronic Society (WPES 2016). Vienna, Austria, October 24, 2016. , pp. 111-122.
BibTeX:
@inproceedings{dis-2016-Lueks-b,
  author = {Wouter Lueks and Maarten Everts and Jaap-Henk Hoepman},
  title = {Vote to Link: recovering from misbehaving anonymous users},
  booktitle = {Workshop on Privacy in the Electronic Society (WPES 2016)},
  year = {2016},
  pages = {111-122},
  doi = {10.1145/2994620.2994634}
}
Lueks W, Everts M and Hoepman J-H (2016), "Revocable Privacy: Principles, Use Cases, and Technologies", In Annual Privacy Forum (APF 2015). , pp. 124-143.
BibTeX:
@inproceedings{dis-2016-Lueks-c,
  author = {Wouter Lueks and Maarten Everts and Jaap-Henk Hoepman},
  title = {Revocable Privacy: Principles, Use Cases, and Technologies},
  booktitle = {Annual Privacy Forum (APF 2015)},
  year = {2016},
  pages = {124--143}
}
Mahmudlu R, Banciu V, Batina L and Buhan I (2016), "LDA-Based Clustering as a Side-Channel Distinguisher", IACR Cryptology ePrint Archive. Vol. 2016, pp. 1024.
BibTeX:
@article{dis-2016-Mahmudlu-a,
  author = {Rauf Mahmudlu and Valentina Banciu and Lejla Batina and Ileana Buhan},
  title = {LDA-Based Clustering as a Side-Channel Distinguisher},
  journal = {IACR Cryptology ePrint Archive},
  year = {2016},
  volume = {2016},
  pages = {1024}
}
Massolino PMC, Renes J and Batina L (2016), "Implementing Complete Formulas on Weierstrass Curves in Hardware", In Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings. , pp. 89-108. Springer International Publishing.
BibTeX:
@inproceedings{dis-2016-Massolino-a,
  author = {Pedro Maat C. Massolino and Joost Renes and Lejla Batina},
  title = {Implementing Complete Formulas on Weierstrass Curves in Hardware},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings},
  publisher = {Springer International Publishing},
  year = {2016},
  pages = {89--108},
  url = {http://dx.doi.org/10.1007/978-3-319-49445-6_5},
  doi = {10.1007/978-3-319-49445-6_5}
}
Nascimento E, Chmielewski Ł, Oswald D and Schwabe P (2016), "Attacking embedded ECC implementations through cmov side channels", In Selected Areas in Cryptology -- SAC 2016. Springer-Verlag Berlin Heidelberg.
BibTeX:
@inproceedings{dis-2016-Nascimento-a,
  author = {Erick Nascimento and Łukasz Chmielewski and David Oswald and Peter Schwabe},
  editor = {Roberto Avanzi and Howard Heys},
  title = {Attacking embedded ECC implementations through cmov side channels},
  booktitle = {Selected Areas in Cryptology -- SAC 2016},
  publisher = {Springer-Verlag Berlin Heidelberg},
  year = {2016},
  note = {https://cryptojedi.org/papers/\#cmovsca}
}
Ozgen E, Papachristodoulou L and Batina L (2016), "Template attacks using classification algorithms", In 2016 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016. , pp. 242-247.
BibTeX:
@inproceedings{dis-2016-Ozgen-a,
  author = {Elif Ozgen and Louiza Papachristodoulou and Lejla Batina},
  title = {Template attacks using classification algorithms},
  booktitle = {2016 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016},
  year = {2016},
  pages = {242--247}
}
Picek S, Jakobovic D, Miller JF, Batina L and Cupic M (2016), "Cryptographic Boolean functions: One output, many design criteria", Appl. Soft Comput.. Vol. 40, pp. 635-653.
BibTeX:
@article{dis-2016-Picek-a,
  author = {Stjepan Picek and Domagoj Jakobovic and Julian F. Miller and Lejla Batina and Marko Cupic},
  title = {Cryptographic Boolean functions: One output, many design criteria},
  journal = {Appl. Soft Comput.},
  year = {2016},
  volume = {40},
  pages = {635--653}
}
Picek S, Sisejkovic D, Jakobovic D, Batina L, Yang B, Sijacic D and Mentens N (2016), "Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware", In Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings. , pp. 147-166.
BibTeX:
@inproceedings{dis-2016-Picek-b,
  author = {Stjepan Picek and Dominik Sisejkovic and Domagoj Jakobovic and Lejla Batina and Bohan Yang and Danilo Sijacic and Nele Mentens},
  title = {Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware},
  booktitle = {Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  year = {2016},
  pages = {147--166}
}
Pieterse V and van Eekelen M (2016), "Which are harder? Soft skills or hard skills?", In 45th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2016, Cullinan, South Africa, July 5-6, 2016, Revised Selected Papers. Vol. 642, pp. 160-167. Springer-Verlag.
BibTeX:
@inproceedings{dis-2016-Pieterse-a,
  author = {Vreda Pieterse and Marko van Eekelen},
  editor = {Stefan Gruner},
  title = {Which are harder? Soft skills or hard skills?},
  booktitle = {45th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2016, Cullinan, South Africa, July 5-6, 2016, Revised Selected Papers},
  publisher = {Springer-Verlag},
  year = {2016},
  volume = {642},
  pages = {160-167}
}
(2016), "Computer Science Education Research Conference 2016 (CSERC '16) - Proceedings. July 5 and 6, 2016. Cullinan, South Africa. Co-located with SACLA 2016", In Proceedings of Computer Science Education Research Conference 2016 (CSERC '16). ACM Digital Library, 52 pages.
BibTeX:
@proceedings{dis-2016-Pieterse-b,,
  editor = {Vreda Pieterse and Marko van Eekelen},
  title = {Computer Science Education Research Conference 2016 (CSERC '16) - Proceedings. July 5 and 6, 2016. Cullinan, South Africa. Co-located with SACLA 2016},
  booktitle = {Proceedings of Computer Science Education Research Conference 2016 (CSERC '16)},
  publisher = {ACM Digital Library, 52 pages},
  year = {2016}
}
Pijpker J and Vranken H (2016), "The Role of Internet Service Providers in Botnet Mitigation", In Proceedings of the European Intelligence and Security Informatics Conference. , pp. 24-31. IEEE.
BibTeX:
@inproceedings{dis-2016-Pijpker-a,
  author = {Pijpker, Jeroen and Vranken, Harald},
  title = {The Role of Internet Service Providers in Botnet Mitigation},
  booktitle = {Proceedings of the European Intelligence and Security Informatics Conference},
  publisher = {IEEE},
  year = {2016},
  pages = {24-31},
  doi = {10.1109/EISIC.2016.12}
}
Popescu A, Hildebrandt M, Breuer J, Claeys L, Papadopoulos S, Petkos G, Michalareas T, Lund D, Heyman R, van der Graaf S, Gadeski E, Le Borgne H, de Vries K, Kastrinogiannis T, Kousaridas A and Padyab A (2016), "Increasing Transparency and Privacy for Online Social Network Users -- USEMP Value Model, Scoring Framework and Legal", In Privacy Technologies and Policy: Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers. Cham , pp. 38-59. Springer International Publishing.
BibTeX:
@incollection{dis-2016-Popescu-a,
  author = {Popescu, A. and Hildebrandt, M. and Breuer, J. and Claeys, L. and Papadopoulos, S. and Petkos, G. and Michalareas, T. and Lund, D. and Heyman, R. and van der Graaf, S. and Gadeski, E. and Le Borgne, H. and de Vries, K. and Kastrinogiannis, T. and Kousaridas, A. and Padyab, A.},
  editor = {Berendt, Bettina and Engel, Thomas and Ikonomou, Demosthenes and Le Métayer, Daniel and Schiffner, Stefan},
  title = {Increasing Transparency and Privacy for Online Social Network Users -- USEMP Value Model, Scoring Framework and Legal},
  booktitle = {Privacy Technologies and Policy: Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers},
  publisher = {Springer International Publishing},
  year = {2016},
  pages = {38--59},
  url = {http://dx.doi.org/10.1007/978-3-319-31456-3_3},
  doi = {10.1007/978-3-319-31456-3_3}
}
Renes J, Costello C and Batina L (2016), "Complete Addition Formulas for Prime Order Elliptic Curves", In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. , pp. 403-428.
BibTeX:
@inproceedings{dis-2016-Renes-a,
  author = {Joost Renes and Craig Costello and Lejla Batina},
  title = {Complete Addition Formulas for Prime Order Elliptic Curves},
  booktitle = {Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I},
  year = {2016},
  pages = {403--428},
  url = {http://dx.doi.org/10.1007/978-3-662-49890-3_16},
  doi = {10.1007/978-3-662-49890-3_16}
}
Renes J, Schwabe P, Smith B and Batina L (2016), "μKummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers", In Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. , pp. 301-320.
BibTeX:
@inproceedings{dis-2016-Renes-b,
  author = {Joost Renes and Peter Schwabe and Benjamin Smith and Lejla Batina},
  title = {μKummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers},
  booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  year = {2016},
  pages = {301--320},
  url = {http://dx.doi.org/10.1007/978-3-662-53140-2_15},
  doi = {10.1007/978-3-662-53140-2_15}
}
de Ruiter J (2016), "A Tale of the OpenSSL State Machine: A Large-Scale Black-Box Analysis", In Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings. Vol. 10014, pp. 169-184. Springer.
BibTeX:
@incollection{dis-2016-Ruiter-a,
  author = {de Ruiter, Joeri},
  editor = {Brumley, Billy Bob and Röning, Juha},
  title = {A Tale of the OpenSSL State Machine: A Large-Scale Black-Box Analysis},
  booktitle = {Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings},
  publisher = {Springer},
  year = {2016},
  volume = {10014},
  pages = {169--184},
  doi = {10.1007/978-3-319-47560-8_11}
}
Salamat R, Ebrahimi M, Bagherzadeh N and Verbeek F (2016), "CoBRA: Low cost compensation of TSV failures in 3D-NoC", In 2016 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2016, Storrs, CT, USA, September 19-20, 2016. , pp. 115-120.
BibTeX:
@inproceedings{dis-2016-Salamat-a,
  author = {Ronak Salamat and Masoumeh Ebrahimi and Nader Bagherzadeh and Freek Verbeek},
  title = {CoBRA: Low cost compensation of TSV failures in 3D-NoC},
  booktitle = {2016 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2016, Storrs, CT, USA, September 19-20, 2016},
  year = {2016},
  pages = {115--120},
  url = {http://dx.doi.org/10.1109/DFT.2016.7684081},
  doi = {10.1109/DFT.2016.7684081}
}
Schwabe P and Stoffelen K (2016), "All the AES You Need on Cortex-M3 and M4", In Selected Areas in Cryptography -- SAC 2016. Springer.
BibTeX:
@inproceedings{dis-2016-Schwabe-a,
  author = {Peter Schwabe and Ko Stoffelen},
  editor = {Roberto Avanzi and Howard Heys},
  title = {All the AES You Need on Cortex-M3 and M4},
  booktitle = {Selected Areas in Cryptography -- SAC 2016},
  publisher = {Springer},
  year = {2016}
}
Stoffelen K (2016), "Instruction Scheduling and Register Allocation on ARM Cortex-M", In Software performance enhancement for encryption and decryption, and benchmarking -- SPEED-B., October, 2016.
BibTeX:
@conference{dis-2016-Stoffelen-a,
  author = {Ko Stoffelen},
  title = {Instruction Scheduling and Register Allocation on ARM Cortex-M},
  booktitle = {Software performance enhancement for encryption and decryption, and benchmarking -- SPEED-B},
  year = {2016}
}
Stoffelen K (2016), "Optimizing S-box Implementations for Several Criteria using SAT Solvers", In Fast Software Encryption. Vol. 9783, pp. 140-160. Springer.
BibTeX:
@inproceedings{dis-2016-Stoffelen-b,
  author = {Ko Stoffelen},
  editor = {Thomas Peyrin},
  title = {Optimizing S-box Implementations for Several Criteria using SAT Solvers},
  booktitle = {Fast Software Encryption},
  publisher = {Springer},
  year = {2016},
  volume = {9783},
  pages = {140--160},
  doi = {10.1007/978-3-662-52993-5}
}
Uijlen S and Westerbaan B (2016), "A Kochen-Specker system has at least 22 vectors", New Generation Computing. Vol. 34(1-2), pp. 3-23. Springer.
BibTeX:
@article{dis-2016-Uijlen-a,
  author = {Uijlen, Sander and Westerbaan, Bas},
  title = {A Kochen-Specker system has at least 22 vectors},
  journal = {New Generation Computing},
  publisher = {Springer},
  year = {2016},
  volume = {34},
  number = {1-2},
  pages = {3--23}
}
Verbeek F, Yaghini PM, Eghbal A and Bagherzadeh N (2016), "ADVOCAT: Automated deadlock verification for on-chip cache coherence and interconnects", In 2016 Design, Automation & Test in Europe Conference & Exhibition, DATE 2016, Dresden, Germany, March 14-18, 2016. , pp. 1640-1645.
BibTeX:
@inproceedings{dis-2016-Verbeek-a,
  author = {Freek Verbeek and Pooria M. Yaghini and Ashkan Eghbal and Nader Bagherzadeh},
  title = {ADVOCAT: Automated deadlock verification for on-chip cache coherence and interconnects},
  booktitle = {2016 Design, Automation & Test in Europe Conference & Exhibition, DATE 2016, Dresden, Germany, March 14-18, 2016},
  year = {2016},
  pages = {1640--1645},
  url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=7459575}
}
Vranken H (2016), "Resilience of the Internet: case studies on DNS availability and botnet detection".
BibTeX:
@misc{dis-2016-Vranken-a,
  author = {Vranken, Harald},
  title = {Resilience of the Internet: case studies on DNS availability and botnet detection},
  year = {2016},
  note = {Presentation at TouW-symposium}
}
Westerbaan A and Westerbaan B (2016), "A universal property for sequential measurement", Journal of Mathematical Physics., sep, 2016. Vol. 57(9), pp. 092203. AIP Publishing.
BibTeX:
@article{dis-2016-Westerbaan-a,
  author = {Abraham Westerbaan and Bas Westerbaan},
  title = {A universal property for sequential measurement},
  journal = {Journal of Mathematical Physics},
  publisher = {AIP Publishing},
  year = {2016},
  volume = {57},
  number = {9},
  pages = {092203},
  doi = {10.1063/1.4961526}
}
Westerbaan A and Westerbaan B (2016), "Paschke Dilations", In Duncan, R.(ed.), QPL 2016: Proceedings 13th International Conference on Quantum Physics and Logic Glasgow, Scotland, 6-10 June 2016. , pp. 229-244.
BibTeX:
@inproceedings{dis-2016-Westerbaan-b,
  author = {Westerbaan, Abraham and Westerbaan, Bas},
  title = {Paschke Dilations},
  booktitle = {Duncan, R.(ed.), QPL 2016: Proceedings 13th International Conference on Quantum Physics and Logic Glasgow, Scotland, 6-10 June 2016},
  year = {2016},
  pages = {229--244}
}
Westerbaan B and Schwabe P (2016), "Solving binary MQ with Grover's algorithm", In Security, Privacy, and Advanced Cryptography Engineering. Springer-Verlag Berlin Heidelberg.
BibTeX:
@inproceedings{dis-2016-Westerbaan-c,
  author = {Bas Westerbaan and Peter Schwabe},
  editor = {Claude Carlet and Anwar Hasan and Vishal Saraswat},
  title = {Solving binary MQ with Grover's algorithm},
  booktitle = {Security, Privacy, and Advanced Cryptography Engineering},
  publisher = {Springer-Verlag Berlin Heidelberg},
  year = {2016},
  note = {http://cryptojedi.org/papers/\#mqgrover}
}
Winderickx J, Daemen J and Mentens N (2016), "Exploring the use of shift register lookup tables for Keccak implementations on Xilinx FPGAs", In 26th International Conference on Field Programmable Logic and Applications, FPL 2016, Lausanne, Switzerland, August 29 - September 2, 2016. , pp. 1-4.
BibTeX:
@inproceedings{dis-2016-Winderickx-a,
  author = {Jori Winderickx and Joan Daemen and Nele Mentens},
  title = {Exploring the use of shift register lookup tables for Keccak implementations on Xilinx FPGAs},
  booktitle = {26th International Conference on Field Programmable Logic and Applications, FPL 2016, Lausanne, Switzerland, August 29 - September 2, 2016},
  year = {2016},
  pages = {1--4},
  url = {http://dx.doi.org/10.1109/FPL.2016.7577367},
  doi = {10.1109/FPL.2016.7577367}
}

2015

Alpár G (2015), "Attribute-Based Identity Management--Bridging the cryptographic design of ABCs with the real world". Thesis at: Radboud University.
BibTeX:
@phdthesis{ds-2015-Alpar-a,
  author = {Alpár, Gergely},
  title = {Attribute-Based Identity Management--Bridging the cryptographic design of ABCs with the real world},
  school = {Radboud University},
  year = {2015}
}
Andreeva E, Daemen J, Mennink B and Assche GV (2015), "Security of Keyed Sponge Constructions Using a Modular Proof Approach", In Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers. Vol. 9054, pp. 364-384. Springer.
BibTeX:
@inproceedings{ds-2015-Andreeva-a,
  author = {Elena Andreeva and Joan Daemen and Bart Mennink and Gilles Van Assche},
  title = {Security of Keyed Sponge Constructions Using a Modular Proof Approach},
  booktitle = {Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  publisher = {Springer},
  year = {2015},
  volume = {9054},
  pages = {364--384},
  doi = {10.1007/978-3-662-48116-5_18}
}
Atkey R, Ghani N, Forsberg FN, Revell T and Staton S (2015), "Models for Polymorphism over Physical Dimension", In 13th International Conference on Typed Lambda Calculi and Applications (TLCA 2015). Dagstuhl, Germany Vol. 38, pp. 45-59. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik.
BibTeX:
@inproceedings{ds-2015-Atkey-a,
  author = {Robert Atkey and Neil Ghani and Fredrik Nordvall Forsberg and Timothy Revell and Sam Staton},
  editor = {Thorsten Altenkirch},
  title = {Models for Polymorphism over Physical Dimension},
  booktitle = {13th International Conference on Typed Lambda Calculi and Applications (TLCA 2015)},
  publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  year = {2015},
  volume = {38},
  pages = {45--59},
  url = {http://drops.dagstuhl.de/opus/volltexte/2015/5154},
  doi = {10.4230/LIPIcs.TLCA.2015.45}
}
Beller M, Gousios G, Panichella A and Zaidman A (2015), "When, How, and Why Developers (Do Not) Test in Their IDEs", In Proceedings of the 10th Joint Meeting on Foundations of Software Engineering. New York, NY, USA , pp. 179-190. ACM.
Abstract:
The research community in Software Engineering and Software Testing in
particular builds many of its contributions on a set of mutually shared
expectations. These expectations often form the motivation for research on
the creation of new testing tools and the refinement of existing test
processes in an attempt to support practitioners. Despite the fact that they
are the basis for many publications as well as open-source and commercial
testing applications, the common expectations and beliefs are rarely ever
questioned. For example, Frederic Brooks' statement that testing takes half
of the development time seems to have manifested itself within the community
since he first made it in the ``Mythical Man Month'' in 1975. With this
paper, we report on the surprising results of a large-scale field study with
416 software engineers whose development activity we closely monitored over
the course of five months, resulting in over 13 years of recorded work time.
Our findings question several commonly shared assumptions and beliefs about
testing and might be contributing factors to the observed bug proneness of
software in practice: the majority of developers in our study does not test;
developers rarely run their tests in the IDE; Test-driven Development is not
widely practiced; and, last but not least, software developers only spend a
quarter of their work time engineering tests, whereas they think they test
half of their time.
BibTeX:
@inproceedings{ds-2015-Beller-a,
  author = {Beller, Moritz and Gousios, Georgios and Panichella, Annibale and Zaidman, Andy},
  title = {When, How, and Why Developers (Do Not) Test in Their IDEs},
  booktitle = {Proceedings of the 10th Joint Meeting on Foundations of Software Engineering},
  publisher = {ACM},
  year = {2015},
  pages = {179--190},
  doi = {10.1145/2786805.2786843}
}
Beller M, Gousios G and Zaidman A (2015), "How (Much) Do Developers Test?", In Proceedings of the 37th International Conference on Software Engineering -- New Ideas and Emerging Results track., May, 2015. Vol. 2, pp. 559-562.
Abstract:
What do we know about software testing in the real world? It seems we know
from Fred Brooks' seminal work ``The Mythical Man-Month'' that 50% of
project effort is spent on testing. However, due to the enormous advances in
software engineering in the past 40 years, the question stands: Is this
observation still true? In fact, was it ever true? The vision for our
research is to settle the discussion about Brooks' estimation once and for
all: How much do developers test? Does developers' estimation on how much
they test match reality? How frequently do they execute their tests, and is
there a relationship between test runtime and execution frequency? What are
the typical reactions to failing tests? Do developers solve actual defects
in the production code, or do they merely relax their test assertions?
Emerging results from 40 software engineering students show that students
overestimate their testing time threefold, and 50% of them test as little
as 4% of their time, or less. Having proven the scalability of our
infrastructure, we are now extending our case study with professional
software engineers from open-source and industrial organizations.
BibTeX:
@inproceedings{ds-2015-Beller-b,
  author = {Moritz Beller and Georgios Gousios and Andy Zaidman},
  title = {How (Much) Do Developers Test?},
  booktitle = {Proceedings of the 37th International Conference on Software Engineering -- New Ideas and Emerging Results track},
  year = {2015},
  volume = {2},
  pages = {559-562},
  doi = {10.1109/ICSE.2015.193}
}
Bernstein DJ, van Gastel B, Janssen W, Lange T, Schwabe P and Smetsers S (2015), "TweetNaCl: A crypto library in 100 tweets", In Progress in Cryptology -- LATINCRYPT 2014. Vol. 8895, pp. 64-83. Springer.
BibTeX:
@inproceedings{ds-2015-Bernstein-a,
  author = {Daniel J. Bernstein and Bernard van Gastel and Wesley Janssen and Tanja Lange and Peter Schwabe and Sjaak Smetsers},
  editor = {Diego Aranha and Alfred Menezes},
  title = {TweetNaCl: A crypto library in 100 tweets},
  booktitle = {Progress in Cryptology -- LATINCRYPT 2014},
  publisher = {Springer},
  year = {2015},
  volume = {8895},
  pages = {64--83},
  doi = {10.1007/978-3-319-16295-9_4}
}
Bernstein DJ, Hopwood D, Hülsing A, Lange T, Niederhagen R, Papachristodoulou L, Schwabe P and Wilcox-O'Hearn Z (2015), "SPHINCS: practical stateless hash-based signatures", In Advances in Cryptology -- EUROCRYPT 2015. Vol. 9056, pp. 368-397. Springer.
BibTeX:
@inproceedings{ds-2015-Bernstein-b,
  author = {Daniel J. Bernstein and Daira Hopwood and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Peter Schwabe and Zooko Wilcox-O'Hearn},
  editor = {Marc Fischlin and Elisabeth Oswald},
  title = {SPHINCS: practical stateless hash-based signatures},
  booktitle = {Advances in Cryptology -- EUROCRYPT 2015},
  publisher = {Springer},
  year = {2015},
  volume = {9056},
  pages = {368--397},
  doi = {10.1007/978-3-662-46800-5_15}
}
Bockisch C, Keiren JJ, Gastel Bv, Kersten R and Eekelen Mv (2015), "Big Energy Data For Software Engineering".
BibTeX:
@misc{ds-2015-Bockisch-a,
  author = {Bockisch, Christoph. and Keiren, Jeroen J.A. and Gastel, Bernard van and Kersten, Rody and Eekelen, Marko van},
  title = {Big Energy Data For Software Engineering},
  year = {2015},
  note = {Poster at European Conference on Object-Oriented Programming (ECOOP)}
}
Petra van den Bos and Erik Poll and Marko van Eekelen (2015), "Cybersecurity NLT Module voor het middelbaar onderwijs" Radboud Universiteit.
BibTeX:
@book{ds-2015-PBEPME-a,
  author = {Petra van den Bos and Erik Poll and Marko van Eekelen},
  title = {Cybersecurity NLT Module voor het middelbaar onderwijs},
  publisher = {Radboud Universiteit},
  year = {2015}
}
van den Broek F, Poll E and Vieira B (2015), "Securing the Information Infrastructure for EV Charging", In Wireless and Satellite Systems. Vol. 154, pp. 61-74. Springer.
BibTeX:
@incollection{ds-2015-Broek-a,
  author = {Fabian van den Broek and Erik Poll and Barbara Vieira},
  title = {Securing the Information Infrastructure for EV Charging},
  booktitle = {Wireless and Satellite Systems},
  publisher = {Springer},
  year = {2015},
  volume = {154},
  pages = {61-74},
  doi = {10.1007/978-3-319-25479-1_5}
}
van den Broek F, Verdult R and de Ruiter J (2015), "Defeating IMSI Catchers", In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. , pp. 340-351. ACM.
BibTeX:
@inproceedings{ds-2015-Broek-b,
  author = {Fabian van den Broek and Roel Verdult and Joeri de Ruiter},
  title = {Defeating IMSI Catchers},
  booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security},
  publisher = {ACM},
  year = {2015},
  pages = {340--351},
  doi = {10.1145/2810103.2813615}
}
Buisman ALD and van Eekelen MCJD (2015), "Gamification in educational software development", In Proceedings of the Computer Science Education Research Conference, CSERC 2014, Berlin, Germany, November 5-6, 2014. , pp. 9-20. ACM.
BibTeX:
@inproceedings{ds-2015-Buisman-a,
  author = {Achilleas L. D. Buisman and Marko C. J. D. van Eekelen},
  title = {Gamification in educational software development},
  booktitle = {Proceedings of the Computer Science Education Research Conference, CSERC 2014, Berlin, Germany, November 5-6, 2014},
  publisher = {ACM},
  year = {2015},
  pages = {9--20},
  url = {http://doi.acm.org/10.1145/2691352.2691353},
  doi = {10.1145/2691352.2691353}
}
Chai W, Wang N, Katsaros K, Kamel G, Melis S, Hoefling M, Vieira B, Romano P, Sarri S, Tsegay T, Yang B, Heimgaertner F, Pignati M, Paolone M, Develder C, Menth M, Pavlou G, Poll E, Mampaey M and Bontius H (2015), "An Information-Centric Communication Infrastructure for Real-Time State Estimation of Active Distribution Networks", IEEE Transactions on Smart Grid. Vol. 6(4), pp. 2134 - 2146. IEEE.
BibTeX:
@article{ds-2015-Chai-a,
  author = {W.K. Chai and N. Wang and K.V. Katsaros and G. Kamel and S. Melis and M. Hoefling and B. Vieira and P. Romano and S. Sarri and T. Tsegay and B. Yang and F. Heimgaertner and M. Pignati and M. Paolone and C. Develder and M. Menth and G. Pavlou and E. Poll and M. Mampaey and H. Bontius},
  title = {An Information-Centric Communication Infrastructure for Real-Time State Estimation of Active Distribution Networks},
  journal = {IEEE Transactions on Smart Grid},
  publisher = {IEEE},
  year = {2015},
  volume = {6},
  number = {4},
  pages = {2134 -- 2146},
  doi = {10.1109/TSG.2015.2398840}
}
Chen G, Davis D, Gousios G, Hauff C and Houben G-J (2015), "Learning transfer: does it take place?", In Proceedings of the 2nd Workshop of Learning With MOOCs. NY, USA, Oct, 2015.
Abstract:
The rising number of MOOCs enable people to advance their knowledge and
competencies in a wide range of fields. Learning though is only the first
step, the transfer of the taught concepts into practice is equally important
and often ne- glected in the investigation of MOOCs. In this paper, we
consider the specific case of FP101x (a functional programming MOOC on
EdX) and the extent to which learners alter their programming behaviour
after having taken the course. We find the practical uptake six months after
the course to be small: only  3% of learners that were not applying
functional concepts in their programming practice before the start of
FP101x, begin using them.
BibTeX:
@inproceedings{ds-2015-Chen-a,
  author = {Guanliang Chen and Dan Davis and Georgios Gousios and Claudia Hauff and Geert-Jan Houben},
  title = {Learning transfer: does it take place?},
  booktitle = {Proceedings of the 2nd Workshop of Learning With MOOCs},
  year = {2015}
}
Cho K (2015), "Total and Partial Computation in Categorical Quantum Foundations", In rm Proceedings of the 12th International Workshop on Quantum Physics and Logic, rm Oxford, U.K., July 15-17, 2015. Vol. 195, pp. 116-135. Open Publishing Association.
BibTeX:
@inproceedings{ds-2015-Cho-a,
  author = {Cho, Kenta},
  editor = {Heunen, Chris and Selinger, Peter and Vicary, Jamie},
  title = {Total and Partial Computation in Categorical Quantum Foundations},
  booktitle = {rm Proceedings of the 12th International Workshop on Quantum Physics and Logic, rm Oxford, U.K., July 15-17, 2015},
  publisher = {Open Publishing Association},
  year = {2015},
  volume = {195},
  pages = {116--135},
  doi = {10.4204/EPTCS.195.9}
}
Cho K, Jacobs B, Westerbaan B and Westerbaan B (2015), "Quotient-Comprehension Chains", In rm Proceedings of the 12th International Workshop on Quantum Physics and Logic, rm Oxford, U.K., July 15-17, 2015. Vol. 195, pp. 136-147. Open Publishing Association.
BibTeX:
@inproceedings{ds-2015-Cho-b,
  author = {Cho, Kenta and Jacobs, Bart and Westerbaan, Bas and Westerbaan, Bram},
  editor = {Heunen, Chris and Selinger, Peter and Vicary, Jamie},
  title = {Quotient-Comprehension Chains},
  booktitle = {rm Proceedings of the 12th International Workshop on Quantum Physics and Logic, rm Oxford, U.K., July 15-17, 2015},
  publisher = {Open Publishing Association},
  year = {2015},
  volume = {195},
  pages = {136--147},
  doi = {10.4204/EPTCS.195.10}
}
Chothia T, Garcia FD, de Ruiter J, van den Breekel J and Thompson M (2015), "Relay Cost Bounding for Contactless EMV Payments", In Financial Cryptography and Data Security. Vol. 8975, pp. 189-206. Springer.
BibTeX:
@incollection{ds-2015-Chothia-a,
  author = {Chothia, Tom and Garcia, Flavio D. and de Ruiter, Joeri and van den Breekel, Jordi and Thompson, Matthew},
  title = {Relay Cost Bounding for Contactless EMV Payments},
  booktitle = {Financial Cryptography and Data Security},
  publisher = {Springer},
  year = {2015},
  volume = {8975},
  pages = {189--206},
  doi = {10.1007/978-3-662-47854-7_11}
}
Coelho R, Almeida L, Gousios G and van Deursen A (2015), "Unveiling Exception Handling Bug Hazards in Android based on GitHub and Google Code Issues", In Proceedings of the 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (MSR). Florence, Italy, May, 2015. , pp. 134-145.
Abstract:
This paper reports on a study mining the exception stack traces included in
159,048 issues reported on Android projects hosted in GitHub (482 projects)
and Google Code (157 projects). The goal of this study is to investigate
whether stack trace information can reveal bug hazards related to exception
handling code that may lead to a decrease in application robustness. Overall
6,005 exception stack traces were extracted, and subjected to source code
and bytecode analysis. The outcomes of this study include the identification
of the following bug hazards: (i) unexpected cross-type exception wrappings
(for instance, trying to handle an instance of OutOfMemoryError ``hidden''
in a checked exception) which can make the exception-related code more
complex and negatively impact the application robustness; (ii) undocumented
runtime exceptions thrown by both the Android platform and third party
libraries; and (iii) undoc- umented checked exceptions thrown by the Android
Platform. Such undocumented exceptions make difficult, and most of the times
infeasible for the client code to protect against unforeseen situations that
may happen while calling third-party code. This study provides further
insights on such bug hazards and the robustness threats they impose to
Android apps as well as to other systems based on the Java exception model.
BibTeX:
@inproceedings{ds-2015-Coelho-a,
  author = {Roberta Coelho and Lucas Almeida and Georgios Gousios and Arie van Deursen},
  title = {Unveiling Exception Handling Bug Hazards in Android based on GitHub and Google Code Issues},
  booktitle = {Proceedings of the 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (MSR)},
  year = {2015},
  pages = {134-145},
  doi = {10.1109/MSR.2015.20}
}
Cox J, Bouwers E, van Eekelen MCJD and Visser J (2015), "Measuring Dependency Freshness in Software Systems", In 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 2. , pp. 109-118. ACM & IEEE.
BibTeX:
@inproceedings{ds-2015-Cox-a,
  author = {Joel Cox and Eric Bouwers and Marko C. J. D. van Eekelen and Joost Visser},
  title = {Measuring Dependency Freshness in Software Systems},
  booktitle = {37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 2},
  publisher = {ACM & IEEE},
  year = {2015},
  pages = {109--118},
  url = {http://dx.doi.org/10.1109/ICSE.2015.140},
  doi = {10.1109/ICSE.2015.140}
}
Dagdelen Ö, Bansarkhani RE, Göpfert F, Güneysu T, Oder T, Pöppelmann T, Sánchez AH and Schwabe P (2015), "High-Speed Signatures from Standard Lattices", In Progress in Cryptology -- LATINCRYPT 2014. Vol. 8895, pp. 84-123. Springer.
BibTeX:
@inproceedings{ds-2015-Dagdelen-a,
  author = {Özgür Dagdelen and Rachid El Bansarkhani and Florian Göpfert and Tim Güneysu and Tobias Oder and Thomas Pöppelmann and Ana Helena Sánchez and Peter Schwabe},
  editor = {Diego F. Aranha and Alfred Menezes},
  title = {High-Speed Signatures from Standard Lattices},
  booktitle = {Progress in Cryptology -- LATINCRYPT 2014},
  publisher = {Springer},
  year = {2015},
  volume = {8895},
  pages = {84--123},
  doi = {10.1007/978-3-319-16295-9_5}
}
Dias M, Bacchelli A, Gousios G, Cassou D and Ducasse S (2015), "Untangling Fine-Grained Code Changes", In Proceedings of the 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering. Montreal, Canada , pp. 341-350.
Abstract:
After working for some time, developers commit their code changes to a
version control system. When doing so, research shows that they often bundle
unrelated changes (e.g., bug fix and refactoring) in a single commit, thus
creating a so-called tangled commit. Sharing tangled commits is problematic
because it makes review, reversion, and integration of these commits harder
and historical analyses of the project less reliable. Researchers have
worked at untangling existing commits, i.e., finding which part of a commit
relates to which task. In this paper, we contribute to this line of work in
two ways: (1) A publicly available dataset of untangled code changes,
created with the help of two developers who accurately split their code
changes into self contained tasks over a period of four months; (2) based on
this dataset we devise and assess EpiceaUntangler, an approach to help
developers share untangled commits (aka. atomic commits) by using
fine-grained code change information. We further evaluate EpiceaUntangler by
deploying it to 7 developers, who used it for 2 weeks. We recorded a median
success rate of 91% and average one of 75 in automatically creating
clusters of untangled fine-grained code changes.
BibTeX:
@inproceedings{ds-2015-Dias-a,
  author = {Martin Dias and Alberto Bacchelli and Georgios Gousios and Damien Cassou and Stephane Ducasse},
  title = {Untangling Fine-Grained Code Changes},
  booktitle = {Proceedings of the 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering},
  year = {2015},
  pages = {341--350},
  doi = {10.1109/SANER.2015.7081844}
}
Düll M, Haase B, Hinterwälder G, Hutter M, Paar C, Sánchez AH and Schwabe P (2015), "High-speed Curve25519 on 8-bit, 16-bit and 32-bit microcontrollers", Design, Codes and Cryptography. Vol. 77(2) Springer.
BibTeX:
@article{ds-2015-Duell-a,
  author = {Michael Düll and Björn Haase and Gesine Hinterwälder and Michael Hutter and Christof Paar and Ana Helena Sánchez and Peter Schwabe},
  title = {High-speed Curve25519 on 8-bit, 16-bit and 32-bit microcontrollers},
  journal = {Design, Codes and Cryptography},
  publisher = {Springer},
  year = {2015},
  volume = {77},
  number = {2},
  doi = {10.1007/s10623-015-0087-1}
}
Marko van Eekelen and Lianne Dirven (2015), "Inspired 3 = Art * Personal * Science = 4 * PRM", In Liber Amicorum Henk Barendregt. , pp. 10-11. Radboud Universiteit.
BibTeX:
@inproceedings{ds-2015-MELD-a,
  author = {Marko van Eekelen and Lianne Dirven},
  title = {Inspired 3 = Art * Personal * Science = 4 * PRM},
  booktitle = {Liber Amicorum Henk Barendregt},
  publisher = {Radboud Universiteit},
  year = {2015},
  pages = {10-11}
}
Ege B, Papagiannopoulos K, Batina L and Picek S (2015), "Improving DPA resistance of S-boxes: How far can we go?", In Circuits and Systems (ISCAS), 2015 IEEE International Symposium on., May, 2015. , pp. 2013-2016.
BibTeX:
@inproceedings{ds-2015-Ege-a,
  author = {Ege, B. and Papagiannopoulos, K. and Batina, L. and Picek, S.},
  title = {Improving DPA resistance of S-boxes: How far can we go?},
  booktitle = {Circuits and Systems (ISCAS), 2015 IEEE International Symposium on},
  year = {2015},
  pages = {2013-2016},
  doi = {10.1109/ISCAS.2015.7169071}
}
Furber R and Jacobs B (2015), "From Kleisli categories to commutative C^*-algebras: Probabilistic Gelfand Duality", Logical Methods in Comp. Sci.. Vol. 11(2), pp. 1-28.
BibTeX:
@article{ds-2015-Furber-a,
  author = {R. Furber and B. Jacobs},
  title = {From Kleisli categories to commutative C^*-algebras: Probabilistic Gelfand Duality},
  journal = {Logical Methods in Comp. Sci.},
  year = {2015},
  volume = {11(2)},
  pages = {1--28},
  doi = {10.2168/LMCS-11(2:5)2015}
}
Furber R and Jacobs B (2015), "Towards a Categorical Account of Conditional Probability", Electronic Proceedings in Theoretical Computer Science., In Quantum Physics and Logic (QPL) 2015. Vol. 195, pp. 179-195.
BibTeX:
@article{ds-2015-Furber-b,
  author = {R. Furber and B. Jacobs},
  editor = {C. Heunen and P. Selinger and J. Vicary},
  title = {Towards a Categorical Account of Conditional Probability},
  booktitle = {Quantum Physics and Logic (QPL) 2015},
  journal = {Electronic Proceedings in Theoretical Computer Science},
  year = {2015},
  volume = {195},
  pages = {179--195},
  doi = {10.4204/EPTCS.195.14}
}
Furber R and Westerbaan B (2015), "Unordered Tuples in Quantum Computation", Electron. Proc. Theor. Comput. Sci.., nov, 2015. Vol. 195, pp. 196-207. Open Publishing Association.
BibTeX:
@article{ds-2015-Furber-c,
  author = {Robert Furber and Bas Westerbaan},
  title = {Unordered Tuples in Quantum Computation},
  journal = {Electron. Proc. Theor. Comput. Sci.},
  publisher = {Open Publishing Association},
  year = {2015},
  volume = {195},
  pages = {196--207},
  doi = {10.4204/eptcs.195.15}
}
Gousios G, Zaidman A, Storey M-A and van Deursen A (2015), "Work Practices and Challenges in Pull-Based Development: The Integrator's Perspective", In Proceedings of the 37th International Conference on Software Engineering. Florence, Italy, May, 2015. Vol. 1, pp. 358-368.
Abstract:
In the pull-based development model, the integrator has the crucial role of
managing and integrating contributions. This work focuses on the role of
the integrator and investigates working habits and challenges alike. We set
up an exploratory qualitative study involving a large-scale survey of 749
integrators, to which we add quantitative data from the integrator's
project. Our results provide insights into the factors they consider in
their decision making process to accept or reject a contribution. Our key
findings are that integrators struggle to maintain the quality of their
projects and have difficulties with prioritizing contributions that are to
be merged. Our insights have implications for practitioners who wish to
use or improve their pull-based development process, as well as for
researchers striving to understand the theoretical implications of the
pull-based model in software development.
BibTeX:
@inproceedings{ds-2015-Gousios-a,
  author = {Georgios Gousios and Andy Zaidman and Margaret-Anne Storey and Arie van Deursen},
  title = {Work Practices and Challenges in Pull-Based Development: The Integrator's Perspective},
  booktitle = {Proceedings of the 37th International Conference on Software Engineering},
  year = {2015},
  volume = {1},
  pages = {358-368},
  doi = {10.1109/ICSE.2015.55}
}
Graves R, Di Natale G, Batina L, Bhasin S, Ege B, Fournaris A, Mentens N, Picek S, Regazzoni F, Rozic V, Sklavos N and Yang B (2015), "Challenges in designing trustworthy cryptographic co-processors", In Circuits and Systems (ISCAS), 2015 IEEE International Symposium on., May, 2015. , pp. 2009-2012.
BibTeX:
@inproceedings{ds-2015-Graves-a,
  author = {Graves, R. and Di Natale, G. and Batina, L. and Bhasin, S. and Ege, B. and Fournaris, A. and Mentens, N. and Picek, S. and Regazzoni, F. and Rozic, V. and Sklavos, N. and Bohan Yang},
  title = {Challenges in designing trustworthy cryptographic co-processors},
  booktitle = {Circuits and Systems (ISCAS), 2015 IEEE International Symposium on},
  year = {2015},
  pages = {2009-2012},
  doi = {10.1109/ISCAS.2015.7169070}
}
Haag J, Karsch S, Vranken H and Van Eekelen M (2015), "An Exercise Assistant for Practical Networking and IT Security Courses in Higher Education", In Computer Supported Education. Vol. 510, pp. 84-98. Springer International Publishing.
BibTeX:
@incollection{ds-2015-Haag-a,
  author = {Haag, Jens and Karsch, Stefan and Vranken, Harald and Van Eekelen, Marko},
  editor = {Zvacek, Susan and Restivo, Maria Teresa and Uhomoibhi, James and Helfert, Markus},
  title = {An Exercise Assistant for Practical Networking and IT Security Courses in Higher Education},
  booktitle = {Computer Supported Education},
  publisher = {Springer International Publishing},
  year = {2015},
  volume = {510},
  pages = {84-98},
  url = {http://dx.doi.org/10.1007/978-3-319-25768-6_6},
  doi = {10.1007/978-3-319-25768-6_6}
}
Habraken R, Dolron P, Poll E and de Ruiter J (2015), "An RFID skimming gate using Higher Harmonics", In RFIDsec 2015. (9440), pp. 122-137. Springer.
BibTeX:
@inproceedings{ds-2015-Habraken-a,
  author = {René Habraken and Peter Dolron and Erik Poll and Joeri de Ruiter},
  title = {An RFID skimming gate using Higher Harmonics},
  booktitle = {RFIDsec 2015},
  publisher = {Springer},
  year = {2015},
  number = {9440},
  pages = {122-137},
  doi = {10.1007/978-3-319-24837-0_8}
}
Hampiholi B, Alpár G, van den Broek F and Jacobs B (2015), "Towards Practical Attribute-Based Signatures", In Security, Privacy, and Applied Cryptography Engineering. , pp. 310-328. Springer.
BibTeX:
@incollection{ds-2015-Hampiholi-a,
  author = {Hampiholi, Brinda and Alpár, Gergely and van den Broek, Fabian and Jacobs, Bart},
  title = {Towards Practical Attribute-Based Signatures},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering},
  publisher = {Springer},
  year = {2015},
  pages = {310--328},
  doi = {10.1007/978-3-319-24126-5_18}
}
Hauff C and Gousios G (2015), "Matching GitHub developer profiles to job advertisements", In Proceedings of the 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (MSR). Florence, Italy, May, 2015. , pp. 362-366.
Abstract:
GitHub is a social coding platform that enables developers to efficiently
work on projects, connect with other developers, collaborate and generally
``be seen'' by the community. This visibility also extends to prospective
employers and HR personnel who may use GitHub to learn more about a
developer???s skills and interests. We propose a pipeline that automatizes
this process and automatically suggests matching job advertisements to
developers, based on signals extracting from their activities on GitHub.
BibTeX:
@inproceedings{ds-2015-Hauff-a,
  author = {Claudia Hauff and Georgios Gousios},
  title = {Matching GitHub developer profiles to job advertisements},
  booktitle = {Proceedings of the 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (MSR)},
  year = {2015},
  pages = {362-366},
  doi = {10.1109/MSR.2015.41}
}
Heimgaertner F, Hoefling M, Vieira B, Poll E and Menth M (2015), "A Security Architecture for the Publish/Subscribe C-DAX Middleware", In Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (ICC Workshops 2015). , pp. 2616-2621. IEEE.
BibTeX:
@inproceedings{ds-2015-Heimgaertner-a,
  author = {Florian Heimgaertner and Michael Hoefling and Barbara Vieira and Erik Poll and Michael Menth},
  title = {A Security Architecture for the Publish/Subscribe C-DAX Middleware},
  booktitle = {Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (ICC Workshops 2015)},
  publisher = {IEEE},
  year = {2015},
  pages = {2616-2621},
  doi = {10.1109/ICCW.2015.7247573}
}
Hinterwälder G, Moradi A, Hutter M, Schwabe P and Paar C (2015), "Full size high security ECC implementation on MSP430 microcontrollers", In Progress in Cryptology -- LATINCRYPT 2014. Vol. 8895, pp. 31-47. Springer.
BibTeX:
@inproceedings{ds-2015-Hinterwaelder-a,
  author = {Gesine Hinterwälder and Amir Moradi and Michael Hutter and Peter Schwabe and Christof Paar},
  editor = {Diego Aranha and Alfred Menezes},
  title = {Full size high security ECC implementation on MSP430 microcontrollers},
  booktitle = {Progress in Cryptology -- LATINCRYPT 2014},
  publisher = {Springer},
  year = {2015},
  volume = {8895},
  pages = {31--47},
  doi = {10.1007/978-3-319-16295-9_2}
}
Hoepman J-H (2015), "Privately (and Unlinkably) Exchanging Messages Using a Public Bulletin Board", In ACM Workshop on Privacy in the Electronic Society (WPES 2015). Denver, CO, USA, October 12, 2015. , pp. 85-94.
BibTeX:
@inproceedings{ds-2015-Hoepman-a,
  author = {Jaap-Henk Hoepman},
  title = {Privately (and Unlinkably) Exchanging Messages Using a Public Bulletin Board},
  booktitle = {ACM Workshop on Privacy in the Electronic Society (WPES 2015)},
  year = {2015},
  pages = {85--94},
  doi = {10.1145/2808138.2808142}
}
Hoepman J-H (2015), "eID Stelsel wijzigt koers - en raakt daarmee van de wal in de sloot", Privacy & Informatie. , pp. 42-45.
BibTeX:
@article{ds-2015-Hoepman-b,
  author = {Jaap-Henk Hoepman},
  title = {eID Stelsel wijzigt koers - en raakt daarmee van de wal in de sloot},
  journal = {Privacy & Informatie},
  year = {2015},
  pages = {42--45}
}
Huijgens H, Gousios G and van Deursen A (2015), "Pricing via Functional Size: A Case Study of a Company's Portfolio of 77 Outsourced Projects", In Proceedings of the 9th International Symposium on Empirical Software Engineering and Measurement. Beijing, China, Oct, 2015.
Abstract:
A medium-sized west-European telecom company experienced a worsening trend in
performance, indicating that the organization did not learn from history, in
combination with much time and energy spent on preparation and review of
project proposals. In order to create more transparency in the supplier
proposal process a pilot was started on Functional Size Measurement pricing
(FSM-pricing). In this paper, we evaluate the implementation of FSM-pricing
in the software engineering domain of the company, as an instrument useful in
the context of software man- agement and supplier proposal pricing. We found
that a statistical, evidence-based pricing approach for software engineering,
as a single instrument (without a connection with expert judgment), can be
used in the subject companies to create cost transparency and performance
management of software project portfolios.
BibTeX:
@inproceedings{ds-2015-Huijgens-a,
  author = {Hennie Huijgens and Georgios Gousios and Arie van Deursen},
  title = {Pricing via Functional Size: A Case Study of a Company's Portfolio of 77 Outsourced Projects},
  booktitle = {Proceedings of the 9th International Symposium on Empirical Software Engineering and Measurement},
  year = {2015}
}
Hutter M, Schilling J, Schwabe P and Wieser W (2015), "NaCl's cryptobox in hardware", In Cryptographic Hardware and Embedded Systems -- CHES 2015. Vol. 9293, pp. 81-101. Springer.
BibTeX:
@inproceedings{ds-2015-Hutter-a,
  author = {Michael Hutter and Jürgen Schilling and Peter Schwabe and and Wolfgang Wieser},
  editor = {Tim Güneysu and Helena Handschuh},
  title = {NaCl's cryptobox in hardware},
  booktitle = {Cryptographic Hardware and Embedded Systems -- CHES 2015},
  publisher = {Springer},
  year = {2015},
  volume = {9293},
  pages = {81--101},
  doi = {10.1007/978-3-662-48324-4_5}
}
Hutter M and Schwabe P (2015), "Multiprecision multiplication on AVR revisited", Journal of Cryptographic Engineering. Vol. 5(3), pp. 201-214. Springer.
BibTeX:
@article{ds-2015-Hutter-b,
  author = {Michael Hutter and Peter Schwabe},
  title = {Multiprecision multiplication on AVR revisited},
  journal = {Journal of Cryptographic Engineering},
  publisher = {Springer},
  year = {2015},
  volume = {5},
  number = {3},
  pages = {201--214},
  doi = {10.1007/s13389-015-0093-2}
}
Jacobs B (2015), "Dijkstra and Hoare Monads in Monadic Computation", Theor. Comp. Sci.. Vol. 604, pp. 30-45.
BibTeX:
@article{ds-2015-Jacobs-a,
  author = {B. Jacobs},
  title = {Dijkstra and Hoare Monads in Monadic Computation},
  journal = {Theor. Comp. Sci.},
  year = {2015},
  volume = {604},
  pages = {30--45},
  doi = {10.1016/j.tcs.2015.03.020}
}
Jacobs B (2015), "A recipe for State and Effect Triangles", In Conference on Algebra and Coalgebra in Computer Science (CALCO 2015). Vol. 35, pp. 116-129. Schloss Dagstuhl.
BibTeX:
@inproceedings{ds-2015-Jacobs-b,
  author = {B. Jacobs},
  editor = {L. Moss and P. Sobocinski},
  title = {A recipe for State and Effect Triangles},
  booktitle = {Conference on Algebra and Coalgebra in Computer Science (CALCO 2015)},
  publisher = {Schloss Dagstuhl},
  year = {2015},
  volume = {35},
  pages = {116--129},
  doi = {10.4230/LIPIcs.CALCO.2015.116}
}
Jacobs B (2015), "De overheid als verschaffer en beschermer van digitale identiteiten", Regelmaat. Vol. 30(1), pp. 37-44.
BibTeX:
@article{ds-2015-Jacobs-c,
  author = {B. Jacobs},
  title = {De overheid als verschaffer en beschermer van digitale identiteiten},
  journal = {Regelmaat},
  year = {2015},
  volume = {30(1)},
  pages = {37--44}
}
Jacobs B (2015), "New Directions in Categorical Logic, for Classical, Probabilistic and Quantum Logic", Logical Methods in Comp. Sci.. Vol. 11(3), pp. 1-76.
BibTeX:
@article{ds-2015-Jacobs-d,
  author = {B. Jacobs},
  title = {New Directions in Categorical Logic, for Classical, Probabilistic and Quantum Logic},
  journal = {Logical Methods in Comp. Sci.},
  year = {2015},
  volume = {11(3)},
  pages = {1--76},
  doi = {10.2168/LMCS-11(3:24)2015}
}
Jacobs B and Westerbaan A (2015), "An effect-theoretic account of Lebesgue integration", In Math. Found. of Programming Semantics. (319), pp. 239-253. Elsevier, Amsterdam.
BibTeX:
@inproceedings{ds-2015-Jacobs-e,
  author = {B. Jacobs and A. Westerbaan},
  editor = {D. Ghica},
  title = {An effect-theoretic account of Lebesgue integration},
  booktitle = {Math. Found. of Programming Semantics},
  publisher = {Elsevier, Amsterdam},
  year = {2015},
  number = {319},
  pages = {239--253},
  doi = {10.1016/j.entcs.2015.12.015}
}
Jacobs B, Westerbaan B and Westerbaan B (2015), "States of convex sets", In Foundations of Software Science and Computation Structures. , pp. 87-101.
BibTeX:
@inproceedings{ds-2015-Jacobs-f,
  author = {Jacobs, Bart and Westerbaan, Bas and Westerbaan, Bram},
  title = {States of convex sets},
  booktitle = {Foundations of Software Science and Computation Structures},
  year = {2015},
  pages = {87--101},
  doi = {10.1007/978-3-662-46678-0_6}
}
Kalliamvakou E, Gousios G, Blincoe K, Singer L, German D and Damian D (2015), "An in-depth study of the promises and perils of mining GitHub", Empirical Software Engineering. , pp. 1-37. Springer.
Abstract: With over 10 million git repositories, GitHub is becoming one of
the most important sources of software artifacts on the Internet. Researchers
mine the information stored in GitHub's event logs to understand how its users
employ the site to collaborate on software, but so far there have been no
studies describing the quality and properties of the available GitHub data. We
document the results of an empirical study aimed at understanding the
characteristics of the repositories and users in GitHub; we see how users take
advantage of GitHub's main features and how their activity is tracked on
GitHub and related datasets to point out misalignment between the real and
mined data. Our results indicate that while GitHub is a rich source of data on
software development, mining GitHub for research purposes should take various
potential perils into consideration. For example, we show that the majority of
the projects are personal and inactive, and that almost 40% of all pull
requests do not appear as merged even though they were. Also, approximately
half of GitHub's registered users do not have public activity, while the
activity of GitHub users in repositories is not always easy to pinpoint. We
use our identified perils to see if they can pose validity threats; we
review selected papers from the MSR 2014 Mining Challenge and see if there are
potential impacts to consider. We provide a set of recommendations for
software engineering researchers on how to approach the data in GitHub.
BibTeX:
@article{ds-2015-Kalliamvakou-a,
  author = {Kalliamvakou, Eirini and Gousios, Georgios and Blincoe, Kelly and Singer, Leif and German, DanielM. and Damian, Daniela},
  title = {An in-depth study of the promises and perils of mining GitHub},
  journal = {Empirical Software Engineering},
  publisher = {Springer},
  year = {2015},
  pages = {1--37},
  doi = {10.1007/s10664-015-9393-5}
}
Karakoidas V, Mitropoulos D, Louridas P, Gousios G and Spinellis D (2015), "Generating the Blueprints of the Java Ecosystem", In Proceedings of the 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (MSR). Florence, Italy, May, 2015. , pp. 510-513.
Abstract:
Examining a large number of software artifacts can provide the research
community with data regarding quality and design. We present a dataset
obtained by statically analyzing 22730 jar files taken from the Maven
central archive, which is the de-facto application library repository for
the Java ecosystem. For our analysis we used three popular static analysis
tools that calculate metrics regarding object-oriented design, program size,
and package design. The dataset contains the metrics results that every tool
reports for every selected jar of the ecosystem. Our dataset can be used to
produce interesting research results, such as measure the domain-specific
language usage.
BibTeX:
@inproceedings{ds-2015-Karakoidas-a,
  author = {Karakoidas, Vassilios and Mitropoulos, Dimitrios and Louridas, Panos and Gousios, Georgios and Spinellis, Diomidis},
  title = {Generating the Blueprints of the Java Ecosystem},
  booktitle = {Proceedings of the 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (MSR)},
  year = {2015},
  pages = {510-513},
  doi = {10.1109/MSR.2015.76}
}
Keiren JJA (2015), "Benchmarks for Parity Games", In Fundamentals of Software Engineering (FSEN 2015). Vol. 9392, pp. 126-142. Springer.
BibTeX:
@inproceedings{ds-2015-Keiren-a,
  author = {Keiren, Jeroen J. A.},
  title = {Benchmarks for Parity Games},
  booktitle = {Fundamentals of Software Engineering (FSEN 2015)},
  publisher = {Springer},
  year = {2015},
  volume = {9392},
  pages = {126--142},
  doi = {10.1007/978-3-319-24644-4_9}
}
Kersten R (2015), "Software Analysis Methods for Resource-Sensitive Systems". Thesis at: Radboud University.
BibTeX:
@phdthesis{ds-2015-Kersten-a,
  author = {Kersten, Rody},
  title = {Software Analysis Methods for Resource-Sensitive Systems},
  school = {Radboud University},
  year = {2015}
}
Köppe C, van Eekelen MCJD and Hoppenbrouwers S (2015), "Improving Student Group Work with Collaboration Patterns: A Case Study", In 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 2. , pp. 303-306. ACM% !TEX root = & IEEE.
BibTeX:
@inproceedings{ds-2015-Koeppe-a,
  author = {Christian Köppe and Marko C. J. D. van Eekelen and Stijn Hoppenbrouwers},
  title = {Improving Student Group Work with Collaboration Patterns: A Case Study},
  booktitle = {37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 2},
  publisher = {ACM% !TEX root = & IEEE},
  year = {2015},
  pages = {303--306},
  url = {http://dx.doi.org/10.1109/ICSE.2015.160},
  doi = {10.1109/ICSE.2015.160}
}
(2015), "The Privacy & Identity Lab. 4 Years Later" The Privacy & Identity Lab.
BibTeX:
@book{ds-2015-Lieshout-a,,
  editor = {Marc van Lieshout and Jaap-Henk Hoepman},
  title = {The Privacy & Identity Lab. 4 Years Later},
  publisher = {The Privacy & Identity Lab},
  year = {2015},
  doi = {10.13140/RG.2.1.1210.7600}
}
Lorente EN, Meijer C and Verdult R (2015), "Scrutinizing WPA2 password generating algorithms in wireless routers", In 9th USENIX Workshop on Offensive Technologies (WOOT 2015). USENIX Association.
BibTeX:
@inproceedings{ds-2015-Lorente-a,
  author = {Lorente, Eduardo Novella and Meijer, Carlo and Verdult, Roel},
  title = {Scrutinizing WPA2 password generating algorithms in wireless routers},
  booktitle = {9th USENIX Workshop on Offensive Technologies (WOOT 2015)},
  publisher = {USENIX Association},
  year = {2015}
}
Lueks W, Alpár G, Hoepman J-H and Vullers P (2015), "Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers (extended abstract)", In 30th Int. Conf. on ICT Systems Security and Privacy Protection (IFIP SEC 2015). Hamburg, Germany, May 26--8, 2015. , pp. 463-478.
BibTeX:
@inproceedings{ds-2015-Lueks-a,
  author = {Wouter Lueks and Gergely Alpár and Jaap-Henk Hoepman and Pim Vullers},
  title = {Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers (extended abstract)},
  booktitle = {30th Int. Conf. on ICT Systems Security and Privacy Protection (IFIP SEC 2015)},
  year = {2015},
  pages = {463--478},
  doi = {10.1007/978-3-319-18467-8_31}
}
Lueks W and Goldberg I (2015), "Sublinear Scaling for Multi-Client Private Information Retrieval", In Financial Cryptography and Data Security (FC 2015). Vol. 8975, pp. 168-186.
BibTeX:
@inproceedings{ds-2015-Lueks-b,
  author = {Lueks, Wouter and Goldberg, Ian},
  editor = {Böhme, Rainer and Okamoto, Tatsuaki},
  title = {Sublinear Scaling for Multi-Client Private Information Retrieval},
  booktitle = {Financial Cryptography and Data Security (FC 2015)},
  year = {2015},
  volume = {8975},
  pages = {168--186},
  doi = {10.1007/978-3-662-47854-7_10}
}
Meijer C and Verdult R (2015), "Ciphertext-only cryptanalysis on hardened Mifare Classic cards", In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. , pp. 18-30. ACM.
BibTeX:
@inproceedings{ds-2015-Meijer-a,
  author = {Meijer, Carlo and Verdult, Roel},
  title = {Ciphertext-only cryptanalysis on hardened Mifare Classic cards},
  booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security},
  publisher = {ACM},
  year = {2015},
  pages = {18--30},
  doi = {10.1145/2810103.2813641}
}
de la Piedra A (2015), "Efficient implementation of AND, OR and NOT operators for ABCs", In The 7th International Conference on Trusted Systems (INTRUST 2015). Beijing, China, December 7--8, 2015.
BibTeX:
@inproceedings{ds-2015-Piedra-a,
  author = {Antonio de la Piedra},
  title = {Efficient implementation of AND, OR and NOT operators for ABCs},
  booktitle = {The 7th International Conference on Trusted Systems (INTRUST 2015)},
  year = {2015}
}
de la Piedra A (2015), "Efficient implementation of AND, OR and NOT operators for ABCs". Thesis at: Radboud University Nijmegen. (Cryptology ePrint Archive: Report 2015/1117)
BibTeX:
@techreport{ds-2015-Piedra-b,
  author = {Antonio de la Piedra},
  title = {Efficient implementation of AND, OR and NOT operators for ABCs},
  school = {Radboud University Nijmegen},
  year = {2015},
  number = {Cryptology ePrint Archive: Report 2015/1117}
}
Poll E, de Ruiter J and Schubert A (2015), "Protocol state machines and session languages: specification, implementation, and security flaws", In Symposium on Security and Privacy Workshops (SPW). , pp. 125 - 133. IEEE.
BibTeX:
@inproceedings{ds-2015-Poll-a,
  author = {Erik Poll and Joeri de Ruiter and Aleksy Schubert},
  title = {Protocol state machines and session languages: specification, implementation, and security flaws},
  booktitle = {Symposium on Security and Privacy Workshops (SPW)},
  publisher = {IEEE},
  year = {2015},
  pages = {125 - 133},
  doi = {10.1109/SPW.2015.32}
}
Rennela M and Staton S (2015), "Complete Positivity and Natural Representation of Quantum Computations", Electronic Notes in Theoretical Computer Science., In Proceedings of the 31st Conference on the Mathematical Foundations of Programming Semantics (MFPS XXXI)... Thesis at: Radboud University Nijmegen and Oxford University. Nijmegen, The Netherlands, December, 2015. Vol. 319, pp. 369 - 385.
BibTeX:
@inproceedings{ds-2015-Rennela-a,
  author = {Mathys Rennela and Sam Staton},
  title = {Complete Positivity and Natural Representation of Quantum Computations},
  booktitle = {Proceedings of the 31st Conference on the Mathematical Foundations of Programming Semantics (MFPS XXXI).},
  journal = {Electronic Notes in Theoretical Computer Science},
  school = {Radboud University Nijmegen and Oxford University},
  year = {2015},
  volume = {319},
  pages = {369 - 385},
  url = {http://www.sciencedirect.com/science/article/pii/S1571066115000894},
  doi = {10.1016/j.entcs.2015.12.022}
}
Rigby PC, Bacchelli A, Gousios G and Mukadam M (2015), "A Mixed Methods Approach to Mining Code Review Data: Examples and a study of multi-commit reviews and pull requests", In The Art and Science of Analyzing Software Data. , pp. 231-255. Morgan Kaufmann.
Abstract:
Software code review has been considered an important quality assurance
mechanism for the last 35 years. The techniques for conducting modern code reviews
have evolved along with the software industry and have become progressively
incremental and lightweight. We have studied code review in number of
contemporary settings, including Apache, Linux, KDE, Microsoft, Android, and
GitHub. Code review is an inherently social activity, so we have used both
quantitative and qualitative methods to understand the underlying parameters
(or measures) of the process, as well as the rich interactions and motivations
for doing code review. In this chapter, we describe how we have used a mixed
methods approach to triangulate our findings on code review. We also
describe how we use quantitative data to help us sample the most interesting
cases from our data to be analyzed qualitatively. To illustrate code review
research, we provide new results that contrast single and multi-commit reviews.
We find that while multi-commit reviews take longer and have more lines churned than
single commit reviews, the same number of people are involved in both types of
review. To enrich and triangulate our findings, we qualitatively analyze the
characteristics of multi-commit reviews and find that there are two types:
reviews of branches and revisions to single commits. We also examine the
reasons why commits on GitHub pull requests are rejected.
BibTeX:
@incollection{ds-2015-Rigby-a,
  author = {Peter C. Rigby and Alberto Bacchelli and Georgios Gousios and Murtuza Mukadam},
  editor = {Christian Bird and Tim Menzies and Thomas Zimmermann},
  title = {A Mixed Methods Approach to Mining Code Review Data: Examples and a study of multi-commit reviews and pull requests},
  booktitle = {The Art and Science of Analyzing Software Data},
  publisher = {Morgan Kaufmann},
  year = {2015},
  pages = {231--255}
}
Ringers S, Hoepman J-H and Lueks W (2015), "On linkability and malleability in self-blindable credentials", In The 9th WISTP International Conference on Information Security Theory and Practice (WISTP'2015). Heraklion, Krete, Greece, August 24--25, 2015. , pp. 203-218.
BibTeX:
@inproceedings{ds-2015-Ringers-a,
  author = {Sietse Ringers and Jaap-Henk Hoepman and Wouter Lueks},
  title = {On linkability and malleability in self-blindable credentials},
  booktitle = {The 9th WISTP International Conference on Information Security Theory and Practice (WISTP'2015)},
  year = {2015},
  pages = {203--218},
  doi = {10.1007/978-3-319-24018-3_13}
}
de Ruiter J (2015), "Lessons learned in the analysis of the EMV and TLS security protocols". Thesis at: Radboud University.
BibTeX:
@phdthesis{ds-2015-Ruiter-a,
  author = {de Ruiter, Joeri},
  title = {Lessons learned in the analysis of the EMV and TLS security protocols},
  school = {Radboud University},
  year = {2015}
}
de Ruiter J and Poll E (2015), "Protocol State Fuzzing of TLS Implementations", In 24th USENIX Security Symposium (USENIX Security 15). Washington, D.C., August, 2015. , pp. 193-206. USENIX Association.
BibTeX:
@inproceedings{ds-2015-Ruiter-b,
  author = {Joeri de Ruiter and Erik Poll},
  title = {Protocol State Fuzzing of TLS Implementations},
  booktitle = {24th USENIX Security Symposium (USENIX Security 15)},
  publisher = {USENIX Association},
  year = {2015},
  pages = {193--206},
  url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/de-ruiter}
}
Shkaravska O, Rocca SRD and van Eekelen (Eds) M (2015), "Special Issue on Foundational and Practical Aspects of Resource Analysis (FOPARA) 2009 and 2011", Science of Computer Programming. Vol. 111, Part 3, pp. 363 - 557. Elsevier.
BibTeX:
@article{ds-2015-Shkaravska-a,
  author = {Olha Shkaravska and Simona Ronchi Della Rocca and Marko van Eekelen (Eds)},
  title = {Special Issue on Foundational and Practical Aspects of Resource Analysis (FOPARA) 2009 and 2011},
  journal = {Science of Computer Programming},
  publisher = {Elsevier},
  year = {2015},
  volume = {111, Part 3},
  pages = {363 - 557},
  note = {November 2015, ISSN 0167-6423. Elsevier, 2015"}
}
Shkaravska O, Rocca SRD and van Eekelen M (2015), "Preface of the special issue on Foundational and Practical Aspects of Resource Analysis (FOPARA) 2009 and 2011 ", Science of Computer Programming. Vol. 111, Part 3, pp. 363 - 364. Elsevier.
BibTeX:
@article{ds-2015-Shkaravska-b,
  author = {Olha Shkaravska and Simona Ronchi Della Rocca and Marko van Eekelen},
  title = {Preface of the special issue on Foundational and Practical Aspects of Resource Analysis (FOPARA) 2009 and 2011 },
  journal = {Science of Computer Programming},
  publisher = {Elsevier},
  year = {2015},
  volume = {111, Part 3},
  pages = {363 - 364},
  note = {Special Issue on Foundational and Practical Aspects of Resource Analysis (FOPARA) 2009 and 2011},
  url = {http://www.sciencedirect.com/science/article/pii/S0167642315002506},
  doi = {10.1016/j.scico.2015.08.008}
}
Smetsers S and van Eekelen M (2015), "Derivation and inference of higher-order strictness types", Computer Languages, Systems & Structures. Vol. 44, Part B, pp. 166 - 180.
BibTeX:
@article{ds-2015-Smetsers-a,
  author = {Sjaak Smetsers and Marko van Eekelen},
  title = {Derivation and inference of higher-order strictness types},
  journal = {Computer Languages, Systems & Structures},
  year = {2015},
  volume = {44, Part B},
  pages = {166 - 180},
  note = {SI: TFP\ 2011/12},
  url = {http://www.sciencedirect.com/science/article/pii/S1477842415000512},
  doi = {10.1016/j.cl.2015.07.004}
}
Smetsers S, Madlener K and van Eekelen MCJD (2015), "Formalizing Bialgebraic Semantics in PVS 6.0", In 2nd International Workshop on Rewriting Techniques for Program Transformations and Evaluation, WPTE 2015, July 2, 2015, Warsaw, Poland. , pp. 47-61. OASICS Volulme 46, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik.
BibTeX:
@inproceedings{ds-2015-Smetsers-b,
  author = {Sjaak Smetsers and Ken Madlener and Marko C. J. D. van Eekelen},
  title = {Formalizing Bialgebraic Semantics in PVS 6.0},
  booktitle = {2nd International Workshop on Rewriting Techniques for Program Transformations and Evaluation, WPTE 2015, July 2, 2015, Warsaw, Poland},
  publisher = {OASICS Volulme 46, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year = {2015},
  pages = {47--61},
  url = {http://dx.doi.org/10.4230/OASIcs.WPTE.2015.47},
  doi = {10.4230/OASIcs.WPTE.2015.47}
}
Staton S (2015), "Algebraic Effects, Linearity, and Quantum Programming Languages", In Proceedings of the 42Nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'15). New York, NY, USA , pp. 395-406. ACM.
BibTeX:
@inproceedings{ds-2015-Staton-a,
  author = {Staton, Sam},
  title = {Algebraic Effects, Linearity, and Quantum Programming Languages},
  booktitle = {Proceedings of the 42Nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'15)},
  publisher = {ACM},
  year = {2015},
  pages = {395--406},
  doi = {10.1145/2676726.2676999}
}
Staton S and Uijlen S (2015), "Effect Algebras, Presheaves, Non-locality and Contextuality", In Automata, Languages, and Programming. , pp. 401-413. Springer Science and Business Media.
BibTeX:
@incollection{ds-2015-Staton-b,
  author = {Sam Staton and Sander Uijlen},
  title = {Effect Algebras, Presheaves, Non-locality and Contextuality},
  booktitle = {Automata, Languages, and Programming},
  publisher = {Springer Science and Business Media},
  year = {2015},
  pages = {401--413},
  doi = {10.1007/978-3-662-47666-6_32}
}
van der Veen E, Gousios G and Zaidman A (2015), "Automatically Prioritizing Pull Requests", In Proceedings of the 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (MSR). Florence, Italy, May, 2015. , pp. 357-361.
Abstract:
In previous work, we observed that in the pull-based development model
integrators face challenges with regard to prioritizing work in the face of
multiple concurrent pull requests. We present the design and initial
implementation of a prototype pull request prioritisation tool called
PRioritizer. PRioritizer works like a priority inbox for pull requests,
recommending the top pull requests the project owner should focus on. A
preliminary user study showed that PRioritizer provides functionality that
GitHub is currently lacking, even though users need more insight into how
the priority ranking is established to make PRioritizer really useful.
BibTeX:
@inproceedings{ds-2015-Veen-a,
  author = {Erik van der Veen and Georgios Gousios and Andy Zaidman},
  title = {Automatically Prioritizing Pull Requests},
  booktitle = {Proceedings of the 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (MSR)},
  year = {2015},
  pages = {357-361},
  doi = {10.1109/MSR.2015.40}
}
Verbeek F, Schmaltz J, Tverdyshev S, Blasum H, Havle O, Langenstein B, Stephan W and Wolff B (2015), "Formal Functional Specification of the PikeOS Separation Kernel", In Proceedings of the 7th NASA Formal Methods Symposium. , pp. 375-389. Springer.
BibTeX:
@inproceedings{ds-2015-Verbeek-a,
  author = {Freek Verbeek and Julien Schmaltz and Sergey Tverdyshev and Holger Blasum and Oto Havle and Bruno Langenstein and Werner Stephan and Burkhart Wolff},
  title = {Formal Functional Specification of the PikeOS Separation Kernel},
  booktitle = {Proceedings of the 7th NASA Formal Methods Symposium},
  publisher = {Springer},
  year = {2015},
  pages = {375--389}
}
Verdult R (2015), "The (in)security of proprietary cryptography". Thesis at: Radboud University.
BibTeX:
@phdthesis{ds-2015-Verdult-a,
  author = {Verdult, Roel},
  title = {The (in)security of proprietary cryptography},
  school = {Radboud University},
  year = {2015}
}
Verheul E, Ringers S and Hoepman J-H (2015), "The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable", Cryptology ePrint Archive, Report 2015/725. July 20, 2015.
BibTeX:
@misc{ds-2015-Verheul-a,
  author = {Eric Verheul and Sietse Ringers and Jaap-Henk Hoepman},
  title = {The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable},
  howpublished = {Cryptology ePrint Archive, Report 2015/725},
  year = {2015},
  url = {https://eprint.iacr.org/2015/725}
}
Vranken H and Poll E (2015), "Een mastercursus over software security: van contactonderwijs naar afstandonderwijs", Presentatie NIOC, Enschede. 23-24 april, 2015.
BibTeX:
@misc{ds-2015-Vranken-a,
  author = {Vranken, Harald and Poll, Erik},
  title = {Een mastercursus over software security: van contactonderwijs naar afstandonderwijs},
  howpublished = {Presentatie NIOC, Enschede},
  year = {2015}
}

2014

Mø gelberg RE and Staton S (2014), "Linear usage of state", Logical Methods in Comp. Sci.., March, 2014. Vol. 10(1)
BibTeX:
@article{ds-2014-Mogelberg-a,
  author = {Rasmus E Mø gelberg and Sam Staton},
  title = {Linear usage of state},
  journal = {Logical Methods in Comp. Sci.},
  year = {2014},
  volume = {10},
  number = {1},
  note = {doi:10.2168/LMCS-10(1:17)2014}
}
Adams R (2014), "QPEL: Quantum Program and Effect Language", In rm Proceedings of the 11th workshop on Quantum Physics and Logic, rm Kyoto, Japan, 4-6th June 2014. Vol. 172, pp. 133-153. Open Publishing Association.
BibTeX:
@inproceedings{ds-2014-Adams-a,
  author = {Adams, Robin},
  editor = {Coecke, Bob and Hasuo, Ichiro and Panangaden, Prakash},
  title = {QPEL: Quantum Program and Effect Language},
  booktitle = {rm Proceedings of the 11th workshop on Quantum Physics and Logic, rm Kyoto, Japan, 4-6th June 2014},
  publisher = {Open Publishing Association},
  year = {2014},
  volume = {172},
  pages = {133--153},
  doi = {10.4204/EPTCS.172.10}
}
Batina L, Chmielewski Ł, Papachristodoulou L, Schwabe P and Tunstall M (2014), "Online template attacks", In Progress in Cryptology -- INDOCRYPT 2014. Vol. 8885, pp. 21-36. Springer-Verlag.
BibTeX:
@inproceedings{ds-2014-Batina-a,
  author = {Lejla Batina and Łukasz Chmielewski and Louiza Papachristodoulou and Peter Schwabe and Michael Tunstall},
  editor = {Willi Meier and Debdeep Mukhopadhyay},
  title = {Online template attacks},
  booktitle = {Progress in Cryptology -- INDOCRYPT 2014},
  publisher = {Springer-Verlag},
  year = {2014},
  volume = {8885},
  pages = {21--36}
}
Batina L, Hermans J, Hoepman J-H and Krasnova A (2014), "High-Speed Dating Privacy-Preserving Attribute Matching for RFID", In Radio Frequency Identification: Security and Privacy Issues. , pp. 19-35. Springer-Verlag.
BibTeX:
@incollection{ds-2014-Batina-b,
  author = {Batina, Lejla and Hermans, Jens and Hoepman, Jaap-Henk and Krasnova, Anna},
  editor = {Saxena, Nitesh and Sadeghi, Ahmad-Reza},
  title = {High-Speed Dating Privacy-Preserving Attribute Matching for RFID},
  booktitle = {Radio Frequency Identification: Security and Privacy Issues},
  publisher = {Springer-Verlag},
  year = {2014},
  pages = {19-35},
  url = {http://dx.doi.org/10.1007/978-3-319-13066-8_2}
}
Batina L, Hermans J, Hoepman J-H and Krasnova A (2014), "High-Speed Dating Privacy-Preserving Attribute Matching for RFID", In Radio Frequency Identification, 2014. RFIDSec 2014. Springer-Verlag Berlin Heidelberg.
BibTeX:
@inproceedings{ds-2014-Batina-c,
  author = {Lejla Batina and Jens Hermans and Jaap-Henk Hoepman and Anna Krasnova},
  title = {High-Speed Dating Privacy-Preserving Attribute Matching for RFID},
  booktitle = {Radio Frequency Identification, 2014. RFIDSec 2014},
  publisher = {Springer-Verlag Berlin Heidelberg},
  year = {2014}
}
Batina L, Jakobovic D, Mentens N, Picek S, de la Piedra A and Sisejkovic D (2014), "S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go?", In Progress in Cryptology -- INDOCRYPT 2014. , pp. 322-337. Springer-Verlag.
BibTeX:
@incollection{ds-2014-Batina-d,
  author = {Batina, Lejla and Jakobovic, Domagoj and Mentens, Nele and Picek, Stjepan and de la Piedra, Antonio and Sisejkovic, Dominik},
  editor = {Meier, Willi and Mukhopadhyay, Debdeep},
  title = {S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go?},
  booktitle = {Progress in Cryptology -- INDOCRYPT 2014},
  publisher = {Springer-Verlag},
  year = {2014},
  pages = {322-337},
  url = {http://dx.doi.org/10.1007/978-3-319-13039-2_19}
}
(2014), "Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings" Vol. 8731 Springer-Verlag.
BibTeX:
@proceedings{ds-2014-Batina-e,,
  editor = {Lejla Batina and Matthew Robshaw},
  title = {Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  publisher = {Springer-Verlag},
  year = {2014},
  volume = {8731}
}
Bernstein DJ, Chuengsatiansup C, Lange T and Schwabe P (2014), "Kummer strikes back: new DH speed records", In Advances in Cryptology -- ASIACRYPT 2014. Vol. 8873, pp. 317-337. Springer-Verlag.
BibTeX:
@inproceedings{ds-2014-Bernstein-a,
  author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe},
  editor = {Tetsu Iwata and Palash Sarkar},
  title = {Kummer strikes back: new DH speed records},
  booktitle = {Advances in Cryptology -- ASIACRYPT 2014},
  publisher = {Springer-Verlag},
  year = {2014},
  volume = {8873},
  pages = {317--337}
}
Broek Fvd, Hond B and Cedillo Torres A (2014), "Security Testing of GSM Implementations", In Engineering Secure Software and Systems. Vol. 8364, pp. 179-195. Springer-Verlag.
BibTeX:
@inproceedings{ds-2014-Broek-a,
  author = {Broek, Fabian van den and Hond, Brinio and Cedillo Torres, Arturo},
  title = {Security Testing of GSM Implementations},
  booktitle = {Engineering Secure Software and Systems},
  publisher = {Springer-Verlag},
  year = {2014},
  volume = {8364},
  pages = {179-195}
}
Broek Fvd and Poll E (2014), "Digitale handtekeningen: nieuwe technologie en nieuwe wet- en regelgeving", Privacy & Informatie. Vol. 1, pp. 2-10. Paris.
BibTeX:
@article{ds-2014-Broek-b,
  author = {Broek, F. van den and Poll, E.},
  title = {Digitale handtekeningen: nieuwe technologie en nieuwe wet- en regelgeving},
  journal = {Privacy & Informatie},
  publisher = {Paris},
  year = {2014},
  volume = {1},
  pages = {2--10}
}
Carpi R, Picek S, Batina L, Menarini F, Jakobovic D and Golub M (2014), "Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection", In Smart Card Research and Advanced Applications. , pp. 236-252. Springer-Verlag.
BibTeX:
@incollection{ds-2014-Carpi-a,
  author = {Carpi, RafaelBoix and Picek, Stjepan and Batina, Lejla and Menarini, Federico and Jakobovic, Domagoj and Golub, Marin},
  editor = {Francillon, Aurélien and Rohatgi, Pankaj},
  title = {Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection},
  booktitle = {Smart Card Research and Advanced Applications},
  publisher = {Springer-Verlag},
  year = {2014},
  pages = {236-252},
  url = {http://dx.doi.org/10.1007/978-3-319-08302-5_16}
}
Chalupar G, Peherstorfer S, Poll E and de Ruiter J (2014), "Automated Reverse Engineering using Lego", In 8th USENIX Workshop on Offensive Technologies (WOOT 2014). USENIX Association.
BibTeX:
@inproceedings{ds-2014-Chalupar-a,
  author = {Georg Chalupar and Stefan Peherstorfer and Erik Poll and Joeri de Ruiter},
  title = {Automated Reverse Engineering using Lego},
  booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT 2014)},
  publisher = {USENIX Association},
  year = {2014}
}
Chen Y-F, Hsu C-H, Lin H-H, Schwabe P, Tsai M-H, Wang B-Y, Yang B-Y and Yang S-Y (2014), "Verifying Curve25519 Software", In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS'14. , pp. 299-309. ACM.
BibTeX:
@inproceedings{ds-2014-Chen-a,
  author = {Yu-Fang Chen and Chang-Hong Hsu and Hsin-Hung Lin and Peter Schwabe and Ming-Hsien Tsai and Bow-Yaw Wang and Bo-Yin Yang and Shang-Yi Yang},
  title = {Verifying Curve25519 Software},
  booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS'14},
  publisher = {ACM},
  year = {2014},
  pages = {299--309},
  note = {http://cryptojedi.org/papers/\#verify25519}
}
Cho K (2014), "Semantics for a Quantum Programming Language by Operator Algebras", In rm Proceedings of the 11th workshop on Quantum Physics and Logic, rm Kyoto, Japan, 4-6th June 2014. Vol. 172, pp. 165-190. Open Publishing Association.
BibTeX:
@inproceedings{ds-2014-Cho-a,
  author = {Cho, Kenta},
  editor = {Coecke, Bob and Hasuo, Ichiro and Panangaden, Prakash},
  title = {Semantics for a Quantum Programming Language by Operator Algebras},
  booktitle = {rm Proceedings of the 11th workshop on Quantum Physics and Logic, rm Kyoto, Japan, 4-6th June 2014},
  publisher = {Open Publishing Association},
  year = {2014},
  volume = {172},
  pages = {165--190},
  doi = {10.4204/EPTCS.172.12}
}
Chuengsatiansup C, Naehrig M, Ribarski P and Schwabe P (2014), "PandA: Pairings and Arithmetic", In Pairing-Based Cryptography -- Pairing 2013. Vol. 8365, pp. 229-250. Springer-Verlag.
BibTeX:
@inproceedings{ds-2014-Chuengsatiansup-a,
  author = {Chitchanok Chuengsatiansup and Michael Naehrig and Pance Ribarski and Peter Schwabe},
  editor = {Zhenfu Cao and Fangguo Zhang},
  title = {PandA: Pairings and Arithmetic},
  booktitle = {Pairing-Based Cryptography -- Pairing 2013},
  publisher = {Springer-Verlag},
  year = {2014},
  volume = {8365},
  pages = {229--250},
  note = {http://cryptojedi.org/papers/\#panda}
}
Cooijmans T, de Ruiter J and Poll E (2014), "Analysis of Secure Key Storage Solutions on Android", In Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. , pp. 11-20. ACM.
BibTeX:
@inproceedings{ds-2014-Cooijmans-a,
  author = {Cooijmans, Tim and de Ruiter, Joeri and Poll, Erik},
  title = {Analysis of Secure Key Storage Solutions on Android},
  booktitle = {Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices},
  publisher = {ACM},
  year = {2014},
  pages = {11--20},
  doi = {10.1145/2666620.2666627}
}
Cuijpers C and Schroers J (2014), "eIDAS as guideline for the development of a pan European eID framework in FutureID", In Proceedings of the Open Identity Summit 2014. , pp. 23-38.
BibTeX:
@inproceedings{ds-2014-Cuijpers-a,
  author = {Cuijpers, Colette and Schroers, Jessica},
  title = {eIDAS as guideline for the development of a pan European eID framework in FutureID},
  booktitle = {Proceedings of the Open Identity Summit 2014},
  year = {2014},
  pages = {23-38}
}
van Eekelen M and Smetsers S (2014), "Verificatie en Validatie van Veiligheidskritieke Systemen", Bits & Chips, Themanummer Software Ontwikkeling. Vol. 4, pp. 42-45.
BibTeX:
@article{ds-2014-Eekelen-a,
  author = {Marko van Eekelen and Sjaak Smetsers},
  title = {Verificatie en Validatie van Veiligheidskritieke Systemen},
  journal = {Bits & Chips, Themanummer Software Ontwikkeling},
  year = {2014},
  volume = {4},
  pages = {42-45}
}
Eekelen Mv (2014), "Onderzoek en Softwareprojecten, water en vuur? Ervaringen met onderzoeksaspecten en software projectonderwijs.", In Proceedings Nationaal Informatica Onderwijs Congres 2013. Arnhem, Nederland, May, 2014. , pp. 262-268.
BibTeX:
@inproceedings{ds-2014-Eekelen-b,
  author = {Eekelen, Marko van},
  title = {Onderzoek en Softwareprojecten, water en vuur? Ervaringen met onderzoeksaspecten en software projectonderwijs.},
  booktitle = {Proceedings Nationaal Informatica Onderwijs Congres 2013},
  year = {2014},
  pages = {262-268}
}
Fiore M and Staton S (2014), "Substitution, jumps, and algebraic effects", In Proceedings of CSL-LICS 2014: Joint meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science. ACM.
BibTeX:
@inproceedings{ds-2014-Fiore-a,
  author = {Marcelo Fiore and Sam Staton},
  title = {Substitution, jumps, and algebraic effects},
  booktitle = {Proceedings of CSL-LICS 2014: Joint meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science},
  publisher = {ACM},
  year = {2014},
  note = {doi:10.1145/2603088.2603163}
}
van Gastel B, Verbeek F and Schmaltz J (2014), "Inference of packet types in channels of micro-architectural communication networks", In Proceedings of the International Conference on Very Large Scale Integration (VLSI-SOC’14)., october, 2014.
BibTeX:
@inproceedings{ds-2014-Gastel-a,
  author = {B. van Gastel and F. Verbeek and J. Schmaltz},
  title = {Inference of packet types in channels of micro-architectural communication networks},
  booktitle = {Proceedings of the International Conference on Very Large Scale Integration (VLSI-SOC’14)},
  year = {2014}
}
Georgios G and Bacchelli A (2014), "Work Practices and Challenges in Pull--Based Development: The Contributor's Perspective". Thesis at: Radboud University Nijmegen., March, 2014. (ICIS-R15001)
BibTeX:
@techreport{ds-2014-Georgios-a,
  author = {Gousios Georgios and Alberto Bacchelli},
  title = {Work Practices and Challenges in Pull--Based Development: The Contributor's Perspective},
  school = {Radboud University Nijmegen},
  year = {2014},
  number = {ICIS--R15001}
}
Haag J, Witte C, Karsch S, Vranken H and van Eekelen M (2014), "An exercise assistant for practical networking courses", In Proceedings of the 6th International Conference On Computer Supported Education (CSEDU2014). Barcelona, Spain, April, 2014. Vol. 1, pp. 97-104. SCITEPRESS Science and Technology Publications, 2014, ISBN 978-989-758-020-8.
BibTeX:
@inproceedings{ds-2014-Haag-a,
  author = {Haag, Jens and Witte, Christian and Karsch, Stefan and Vranken, Harald and van Eekelen, Marko},
  title = {An exercise assistant for practical networking courses},
  booktitle = {Proceedings of the 6th International Conference On Computer Supported Education (CSEDU2014)},
  publisher = {SCITEPRESS Science and Technology Publications, 2014, ISBN 978-989-758-020-8},
  year = {2014},
  volume = {1},
  pages = {97-104},
  note = {This paper received the CSEDU2014 Best Student Paper Award.}
}
Haag J, Witte C, Karsch S, Vranken H and Van Eekelen M (2014), "Evaluation of students' learning behaviour and success as a prerequisite for modernizing practical on campus networking courses in higher education", Journal of Higher Education (Yüksekögretim Dergisi)., August, 2014. Vol. 4(2), pp. 83-90.
BibTeX:
@article{ds-2014-Haag-b,
  author = {Haag, Jens and Witte, Christian and Karsch, Stefan and Vranken, Harald and Van Eekelen, Marko},
  title = {Evaluation of students' learning behaviour and success as a prerequisite for modernizing practical on campus networking courses in higher education},
  journal = {Journal of Higher Education (Yüksekögretim Dergisi)},
  year = {2014},
  volume = {4},
  number = {2},
  pages = {83-90},
  note = {(published in 2015)}
}
(2014), "Privacy and Identity Management for Emerging Services and Technologies. 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers" Vol. 421 Springer.
BibTeX:
@proceedings{ds-2014-Hansen-a,,
  editor = {M. Hansen and J.-H. Hoepman and R. Leenes and D. Whitehouse},
  title = {Privacy and Identity Management for Emerging Services and Technologies. 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers},
  publisher = {Springer},
  year = {2014},
  volume = {421},
  url = {https://www.springer.com/computer/security+and+cryptology/book/978-3-642-55136-9}
}
Hildebrandt M (2014), "Location Data, Purpose Binding and Contextual Integrity: What’s the Message?", In Protection of Information and the Right to Privacy-A New Equilibrium?. , pp. 31-63. Springer.
BibTeX:
@incollection{ds-2014-Hildebrandt-a,
  author = {Hildebrandt, Mireille},
  title = {Location Data, Purpose Binding and Contextual Integrity: What’s the Message?},
  booktitle = {Protection of Information and the Right to Privacy-A New Equilibrium?},
  publisher = {Springer},
  year = {2014},
  pages = {31--63}
}
Hildebrandt M (2014), "Radbruch on the Origins of the Criminal Law: Punitive Interventions before Sovereignty", In Foundational Texts in Modern Criminal Law. , pp. 219-238. Oxford University Press.
BibTeX:
@incollection{ds-2014-Hildebrandt-b,
  author = {Hildebrandt, Mireille},
  editor = {Dubber, Markus D.},
  title = {Radbruch on the Origins of the Criminal Law: Punitive Interventions before Sovereignty},
  booktitle = {Foundational Texts in Modern Criminal Law},
  publisher = {Oxford University Press},
  year = {2014},
  pages = {219--238}
}
Hildebrandt M (2014), "Eccentric Positionality as a Precondition for the Criminal Liability Of Artificial Life Forms", In Plessner’s Philosophical Anthropology. , pp. 407-424. Amsterdam University Press.
BibTeX:
@incollection{ds-2014-Hildebrandt-c,
  author = {Hildebrandt, Mireille},
  editor = {Mul, Jos de},
  title = {Eccentric Positionality as a Precondition for the Criminal Liability Of Artificial Life Forms},
  booktitle = {Plessner’s Philosophical Anthropology},
  publisher = {Amsterdam University Press},
  year = {2014},
  pages = {407--424}
}
Hildebrandt M (2014), "Dualism is Dead. Long Live Plurality (Instead of Duality)", In The Onlife Manifesto. , pp. 27-29. Springer.
BibTeX:
@incollection{ds-2014-Hildebrandt-d,
  author = {Hildebrandt, Mireille},
  title = {Dualism is Dead. Long Live Plurality (Instead of Duality)},
  booktitle = {The Onlife Manifesto},
  publisher = {Springer},
  year = {2014},
  pages = {27--29}
}
Hildebrandt M (2014), "ICT en Rechtstaat", In Recht en Computer. , pp. 25-45. Kluwer: Deventer.
BibTeX:
@incollection{ds-2014-Hildebrandt-e,
  author = {Hildebrandt, Mireille},
  title = {ICT en Rechtstaat},
  booktitle = {Recht en Computer},
  publisher = {Kluwer: Deventer},
  year = {2014},
  pages = {25--45}
}
Hoepman J-H (2014), "Privacy Design Strategies", In IFIP TC11 29th Int. Conf. on Information Security (IFIP SEC 2014)., June 2--4, 2014. , pp. 446-459.
BibTeX:
@inproceedings{ds-2014-Hoepman-a,
  author = {Jaap-Henk Hoepman},
  title = {Privacy Design Strategies},
  booktitle = {IFIP TC11 29th Int. Conf. on Information Security (IFIP SEC 2014)},
  year = {2014},
  pages = {446--459},
  note = {A preliminary version was presented at the Amsterdam Privacy Conference (APC 2012) and the Privacy Law Scholars Conference (PLSC 2013)}
}
Hoepman J-H, Koops B-J and Lueks W (2014), "Anoniem misdaad melden via Internet: technische en juridische risico’s", Nederlands Juristenblad.
BibTeX:
@article{ds-2014-Hoepman-b,
  author = {Jaap-Henk Hoepman and Bert-Jaap Koops and Wouter Lueks},
  title = {Anoniem misdaad melden via Internet: technische en juridische risico’s},
  journal = {Nederlands Juristenblad},
  year = {2014}
}
Jacobs B (2014), "Two of the Grand Changes through Computer and Network Technology", In Privacy and Identity Management for Emerging Services and Technologies. Vol. 421, pp. 1-11. Springer, Boston.
BibTeX:
@inproceedings{ds-2014-Jacobs-a,
  author = {B. Jacobs},
  editor = {M. Hansen and J.-H. Hoepman and R. Leenes and D. Whitehouse},
  title = {Two of the Grand Changes through Computer and Network Technology},
  booktitle = {Privacy and Identity Management for Emerging Services and Technologies},
  publisher = {Springer, Boston},
  year = {2014},
  volume = {421},
  pages = {1--11}
}
Jacobs B (2014), "Dijkstra Monads in Monadic Computation", In Coalgebraic Methods in Computer Science (CMCS 2014). (8446), pp. 135-150. Springer, Berlin.
BibTeX:
@inproceedings{ds-2014-Jacobs-b,
  author = {B. Jacobs},
  editor = {M. Bonsangue},
  title = {Dijkstra Monads in Monadic Computation},
  booktitle = {Coalgebraic Methods in Computer Science (CMCS 2014)},
  publisher = {Springer, Berlin},
  year = {2014},
  number = {8446},
  pages = {135--150}
}
Jacobs B and Silva A (2014), "Initial Algebras of Terms with Binding and Algebraic Structure", In Categories and Types in Logic, Language, and Physics. (8222), pp. 211-234. Springer, Berlin.
BibTeX:
@inproceedings{ds-2014-Jacobs-c,
  author = {B. Jacobs and A. Silva},
  editor = {C. Casadio and B. Coecke and M. Moortgat and P. Scott},
  title = {Initial Algebras of Terms with Binding and Algebraic Structure},
  booktitle = {Categories and Types in Logic, Language, and Physics},
  publisher = {Springer, Berlin},
  year = {2014},
  number = {8222},
  pages = {211--234}
}
Jacobs B and Silva A (2014), "Automata Learning: A Categorical Perspective", In Horizons of the Mind. A Tribute to Prakash Panangaden. (8464), pp. 384-406. Springer, Berlin.
BibTeX:
@inproceedings{ds-2014-Jacobs-d,
  author = {B. Jacobs and A. Silva},
  editor = {Breugel, F. van and E. Kashefi and C. Palamidessi and J. Rutten},
  title = {Automata Learning: A Categorical Perspective},
  booktitle = {Horizons of the Mind. A Tribute to Prakash Panangaden},
  publisher = {Springer, Berlin},
  year = {2014},
  number = {8464},
  pages = {384--406}
}
Jiang K, Batina L, Eles P and Peng Z (2014), "Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks", In IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2014, Tampa, FL, USA, July 9-11, 2014. , pp. 450-455.
BibTeX:
@inproceedings{ds-2014-Jiang-a,
  author = {Ke Jiang and Lejla Batina and Petru Eles and Zebo Peng},
  title = {Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks},
  booktitle = {IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2014, Tampa, FL, USA, July 9-11, 2014},
  year = {2014},
  pages = {450--455}
}
Joosten S, Kaliszyk C and Urban J (2014), "Initial Experiments with TPTP-style Automated Theorem Provers on ACL2 Problems", In ACL2 Workhop. Vol. 152, pp. 77-85.
BibTeX:
@inproceedings{ds-2014-Joosten-a,
  author = {Joosten, Sebastiaan and Kaliszyk, Cezary and Urban, Josef},
  title = {Initial Experiments with TPTP-style Automated Theorem Provers on ACL2 Problems},
  booktitle = {ACL2 Workhop},
  year = {2014},
  volume = {152},
  pages = {77--85}
}
Joosten S, Verbeek F and Schmaltz J (2014), "WickedXmas: Designing and Verifying on-chip Communication Fabrics", In Proceedings of the International Workshop on Design and Implementation of Formal Tools and Systems (DIFTS'14)., october, 2014.
BibTeX:
@inproceedings{ds-2014-Joosten-b,
  author = {S. Joosten and F. Verbeek and J. Schmaltz},
  title = {WickedXmas: Designing and Verifying on-chip Communication Fabrics},
  booktitle = {Proceedings of the International Workshop on Design and Implementation of Formal Tools and Systems (DIFTS'14)},
  year = {2014}
}
Joosten SJ and Schmaltz J (2014), "Scalable liveness verification for communication fabrics", In Proceedings of the conference on Design, Automation & Test in Europe. , pp. 113.
BibTeX:
@inproceedings{ds-2014-Joosten-c,
  author = {Joosten, Sebastiaan JC and Schmaltz, Julien},
  title = {Scalable liveness verification for communication fabrics},
  booktitle = {Proceedings of the conference on Design, Automation & Test in Europe},
  year = {2014},
  pages = {113}
}
Katsaros KV, Chai WK, Vieira B and Pavlou G (2014), "Supporting smart electric vehicle charging with information-centric networking", In Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine), 2014 10th International Conference on. , pp. 174-179.
BibTeX:
@inproceedings{ds-2014-Katsaros-a,
  author = {Katsaros, Konstantinos V. and Chai, Wei Koong and Vieira, Barbara and Pavlou, George},
  title = {Supporting smart electric vehicle charging with information-centric networking},
  booktitle = {Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine), 2014 10th International Conference on},
  year = {2014},
  pages = {174--179}
}
Kerstan H, König B and Westerbaan B (2014), "Lifting Adjunctions to Coalgebras to (Re)Discover Automata Constructions", In Coalgebraic Methods in Computer Science. , pp. 168-188. Springer.
BibTeX:
@incollection{ds-2014-Kerstan-a,
  author = {Kerstan, Henning and König, Barbara and Westerbaan, Bram},
  title = {Lifting Adjunctions to Coalgebras to (Re)Discover Automata Constructions},
  booktitle = {Coalgebraic Methods in Computer Science},
  publisher = {Springer},
  year = {2014},
  pages = {168--188}
}
Kersten R, Parisen Toldin P, van Gastel B and van Eekelen M (2014), "A Hoare Logic for Energy Consumption Analysis", In Proceedings of the Third International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA'13). Vol. 8552, pp. 93-109. Springer.
BibTeX:
@inproceedings{ds-2014-Kersten-a,
  author = {Kersten, Rody and Parisen Toldin, Paolo and van Gastel, Bernard and van Eekelen, Marko},
  title = {A Hoare Logic for Energy Consumption Analysis},
  booktitle = {Proceedings of the Third International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA'13)},
  publisher = {Springer},
  year = {2014},
  volume = {8552},
  pages = {93--109}
}
Kersten RWJ, van Gastel BE, Shkaravska O, Montenegro M and van Eekelen MCJD (2014), "ResAna: a resource analysis toolset for (real-time) JAVA", Concurrency and Computation: Practice and Experience. Vol. 26(14), pp. 2432-2455.
BibTeX:
@article{ds-2014-Kersten-b,
  author = {Kersten, Rody W. J. and van Gastel, Bernard E. and Shkaravska, Olha and Montenegro, Manuel and van Eekelen, Marko C. J. D.},
  title = {ResAna: a resource analysis toolset for (real-time) JAVA},
  journal = {Concurrency and Computation: Practice and Experience},
  year = {2014},
  volume = {26},
  number = {14},
  pages = {2432--2455},
  url = {http://dx.doi.org/10.1002/cpe.3154},
  doi = {10.1002/cpe.3154}
}
Kiljan S, Cock Dd, Eekelen Mv and Vranken H (2014), "Security of Online Banking Systems". Thesis at: TNO., March, 2014. (TR-OU-INF-2014-01)
BibTeX:
@techreport{ds-2014-Kiljan-a,
  author = {Kiljan, S. and Cock, D. de and Eekelen, M. van and Vranken, H.},
  title = {Security of Online Banking Systems},
  school = {TNO},
  year = {2014},
  number = {TR-OU-INF-2014-01},
  doi = {http://portal.ou.nl/documents/114964/523334/TR-OU-INF-2014-01.pdf}
}
Kiljan S, Simoens K, De Cock D, van Eekelen M and Vranken H (2014), "Technical report: Security of Online Banking Systems". Thesis at: Open Universiteit., February, 2014.
BibTeX:
@techreport{ds-2014-Kiljan-b,
  author = {Kiljan, Sven and Simoens, Koen and De Cock, Danny and van Eekelen, Marko and Vranken, Harald},
  title = {Technical report: Security of Online Banking Systems},
  school = {Open Universiteit},
  year = {2014},
  url = {https://kiljan.org/publications/Kiljan, et al. (2014) - Security
of Online Banking Systems.pdf} }
Kiljan S, Vranken HPE and van Eekelen MCJD (2014), "What You Enter Is What You Sign: Input Integrity in an Online Banking Environment", In 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014. , pp. 40-47. IEEE.
BibTeX:
@inproceedings{ds-2014-Kiljan-c,
  author = {Sven Kiljan and Harald P. E. Vranken and Marko C. J. D. van Eekelen},
  title = {What You Enter Is What You Sign: Input Integrity in an Online Banking Environment},
  booktitle = {2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014},
  publisher = {IEEE},
  year = {2014},
  pages = {40--47},
  url = {http://dx.doi.org/10.1109/STAST.2014.14},
  doi = {10.1109/STAST.2014.14}
}
Koning M, Korenhof P, Alpár G and Hoepman J-H (2014), "The ABCs OF ABCs: an analysis of attribute-based credentials in the light of data protection, privacy and identity", In Balcells, J., Cerrillo i Mart\inez, A., Peguera, M., Peña-López, I., Pifarré de Moner, MJ, & Vilasau Solana, M.(coords.)(2014). A decade of transformations. Proceedings of the 10th International Conference on Internet, Law & Politics. Universitat Oberta de Catalunya, Barcelona. , pp. 357-374.
BibTeX:
@inproceedings{ds-2014-Koning-a,
  author = {Merel Koning and Paulan Korenhof and Gergely Alpár and Jaap-Henk Hoepman},
  title = {The ABCs OF ABCs: an analysis of attribute-based credentials in the light of data protection, privacy and identity},
  booktitle = {Balcells, J., Cerrillo i Mart\inez, A., Peguera, M., Peña-López, I., Pifarré de Moner, MJ, & Vilasau Solana, M.(coords.)(2014). A decade of transformations. Proceedings of the 10th International Conference on Internet, Law & Politics. Universitat Oberta de Catalunya, Barcelona},
  year = {2014},
  pages = {357--374}
}
Koning M, Korenhof P, Alpár G and Hoepman J-H (2014), "The ABCs OF ABCs: an analysis of attribute-based credentials in the light of data protection, privacy and identity", Selected Papers from the 7th Hot Topics in Privacy Enhancing Technologies (HotPETs).
BibTeX:
@misc{ds-2014-Koning-b,
  author = {Merel Koning and Paulan Korenhof and Gergely Alpár and Jaap-Henk Hoepman},
  title = {The ABCs OF ABCs: an analysis of attribute-based credentials in the light of data protection, privacy and identity},
  howpublished = {Selected Papers from the 7th Hot Topics in Privacy Enhancing Technologies (HotPETs)},
  year = {2014}
}
Korak T, Hutter M, Ege B and Batina L (2014), "Clock Glitch Attacks in the Presence of Heating", In Fault Diagnosis and Tolerance in Cryptography (FDTC), 2014 Workshop on., Sept, 2014. , pp. 104-114.
BibTeX:
@inproceedings{ds-2014-Korak-a,
  author = {Korak, Thomas and Hutter, Michael and Ege, Barış and Batina, Lejla},
  title = {Clock Glitch Attacks in the Presence of Heating},
  booktitle = {Fault Diagnosis and Tolerance in Cryptography (FDTC), 2014 Workshop on},
  year = {2014},
  pages = {104-114}
}
de La Piedra A, Hoepman J-H and Vullers P (2014), "Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Card", In 13th Int. Conf. on Cryptology and Network Security (CANS 2014). Heraklion, Crete, Greece, October 22--24, 2014. , pp. 270-289.
BibTeX:
@inproceedings{ds-2014-LaPiedra-a,
  author = {Antonio de La Piedra and Jaap-Henk Hoepman and Pim Vullers},
  editor = {Aggelos Kiayias and Dimitris Gritzali},
  title = {Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Card},
  booktitle = {13th Int. Conf. on Cryptology and Network Security (CANS 2014)},
  year = {2014},
  pages = {270--289}
}
Levy PB and Staton S (2014), "Transition systems over games", In Proceedings of CSL-LICS 2014: Joint meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science. ACM.
BibTeX:
@inproceedings{ds-2014-Levy-a,
  author = {Paul B Levy and Sam Staton},
  title = {Transition systems over games},
  booktitle = {Proceedings of CSL-LICS 2014: Joint meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science},
  publisher = {ACM},
  year = {2014},
  note = {doi:10.1145/2603088.2603150}
}
Lueks W, Hoepman J-H and Kursawe K (2014), "Forward-Secure Distributed Encryption", In 14th Privacy Enhancing Technologies Symposium (PETS 2014). Amsterdam, July 16--18, 2014. , pp. 123-142.
BibTeX:
@inproceedings{ds-2014-Lueks-a,
  author = {Wouter Lueks and Jaap-Henk Hoepman and Klaus Kursawe},
  title = {Forward-Secure Distributed Encryption},
  booktitle = {14th Privacy Enhancing Technologies Symposium (PETS 2014)},
  year = {2014},
  pages = {123--142}
}
Madlener K (2014), "Formally Verified Modular Semantics". Thesis at: Radboud University.
BibTeX:
@phdthesis{ds-2014-Madlener-a,
  author = {K. Madlener},
  title = {Formally Verified Modular Semantics},
  school = {Radboud University},
  year = {2014}
}
Montes Portela C, Geldtmeijer D, Slootweg H and van Eekelen M (2014), "Tecnologia da informacao e comunicacao para recarga intelligente", Electricidade Moderna. , pp. 36-43.
BibTeX:
@article{ds-2014-MontesPortela-a,
  author = {Montes Portela, Carlos and Geldtmeijer, Danny and Slootweg, Han and van Eekelen, Marko},
  title = {Tecnologia da informacao e comunicacao para recarga intelligente},
  journal = {Electricidade Moderna},
  year = {2014},
  pages = {36-43}
}
Morbitzer M (2014), "TCP Idle scans in IPv6", HitB magazine. Vol. 4(10), pp. 3-15.
BibTeX:
@article{ds-2014-Morbitzer-a,
  author = {Mathias Morbitzer},
  title = {TCP Idle scans in IPv6},
  journal = {HitB magazine},
  year = {2014},
  volume = {4},
  number = {10},
  pages = {3-15}
}
Ortiz-Yepes D (2014), "A critical review of the EMV Payment Tokenisation Specification", Computer Fraud and & Security. Vol. 10, pp. 5-12. Elsevier.
BibTeX:
@article{ds-2014-Ortiz-Yepes-a,
  author = {D. Ortiz-Yepes},
  title = {A critical review of the EMV Payment Tokenisation Specification},
  journal = {Computer Fraud and & Security},
  publisher = {Elsevier},
  year = {2014},
  volume = {10},
  pages = {5-12}
}
Ortiz-Yepes D (2014), "Optimizing TLS for low Bandwidth Environments", In Proceedings of the 7th International Symposium on Foundations & Practice of Security (FPS 2014). Springer-Verlag.
BibTeX:
@inproceedings{ds-2014-Ortiz-Yepes-b,
  author = {D. Ortiz-Yepes},
  title = {Optimizing TLS for low Bandwidth Environments},
  booktitle = {Proceedings of the 7th International Symposium on Foundations & Practice of Security (FPS 2014)},
  publisher = {Springer-Verlag},
  year = {2014}
}
Ortiz-Yepes D, Hermann R, Steinauer H and Buhler P (2014), "Bringing strong authentication and transaction security to the realm of mobile devices", IBM Journal of Research and Development. Cybersecurity for a Smarter Planet., January-February, 2014. Vol. 58(1), pp. 4:1-4:11. IBM.
BibTeX:
@article{ds-2014-Ortiz-Yepes-c,
  author = {D. Ortiz-Yepes and R. Hermann and H. Steinauer and P. Buhler},
  title = {Bringing strong authentication and transaction security to the realm of mobile devices},
  journal = {IBM Journal of Research and Development. Cybersecurity for a Smarter Planet},
  publisher = {IBM},
  year = {2014},
  volume = {58},
  number = {1},
  pages = {4:1--4:11}
}
Papapagiannopoulos K (2014), "High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers", In Radio Frequency Identification: Security and Privacy Issues. , pp. 137-155. Springer-Verlag.
BibTeX:
@incollection{ds-2014-Papapagiannopoulos-a,
  author = {Papapagiannopoulos, Kostas},
  editor = {Saxena, Nitesh and Sadeghi, Ahmad-Reza},
  title = {High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers},
  booktitle = {Radio Frequency Identification: Security and Privacy Issues},
  publisher = {Springer-Verlag},
  year = {2014},
  pages = {137-155},
  url = {http://dx.doi.org/10.1007/978-3-319-13066-8_9}
}
Paske Bt, Cuijpers C, Eekelen Mv, Poll E and Schoonhoven Bv (2014), "Risicoanalyse Slimme Meter Keten, Privacy en Security in het nieuwe marktmodel". Thesis at: TNO., March, 2014.
BibTeX:
@techreport{ds-2014-Paske-a,
  author = {Paske, B.J. te and Cuijpers, C.M.C. and Eekelen, M.C.J.D. van and Poll, E. and Schoonhoven, B.H.A. van},
  title = {Risicoanalyse Slimme Meter Keten, Privacy en Security in het nieuwe marktmodel},
  school = {TNO},
  year = {2014}
}
Picek S, Batina L and Jakobovic D (2014), "Evolving DPA-Resistant Boolean Functions", In Parallel Problem Solving from Nature - PPSN XIII - 13th International Conference, Ljubljana, Slovenia, September 13-17, 2014. Proceedings. , pp. 812-821.
BibTeX:
@inproceedings{ds-2014-Picek-a,
  author = {Stjepan Picek and Lejla Batina and Domagoj Jakobovic},
  title = {Evolving DPA-Resistant Boolean Functions},
  booktitle = {Parallel Problem Solving from Nature - PPSN XIII - 13th International Conference, Ljubljana, Slovenia, September 13-17, 2014. Proceedings},
  year = {2014},
  pages = {812--821},
  url = {http://dx.doi.org/10.1007/978-3-319-10762-2_80}
}
Picek S, Batina L, Jakobovic D and Carpi RB (2014), "Evolving genetic algorithms for fault injection attacks", In 37th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2014, Opatija, Croatia, May 26-30, 2014. , pp. 1106-1111.
BibTeX:
@inproceedings{ds-2014-Picek-b,
  author = {Stjepan Picek and Lejla Batina and Domagoj Jakobovic and Rafael Boix Carpi},
  title = {Evolving genetic algorithms for fault injection attacks},
  booktitle = {37th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2014, Opatija, Croatia, May 26-30, 2014},
  year = {2014},
  pages = {1106--1111},
  url = {http://dx.doi.org/10.1109/MIPRO.2014.6859734}
}
Picek S, Batina L, Jakobovic D, Ege B and Golub M (2014), "S-box, SET, Match: A Toolbox for S-box Analysis", In Information Security Theory and Practice. Securing the Internet of Things. Vol. 8501, pp. 140-149. Springer-Verlag.
BibTeX:
@incollection{ds-2014-Picek-c,
  author = {Picek, Stjepan and Batina, Lejla and Jakobovic, Domagoj and Ege, Barış and Golub, Marin},
  editor = {Naccache, David and Sauveron, Damien},
  title = {S-box, SET, Match: A Toolbox for S-box Analysis},
  booktitle = {Information Security Theory and Practice. Securing the Internet of Things},
  publisher = {Springer-Verlag},
  year = {2014},
  volume = {8501},
  pages = {140-149},
  url = {http://dx.doi.org/10.1007/978-3-662-43826-8_10}
}
Picek S, Ege B, Batina L, Jakobovic D, Chmielewski Ł and Golub M (2014), "On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box", In Proceedings of the First Workshop on Cryptography and Security in Computing Systems. New York, NY, USA , pp. 13-18. ACM.
BibTeX:
@inproceedings{ds-2014-Picek-d,
  author = {Picek, Stjepan and Ege, Barış and Batina, Lejla and Jakobovic, Domagoj and Chmielewski, Łukasz and Golub, Marin},
  title = {On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box},
  booktitle = {Proceedings of the First Workshop on Cryptography and Security in Computing Systems},
  publisher = {ACM},
  year = {2014},
  pages = {13--18},
  url = {http://doi.acm.org/10.1145/2556315.2556319}
}
Picek S, Ege B, Papagiannopoulos K, Batina L and Jakobovic D (2014), "Optimality and beyond: The case of 4x4 S-boxes", In Hardware-Oriented Security and Trust (HOST), 2014 IEEE International Symposium on., May, 2014. , pp. 80-83.
BibTeX:
@inproceedings{ds-2014-Picek-e,
  author = {Picek, Stjepan and Ege, Barış and Papagiannopoulos, Kostas and Batina, Lejla and Jakobovic, Domagoj},
  title = {Optimality and beyond: The case of 4x4 S-boxes},
  booktitle = {Hardware-Oriented Security and Trust (HOST), 2014 IEEE International Symposium on},
  year = {2014},
  pages = {80-83}
}
Picek S and Jakobovic D (2014), "From fitness landscape to crossover operator choice", In Genetic and Evolutionary Computation Conference, GECCO '14, Vancouver, BC, Canada, July 12-16, 2014. , pp. 815-822.
BibTeX:
@inproceedings{ds-2014-Picek-f,
  author = {Stjepan Picek and Domagoj Jakobovic},
  title = {From fitness landscape to crossover operator choice},
  booktitle = {Genetic and Evolutionary Computation Conference, GECCO '14, Vancouver, BC, Canada, July 12-16, 2014},
  year = {2014},
  pages = {815--822},
  url = {http://doi.acm.org/10.1145/2576768.2598320}
}
Picek S, Marchiori E, Batina L and Jakobovic D (2014), "Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions", In Parallel Problem Solving from Nature - PPSN XIII - 13th International Conference, Ljubljana, Slovenia, September 13-17, 2014. Proceedings. , pp. 822-831.
BibTeX:
@inproceedings{ds-2014-Picek-g,
  author = {Stjepan Picek and Elena Marchiori and Lejla Batina and Domagoj Jakobovic},
  title = {Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions},
  booktitle = {Parallel Problem Solving from Nature - PPSN XIII - 13th International Conference, Ljubljana, Slovenia, September 13-17, 2014. Proceedings},
  year = {2014},
  pages = {822--831},
  url = {http://dx.doi.org/10.1007/978-3-319-10762-2_81}
}
Picek S, Papagiannopoulos K, Ege B, Batina L and Jakobovic D (2014), "Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes", In Progress in Cryptology -- INDOCRYPT 2014. , pp. 374-390. Springer International Publishing.
BibTeX:
@incollection{ds-2014-Picek-h,
  author = {Picek, Stjepan and Papagiannopoulos, Kostas and Ege, Barış and Batina, Lejla and Jakobovic, Domagoj},
  editor = {Meier, Willi and Mukhopadhyay, Debdeep},
  title = {Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes},
  booktitle = {Progress in Cryptology -- INDOCRYPT 2014},
  publisher = {Springer International Publishing},
  year = {2014},
  pages = {374-390},
  url = {http://dx.doi.org/10.1007/978-3-319-13039-2_22}
}
Ramirez AG, Schmaltz J, Verbeek F, Langenstein B and Blasum H (2014), "On two models of noninterference: Rushby and Greve, Wilding, and Vanfleet", In Proceedings of the International Conference on Computer and Safety, reliability and security (SAFECOMP’14)., september, 2014.
BibTeX:
@inproceedings{ds-2014-Ramirez-a,
  author = {A. Garcia Ramirez and Schmaltz, J. and Verbeek, F. and Langenstein, B. and Blasum, H.},
  title = {On two models of noninterference: Rushby and Greve, Wilding, and Vanfleet},
  booktitle = {Proceedings of the International Conference on Computer and Safety, reliability and security (SAFECOMP’14)},
  year = {2014}
}
Rennela M (2014), "Towards a Quantum Domain Theory: Order-enrichment and Fixpoints in W*-algebras.", Electr. Notes Theor. Comput. Sci.., In Proceedings of the 30th Conference on the Mathematical Foundations of Programming Semantics. , pp. 289-307.
BibTeX:
@inproceedings{ds-2014-Rennela-a,
  author = {Mathys Rennela},
  title = {Towards a Quantum Domain Theory: Order-enrichment and Fixpoints in W*-algebras.},
  booktitle = {Proceedings of the 30th Conference on the Mathematical Foundations of Programming Semantics},
  journal = {Electr. Notes Theor. Comput. Sci.},
  year = {2014},
  pages = {289-307}
}
de Ruiter J (2014), "Automated algebraic analysis of structure-preserving signature schemes", Cryptology ePrint Archive, Report 2014/590.
BibTeX:
@misc{ds-2014-Ruiter-a,
  author = {Joeri de Ruiter},
  title = {Automated algebraic analysis of structure-preserving signature schemes},
  howpublished = {Cryptology ePrint Archive, Report 2014/590},
  year = {2014},
  note = {http://eprint.iacr.org/}
}
Schoolderman M, Neutelings J, Kersten R and van Eekelen M (2014), "ECAlogic: Hardware-parametric Energy-consumption Analysis of Algorithms", In Proceedings of the 13th Workshop on Foundations of Aspect-oriented Languages. New York, NY, USA , pp. 19-22. ACM.
BibTeX:
@inproceedings{ds-2014-Schoolderman-a,
  author = {Schoolderman, Marc and Neutelings, Jascha and Kersten, Rody and van Eekelen, Marko},
  title = {ECAlogic: Hardware-parametric Energy-consumption Analysis of Algorithms},
  booktitle = {Proceedings of the 13th Workshop on Foundations of Aspect-oriented Languages},
  publisher = {ACM},
  year = {2014},
  pages = {19--22},
  url = {http://doi.acm.org/10.1145/2588548.2588553},
  doi = {10.1145/2588548.2588553}
}
Shkaravska O and van Eekelen M (2014), "Univariate Polynomial Solutions of Algebraic Difference Equations", Journal of Symbolic Computation. Vol. 1(60), pp. 15-28.
BibTeX:
@article{ds-2014-Shkaravska-a,
  author = {Olha Shkaravska and Marko van Eekelen},
  title = {Univariate Polynomial Solutions of Algebraic Difference Equations},
  journal = {Journal of Symbolic Computation},
  year = {2014},
  volume = {1},
  number = {60},
  pages = {15-28},
  note = {Elsevier}
}
Olha Shkaravska and Marko van Eekelen and Alejandro Tamalet (2014), "Collected Size Semantics for Strict Functional Programs over Polymorphic Lists", In Proceedings of the Third International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA'13). Vol. 8552, pp. 93-109. Springer.
BibTeX:
@inproceedings{ds-2014-OSMEAT-a,
  author = {Olha Shkaravska and Marko van Eekelen and Alejandro Tamalet},
  title = {Collected Size Semantics for Strict Functional Programs over Polymorphic Lists},
  booktitle = {Proceedings of the Third International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA'13)},
  publisher = {Springer},
  year = {2014},
  volume = {8552},
  pages = {93--109}
}
Staton S (2014), "Freyd categories are Enriched Lawvere Theories", In Proceedings of the Workshop on Algebra, Coalgebra and Topology., March, 2014. Vol. 303, pp. 197-206. Elsevier.
BibTeX:
@inproceedings{ds-2014-Staton-a,
  author = {Sam Staton},
  editor = {John Power},
  title = {Freyd categories are Enriched Lawvere Theories},
  booktitle = {Proceedings of the Workshop on Algebra, Coalgebra and Topology},
  publisher = {Elsevier},
  year = {2014},
  volume = {303},
  pages = {197--206},
  note = {doi:10.1016/j.entcs.2014.02.010}
}
Stegeman M, Barendsen E and Smetsers S (2014), "Towards an Empirically Validated Model for Assessment of Code Quality", In Proceedings of the 14th Koli Calling International Conference on Computing Education Research. New York, NY, USA , pp. 99-108. ACM.
BibTeX:
@inproceedings{ds-2014-Stegeman-a,
  author = {Stegeman, Martijn and Barendsen, Erik and Smetsers, Sjaak},
  title = {Towards an Empirically Validated Model for Assessment of Code Quality},
  booktitle = {Proceedings of the 14th Koli Calling International Conference on Computing Education Research},
  publisher = {ACM},
  year = {2014},
  pages = {99--108}
}
Uijlen S and Westerbaan B (2014), "A Kochen-Specker system has at least 22 vectors (extended abstract)", Electron. Proc. Theor. Comput. Sci.., dec, 2014. Vol. 172, pp. 154-164. Open Publishing Association.
BibTeX:
@article{ds-2014-Uijlen-a,
  author = {Sander Uijlen and Bas Westerbaan},
  title = {A Kochen-Specker system has at least 22 vectors (extended abstract)},
  journal = {Electron. Proc. Theor. Comput. Sci.},
  publisher = {Open Publishing Association},
  year = {2014},
  volume = {172},
  pages = {154--164},
  doi = {10.4204/eptcs.172.11}
}
Vaandrager F and Verbeek F (2014), "Recreational Formal Methods: Designing Vacuum Cleaning Trajectories", Bulletin of the EATCS., june, 2014. Vol. 113:100-109
BibTeX:
@article{ds-2014-Vaandrager-a,
  author = {F.W. Vaandrager and F. Verbeek},
  title = {Recreational Formal Methods: Designing Vacuum Cleaning Trajectories},
  journal = {Bulletin of the EATCS},
  year = {2014},
  volume = {113:100-109}
}
Verbeek F and Schmaltz J (2014), "A Decision Procedure for Deadlock-Free Routing in Wormhole Networks", IEEE Trans. Parallel Distrib. Syst. Vol. 25(8), pp. 1935-1944.
BibTeX:
@article{ds-2014-Verbeek-a,
  author = {Freek Verbeek and Julien Schmaltz},
  title = {A Decision Procedure for Deadlock-Free Routing in Wormhole Networks},
  journal = {IEEE Trans. Parallel Distrib. Syst},
  year = {2014},
  volume = {25(8)},
  pages = {1935--1944}
}
(2014), "Proceedings of the Twelfth International Workshop on the ACL2 Theorem Prover and its Applications (ACL2'14)", july, 2014. Vol. EPTCS 152
BibTeX:
@proceedings{ds-2014-Verbeek-b,,
  editor = {F. Verbeek and J. Schmaltz},
  title = {Proceedings of the Twelfth International Workshop on the ACL2 Theorem Prover and its Applications (ACL2'14)},
  year = {2014},
  volume = {EPTCS 152}
}
Verbeek F, Schmaltz J, Tverdyshev S, Blasum H and Havle O (2014), "Implicit Assumptions in a Model for Separation Kernels", In Proceedings of VeriSure: Verification and Assurance (VERISURE’14)., july, 2014.
BibTeX:
@inproceedings{ds-2014-Verbeek-c,
  author = {F. Verbeek and J. Schmaltz and S. Tverdyshev and H. Blasum and O. Havle},
  title = {Implicit Assumptions in a Model for Separation Kernels},
  booktitle = {Proceedings of VeriSure: Verification and Assurance (VERISURE’14)},
  year = {2014}
}
Verbeek F, Tverdyshev S, Havle O, Blasum H, Langenstein B, Stephan W, Nemouchi Y, Feliachi A, Wolff B and Schmaltz J (2014), "Formal Specification of a Generic Separation Kernel", Archive of Formal Proofs., july, 2014.
BibTeX:
@article{ds-2014-Verbeek-d,
  author = {Freek Verbeek and Sergey Tverdyshev and Oto Havle and Holger Blasum and Bruno Langenstein and Werner Stephan and Yakoub Nemouchi and Abderrahmane Feliachi and Burkhart Wolff and Julien Schmaltz},
  title = {Formal Specification of a Generic Separation Kernel},
  journal = {Archive of Formal Proofs},
  year = {2014}
}

2013

Aarts F, Poll E and de Ruiter J (2013), "Formal models of bank cards for free", In Sixth International Conference on Software Testing, Verification and Validation Workshops (ICSTW). , pp. 461 - 468. IEEE.
BibTeX:
@inproceedings{ds-2013-Aarts-a,
  author = {F. Aarts and E. Poll and J. de Ruiter},
  title = {Formal models of bank cards for free},
  booktitle = {Sixth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)},
  publisher = {IEEE},
  year = {2013},
  pages = {461 -- 468},
  doi = {10.1109/ICSTW.2013.60}
}
Achten P, van Eekelen MCJD, de Mol M and Plasmeijer R (2013), "EditorArrow: An arrow-based model for editor-based programming", J. Funct. Program.. Vol. 23(2), pp. 185-224.
BibTeX:
@article{ds-2013-Achten-a,
  author = {Peter Achten and Marko C. J. D. van Eekelen and Maarten de Mol and Rinus Plasmeijer},
  title = {EditorArrow: An arrow-based model for editor-based programming},
  journal = {J. Funct. Program.},
  year = {2013},
  volume = {23},
  number = {2},
  pages = {185-224}
}
Alpár G and Hoepman J-H (2013), "A Secure Channel for Attribute-Based Credentials", In ACM Digital Identity Management Workshop (DIM). Berlin, Germany, November 8, 2013. , pp. 13-18.
BibTeX:
@inproceedings{ds-2013-Alpar-a,
  author = {Gergely Alpár and Jaap-Henk Hoepman},
  title = {A Secure Channel for Attribute-Based Credentials},
  booktitle = {ACM Digital Identity Management Workshop (DIM)},
  year = {2013},
  pages = {13--18},
  url = {http://dx.doi.org/10.1145/2517881.251788}
}
Alpár G, Hoepman J-H and Lueks W (2013), "An Attack Against Fixed Value Discrete Logarithm Representations", Cryptology ePrint Archive, Report 2013/120.
BibTeX:
@misc{ds-2013-Alpar-b,
  author = {Gergely Alpár and Jaap-Henk Hoepman and Wouter Lueks},
  title = {An Attack Against Fixed Value Discrete Logarithm Representations},
  howpublished = {Cryptology ePrint Archive, Report 2013/120},
  year = {2013},
  note = {http://eprint.iacr.org/}
}
Alpár G and Jacobs B (2013), "Credential Design in Attribute-Based Identity Management", In Bridging distances in technology and regulation, 3rd TILTing Perspectives Conference. , pp. 189-204.
BibTeX:
@inproceedings{ds-2013-Alpar-c,
  author = {Gergely Alpár and Bart Jacobs},
  editor = {Ronald Leenes},
  title = {Credential Design in Attribute-Based Identity Management},
  booktitle = {Bridging distances in technology and regulation, 3rd TILTing Perspectives Conference},
  year = {2013},
  pages = {189--204}
}
Batina L, Das A, Ege B, Kavun EB, Mentens N, Paar C, Verbauwhede I and Yalçın T (2013), "Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures", In Radio Frequency Identification. , pp. 103-112. Springer Berlin Heidelberg.
BibTeX:
@incollection{ds-2013-Batina-a,
  author = {Batina, Lejla and Das, Amitabh and Ege, Barış and Kavun, Elif Bilge and Mentens, Nele and Paar, Christof and Verbauwhede, Ingrid and Yalçın, Tolga},
  editor = {Hutter, Michael and Schmidt, Jörn-Marc},
  title = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures},
  booktitle = {Radio Frequency Identification},
  publisher = {Springer Berlin Heidelberg},
  year = {2013},
  pages = {103-112},
  url = {http://dx.doi.org/10.1007/978-3-642-41332-2_7},
  doi = {10.1007/978-3-642-41332-2_7}
}
Bernstein DJ, Chou T and Schwabe P (2013), "McBits: fast constant-time code-based cryptography", In Cryptographic Hardware and Embedded Systems -- CHES 2013. Vol. 8086 Springer-Verlag.
BibTeX:
@inproceedings{ds-2013-Bernstein-a,
  author = {Daniel J. Bernstein and Tung Chou and Peter Schwabe},
  editor = {Guido Bertoni and Jean-Sébastian Coron},
  title = {McBits: fast constant-time code-based cryptography},
  booktitle = {Cryptographic Hardware and Embedded Systems -- CHES 2013},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {8086},
  note = {Document ID: e801a97c500b3ac879d77bcecf054ce5, http://cryptojedi.org/papers/\#mcbits}
}
Bernstein DJ, Hamburg M, Krasnova A and Lange T (2013), "Elligator: Elliptic-curve points indistinguishable from uniform random strings", In ACM Conference on Computer and Communications Security 2013. ACM.
BibTeX:
@inproceedings{ds-2013-Bernstein-b,
  author = {Daniel J. Bernstein and Mike Hamburg and Anna Krasnova and Tanja Lange},
  title = {Elligator: Elliptic-curve points indistinguishable from uniform random strings},
  booktitle = {ACM Conference on Computer and Communications Security 2013},
  publisher = {ACM},
  year = {2013},
  note = {Document ID: 711e2f8601805e06e5fbb3c5953dd5d1, http://mechanical-mind.org/papers/elligator-20130828.pdf}
}
van den Broek F and Poll E (2013), "A comparison of time-memory trade-off attacks on stream ciphers", In AFRICACRYPT. Vol. 7918, pp. 406-423. Springer-Verlag.
BibTeX:
@incollection{ds-2013-Broek-a,
  author = {van den Broek, F. and Poll, E.},
  title = {A comparison of time-memory trade-off attacks on stream ciphers},
  booktitle = {AFRICACRYPT},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {7918},
  pages = {406--423},
  doi = {10.1007/978-3-642-38553-7_24}
}
van den Broek F and Wichers Schreur R (2013), "Femtocell Security in Theory and Practice", In Secure IT Systems. Vol. 8208, pp. 183-198. Springer-Verlag.
BibTeX:
@incollection{ds-2013-Broek-b,
  author = {van den Broek, Fabian and Wichers Schreur, Ronny},
  editor = {Riis Nielson, Hanne and Gollmann, Dieter},
  title = {Femtocell Security in Theory and Practice},
  booktitle = {Secure IT Systems},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {8208},
  pages = {183--198},
  doi = {10.1007/978-3-642-41488-6_3}
}
Burgers W, Verdult R and van Eekelen M (2013), "Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials", In Secure IT Systems. Vol. 8208, pp. 33-50. Springer-Verlag.
BibTeX:
@incollection{ds-2013-Burgers-a,
  author = {Burgers, Willem and Verdult, Roel and van Eekelen, Marko},
  editor = {Riis Nielson, Hanne and Gollmann, Dieter},
  title = {Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials},
  booktitle = {Secure IT Systems},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {8208},
  pages = {33-50},
  doi = {10.1007/978-3-642-41488-6_3}
}
Coumans D and Jacobs B (2013), "Scalars, Monads and Categories", In Quantum Physics and Linguistics. A Compositional, Diagrammatic Discourse. , pp. 184-216. Oxford Univ. Press.
BibTeX:
@inproceedings{ds-2013-Coumans-a,
  author = {D. Coumans and B. Jacobs},
  editor = {C. Heunen and M. Sadrzadeh and E. Grefenstette},
  title = {Scalars, Monads and Categories},
  booktitle = {Quantum Physics and Linguistics. A Compositional, Diagrammatic Discourse},
  publisher = {Oxford Univ. Press},
  year = {2013},
  pages = {184--216}
}
Das A, Ege B, Ghosh S, Batina L and Verbauwhede I (2013), "Security Analysis of Industrial Test Compression Schemes", Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on. Vol. 32(12), pp. 1966-1977.
BibTeX:
@article{ds-2013-Das-a,
  author = {Das, A. and Ege, B. and Ghosh, S. and Batina, L. and Verbauwhede, I.},
  title = {Security Analysis of Industrial Test Compression Schemes},
  journal = {Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on},
  year = {2013},
  volume = {32},
  number = {12},
  pages = {1966-1977},
  doi = {10.1109/TCAD.2013.2274619}
}
Drijvers M, Luz P, Alpár G and Lueks W (2013), "Ad Hoc Voting on Mobile Devices", In WIC symposium 2013., Poster and Abstract.
BibTeX:
@inproceedings{ds-2013-Drijvers-a,
  author = {Drijvers, Manu and Luz, Pedro and Alpár, Gergely and Lueks, Wouter},
  title = {Ad Hoc Voting on Mobile Devices},
  booktitle = {WIC symposium 2013},
  year = {2013}
}
(2013), "CSERC '13: Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education Research" Arnhem, Netherlands Open Universiteit, Heerlen, The Netherlands.
BibTeX:
@proceedings{ds-2013-EekelenMarko-a,,
  editor = {Eekelen Marko van, Barendsen Erik, Sloep Peter, and Gerrit van der Veer},
  title = {CSERC '13: Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education Research},
  publisher = {Open Universiteit, Heerlen, The Netherlands},
  year = {2013},
  note = {ACM, Digital Library}
}
Eekelen Mv, Moussa RB, Hubbers E and Verdult R (2013), "Blackboard Security Assessment". Thesis at: Radboud University Nijmegen., April, 2013. (ICIS-R13004)
BibTeX:
@techreport{ds-2013-Eekelen-a,
  author = {Eekelen, Marko van and Moussa, Rachid Ben and Hubbers, Engelbert and Verdult, Roel},
  title = {Blackboard Security Assessment},
  school = {Radboud University Nijmegen},
  year = {2013},
  number = {ICIS--R13004}
}
Everts M, Hoepman J-H and Siljee J (2013), "UbiKiMa: Ubiquitous Authentication Using a Smartphone, Migrating from Passwords to Strong Cryptography", In ACM Digital Identity Management Workshop (DIM). Berlin, Germany, November 8, 2013. , pp. 19-24.
BibTeX:
@inproceedings{ds-2013-Everts-a,
  author = {Maarten Everts and Jaap-Henk Hoepman and Johanneke Siljee},
  title = {UbiKiMa: Ubiquitous Authentication Using a Smartphone, Migrating from Passwords to Strong Cryptography},
  booktitle = {ACM Digital Identity Management Workshop (DIM)},
  year = {2013},
  pages = {19--24},
  url = {http://dx.doi.org/10.1145/2517881.2517885}
}
Furber R and Jacobs B (2013), "From Kleisli categories to commutative C^*-algebras: Probabilistic Gelfand Duality", In Conference on Algebra and Coalgebra in Computer Science (CALCO 2013). (8089), pp. 141-157.
BibTeX:
@inproceedings{ds-2013-Furber-a,
  author = {Robert Furber and Bart Jacobs},
  editor = {R. Heckel and S. Milius},
  title = {From Kleisli categories to commutative C^*-algebras: Probabilistic Gelfand Duality},
  booktitle = {Conference on Algebra and Coalgebra in Computer Science (CALCO 2013)},
  year = {2013},
  number = {8089},
  pages = {141--157}
}
Garcia F, Verheul E and B.Jacobs (2013), "Cell-based privacy-friendly roadpricing", Computers & Math. with Appl.. Vol. 65(5), pp. 774-785.
BibTeX:
@article{ds-2013-Garcia-a,
  author = {F.D. Garcia and E. Verheul and B.Jacobs},
  title = {Cell-based privacy-friendly roadpricing},
  journal = {Computers & Math. with Appl.},
  year = {2013},
  volume = {65(5)},
  pages = {774--785}
}
van Gastel B and Schmaltz J (2013), "A formalisation of XMAS", In ACL2. Vol. 114, pp. 111-126.
BibTeX:
@inproceedings{ds-2013-Gastel-a,
  author = {Bernard van Gastel and Julien Schmaltz},
  editor = {Ruben Gamboa and Jared Davis},
  title = {A formalisation of XMAS},
  booktitle = {ACL2},
  year = {2013},
  volume = {114},
  pages = {111-126}
}
Góbi A, Shkaravska O and van Eekelen MCJD (2013), "Higher-Order Size Checking without Subtyping", In Trends in Functional Programming. Vol. 7829, pp. 53-68. Springer-Verlag.
BibTeX:
@inproceedings{ds-2013-Gobi-a,
  author = {Attila Góbi and Olha Shkaravska and Marko C. J. D. van Eekelen},
  editor = {Hans-Wolfgang Loidl and Ricardo Peña},
  title = {Higher-Order Size Checking without Subtyping},
  booktitle = {Trends in Functional Programming},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {7829},
  pages = {53-68}
}
Güneysu T, Oder T, Pöppelmann T and Schwabe P (2013), "Software speed records for lattice-based signatures", In Post-Quantum Cryptography. Vol. 7932, pp. 67-82. Springer-Verlag.
BibTeX:
@inproceedings{ds-2013-Gueneysu-a,
  author = {Tim Güneysu and Tobias Oder and Thomas Pöppelmann and Peter Schwabe},
  editor = {Philippe Gaborit},
  title = {Software speed records for lattice-based signatures},
  booktitle = {Post-Quantum Cryptography},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {7932},
  pages = {67--82},
  note = {Document ID: d67aa537a6de60813845a45505c313, http://cryptojedi.org/papers/\#lattisigns}
}
Haag J, Witte C, Karsch S, Vranken H and van Eekelen M (2013), "Evaluation of students' learning behaviour and success in a practical computer networking course", In Second International Conference on e-Learning and e-Technologies in Education (ICEEE), 2013. , pp. 201-206.
BibTeX:
@inproceedings{ds-2013-Haag-a,
  author = {Haag, Jens and Witte, Christian and Karsch, Stefan and Vranken, Harald and van Eekelen, Marko},
  title = {Evaluation of students' learning behaviour and success in a practical computer networking course},
  booktitle = {Second International Conference on e-Learning and e-Technologies in Education (ICEEE), 2013},
  year = {2013},
  pages = {201-206},
  note = {IEEE Xplore Digital Library}
}
Hasuo I, Cho K, Kataoka T and Jacobs B (2013), "Coinductive Predicates and Final Sequences in a Fibration", In Math. Found. of Programming Semantics. Elsevier, Amsterdam.
BibTeX:
@inproceedings{ds-2013-Hasuo-a,
  author = {I. Hasuo and K. Cho and T. Kataoka and B. Jacobs},
  editor = {D. Kozen and M. Mislove},
  title = {Coinductive Predicates and Final Sequences in a Fibration},
  booktitle = {Math. Found. of Programming Semantics},
  publisher = {Elsevier, Amsterdam},
  year = {2013}
}
Hildebrandt M (2013), "Legal protection by design in the smart grid: privacy, data protection & profile transparency". Thesis at: Smart Energy Collective. S.l. , pp. 38. Smart Energy Collective.
BibTeX:
@techreport{ds-2013-Hildebrandt-a,
  author = {Hildebrandt, M.},
  title = {Legal protection by design in the smart grid: privacy, data protection & profile transparency},
  publisher = {Smart Energy Collective},
  school = {Smart Energy Collective},
  year = {2013},
  pages = {38}
}
Hildebrandt M (2013), "Prefatory Remarks on Part I: Law and Code", In Human Law and Computer Law: Comparative Perspectives. Dordrecht , pp. 13-22. Springer.
BibTeX:
@incollection{ds-2013-Hildebrandt-b,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M. and Gaakeer, J.},
  title = {Prefatory Remarks on Part I: Law and Code},
  booktitle = {Human Law and Computer Law: Comparative Perspectives},
  publisher = {Springer},
  year = {2013},
  pages = {13--22},
  url = {http://dx.doi.org/10.1007/978-94-007-6314-2_1}
}
Hildebrandt M (2013), "From Galatea 2.2 to Watson -- And Back?", In Human Law and Computer Law: Comparative Perspectives. Dordrecht , pp. 23-45. Springer.
BibTeX:
@incollection{ds-2013-Hildebrandt-c,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M. and Gaakeer, J.},
  title = {From Galatea 2.2 to Watson -- And Back?},
  booktitle = {Human Law and Computer Law: Comparative Perspectives},
  publisher = {Springer},
  year = {2013},
  pages = {23--45},
  url = {http://dx.doi.org/10.1007/978-94-007-6314-2_2}
}
Hildebrandt M (2013), "Balance or Trade-off? Online Security Technologies and Fundamental Rights", Philosophy & Technology. Vol. 2013(May), pp. 1-23.
BibTeX:
@article{ds-2013-Hildebrandt-d,
  author = {Hildebrandt, M.},
  title = {Balance or Trade-off? Online Security Technologies and Fundamental Rights},
  journal = {Philosophy & Technology},
  year = {2013},
  volume = {2013},
  number = {May},
  pages = {1--23},
  url = {http://dx.doi.org/10.1007/s13347-013-0104-0}
}
Hildebrandt M (2013), "Slaves to big data. Or are we?", In IDP 2013 : 9th Annual Conference on Internet, Law & Politics, 25th June, Barcelona. S.l. , pp. 1-22. s.n..
BibTeX:
@inproceedings{ds-2013-Hildebrandt-e,
  author = {Hildebrandt, M.},
  title = {Slaves to big data. Or are we?},
  booktitle = {IDP 2013 : 9th Annual Conference on Internet, Law & Politics, 25th June, Barcelona},
  publisher = {s.n.},
  year = {2013},
  pages = {1--22}
}
Hildebrandt M (2013), "Extraterritorial jurisdiction to enforce in cyberspace? Bodin, Schmitt, Grotius in cyberspace", University of Toronto Law Journal. Vol. 63(2), pp. 196-224.
BibTeX:
@article{ds-2013-Hildebrandt-f,
  author = {Hildebrandt, M.},
  title = {Extraterritorial jurisdiction to enforce in cyberspace? Bodin, Schmitt, Grotius in cyberspace},
  journal = {University of Toronto Law Journal},
  year = {2013},
  volume = {63},
  number = {2},
  pages = {196--224},
  note = {|},
  url = {http://dx.doi.org/10.3138/utlj.1119}
}
Hildebrandt M (2013), "Profile transparency by design? Re-enabling double contingency", In Privacy and Due Process after the Computational Turn. Abingdon , pp. 258. Routledge.
BibTeX:
@incollection{ds-2013-Hildebrandt-g,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M. and de Vries, K.},
  title = {Profile transparency by design? Re-enabling double contingency},
  booktitle = {Privacy and Due Process after the Computational Turn},
  publisher = {Routledge},
  year = {2013},
  pages = {258}
}
Hildebrandt M (2013), "Prefatory Remarks on Human Law and Computer Law", In Human Law and Computer Law: Comparative Perspectives. Dordrecht , pp. 1-9. Springer.
BibTeX:
@incollection{ds-2013-Hildebrandt-h,
  author = {Hildebrandt, M.},
  editor = {Hildebrandt, M. and Gaakeer, J.},
  title = {Prefatory Remarks on Human Law and Computer Law},
  booktitle = {Human Law and Computer Law: Comparative Perspectives},
  publisher = {Springer},
  year = {2013},
  pages = {1--9},
  url = {http://dx.doi.org/10.1007/978-94-007-6314-2_0}
}
Hildebrandt M and Gaakeer J (2013), "Human Law and Computer Law: Comparative Perspectives" Dordrecht (25), pp. 202. Springer.
BibTeX:
@book{ds-2013-Hildebrandt-i,
  author = {Hildebrandt, M. and Gaakeer, J.},
  title = {Human Law and Computer Law: Comparative Perspectives},
  publisher = {Springer},
  year = {2013},
  number = {25},
  pages = {202},
  url = {http://dx.doi.org/10.1007/978-94-007-6314-2_0}
}
Hildebrandt M, O'Hara K and Waidner M (2013), "The Value of Personal Data. Digital Enlightenment Yearbook 2013." IOS Press.
BibTeX:
@book{ds-2013-Hildebrandt-j,
  author = {M. Hildebrandt and K. O'Hara and M. Waidner},
  title = {The Value of Personal Data. Digital Enlightenment Yearbook 2013.},
  publisher = {IOS Press},
  year = {2013}
}
Hildebrandt M, O'Hara K and Waidner M (2013), "Introduction.", In The Value of Personal Data. Digital Enlightenment Yearbook 2013.. , pp. 1-25. IOS Press.
BibTeX:
@incollection{ds-2013-Hildebrandt-k,
  author = {M. Hildebrandt and K. O'Hara and M. Waidner},
  editor = {M. Hildebrandt and K. O'Hara and M. Waidner},
  title = {Introduction.},
  booktitle = {The Value of Personal Data. Digital Enlightenment Yearbook 2013.},
  publisher = {IOS Press},
  year = {2013},
  pages = {1-25}
}
Hildebrandt M and Tielemans L (2013), "Data protection by design and technology neutral law", Computer Law & Security Review. Vol. 29(5), pp. 509-521.
BibTeX:
@article{ds-2013-Hildebrandt-l,
  author = {Hildebrandt, M. and Tielemans, L.},
  title = {Data protection by design and technology neutral law},
  journal = {Computer Law & Security Review},
  year = {2013},
  volume = {29},
  number = {5},
  pages = {509--521},
  url = {http://dx.doi.org/10.1016/j.clsr.2013.07.004}
}
Hildebrandt M and de Vries K (2013), "Privacy, Due Process and the Computational Turn : The Philosophy of Law Meets the Philosophy of Technology" Abingdon , pp. 258. Routledge.
BibTeX:
@book{ds-2013-Hildebrandt-m,
  author = {Hildebrandt, M. and de Vries, K.},
  title = {Privacy, Due Process and the Computational Turn : The Philosophy of Law Meets the Philosophy of Technology},
  publisher = {Routledge},
  year = {2013},
  pages = {258}
}
Hoepman J-H (2013), "Irma brengt persoonsgegevens efficiënt en privacyvriendelijk naar chipkaart", Bits & Chips., April 26, 2013.
BibTeX:
@article{ds-2013-Hoepman-a,
  author = {Jaap-Henk Hoepman},
  title = {Irma brengt persoonsgegevens efficiënt en privacyvriendelijk naar chipkaart},
  journal = {Bits & Chips},
  year = {2013},
  url = {http://www.bits-chips.nl/nieuws/bekijk/artikel/irma-brengt-persoonsgegevens-efficient-en-privacyvriendelijk-naar-chipkaart.html}
}
Holzer-Graf S, Krinninger T, Pernull M, Schläffer M, Schwabe P, Seywald D and Wieser W (2013), "Efficient Vector Implementations of AES-based Designs: A Case Study and New Implemenations for tt Grø stl", In Topics in Cryptology -- CT-RSA 2013. Vol. 7779, pp. 145-161. Springer-Verlag.
BibTeX:
@inproceedings{ds-2013-Holzer-Graf-a,
  author = {Severin Holzer-Graf and Thomas Krinninger and Martin Pernull and Martin Schläffer and Peter Schwabe and David Seywald and and Wolfgang Wieser},
  editor = {Ed Dawson},
  title = {Efficient Vector Implementations of AES-based Designs: A Case Study and New Implemenations for tt Grø stl},
  booktitle = {Topics in Cryptology -- CT-RSA 2013},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {7779},
  pages = {145--161},
  note = {http://cryptojedi.org/papers/\#fastgroestl}
}
Hutter M and Schwabe P (2013), "NaCl on 8-bit AVR Microcontrollers", In Progress in Cryptology -- AFRICACRYPT 2013. Vol. 7918, pp. 156-172. Springer-Verlag.
BibTeX:
@inproceedings{ds-2013-Hutter-a,
  author = {Michael Hutter and Peter Schwabe},
  editor = {Amr Youssef and Abderrahmane Nitaj},
  title = {NaCl on 8-bit AVR Microcontrollers},
  booktitle = {Progress in Cryptology -- AFRICACRYPT 2013},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {7918},
  pages = {156--172},
  note = {Document ID: cd4aad485407c33ece17e509622eb554, http://cryptojedi.org/papers/\#avrnacl}
}
Jacobs B (2013), "Measurable Spaces and their Effect Logic", In Logic in Computer Science. Computer Science Press.
BibTeX:
@inproceedings{ds-2013-Jacobs-a,
  author = {B. Jacobs},
  title = {Measurable Spaces and their Effect Logic},
  booktitle = {Logic in Computer Science},
  publisher = {Computer Science Press},
  year = {2013}
}
Jacobs B (2013), "On Block Structures in Quantum Computation", In Math. Found. of Programming Semantics. Vol. 298, pp. 233-255. Elsevier, Amsterdam.
BibTeX:
@inproceedings{ds-2013-Jacobs-b,
  author = {B. Jacobs},
  editor = {D. Kozen and M. Mislove},
  title = {On Block Structures in Quantum Computation},
  booktitle = {Math. Found. of Programming Semantics},
  publisher = {Elsevier, Amsterdam},
  year = {2013},
  volume = {298},
  pages = {233--255}
}
Jacobs B (2013), "Bases as Coalgebras", Logical Methods in Comp. Sci.. Vol. 9(3)
BibTeX:
@article{ds-2013-Jacobs-c,
  author = {B. Jacobs},
  title = {Bases as Coalgebras},
  journal = {Logical Methods in Comp. Sci.},
  year = {2013},
  volume = {9(3)},
  note = {See arxiv.org/pdf/1309.0844}
}
Jacobs B (2013), "De DDoS Paradox. Ontsluiten door Afsluiten", Ned. Juristen Blad. Vol. 32, pp. 2191-2195.
BibTeX:
@article{ds-2013-Jacobs-d,
  author = {B. Jacobs},
  title = {De DDoS Paradox. Ontsluiten door Afsluiten},
  journal = {Ned. Juristen Blad},
  year = {2013},
  volume = {32},
  pages = {2191--2195}
}
Jacobs B (2013), "Laat weten wat je monitort", Financieel Dagblad Outlook., September 30, 2013. , pp. 36-37.
BibTeX:
@article{ds-2013-Jacobs-e,
  author = {B. Jacobs},
  title = {Laat weten wat je monitort},
  journal = {Financieel Dagblad Outlook},
  year = {2013},
  pages = {36--37},
  note = {Opinion article}
}
Jacobs B (2013), "Digitaal tafelzilver beter beveiligen tegen afluisteren", Trouw., October 30, 2013.
BibTeX:
@article{ds-2013-Jacobs-f,
  author = {B. Jacobs},
  title = {Digitaal tafelzilver beter beveiligen tegen afluisteren},
  journal = {Trouw},
  year = {2013},
  note = {Opinion article}
}
Jacobs B (2013), "Dagger Categories of Tame Relations", Logica Universalis. Vol. 7(3), pp. 341-370.
BibTeX:
@article{ds-2013-Jacobs-g,
  author = {B. Jacobs},
  title = {Dagger Categories of Tame Relations},
  journal = {Logica Universalis},
  year = {2013},
  volume = {7(3)},
  pages = {341--370}
}
Jacobs B (2013), "Attributen in plaats van Identiteiten", IT-auditor. Vol. 1/2013, pp. 29-35.
BibTeX:
@article{ds-2013-Jacobs-h,
  author = {B. Jacobs},
  title = {Attributen in plaats van Identiteiten},
  journal = {IT-auditor},
  year = {2013},
  volume = {1/2013},
  pages = {29--35}
}
Jacobs B (2013), "Wat ben je?", In Nederland in Ideeën. , pp. 261-264. Maven Publishing.
BibTeX:
@inproceedings{ds-2013-Jacobs-i,
  author = {B. Jacobs},
  editor = {M. Geels and T. van Opijnen},
  title = {Wat ben je?},
  booktitle = {Nederland in Ideeën},
  publisher = {Maven Publishing},
  year = {2013},
  pages = {261--264}
}
Joosten SJC, van Gastel B and Schmaltz J (2013), "A Macro for Reusing Abstract Functions and Theorems", In ACL2 Theorem Prover and its Applications. Vol. EPTCS 114, pp. 29-41.
BibTeX:
@inproceedings{ds-2013-Joosten-a,
  author = {Sebastiaan Jozef Christiaan Joosten and Bernard van Gastel and Julien Schmaltz},
  editor = {Ruben Gamboa and Jared Davis},
  title = {A Macro for Reusing Abstract Functions and Theorems},
  booktitle = {ACL2 Theorem Prover and its Applications},
  year = {2013},
  volume = {EPTCS 114},
  pages = {29--41}
}
Joosten SJC and Schmaltz J (2013), "Generation of inductive invariants from register transfer level designs of communication fabrics", In Formal Methods and Models for Codesign (MEMOCODE), 2013 Eleventh IEEE/ACM International Conference on. , pp. 57-64.
BibTeX:
@inproceedings{ds-2013-Joosten-b,
  author = {Joosten, Sebastiaan Jozef Christiaan and Schmaltz, Julien},
  title = {Generation of inductive invariants from register transfer level designs of communication fabrics},
  booktitle = {Formal Methods and Models for Codesign (MEMOCODE), 2013 Eleventh IEEE/ACM International Conference on},
  year = {2013},
  pages = {57--64}
}
Joosten SJC and Zantema H (2013), "Relaxation of 3-partition instances.", In CTW. , pp. 133-136.
BibTeX:
@inproceedings{ds-2013-Joosten-c,
  author = {Joosten, Sebastiaan Jozef Christiaan and Zantema, Hans},
  title = {Relaxation of 3-partition instances.},
  booktitle = {CTW},
  year = {2013},
  pages = {133--136}
}
Kersten R, van Gastel B, Drijvers M, Smetsers S and van Eekelen MCJD (2013), "Using Model-Checking to Reveal a Vulnerability of Tamper-Evident Pairing", In NASA Formal Methods. Vol. 7871, pp. 63-77. Springer-Verlag.
BibTeX:
@inproceedings{ds-2013-Kersten-a,
  author = {Rody Kersten and Bernard van Gastel and Manu Drijvers and Sjaak Smetsers and Marko C. J. D. van Eekelen},
  editor = {Guillaume Brat and Neha Rungta and Arnaud Venet},
  title = {Using Model-Checking to Reveal a Vulnerability of Tamper-Evident Pairing},
  booktitle = {NASA Formal Methods},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {7871},
  pages = {63-77}
}
Klint P and van Eekelen M (2013), "Software ís Sleuteltechnologie - Academische software engineers moeten brug slaan tussen theorie en praktijk", Automatiseringgids., June 5, 2013. Vol. 11 Academic Service.
BibTeX:
@article{ds-2013-Klint-a,
  author = {Paul Klint and Marko van Eekelen},
  title = {Software ís Sleuteltechnologie - Academische software engineers moeten brug slaan tussen theorie en praktijk},
  journal = {Automatiseringgids},
  publisher = {Academic Service},
  year = {2013},
  volume = {11},
  note = {Opinion article}
}
de Koning Gans G (2013), "Outsmarting Smart Cards". Thesis at: Radboud University.
BibTeX:
@phdthesis{ds-2013-KoningGans-a,
  author = {G. de Koning Gans},
  title = {Outsmarting Smart Cards},
  school = {Radboud University},
  year = {2013}
}
Koning M (2013), "Publiek private samenwerking in cyberspace – de gegevensvergaring", Computerrecht. Vol. 6(1), pp. 31-41.
BibTeX:
@article{ds-2013-Koning-a,
  author = {M.E. Koning},
  title = {Publiek private samenwerking in cyberspace – de gegevensvergaring},
  journal = {Computerrecht},
  year = {2013},
  volume = {6},
  number = {1},
  pages = {31-41}
}
Koops B-J, Hoepman J-H and Leenes R (2013), "Open-source intelligence and privacy by design", Computer Law & Security Review., December, 2013. Vol. 29(6), pp. 676-688.
BibTeX:
@article{ds-2013-Koops-a,
  author = {Bert-Jaap Koops and Jaap-Henk Hoepman and Ronald Leenes},
  title = {Open-source intelligence and privacy by design},
  journal = {Computer Law & Security Review},
  year = {2013},
  volume = {29},
  number = {6},
  pages = {676--688},
  url = {http://dx.doi.org/10.1016/j.clsr.2013.09.005}
}
Köppe C and van Eekelen M (2013), "Report of Computer Science Research Conference 2012 (CSERC'12)", ACM InRoads., March, 2013. Vol. 4 (1), pp. 80-80. ACM.
BibTeX:
@article{ds-2013-Koeppe-a,
  author = {Christian Köppe and Marko van Eekelen},
  title = {Report of Computer Science Research Conference 2012 (CSERC'12)},
  journal = {ACM InRoads},
  publisher = {ACM},
  year = {2013},
  volume = {4 (1)},
  pages = {80-80}
}
Lensink L (2013), "Applying Formal Methods in Software Development". Thesis at: Radboud University.
BibTeX:
@phdthesis{ds-2013-Lensink-a,
  author = {L. Lensink},
  title = {Applying Formal Methods in Software Development},
  school = {Radboud University},
  year = {2013}
}
Madlener K and Smetsers S (2013), "GSOS Formalized in Coq", In Proceedings of TASE'13. , pp. 199-206. IEEE.
BibTeX:
@inproceedings{ds-2013-Madlener-a,
  author = {Ken Madlener and Sjaak Smetsers},
  title = {GSOS Formalized in Coq},
  booktitle = {Proceedings of TASE'13},
  publisher = {IEEE},
  year = {2013},
  pages = {199--206}
}
Madlener K, Smetsers S and van Eekelen MCJD (2013), "Modular Bialgebraic Semantics and Algebraic Laws", In SBLP. Vol. 8129, pp. 46-60. Springer-Verlag.
BibTeX:
@inproceedings{ds-2013-Madlener-b,
  author = {Ken Madlener and Sjaak Smetsers and Marko C. J. D. van Eekelen},
  editor = {André Rauber Du Bois and Phil Trinder},
  title = {Modular Bialgebraic Semantics and Algebraic Laws},
  booktitle = {SBLP},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {8129},
  pages = {46-60}
}
Madlener K, Smetsers S and Eekelen Mv (2013), "Modular Bialgebraic Semantics and Algebraic Laws". Thesis at: Radboud University Nijmegen., July, 2013. (ICIS-R13008)
BibTeX:
@techreport{ds-2013-Madlener-c,
  author = {Madlener, Ken and Smetsers, Sjaak and Eekelen, Marko van},
  title = {Modular Bialgebraic Semantics and Algebraic Laws},
  school = {Radboud University Nijmegen},
  year = {2013},
  number = {ICIS--R13008}
}
de Mol M and van Eekelen MCJD (2013), "Beautiful Code, Beautiful Proof?", In The Beauty of Functional Code. Vol. 8106, pp. 1-7. Springer-Verlag.
BibTeX:
@inproceedings{ds-2013-Mol-a,
  author = {Maarten de Mol and Marko C. J. D. van Eekelen},
  editor = {Peter Achten and Pieter W. M. Koopman},
  title = {Beautiful Code, Beautiful Proof?},
  booktitle = {The Beauty of Functional Code},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {8106},
  pages = {1-7}
}
Montes Portela C, Geldtmeijer D, Rooden H, Kohlmann J, Slootweg H, Van Leersum D and van Eekelen M (2013), "A flexible, privacy enhanced and secured ICT architecture for a smart grid project with active consumers in the city of Zwolle, NL", In Proceedings of the 22nd International Conference on Electricity Distribution (CIRED 2013). Stockholm, Sweden , pp. 1-4.
BibTeX:
@inproceedings{ds-2013-MontesPortela-a,
  author = {Montes Portela, Carlos and Geldtmeijer, Danny and Rooden, Hans and Kohlmann, Jaap and Slootweg, Han and Van Leersum, Denny and van Eekelen, Marko},
  title = {A flexible, privacy enhanced and secured ICT architecture for a smart grid project with active consumers in the city of Zwolle, NL},
  booktitle = {Proceedings of the 22nd International Conference on Electricity Distribution (CIRED 2013)},
  year = {2013},
  pages = {1-4},
  note = {Paper 241, IEEE Xplore Digital Library 2013}
}
Montes Portela C, Geldtmeijer D, Slootweg H and van Eekelen M (2013), "A flexible and privacy friendly ICT architecture for smart charging of EVS", In Proceedings of the 22nd International Conference on Electricity Distribution (CIRED 2013), Stockholm. Stockholm, Sweden , pp. 1-4.
BibTeX:
@inproceedings{ds-2013-MontesPortela-b,
  author = {Montes Portela, Carlos and Geldtmeijer, Danny and Slootweg, Han and van Eekelen, Marko},
  title = {A flexible and privacy friendly ICT architecture for smart charging of EVS},
  booktitle = {Proceedings of the 22nd International Conference on Electricity Distribution (CIRED 2013), Stockholm},
  year = {2013},
  pages = {1-4},
  note = {Paper 0199, IEEE Xplore Digital Library 2013}
}
Montes Portela C, Slootweg H and van Eekelen M (2013), "Structuring the design space of the ICT architecture for the Smart Grid", In IEEE Recent Advances in Computational Systems 2013 (RAICS), Conference proceedings track VI Smart Systems. Trivandrum, India, December, 2013.
BibTeX:
@inproceedings{ds-2013-MontesPortela-c,
  author = {Montes Portela, Carlos and Slootweg, Han and van Eekelen, Marko},
  title = {Structuring the design space of the ICT architecture for the Smart Grid},
  booktitle = {IEEE Recent Advances in Computational Systems 2013 (RAICS), Conference proceedings track VI Smart Systems},
  year = {2013},
  note = {IEEE Xplore Digital Library 2014}
}
Papagiannopoulos K, Alpár G and Lueks W (2013), "Desigated Attribute Proofs with the Camenish--Lysyanskaya Signature", In WIC symposium 2013., Poster and Abstract.
BibTeX:
@inproceedings{ds-2013-Papagiannopoulos-a,
  author = {Papagiannopoulos, Kostas and Alpár, Gergely and Lueks, Wouter},
  title = {Desigated Attribute Proofs with the Camenish--Lysyanskaya Signature},
  booktitle = {WIC symposium 2013},
  year = {2013}
}
Parisen Toldin P, Kersten R, Gastel Bv and Eekelen Mv (2013), "Soundness Proof for a Hoare Logic for Energy Consumption Analysis". Thesis at: Radboud University Nijmegen., October, 2013. (ICIS-R13009)
BibTeX:
@techreport{ds-2013-ParisenToldin-a,
  author = {Parisen Toldin, Paolo and Kersten, Rody and Gastel, Bernard van and Eekelen, Marko van},
  title = {Soundness Proof for a Hoare Logic for Energy Consumption Analysis},
  school = {Radboud University Nijmegen},
  year = {2013},
  number = {ICIS--R13009}
}
Poll E and de Ruiter J (2013), "The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions", In Policies and Research in Identity Management. Vol. 396, pp. 107-120. Springer-Verlag.
BibTeX:
@incollection{ds-2013-Poll-a,
  author = {Poll, E. and de Ruiter, J.},
  title = {The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions},
  booktitle = {Policies and Research in Identity Management},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {396},
  pages = {107--120},
  doi = {10.1007/978-3-642-37282-7_11}
}
van Rijswijk-Deij R and Poll E (2013), "Using Trusted Execution Environments in Two-factor Authentication: comparing approaches", In Proceedings Open Identity Summit 2013. Open Identity Summit (OID-2013), September 9-11, Kloster Banz, Germany. Vol. 223, pp. 20-31. Springer-Verlag.
BibTeX:
@inproceedings{ds-2013-Rijswijk-Deij-a,
  author = {van Rijswijk-Deij, Roland and Poll, Erik},
  title = {Using Trusted Execution Environments in Two-factor Authentication: comparing approaches},
  booktitle = {Proceedings Open Identity Summit 2013. Open Identity Summit (OID-2013), September 9-11, Kloster Banz, Germany},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {223},
  pages = {20--31},
  url = {http://www.cs.ru.nl/ rijswijk/pub/TrEE-oids13.pdf}
}
Smetsers S and Barendsen E (2013), "Verifying Functional Formalizations - A type-theoretical case study in PVS", In The Beauty of Functional Code. Vol. 8106, pp. 47-59. Springer-Verlag.
BibTeX:
@inproceedings{ds-2013-Smetsers-a,
  author = {Sjaak Smetsers and Erik Barendsen},
  editor = {Peter Achten and Pieter W. M. Koopman},
  title = {Verifying Functional Formalizations - A type-theoretical case study in PVS},
  booktitle = {The Beauty of Functional Code},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {8106},
  pages = {47-59}
}
Smetsers S and van Eekelen MCJD (2013), "Higher-Order Strictness Typing", In Trends in Functional Programming. Vol. 7829, pp. 85-100. Springer-Verlag.
BibTeX:
@inproceedings{ds-2013-Smetsers-b,
  author = {Sjaak Smetsers and Marko C. J. D. van Eekelen},
  editor = {Hans-Wolfgang Loidl and Ricardo Peña},
  title = {Higher-Order Strictness Typing},
  booktitle = {Trends in Functional Programming},
  publisher = {Springer-Verlag},
  year = {2013},
  volume = {7829},
  pages = {85-100}
}
Verbeek F (2013), "Formal Verification of On-Chip Communication Fabrics". Thesis at: Radboud University.
BibTeX:
@phdthesis{ds-2013-Verbeek-a,
  author = {F. Verbeek},
  title = {Formal Verification of On-Chip Communication Fabrics},
  school = {Radboud University},
  year = {2013}
}
Verbeek F, Joosten SJC and Schmaltz J (2013), "Formal Deadlock Verification for Click Circuits", In Asynchronous Circuits and Systems (ASYNC), 2013 IEEE 19th International Symposium on. , pp. 183-190.
BibTeX:
@inproceedings{ds-2013-Verbeek-b,
  author = {Verbeek, Freek and Joosten, Sebastiaan Jozef Christiaan and Schmaltz, Julien},
  title = {Formal Deadlock Verification for Click Circuits},
  booktitle = {Asynchronous Circuits and Systems (ASYNC), 2013 IEEE 19th International Symposium on},
  year = {2013},
  pages = {183--190}
}
Vieira B and Poll E (2013), "A Security Protocol for Information-Centric Networking in Smart Grids", In SEGS (Smart Energy Grid Security). , pp. 1-10. ACM.
BibTeX:
@incollection{ds-2013-Vieira-a,
  author = {Vieira, B. and Poll, E.},
  title = {A Security Protocol for Information-Centric Networking in Smart Grids},
  booktitle = {SEGS (Smart Energy Grid Security)},
  publisher = {ACM},
  year = {2013},
  pages = {1--10},
  doi = {10.1145/2516930.2516932}
}
de Vries K and Hildebrandt M (2013), "Introduction. Privacy, due process and the computational turn at a glance: pointers for the hurried reader", In Privacy and Due Process after the Computational Turn. Abingdon , pp. 1-8. Routledge.
BibTeX:
@incollection{ds-2013-Vries-a,
  author = {de Vries, K. and Hildebrandt, M.},
  editor = {Hildebrandt, M. and de Vries, K.},
  title = {Introduction. Privacy, due process and the computational turn at a glance: pointers for the hurried reader},
  booktitle = {Privacy and Due Process after the Computational Turn},
  publisher = {Routledge},
  year = {2013},
  pages = {1-8}
}
Vullers P and Alpár G (2013), "Efficient Selective Disclosure on Smart Cards Using Idemix", In Policies and Research in Identity Management (IDMAN). , pp. 53-67. Springer-Verlag.
BibTeX:
@inproceedings{ds-2013-Vullers-a,
  author = {Pim Vullers and Gergely Alpár},
  editor = {Simone Fischer-Hübner and Elisabeth de Leeuw and Chris Mitchell},
  title = {Efficient Selective Disclosure on Smart Cards Using Idemix},
  booktitle = {Policies and Research in Identity Management (IDMAN)},
  publisher = {Springer-Verlag},
  year = {2013},
  pages = {53--67}
}

2012

Alpár G, Batina L and Lueks W (2012), "Designated Attribute-Based Proofs for RFID Applications", In RFID Security and Privacy -- RFIDsec 2012. , pp. 59-75. Springer-Verlag.
BibTeX:
@inproceedings{ds-2012-Alpar-a,
  author = {Gergely Alpár and Lejla Batina and Wouter Lueks},
  editor = {Jaap-Henk Hoepman and Ingrid Verbauwhede},
  title = {Designated Attribute-Based Proofs for RFID Applications},
  booktitle = {RFID Security and Privacy -- RFIDsec 2012},
  publisher = {Springer-Verlag},
  year = {2012},
  pages = {59--75}
}
Alpár G, Batina L and Verdult R (2012), "Using NFC Phones for Proving Credentials", In 16th Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance (MMB&DFT 2012). Vol. 7201, pp. 317-330. Springer-Verlag.
BibTeX:
@inproceedings{ds-2012-Alpar-b,
  author = {Alpár, Gergely. and Batina, Lejla and Verdult, Roel},
  title = {Using NFC Phones for Proving Credentials},
  booktitle = {16th Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance (MMB&DFT 2012)},
  publisher = {Springer-Verlag},
  year = {2012},
  volume = {7201},
  pages = {317--330}
}
Atkey R, Ghani N, Jacobs B and Johann P (2012), "Fibrational Induction Meets Effects", In Foundations of Software Science and Computation Structures. (7213), pp. 42-57. Springer, Berlin.
BibTeX:
@inproceedings{ds-2012-Atkey-a,
  author = {R. Atkey and N. Ghani and B. Jacobs and P. Johann},
  editor = {L. Birkedal},
  title = {Fibrational Induction Meets Effects},
  booktitle = {Foundations of Software Science and Computation Structures},
  publisher = {Springer, Berlin},
  year = {2012},
  number = {7213},
  pages = {42--57}
}
Balasch J, Gierlichs B, Verdult R, Batina L and Verbauwhede I (2012), "Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs", In 12th Cryptographers' Track at the RSA Conference (CT-RSA 2012). Vol. 7178, pp. 19-34. Springer-Verlag.
BibTeX:
@inproceedings{ds-2012-Balasch-a,
  author = {Balasch, Josep and Gierlichs, Benedikt and Verdult, Roel and Batina, Lejla and Verbauwhede, Ingrid},
  title = {Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs},
  booktitle = {12th Cryptographers' Track at the RSA Conference (CT-RSA 2012)},
  publisher = {Springer-Verlag},
  year = {2012},
  volume = {7178},
  pages = {19--34}
}
Batina L, Hogenboom J and Van Woudenberg J (2012), "Getting more from PCA: First results of using Principal Component Analysis for extensive power analysis", In 12th Cryptographers' Track at the RSA Conference (CT-RSA 2012). Vol. 7178, pp. 383-397. Springer-Verlag.
BibTeX:
@inproceedings{ds-2012-Batina-a,
  author = {Batina, Lejla and Hogenboom, Jip and Van Woudenberg, Jasper},
  title = {Getting more from PCA: First results of using Principal Component Analysis for extensive power analysis},
  booktitle = {12th Cryptographers' Track at the RSA Conference (CT-RSA 2012)},
  publisher = {Springer-Verlag},
  year = {2012},
  volume = {7178},
  pages = {383--397}
}
Batina L, Lee YK, Seys S, Singelée D and Verbauwhede I (2012), "Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs", Personal and Ubiquitous Computing. Vol. 16(3), pp. 323-335.
BibTeX:
@article{ds-2012-Batina-b,
  author = {Lejla Batina and Yong Ki Lee and Stefaan Seys and Dave Singelée and Ingrid Verbauwhede},
  title = {Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs},
  journal = {Personal and Ubiquitous Computing},
  year = {2012},
  volume = {16},
  number = {3},
  pages = {323-335}
}
Blom A, de Koning Gans G, Poll E, de Ruiter J and Verdult R (2012), "Designed to Fail: A USB-Connected Reader for Online Banking", In Secure IT Systems (NordSec 2012). Vol. 7616, pp. 1-16. Springer-Verlag.
BibTeX:
@inproceedings{ds-2012-Blom-a,
  author = {Arjan Blom and Gerhard de Koning Gans and Erik Poll and Joeri de Ruiter and Roel Verdult},
  title = {Designed to Fail: A USB-Connected Reader for Online Banking},
  booktitle = {Secure IT Systems (NordSec 2012)},
  publisher = {Springer-Verlag},
  year = {2012},
  volume = {7616},
  pages = {1--16},
  doi = {10.1007/978-3-642-34210-3_1}
}
van Eekelen M (2012), "Analysing Java progams with ResAna (Abstract)", In Software Development. NLUUG Najaarsconferentie. , pp. 5. NLUUG.
BibTeX:
@incollection{ds-2012-Eekelen-a,
  author = {M. van Eekelen},
  title = {Analysing Java progams with ResAna (Abstract)},
  booktitle = {Software Development. NLUUG Najaarsconferentie},
  publisher = {NLUUG},
  year = {2012},
  pages = {5}
}
van Eekelen M and Vranken H (2012), "The Internet: Historical and Technical Background", In Cyber Safety: An Introduction. , pp. 31-44. Eleven International Publishing.
BibTeX:
@incollection{ds-2012-Eekelen-b,
  author = {Marko van Eekelen and Harald Vranken},
  editor = {E.R. Leukfeldt and W.Ph. Stol},
  title = {The Internet: Historical and Technical Background},
  booktitle = {Cyber Safety: An Introduction},
  publisher = {Eleven International Publishing},
  year = {2012},
  pages = {31--44}
}
Garcia F, Verheul E and B.Jacobs (2012), "Cell-based Roadpricing", In EuroPKI 2011. (7163), pp. 106-122.
BibTeX:
@inproceedings{ds-2012-Garcia-a,
  author = {F.D. Garcia and E. Verheul and B.Jacobs},
  editor = {S. Petkova-Kikova and A. Pashalidis and G. Pernul},
  title = {Cell-based Roadpricing},
  booktitle = {EuroPKI 2011},
  year = {2012},
  number = {7163},
  pages = {106--122}
}
Garcia FD, de Koning Gans G and Verdult R (2012), "Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research", \emph{Tutorial at 8th Workshop on RFID Security and Privacy (RFIDSec 2012)}.. Thesis at: Radboud University Nijmegen.
BibTeX:
@techreport{ds-2012-Garcia-b,
  author = {Garcia, Flavio D. and de Koning Gans, Gerhard and Verdult, Roel},
  title = {Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research},
  school = {Radboud University Nijmegen},
  year = {2012}
}
Garcia FD, de Koning Gans G, Verdult R and Meriac M (2012), "Dismantling iClass and iClass Elite", In 17th European Symposium on Research in Computer Security (ESORICS 2012). Vol. 7459, pp. 697-715. Springer-Verlag.
BibTeX:
@inproceedings{ds-2012-Garcia-c,
  author = {Garcia, Flavio D. and de Koning Gans, Gerhard and Verdult, Roel and Meriac, Milosch},
  title = {Dismantling iClass and iClass Elite},
  booktitle = {17th European Symposium on Research in Computer Security (ESORICS 2012)},
  publisher = {Springer-Verlag},
  year = {2012},
  volume = {7459},
  pages = {697-715}
}
Garcia FD, Verheul ER and Jacobs B (2012), "Cell-based Roadpricing", In 8th European PKI Workshop (EuroPKI 2011). Vol. 7163, pp. 106-122. Springer Heidelberg.
BibTeX:
@inproceedings{ds-2012-Garcia-d,
  author = {Flavio D. Garcia and Eric R. Verheul and Bart Jacobs},
  editor = {S. Petkova-Kikova, A. Pashalidis, G. Pernul},
  title = {Cell-based Roadpricing},
  booktitle = {8th European PKI Workshop (EuroPKI 2011)},
  publisher = {Springer Heidelberg},
  year = {2012},
  volume = {7163},
  pages = {106--122}
}
Gobi A, Shkaravska O and Eekelen Mv (2012), "A higher--order size system for a higher--order functional language". Thesis at: Radboud University Nijmegen., July, 2012. (ICIS-R12005)
BibTeX:
@techreport{ds-2012-Gobi-a,
  author = {Gobi, Attila and Shkaravska, Olha and Eekelen, Marko van},
  title = {A higher--order size system for a higher--order functional language},
  school = {Radboud University Nijmegen},
  year = {2012},
  number = {ICIS--R12005}
}
Haag J, Karsch S, Vranken H and van Eekelen (2012), "A Virtual Computer Security Lab As Learning Environment For Networking and SecurityCourses", In Proceedings of the 3rd Annual International Conference Computer Science Education: Innovation and Technology. Singapore , pp. 61-68. Global Science & Technology Forum.
BibTeX:
@inproceedings{ds-2012-Haag-a,
  author = {Haag, J. and Karsch, S. and Vranken H. and van Eekelen},
  title = {A Virtual Computer Security Lab As Learning Environment For Networking and SecurityCourses},
  booktitle = {Proceedings of the 3rd Annual International Conference Computer Science Education: Innovation and Technology},
  publisher = {Global Science & Technology Forum},
  year = {2012},
  pages = {61--68}
}
Hoepman J-H (2012), "In Things We Trust? Towards Trustability in the Internet of Things (Extended Abstract)", In Constructing Ambient Intelligence - AmI 2011 Workshops. Amsterdam, the Netherlands Vol. 277, pp. 287-295. Springer.
BibTeX:
@inproceedings{ds-2012-Hoepman-a,
  author = {Jaap-Henk Hoepman},
  editor = {Reiner Wichert and Kristof Van Laerhoven and Jean Gelissen},
  title = {In Things We Trust? Towards Trustability in the Internet of Things (Extended Abstract)},
  booktitle = {Constructing Ambient Intelligence - AmI 2011 Workshops},
  publisher = {Springer},
  year = {2012},
  volume = {277},
  pages = {287--295}
}
Hoepman J-H and Hooghiemstra T (2012), "Goede code. De digitale samenleving in balans", RegelMaat. Vol. 27(2), pp. 76-87.
BibTeX:
@article{ds-2012-Hoepman-b,
  author = {Jaap-Henk Hoepman and Theo Hooghiemstra},
  title = {Goede code. De digitale samenleving in balans},
  journal = {RegelMaat},
  year = {2012},
  volume = {27},
  number = {2},
  pages = {76--87}
}
Hoepman J-H and van Lieshout M (2012), "Privacy", In Cyber Safety: An Introduction. , pp. pp 75-87. Eleven International Publishing, The Hague.
BibTeX:
@incollection{ds-2012-Hoepman-c,
  author = {Jaap-Henk Hoepman and Marc van Lieshout},
  editor = {E. R. Leukfeldt and W. Ph. Stol},
  title = {Privacy},
  booktitle = {Cyber Safety: An Introduction},
  publisher = {Eleven International Publishing, The Hague},
  year = {2012},
  pages = {pp 75--87}
}
Jacobs B (2012), "Policeware", Ned. Juristen Blad. Vol. 37, pp. 2761-2764.
BibTeX:
@article{ds-2012-Jacobs-a,
  author = {B. Jacobs},
  title = {Policeware},
  journal = {Ned. Juristen Blad},
  year = {2012},
  volume = {37},
  pages = {2761--2764}
}
Jacobs B (2012), "Bedwelmende zelfontplooiing", In Van verzorgingsstaat naar waarborgstaat. Nieuwe kansen voor overheid en samenleving. , pp. 85-97. Boom.
BibTeX:
@incollection{ds-2012-Jacobs-b,
  author = {B. Jacobs},
  editor = {T. Kwakkelstein and A. van Dam and A. van Ravenzwaaij},
  title = {Bedwelmende zelfontplooiing},
  booktitle = {Van verzorgingsstaat naar waarborgstaat. Nieuwe kansen voor overheid en samenleving},
  publisher = {Boom},
  year = {2012},
  pages = {85--97}
}
Jacobs B (2012), "Koester de professional", iBestuur. Vol. 2, pp. 37.
BibTeX:
@article{ds-2012-Jacobs-c,
  author = {B. Jacobs},
  title = {Koester de professional},
  journal = {iBestuur},
  year = {2012},
  volume = {2},
  pages = {37}
}
Jacobs B and Mandemaker J (2012), "The Expectation Monad in Quantum Foundations", In Quantum Physics and Logic (QPL) 2011. Vol. 95, pp. 143-182.
BibTeX:
@inproceedings{ds-2012-Jacobs-d,
  author = {B. Jacobs and J. Mandemaker},
  editor = {B. Jacobs and P. Selinger and B. Spitters},
  title = {The Expectation Monad in Quantum Foundations},
  booktitle = {Quantum Physics and Logic (QPL) 2011},
  year = {2012},
  volume = {95},
  pages = {143--182}
}
Jacobs B and Mandemaker J (2012), "Coreflections in Algebraic Quantum Logic", Found. of Physics.
BibTeX:
@article{ds-2012-Jacobs-e,
  author = {B. Jacobs and J. Mandemaker},
  title = {Coreflections in Algebraic Quantum Logic},
  journal = {Found. of Physics},
  year = {2012},
  doi = {10.1007/s10701-012-9654-8}
}
Jacobs B, Silva A and Sokolova A (2012), "Trace semantics via determinization", In Coalgebraic Methods in Computer Science (CMCS 2012). (7399), pp. 109-129. Springer, Berlin.
BibTeX:
@inproceedings{ds-2012-Jacobs-f,
  author = {B. Jacobs and A. Silva and A. Sokolova},
  editor = {L. Schröder and D. Patinson},
  title = {Trace semantics via determinization},
  booktitle = {Coalgebraic Methods in Computer Science (CMCS 2012)},
  publisher = {Springer, Berlin},
  year = {2012},
  number = {7399},
  pages = {109--129}
}
(2012), "Special Issue of higher order and symbolic computing dedicated to TFP2007 and TFP2008. Higher Order and Symbolic Computing. Volume 23, nr. 2 and 4", In TFP0708. Springer.
BibTeX:
@proceedings{ds-2012-Johann-a,,
  editor = {Patricia Johann and Peter Achten and Marko van Eekelen and Pieter Koopman and Marco T. Moraz�n},
  title = {Special Issue of higher order and symbolic computing dedicated to TFP2007 and TFP2008. Higher Order and Symbolic Computing. Volume 23, nr. 2 and 4},
  booktitle = {TFP0708},
  publisher = {Springer},
  year = {2012}
}
Kersten R, Shkaravska O, van Gastel B, Montenegro M and van Eekelen M (2012), "Making resource analysis practical for real-time Java", In Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems (JTRES 2012). New York, NY, USA , pp. 135-144. ACM.
BibTeX:
@inproceedings{ds-2012-Kersten-a,
  author = {Kersten, Rody and Shkaravska, Olha and van Gastel, Bernard and Montenegro, Manuel and van Eekelen, Marko},
  title = {Making resource analysis practical for real-time Java},
  booktitle = {Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems (JTRES 2012)},
  publisher = {ACM},
  year = {2012},
  pages = {135--144},
  url = {http://doi.acm.org/10.1145/2388936.2388959},
  doi = {10.1145/2388936.2388959}
}
de Koning Gans G and de Ruiter J (2012), "The SmartLogic Tool: Analysing and Testing Smart Card Protocols", In IEEE Fifth International Conference on Software Testing, Verification, and Validation. Los Alamitos, CA, USA , pp. 864-871. IEEE.
BibTeX:
@inproceedings{ds-2012-KoningGans-a,
  author = {Gerhard de Koning Gans and Joeri de Ruiter},
  title = {The SmartLogic Tool: Analysing and Testing Smart Card Protocols},
  booktitle = {IEEE Fifth International Conference on Software Testing, Verification, and Validation},
  publisher = {IEEE},
  year = {2012},
  pages = {864--871},
  doi = {10.1109/ICST.2012.189}
}
Lamers A and Eekelen Mv (2012), "Analyzing Isoefficiency of Partition Local Algorithms". Thesis at: Radboud University Nijmegen., February, 2012. (ICIS-R12003)
BibTeX:
@techreport{ds-2012-Lamers-a,
  author = {Lamers, Arjan and Eekelen, Marko van},
  title = {Analyzing Isoefficiency of Partition Local Algorithms},
  school = {Radboud University Nijmegen},
  year = {2012},
  number = {ICIS--R12003}
}
Lensink L, Smetsers S and van Eekelen M (2012), "A Proof Framework for Concurrent Programs". Thesis at: Radboud University Nijmegen., January, 2012. (ICIS-R12001)
BibTeX:
@techreport{ds-2012-Lensink-a,
  author = {Lensink, Leonard and Smetsers, Sjaak and van Eekelen, Marko},
  title = {A Proof Framework for Concurrent Programs},
  school = {Radboud University Nijmegen},
  year = {2012},
  number = {ICIS--R12001}
}
Lensink L, Smetsers S and van Eekelen MCJD (2012), "A Proof Framework for Concurrent Programs", In Integrated Formal Methods - 9th International Conference (IFM 2012). Vol. 7321, pp. 174-190. Springer.
BibTeX:
@inproceedings{ds-2012-Lensink-b,
  author = {Leonard Lensink and Sjaak Smetsers and Marko C. J. D. van Eekelen},
  editor = {John Derrick and Stefania Gnesi and Diego Latella and Helen Treharne},
  title = {A Proof Framework for Concurrent Programs},
  booktitle = {Integrated Formal Methods - 9th International Conference (IFM 2012)},
  publisher = {Springer},
  year = {2012},
  volume = {7321},
  pages = {174-190}
}
Lensink L, Smetsers S and van Eekelen MCJD (2012), "Generating Verifiable Java Code from Verified PVS Specifications", In NASA Formal Methods 4th International Symposium (NFM 2012). Vol. 7226, pp. 310-325. Springer.
BibTeX:
@inproceedings{ds-2012-Lensink-c,
  author = {Leonard Lensink and Sjaak Smetsers and Marko C. J. D. van Eekelen},
  editor = {Alwyn Goodloe and Suzette Person},
  title = {Generating Verifiable Java Code from Verified PVS Specifications},
  booktitle = {NASA Formal Methods 4th International Symposium (NFM 2012)},
  publisher = {Springer},
  year = {2012},
  volume = {7226},
  pages = {310-325}
}
Leukfeldt R, van Eekelen M, de Jong E and Vranken H (2012), "Basic Cybercriminal Techniques and Techniques to Cause Damage", In Cyber Safety: An Introduction. , pp. 167-180. Eleven International Publishing.
BibTeX:
@incollection{ds-2012-Leukfeldt-a,
  author = {Rutger Leukfeldt and Marko van Eekelen and Erik de Jong and Harald Vranken},
  editor = {E.R. Leukfeldt and W.Ph. Stol},
  title = {Basic Cybercriminal Techniques and Techniques to Cause Damage},
  booktitle = {Cyber Safety: An Introduction},
  publisher = {Eleven International Publishing},
  year = {2012},
  pages = {167--180}
}
Mavroeidis D, Batina L, van Laarhoven T and Marchiori E (2012), "PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices", In Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2012. Vol. 7523, pp. 253-268. Springer-Verlag.
BibTeX:
@inproceedings{ds-2012-Mavroeidis-a,
  author = {Mavroeidis, Dimitris and Batina, Lejla and van Laarhoven, Twan and Marchiori, Elena},
  title = {PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices},
  booktitle = {Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2012},
  publisher = {Springer-Verlag},
  year = {2012},
  volume = {7523},
  pages = {253--268}
}
Montenegro M, Shkaravska O, van Eekelen M and Peña R (2012), "Interpolation-Based Height Analysis for Improving a Recurrence Solver", In Foundational and Practical Aspects of Resource Analysis. Vol. 7177, pp. 36-53. Springer Berlin / Heidelberg.
BibTeX:
@incollection{ds-2012-Montenegro-a,
  author = {Montenegro, Manuel and Shkaravska, Olha and van Eekelen, Marko and Peña, Ricardo},
  editor = {Pe�a, Ricardo and van Eekelen, Marko and Shkaravska, Olha},
  title = {Interpolation-Based Height Analysis for Improving a Recurrence Solver},
  booktitle = {Foundational and Practical Aspects of Resource Analysis},
  publisher = {Springer Berlin / Heidelberg},
  year = {2012},
  volume = {7177},
  pages = {36-53}
}
Mostowski W and Vullers P (2012), "Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards", In Security and Privacy in Communication Networks., August, 2012. Vol. 96, pp. 243-260. Springer Berlin Heidelberg.
BibTeX:
@inproceedings{ds-2012-Mostowski-a,
  author = {Wojciech Mostowski and Pim Vullers},
  editor = {Muttukrishnon Rajarajan and Fred Piper and Haining Wang and George Kesidis},
  title = {Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards},
  booktitle = {Security and Privacy in Communication Networks},
  publisher = {Springer Berlin Heidelberg},
  year = {2012},
  volume = {96},
  pages = {243-260}
}
(2012), " Foundational and Practical Aspects of Resource Analysis (FOPARA 2011). Proceedings of the Second International Workshop on Foundational and Practical Aspects of Resource Analysis (2011). Madrid. Spain", In FOPARA2011. Vol. 7177 Springer.
BibTeX:
@proceedings{ds-2012-Pena-a,,
  editor = {Ricardo Peña and Marko van Eekelen and Olha Shkaravska},
  title = { Foundational and Practical Aspects of Resource Analysis (FOPARA 2011). Proceedings of the Second International Workshop on Foundational and Practical Aspects of Resource Analysis (2011). Madrid. Spain},
  booktitle = {FOPARA2011},
  publisher = {Springer},
  year = {2012},
  volume = {7177}
}
de Ruiter J and Poll E (2012), "Formal Analysis of the EMV Protocol Suite", In Theory of Security and Applications (TOSCA). Vol. 6993, pp. 113-129. Springer-Verlag.
BibTeX:
@inproceedings{ds-2012-Ruiter-a,
  author = {de Ruiter, Joeri and Poll, Erik},
  editor = {Mödersheim, S. and Palamidessi, C.},
  title = {Formal Analysis of the EMV Protocol Suite},
  booktitle = {Theory of Security and Applications (TOSCA)},
  publisher = {Springer-Verlag},
  year = {2012},
  volume = {6993},
  pages = {113--129},
  doi = {10.1007/978-3-642-27375-9_7}
}
Sikorski M, van de Vrie E, van der Veer G, Sloep P and van Eekelen M (2012), "Preprints of the 2nd Computer Science Education Research Conference (CSERC2012)". Thesis at: FedCSIS September 9�12. Wroclaw, Poland.
BibTeX:
@techreport{ds-2012-Sikorski-a,
  author = {Marcin Sikorski and Evert van de Vrie and Gerrit van der Veer and Peter Sloep and Marko van Eekelen},
  title = {Preprints of the 2nd Computer Science Education Research Conference (CSERC2012)},
  school = {FedCSIS September 9�12. Wroclaw, Poland},
  year = {2012}
}
Sprengers M and Batina L (2012), "Speeding up GPU-based password cracking", In Special-purpose Hardware for Attacking Cryptographic Systems (SHARCS 2012) - workshop record. , pp. 45-54.
BibTeX:
@inproceedings{ds-2012-Sprengers-a,
  author = {Sprengers, Martijn and Batina, Lejla},
  title = {Speeding up GPU-based password cracking},
  booktitle = {Special-purpose Hardware for Attacking Cryptographic Systems (SHARCS 2012) - workshop record},
  year = {2012},
  pages = {45--54}
}
Stuurman S, van Eekelen M and Heeren B (2012), "A new method for sustainable development of open educational resources", In Proceedings of Second Computer Science Education Research Conference. New York, NY, USA , pp. 57-66. ACM.
BibTeX:
@inproceedings{ds-2012-Stuurman-a,
  author = {Stuurman, Sylvia and van Eekelen, Marko and Heeren, Bastiaan},
  title = {A new method for sustainable development of open educational resources},
  booktitle = {Proceedings of Second Computer Science Education Research Conference},
  publisher = {ACM},
  year = {2012},
  pages = {57--66},
  url = {http://doi.acm.org/10.1145/2421277.2421284},
  doi = {10.1145/2421277.2421284}
}
(2012), "CSERC '12: Proceedings of Second Computer Science Education Research Conference" New York, NY, USA ACM.
BibTeX:
@proceedings{ds-2012-Veer-a,,
  editor = {Gerrit van der Veer and Marcin Sikorski and Peter Sloep and Marko van Eekelen},
  title = {CSERC '12: Proceedings of Second Computer Science Education Research Conference},
  publisher = {ACM},
  year = {2012}
}
Verdult R, Garcia FD and Balasch J (2012), "Gone in 360 Seconds: Hijacking with Hitag2", In 21st USENIX Security Symposium (USENIX Security 2012). , pp. 237-252. USENIX Association.
BibTeX:
@inproceedings{ds-2012-Verdult-a,
  author = {Verdult, Roel and Garcia, Flavio D. and Balasch, Josep},
  title = {Gone in 360 Seconds: Hijacking with Hitag2},
  booktitle = {21st USENIX Security Symposium (USENIX Security 2012)},
  publisher = {USENIX Association},
  year = {2012},
  pages = {237--252}
}
Verdult R, de Koning Gans G and Garcia FD (2012), "A Toolbox for RFID Protocol Analysis", In 4th International EURASIP Workshop on RFID Technology (EURASIP RFID 2012). IEEE Computer Society.
BibTeX:
@inproceedings{ds-2012-Verdult-b,
  author = {Verdult, Roel and de Koning Gans, Gerhard and Garcia, Flavio D.},
  title = {A Toolbox for RFID Protocol Analysis},
  booktitle = {4th International EURASIP Workshop on RFID Technology (EURASIP RFID 2012)},
  publisher = {IEEE Computer Society},
  year = {2012}
}
Williams D, de Ruiter J and Fokkink W (2012), "Model Checking under Fairness in ProB and Its Application to Fair Exchange Protocols", In Theoretical Aspects of Computing - ICTAC 2012. Vol. 7521, pp. 168-182. Springer-Verlag.
BibTeX:
@inproceedings{ds-2012-Williams-a,
  author = {Williams, David and de Ruiter, Joeri and Fokkink, Wan},
  editor = {Roychoudhury, Abhik and D'Souza, Meenakshi},
  title = {Model Checking under Fairness in ProB and Its Application to Fair Exchange Protocols},
  booktitle = {Theoretical Aspects of Computing - ICTAC 2012},
  publisher = {Springer-Verlag},
  year = {2012},
  volume = {7521},
  pages = {168--182},
  doi = {10.1007/978-3-642-32943-2_14}
}

2011

Kursawe K, Danezis G and Kohlweiss M (2011), "Privacy-Friendly Aggregation for the Smart-Grid", In PETS. Vol. 6794, pp. 175-191. Springer.
BibTeX:
@inproceedings{ds-2011-Kursawe-a,
  author = {Klaus Kursawe and George Danezis and Markulf Kohlweiss},
  editor = {Simone Fischer-Hübner and Nicholas Hopper},
  title = {Privacy-Friendly Aggregation for the Smart-Grid},
  booktitle = {PETS},
  publisher = {Springer},
  year = {2011},
  volume = {6794},
  pages = {175-191}
}
Verbeek F and Schmaltz J (2011), "Formal verification of a deadlock detection algorithm", In 10th International Workshop on the ACL2 Theorem Prover and its Applications (ACL2'11). , pp. 103-112.
BibTeX:
@inproceedings{ds-2011-Verbeek-a,
  author = {Freek Verbeek and Julien Schmaltz},
  title = {Formal verification of a deadlock detection algorithm},
  booktitle = {10th International Workshop on the ACL2 Theorem Prover and its Applications (ACL2'11)},
  year = {2011},
  pages = {103-112}
}
Verbeek F and Schmaltz J (2011), "Automatic verification for deadlock in networks-on-chips with adaptive routing and wormhole switching", In Fifth ACM/IEEE International Symposium on Networks-on-Chip (NOCS'11). , pp. 25-32.
BibTeX:
@inproceedings{ds-2011-Verbeek-b,
  author = {Freek Verbeek and Julien Schmaltz},
  title = {Automatic verification for deadlock in networks-on-chips with adaptive routing and wormhole switching},
  booktitle = {Fifth ACM/IEEE International Symposium on Networks-on-Chip (NOCS'11)},
  year = {2011},
  pages = {25-32}
}
Verbeek F and Schmaltz J (2011), "A Fast and Verified Algorithm for Proving Store-and-Forward Networks Deadlock-Free", In 19th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP'11). , pp. 3-10.
BibTeX:
@inproceedings{ds-2011-Verbeek-c,
  author = {Freek Verbeek and Julien Schmaltz},
  title = {A Fast and Verified Algorithm for Proving Store-and-Forward Networks Deadlock-Free},
  booktitle = {19th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP'11)},
  year = {2011},
  pages = {3-10}
}
Achten P, van Eekelen M, Koopman P and Morazán MT (2011), "Trends in Trends in Functional Programming", Higher Order and Symbolic Computing. Vol. 23(4), pp. 23.
BibTeX:
@article{ds-2011-Achten-a,
  author = {Peter Achten and Marko van Eekelen and Pieter Koopman and Marco T. Morazán},
  title = {Trends in Trends in Functional Programming},
  journal = {Higher Order and Symbolic Computing},
  year = {2011},
  volume = {23},
  number = {4},
  pages = {23},
  note = {Springer Verlag}
}
Alpár G and Hoepman J-H (2011), "Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals", In 7th Int. IFIP Summerschool. Trento, Italy, sep, 2011.
BibTeX:
@inproceedings{ds-2011-Alpar-a,
  author = {Gergely Alpár and Jaap-Henk Hoepman},
  title = {Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals},
  booktitle = {7th Int. IFIP Summerschool},
  year = {2011}
}
Alpár G, Hoepman J-H and Siljee J (2011), "The Identity Crisis. Security, Privacy and Usability Issues in Identity Management". January, 2011.
BibTeX:
@misc{ds-2011-Alpar-b,
  author = {Gergely Alpár and Jaap-Henk Hoepman and Johanneke Siljee},
  title = {The Identity Crisis. Security, Privacy and Usability Issues in Identity Management},
  year = {2011},
  note = {eprint CoRR cs.CR:1101.0427},
  url = {http://arxiv.org/abs/1101.0427}
}
Andrés ME, Palamidessi C, van Rossum P and Sokolova A (2011), "Information Hiding in Probabilistic Concurrent Systems", Theor. Comp. Sci.. Vol. 412(28), pp. 3072-3089.
BibTeX:
@article{ds-2011-Andres-a,
  author = {Miguel E. Andrés and Catuscia Palamidessi and Peter van Rossum and Ana Sokolova},
  title = {Information Hiding in Probabilistic Concurrent Systems},
  journal = {Theor. Comp. Sci.},
  year = {2011},
  volume = {412},
  number = {28},
  pages = {3072-3089}
}
Batina L, Gierlichs B, Prouff E, Rivain M, Standaert F-X and Veyrat-Charvillon N (2011), "Mutual Information Analysis: a Comprehensive Study", J. Cryptology. Vol. 24(2), pp. 269-291.
BibTeX:
@article{ds-2011-Batina-a,
  author = {Lejla Batina and Benedikt Gierlichs and Emmanuel Prouff and Matthieu Rivain and François-Xavier Standaert and Nicolas Veyrat-Charvillon},
  title = {Mutual Information Analysis: a Comprehensive Study},
  journal = {J. Cryptology},
  year = {2011},
  volume = {24},
  number = {2},
  pages = {269-291}
}
Counotte A, Thiadens T and van Eekelen M (2011), "Mogelijke opzet voor een cursus duurzaamheid van ICT", In NIOC 2011 - Grenzeloos ICT onderwijs. Proceedings van het 10e Nederlands Informatica Onderwijs Congres (2011). Stichting NIOC. , pp. 52-56. Open Universiteit Heerlen.
BibTeX:
@incollection{ds-2011-Counotte-a,
  author = {Anda Counotte and Theo Thiadens and Marko van Eekelen},
  editor = {Karel Lemmen and Evert van de Vrie},
  title = {Mogelijke opzet voor een cursus duurzaamheid van ICT},
  booktitle = {NIOC 2011 - Grenzeloos ICT onderwijs. Proceedings van het 10e Nederlands Informatica Onderwijs Congres (2011). Stichting NIOC},
  publisher = {Open Universiteit Heerlen},
  year = {2011},
  pages = {52--56}
}
van Eekelen M (2011), "Modularisering van sterk afhankelijke cursussusen", In NIOC 2011 - Grenzeloos ICT onderwijs. Proceedings van het 10e Nederlands Informatica Onderwijs Congres (2011). Stichting NIOC. , pp. 92-98. Open Universiteit Heerlen.
BibTeX:
@incollection{ds-2011-Eekelen-a,
  author = {Marko van Eekelen},
  editor = {Karel Lemmen and Evert van de Vrie},
  title = {Modularisering van sterk afhankelijke cursussusen},
  booktitle = {NIOC 2011 - Grenzeloos ICT onderwijs. Proceedings van het 10e Nederlands Informatica Onderwijs Congres (2011). Stichting NIOC},
  publisher = {Open Universiteit Heerlen},
  year = {2011},
  pages = {92--98}
}
(2011), "Interactive Theorem Proving - Second International Conference, ITP 2011, Berg en Dal, The Netherlands, August 22-25, 2011. Proceedings", In Interactive Theorem Proving (ITP'11). Vol. 6898 Springer.
BibTeX:
@proceedings{ds-2011-Eekelen-b,,
  editor = {Marko van Eekelen and Herman Geuvers and Julien Schmaltz and Freek Wiedijk},
  title = {Interactive Theorem Proving - Second International Conference, ITP 2011, Berg en Dal, The Netherlands, August 22-25, 2011. Proceedings},
  booktitle = {Interactive Theorem Proving (ITP'11)},
  publisher = {Springer},
  year = {2011},
  volume = {6898}
}
van Eekelen M and Sint M (2011), "Ontwerp van een 1-jarige Master Software Engineering aan de Open Universiteit", In NIOC 2011 - Grenzeloos ICT onderwijs. Proceedings van het 10e Nederlands Informatica Onderwijs Congres (2011). Stichting NIOC. , pp. 82-91. Open Universiteit Heerlen.
BibTeX:
@incollection{ds-2011-Eekelen-c,
  author = {Marko van Eekelen and Marleen Sint},
  editor = {Karel Lemmen and Evert van de Vrie},
  title = {Ontwerp van een 1-jarige Master Software Engineering aan de Open Universiteit},
  booktitle = {NIOC 2011 - Grenzeloos ICT onderwijs. Proceedings van het 10e Nederlands Informatica Onderwijs Congres (2011). Stichting NIOC},
  publisher = {Open Universiteit Heerlen},
  year = {2011},
  pages = {82--91}
}
Fan J, Batina L and Verbauwhede I (2011), "Design and design methods for unified multiplier and inverter and its application for HECC", Integration. Vol. 44(4), pp. 280-289.
BibTeX:
@article{ds-2011-Fan-a,
  author = {Junfeng Fan and Lejla Batina and Ingrid Verbauwhede},
  title = {Design and design methods for unified multiplier and inverter and its application for HECC},
  journal = {Integration},
  year = {2011},
  volume = {44},
  number = {4},
  pages = {280-289}
}
(2011), "Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings", In Privacy Enhancing Technologies. Vol. 6794 Springer.
BibTeX:
@proceedings{ds-2011-Fischer-Huebner-a,,
  editor = {Simone Fischer-Hübner and Nicholas Hopper},
  title = {Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},
  booktitle = {Privacy Enhancing Technologies},
  publisher = {Springer},
  year = {2011},
  volume = {6794}
}
Galindo D and Hoepman J-H (2011), "Non-interactive Distributed Encryption: A New Primitive for Revocable Privacy", In Workshop on Privacy in the Electronic Society (WPES). Chicago, IL, USA, October 17, 2011. , pp. 81-92.
BibTeX:
@inproceedings{ds-2011-Galindo-a,
  author = {David Galindo and Jaap-Henk Hoepman},
  title = {Non-interactive Distributed Encryption: A New Primitive for Revocable Privacy},
  booktitle = {Workshop on Privacy in the Electronic Society (WPES)},
  year = {2011},
  pages = {81--92}
}
Garcia F and Jacobs B (2011), "Privacy-Friendly Energy-Metering via Homomorphic Encryption", In Security and Trust Management. (6710), pp. 226-238.
BibTeX:
@inproceedings{ds-2011-Garcia-a,
  author = {F. Garcia and B. Jacobs},
  editor = {J. Cuellar and J. Lopez and G. Barthe and A. Pretschner},
  title = {Privacy-Friendly Energy-Metering via Homomorphic Encryption},
  booktitle = {Security and Trust Management},
  year = {2011},
  number = {6710},
  pages = {226--238},
  doi = {10.1007/978-3-642-22444-7_15}
}
Garcia FD and Jacobs B (2011), "Privacy-friendly Energy-metering via Homomorphic Encryption", In 6th Workshop on Security and Trust Management (STM 2010). Vol. 6710, pp. 226-238. Springer Verlag.
BibTeX:
@inproceedings{ds-2011-Garcia-b,
  author = {Flavio D. Garcia and Bart Jacobs},
  editor = {J. Cuellar et al.},
  title = {Privacy-friendly Energy-metering via Homomorphic Encryption},
  booktitle = {6th Workshop on Security and Trust Management (STM 2010)},
  publisher = {Springer Verlag},
  year = {2011},
  volume = {6710},
  pages = {226--238}
}
Garcia FD, de Koning Gans G and Verdult R (2011), "Exposing iClass key diversification", In 5th USENIX Workshop on Offensive Technologies (WOOT 2011). Berkeley, CA, USA , pp. 128-136. USENIX Association.
BibTeX:
@inproceedings{ds-2011-Garcia-c,
  author = {Flavio D. Garcia and Gerhard de Koning Gans and Roel Verdult},
  title = {Exposing iClass key diversification},
  booktitle = {5th USENIX Workshop on Offensive Technologies (WOOT 2011)},
  publisher = {USENIX Association},
  year = {2011},
  pages = {128--136}
}
van Gastel B, Lensink L, Smetsers S and van Eekelen M (2011), "Deadlock and starvation free reentrant readers-writers: A case study combining model checking with theorem proving", Science of Comput. Progr.. Vol. 76(2), pp. 82-89. Elsevier.
BibTeX:
@article{ds-2011-Gastel-a,
  author = {Bernard van Gastel and Leonard Lensink and Sjaak Smetsers and Marko van Eekelen},
  title = {Deadlock and starvation free reentrant readers-writers: A case study combining model checking with theorem proving},
  journal = {Science of Comput. Progr.},
  publisher = {Elsevier},
  year = {2011},
  volume = {76},
  number = {2},
  pages = {82--89}
}
Gobi A, Shkaravska O and van Eekelen M (2011), "Size Analysis of Higher-Order Functions", In Proceedings of the 12th International Symposium on Trends in Functional Programming (TFP2011). Madrid, Spain, Tech. Rep. SIC-07/11. , pp. 77-91. Dept. Computer Systems and Computing, Universidad Complutense de Madrid.
BibTeX:
@incollection{ds-2011-Gobi-a,
  author = {Attila Gobi and Olha Shkaravska and Marko van Eekelen},
  editor = {Ricardo Peña and Marko van Eekelen},
  title = {Size Analysis of Higher-Order Functions},
  booktitle = {Proceedings of the 12th International Symposium on Trends in Functional Programming (TFP2011). Madrid, Spain, Tech. Rep. SIC-07/11},
  publisher = {Dept. Computer Systems and Computing, Universidad Complutense de Madrid},
  year = {2011},
  pages = {77-91}
}
Hasuo I and Jacobs B (2011), "Traces for coalgebraic components", Math. Struct. in Comp. Sci.. Vol. 21, pp. 267-320.
BibTeX:
@article{ds-2011-Hasuo-a,
  author = {I. Hasuo and B. Jacobs},
  title = {Traces for coalgebraic components},
  journal = {Math. Struct. in Comp. Sci.},
  year = {2011},
  volume = {21},
  pages = {267--320},
  doi = {10.1017/S0960129510000551}
}
Heunen C and Jacobs B (2011), "Quantum Logic in Dagger Kernel Categories", In Proceedings of the 6th International Workshop on Quantum Programming Languages (QPL 2009). (270(2)), pp. 79-103. Elsevier, Amsterdam.
BibTeX:
@inproceedings{ds-2011-Heunen-a,
  author = {C. Heunen and B. Jacobs},
  editor = {B. Coecke and P. Panangaden and P. Selinger},
  title = {Quantum Logic in Dagger Kernel Categories},
  booktitle = {Proceedings of the 6th International Workshop on Quantum Programming Languages (QPL 2009)},
  publisher = {Elsevier, Amsterdam},
  year = {2011},
  number = {270(2)},
  pages = {79--103},
  doi = {10.1016/j.entcs.2011.01.024}
}
Heunen C, Landsman K, Spitters B and Wolters S (2011), "The Gelfand spectrum of a noncommutative C*-algebra: a topos-theoretic approach", Journal of the Australian Mathematical Society. Vol. 90(01), pp. 39-52. Cambridge Univ Press.
BibTeX:
@article{ds-2011-Heunen-b,
  author = {Chris Heunen and Klaas Landsman and Bas Spitters and Sander Wolters},
  title = {The Gelfand spectrum of a noncommutative C*-algebra: a topos-theoretic approach},
  journal = {Journal of the Australian Mathematical Society},
  publisher = {Cambridge Univ Press},
  year = {2011},
  volume = {90},
  number = {01},
  pages = {39--52},
  doi = {10.1017/S1446788711001157}
}
Hildebrandt M and Jacobs B (2011), "De computer heeft gelijk", In Levend Strafrecht. Strafrechtelijke vernieuwingen in een maatschappelijke context. Liber amicorum Ybo Buruma. , pp. 255-269. Kluwer, Deventer.
BibTeX:
@incollection{ds-2011-Hildebrandt-a,
  author = {M. Hildebrandt and B. Jacobs},
  editor = {P. van Kempen and A. Machielse and H. Sackers and P. Vegter},
  title = {De computer heeft gelijk},
  booktitle = {Levend Strafrecht. Strafrechtelijke vernieuwingen in een maatschappelijke context. Liber amicorum Ybo Buruma},
  publisher = {Kluwer, Deventer},
  year = {2011},
  pages = {255--269}
}
Hoepman J-H (2011), "In Things We Trust? Towards trustability in the Internet of Things". September, 2011.
BibTeX:
@misc{ds-2011-Hoepman-a,
  author = {Jaap-Henk Hoepman},
  title = {In Things We Trust? Towards trustability in the Internet of Things},
  year = {2011},
  note = {eprint CoRR cs.CR:1109.2637},
  url = {http://arxiv.org/abs/1109.2637}
}
Hoepman J-H (2011), "Het recht op inzage is een wassen neus. Wat nu?", Informatiebeveiliging. Vol. 6, pp. 16-17.
BibTeX:
@article{ds-2011-Hoepman-b,
  author = {Jaap-Henk Hoepman},
  title = {Het recht op inzage is een wassen neus. Wat nu?},
  journal = {Informatiebeveiliging},
  year = {2011},
  volume = {6},
  pages = {16--17}
}
Hoepman J-H and Jacobs B (2011), "Privacy: code in context", In De Transparante Samenleving. Jaarboek ICT en Samenleving 2011. , pp. 237-252. Media Update, Gorredijk.
BibTeX:
@incollection{ds-2011-Hoepman-c,
  author = {J.-H. Hoepman and B. Jacobs},
  editor = {V. Frissen and L. Kool and M. van Lieshout},
  title = {Privacy: code in context},
  booktitle = {De Transparante Samenleving. Jaarboek ICT en Samenleving 2011},
  publisher = {Media Update, Gorredijk},
  year = {2011},
  pages = {237--252}
}
Jacobs B (2011), "Coalgebraic Walks, in Quantum and Turing Computation", In Foundations of Software Science and Computation Structures. (6604), pp. 12-26. Springer, Berlin.
BibTeX:
@inproceedings{ds-2011-Jacobs-a,
  author = {B. Jacobs},
  editor = {M. Hofmann},
  title = {Coalgebraic Walks, in Quantum and Turing Computation},
  booktitle = {Foundations of Software Science and Computation Structures},
  publisher = {Springer, Berlin},
  year = {2011},
  number = {6604},
  pages = {12--26},
  doi = {10.1007/978-3-642-19805-2_2}
}
Jacobs B (2011), "Probabilities, Distribution Monads, and Convex Categories", Theor. Comp. Sci.. Vol. 412(28), pp. 3323-3336.
BibTeX:
@article{ds-2011-Jacobs-b,
  author = {B. Jacobs},
  title = {Probabilities, Distribution Monads, and Convex Categories},
  journal = {Theor. Comp. Sci.},
  year = {2011},
  volume = {412(28)},
  pages = {3323--3336},
  doi = {10.1016/j.tcs.2011.04.005}
}
Jacobs B (2011), "Bases as Coalgebras", In Conference on Algebra and Coalgebra in Computer Science (CALCO 2005). (6859), pp. 237-252. Springer, Berlin.
BibTeX:
@inproceedings{ds-2011-Jacobs-c,
  author = {B. Jacobs},
  editor = {A. Corradini and B. Klin and C. C\irstea},
  title = {Bases as Coalgebras},
  booktitle = {Conference on Algebra and Coalgebra in Computer Science (CALCO 2005)},
  publisher = {Springer, Berlin},
  year = {2011},
  number = {6859},
  pages = {237--252},
  doi = {10.1007/978-3-642-22944-2_17}
}
Jacobs B (2011), "Involutive Categories and Monoids, with a GNS-correspondence", In Quantum Physics and Logic (QPL) 2010.
BibTeX:
@inproceedings{ds-2011-Jacobs-d,
  author = {B. Jacobs},
  title = {Involutive Categories and Monoids, with a GNS-correspondence},
  booktitle = {Quantum Physics and Logic (QPL) 2010},
  year = {2011},
  doi = {10.1007/s10701-011-9595-7}
}
Jacobs B (2011), "Autonomie en Transparantie", In Contraterrorisme en Ethiek. , pp. 56-68. Boom.
BibTeX:
@incollection{ds-2011-Jacobs-e,
  author = {B. Jacobs},
  editor = {M. Kowalski and M. Meeder},
  title = {Autonomie en Transparantie},
  booktitle = {Contraterrorisme en Ethiek},
  publisher = {Boom},
  year = {2011},
  pages = {56--68}
}
Jacobs B and Poll E (2011), "Biometrics and Smart Cards in Identity Management", In Innovating Government. Normative, Policy and Technological Dimensions of Modern Government. , pp. 419-439. T.M.C. Asser Press/Springer.
BibTeX:
@incollection{ds-2011-Jacobs-f,
  author = {B. Jacobs and E. Poll},
  editor = {S. van der Hof and M. M. Groothuis},
  title = {Biometrics and Smart Cards in Identity Management},
  booktitle = {Innovating Government. Normative, Policy and Technological Dimensions of Modern Government},
  publisher = {T.M.C. Asser Press/Springer},
  year = {2011},
  pages = {419--439}
}
Jacobs B and Rutten J (2011), "A Tutorial on (Co)Algebras and (Co)Induction", In Advanced topics in bisimulation and coinduction. (52), pp. 38-99. Cambridge Univ. Press.
BibTeX:
@incollection{ds-2011-Jacobs-g,
  author = {B. Jacobs and J. Rutten},
  editor = {D. Sangiorgi and J. Rutten},
  title = {A Tutorial on (Co)Algebras and (Co)Induction},
  booktitle = {Advanced topics in bisimulation and coinduction},
  publisher = {Cambridge Univ. Press},
  year = {2011},
  number = {52},
  pages = {38--99}
}
Jacobs B and Schreur RW (2011), "Logical Formalisation and Analysis of the Mifare Classic Card in PVS", In Interactive Theorem Proving. (6898), pp. 3-17. Springer, Berlin.
BibTeX:
@inproceedings{ds-2011-Jacobs-h,
  author = {B. Jacobs and R. Wichers Schreur},
  editor = {M. van Eekelen and H. Geuvers and J. Schmaltz and F. Wiedijk},
  title = {Logical Formalisation and Analysis of the Mifare Classic Card in PVS},
  booktitle = {Interactive Theorem Proving},
  publisher = {Springer, Berlin},
  year = {2011},
  number = {6898},
  pages = {3--17},
  doi = {10.1007/978-3-642-22863-6_3}
}
Kersten R and van Eekelen M (2011), "Ranking Functions for Loops with Disjunctive Exit-Conditions", In Proceedings of the 2th International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA2011). Madrid, Spain. Tech. Rep. SIC-08/11. , pp. 111-126. Dept. Computer Systems and Computing, Universidad Complutense de Madrid.
BibTeX:
@incollection{ds-2011-Kersten-a,
  author = {Rody Kersten and Marko van Eekelen},
  editor = {Ricardo Peña},
  title = {Ranking Functions for Loops with Disjunctive Exit-Conditions},
  booktitle = {Proceedings of the 2th International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA2011). Madrid, Spain. Tech. Rep. SIC-08/11},
  publisher = {Dept. Computer Systems and Computing, Universidad Complutense de Madrid},
  year = {2011},
  pages = {111-126}
}
de Koning Gans G and Verheul E (2011), "Best Effort and Practice Activation Codes", In Trust, Privacy and Security in Digital Business. Vol. 6863, pp. 98-112. Springer Berlin / Heidelberg.
BibTeX:
@inproceedings{ds-2011-KoningGans-a,
  author = {de Koning Gans, Gerhard and Verheul, Eric},
  editor = {Furnell, Steven and Lambrinoudakis, Costas and Pernul, Günther},
  title = {Best Effort and Practice Activation Codes},
  booktitle = {Trust, Privacy and Security in Digital Business},
  publisher = {Springer Berlin / Heidelberg},
  year = {2011},
  volume = {6863},
  pages = {98-112}
}
Koster CHA, Beney JG, Verberne S and Vogel M (2011), "Phrase-Based Document Categorization", In Current Challenges in Patent Information Retrieval. Vol. 29, pp. 263-286. Springer Berlin Heidelberg.
BibTeX:
@incollection{ds-2011-Koster-a,
  author = {Koster, Cornelis H. A. and Beney, Jean G. and Verberne, Suzan and Vogel, Merijn},
  editor = {Lupu, Mihai and Mayer, Katja and Tait, John and Trippe, Anthony J. and Croft, W. Bruce},
  title = {Phrase-Based Document Categorization},
  booktitle = {Current Challenges in Patent Information Retrieval},
  publisher = {Springer Berlin Heidelberg},
  year = {2011},
  volume = {29},
  pages = {263-286},
  url = {http://dx.doi.org/10.1007/978-3-642-19231-9_13}
}
Krebbers R and Spitters B (2011), "Computer certified efficient exact reals in Coq", In Intelligent Computer Mathematics. Vol. 6824, pp. 90-106. Springer.
BibTeX:
@incollection{ds-2011-Krebbers-a,
  author = {Robbert Krebbers and Bas Spitters},
  editor = {Davenport, James and Farmer, William and Urban, Josef and Rabe, Florian},
  title = {Computer certified efficient exact reals in Coq},
  booktitle = {Intelligent Computer Mathematics},
  publisher = {Springer},
  year = {2011},
  volume = {6824},
  pages = {90--106},
  doi = {10.1007/978-3-642-22673-1_7}
}
Madlener K, Smetsers S and van Eekelen M (2011), "Formal Component-Based Semantics", In Proceedings Eight Workshop on Structural Operational Semantics 2011. Vol. 62, pp. 17-29.
BibTeX:
@inproceedings{ds-2011-Madlener-a,
  author = {K. Madlener and S. Smetsers and M. van Eekelen},
  editor = {M.A. Reniers and P. Sobocinski},
  title = {Formal Component-Based Semantics},
  booktitle = {Proceedings Eight Workshop on Structural Operational Semantics 2011},
  year = {2011},
  volume = {62},
  pages = {17-29}
}
Montenegro M, Shkaravska O, van Eekelen M and Peña R (2011), "Interpolation-based height analysis for improving a recurrence solver", In Proceedings of the 2th International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA2011). Madrid, Spain. Tech. Rep. SIC-08/11. , pp. 95-110. Dept. Computer Systems and Computing, Universidad Complutense de Madrid.
BibTeX:
@incollection{ds-2011-Montenegro-a,
  author = {Manuel Montenegro and Olha Shkaravska and Marko van Eekelen and Ricardo Peña},
  editor = {Ricardo Peña},
  title = {Interpolation-based height analysis for improving a recurrence solver},
  booktitle = {Proceedings of the 2th International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA2011). Madrid, Spain. Tech. Rep. SIC-08/11},
  publisher = {Dept. Computer Systems and Computing, Universidad Complutense de Madrid},
  year = {2011},
  pages = {95--110}
}
Mostowski W and Poll E (2011), "Midlet Navigation Graphs in JML", In 13th Brazilian Symposium on Formal Methods (SBMF'2010). Vol. 6527, pp. 17-32. Springer-Verlag.
BibTeX:
@inproceedings{ds-2011-Mostowski-a,
  author = {W. Mostowski and E. Poll},
  editor = {J. Davies and L. Silva and A. Simao},
  title = {Midlet Navigation Graphs in JML},
  booktitle = {13th Brazilian Symposium on Formal Methods (SBMF'2010)},
  publisher = {Springer-Verlag},
  year = {2011},
  volume = {6527},
  pages = {17-32}
}
Muijrers R, Woudenberg JGJV and Batina L (2011), "RAM: Rapid Alignment Method", In Proceedings of CARDIS 2011. (7079), pp. 266-282. Springer.
BibTeX:
@inproceedings{ds-2011-Muijrers-a,
  author = {Ruben Muijrers and Jasper G. J. Van Woudenberg and Lejla Batina},
  editor = {E. Prouff},
  title = {RAM: Rapid Alignment Method},
  booktitle = {Proceedings of CARDIS 2011},
  publisher = {Springer},
  year = {2011},
  number = {7079},
  pages = {266--282}
}
Peña R and van Eekelen M (2011), "Proceedings of the 12th International Symposium on Trends in Functional Programming (TFP2011). Madrid, Spain". Thesis at: Dept. Computer Systems and Computing, Universidad Complutense de Madrid. ({SIC-07/11}), pp. 355.
BibTeX:
@techreport{ds-2011-Pena-a,
  author = {Ricardo Peña and Marko van Eekelen},
  title = {Proceedings of the 12th International Symposium on Trends in Functional Programming (TFP2011). Madrid, Spain},
  school = {Dept. Computer Systems and Computing, Universidad Complutense de Madrid},
  year = {2011},
  number = {SIC-07/11},
  pages = {355}
}
Poll E and Schubert A (2011), "Rigorous specifications of the SSH Transport Layer". Thesis at: Radboud University Nijmegen. (ICIS-R11004)
BibTeX:
@techreport{ds-2011-Poll-a,
  author = {Poll, Erik and Schubert, Aleksy},
  title = {Rigorous specifications of the SSH Transport Layer},
  school = {Radboud University Nijmegen},
  year = {2011},
  number = {ICIS--R11004}
}
Rütz C and Schmaltz J (2011), "An Experience Report on an Industrial Case-Study about Timed Model-Based Testing with UPPAAL-TRON", In 7th Workshop on Advances in Model Based Testing (A-MOST'11). , pp. 39-46. IEEE.
BibTeX:
@inproceedings{ds-2011-Ruetz-a,
  author = {Carsten Rütz and Julien Schmaltz},
  title = {An Experience Report on an Industrial Case-Study about Timed Model-Based Testing with UPPAAL-TRON},
  booktitle = {7th Workshop on Advances in Model Based Testing (A-MOST'11)},
  publisher = {IEEE},
  year = {2011},
  pages = {39--46}
}
Shkaravska O, van Eekelen M and Tamalet A (2011), "Collected Size Semantics for Functional Programs over Lists", In Selected Papers of the 20th Symposium on Implementation and Application of Functional Programming, IFL 2008, University of Hertfordshire, UK, 2008. Vol. 5836, pp. 118-137. Springer Verlag.
BibTeX:
@inproceedings{ds-2011-Shkaravska-a,
  author = {Olha Shkaravska and Marko van Eekelen and Alejandro Tamalet},
  editor = {Sven-Bodo Scholz},
  title = {Collected Size Semantics for Functional Programs over Lists},
  booktitle = {Selected Papers of the 20th Symposium on Implementation and Application of Functional Programming, IFL 2008, University of Hertfordshire, UK, 2008},
  publisher = {Springer Verlag},
  year = {2011},
  volume = {5836},
  pages = {118--137}
}
Singelée D, Seys S, Batina L and Verbauwhede I (2011), "The communication and computation cost of wireless security: extended abstract", In Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. , pp. 1-4. ACM.
BibTeX:
@inproceedings{ds-2011-Singelee-a,
  author = {Dave Singelée and Stefaan Seys and Lejla Batina and Ingrid Verbauwhede},
  editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan},
  title = {The communication and computation cost of wireless security: extended abstract},
  booktitle = {Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011},
  publisher = {ACM},
  year = {2011},
  pages = {1-4}
}
Spitters B (2011), "The Space of Measurement Outcomes as a Spectral Invariant for Non-Commutative Algebras", Foundations of Physics.
BibTeX:
@article{ds-2011-Spitters-a,
  author = {Bas Spitters},
  title = {The Space of Measurement Outcomes as a Spectral Invariant for Non-Commutative Algebras},
  journal = {Foundations of Physics},
  year = {2011},
  doi = {10.1007/s10701-011-9619-3}
}
Tamalet A and Madlener K (2011), "Reasoning about Assignments in Recursive Data Structures", In 13th Brazilian Symposium on Formal Methods (SBMF'2010). Vol. 6527, pp. 161-176. Springer-Verlag.
BibTeX:
@inproceedings{ds-2011-Tamalet-a,
  author = {A. Tamalet and K. Madlener},
  editor = {J. Davies and L. Silva and A. Simao},
  title = {Reasoning about Assignments in Recursive Data Structures},
  booktitle = {13th Brazilian Symposium on Formal Methods (SBMF'2010)},
  publisher = {Springer-Verlag},
  year = {2011},
  volume = {6527},
  pages = {161-176}
}
(2011), "Computer Science Education Research Conference CSERC 2011, Heerlen, The Netherlands, April 7-8, 2011. Proceedings ACM In-cooperation" , pp. 1-95. ACM Digital Library.
BibTeX:
@proceedings{ds-2011-Veer-a,,
  editor = {Gerrit van der Veer and Peter Sloep and Marko van Eekelen},
  title = {Computer Science Education Research Conference CSERC 2011, Heerlen, The Netherlands, April 7-8, 2011. Proceedings ACM In-cooperation},
  publisher = {ACM Digital Library},
  year = {2011},
  pages = {1--95}
}
Verbeek F and Schmaltz J (2011), "A Comment on "A Necessary and Sufficient Condition for Deadlock-Free Adaptive Routing in Wormhole Networks"", IEEE Trans. Parallel Distrib. Syst.. Vol. 22(10), pp. 1775-1776.
BibTeX:
@article{ds-2011-Verbeek-d,
  author = {Freek Verbeek and Julien Schmaltz},
  title = {A Comment on "A Necessary and Sufficient Condition for Deadlock-Free Adaptive Routing in Wormhole Networks"},
  journal = {IEEE Trans. Parallel Distrib. Syst.},
  year = {2011},
  volume = {22},
  number = {10},
  pages = {1775-1776}
}
Verbeek F and Schmaltz J (2011), "On Necessary and Sufficient Conditions for Deadlock-Free Routing in Wormhole Networks", IEEE Trans. Parallel Distrib. Syst.. Vol. 22(12), pp. 2022-2032.
BibTeX:
@article{ds-2011-Verbeek-e,
  author = {Freek Verbeek and Julien Schmaltz},
  title = {On Necessary and Sufficient Conditions for Deadlock-Free Routing in Wormhole Networks},
  journal = {IEEE Trans. Parallel Distrib. Syst.},
  year = {2011},
  volume = {22},
  number = {12},
  pages = {2022-2032}
}
Verbeek F and Schmaltz J (2011), "Hunting deadlocks efficiently in microarchitectural models of communication fabrics", In 11th Conference on Formal Methods in Computer-Aided Design (FMCAD'11). , pp. 223-231. IEEE.
BibTeX:
@inproceedings{ds-2011-Verbeek-f,
  author = {Freek Verbeek and Julien Schmaltz},
  editor = {Per Bjesse and Anna Slobodova},
  title = {Hunting deadlocks efficiently in microarchitectural models of communication fabrics},
  booktitle = {11th Conference on Formal Methods in Computer-Aided Design (FMCAD'11)},
  publisher = {IEEE},
  year = {2011},
  pages = {223--231}
}
Verdult R and Kooman F (2011), "Practical attacks on NFC enabled cell phones", In Near Field Communication (NFC), 2011 3rd International Workshop on. , pp. 77-82.
BibTeX:
@inproceedings{ds-2011-Verdult-a,
  author = {Verdult, R. and Kooman, F.},
  title = {Practical attacks on NFC enabled cell phones},
  booktitle = {Near Field Communication (NFC), 2011 3rd International Workshop on},
  year = {2011},
  pages = {77--82}
}
de Vey Mestdagh C and Hoepman J-H (2011), "Inconsistent Knowledge as a Natural Phenomenon: The Ranking of Reasonable Inferences as a Computational Approach to Naturally Inconsistent (Legal) Theories", In Information And Computation., June, 2011. , pp. 439-476. World Scientific Publishing Co..
BibTeX:
@incollection{ds-2011-VeyMestdagh-a,
  author = {C.N.J. de Vey Mestdagh and J.-H. Hoepman},
  editor = {Gordana Dodig-Crnkovic and Mark Burgin},
  title = {Inconsistent Knowledge as a Natural Phenomenon: The Ranking of Reasonable Inferences as a Computational Approach to Naturally Inconsistent (Legal) Theories},
  booktitle = {Information And Computation},
  publisher = {World Scientific Publishing Co.},
  year = {2011},
  pages = {439--476},
  url = {https://www.worldscibooks.com/compsci/7637.html}
}

2010

Aarts F, Schmaltz J and Vaandrager FW (2010), "Inference and Abstraction of the Biometric Passport", In International Symposium on Leveraging Applications of Formal Methods (ISoLA'10). Vol. 6415, pp. 673-686. Springer.
BibTeX:
@inproceedings{ds-2010-Aarts-a,
  author = {F. Aarts and J. Schmaltz and F. W. Vaandrager},
  editor = {Tiziana Margaria and Bernhard Steffen},
  title = {Inference and Abstraction of the Biometric Passport},
  booktitle = {International Symposium on Leveraging Applications of Formal Methods (ISoLA'10)},
  publisher = {Springer},
  year = {2010},
  volume = {6415},
  pages = {673-686}
}
Alvim MS, Andrés ME and Palamidessi C (2010), "Information Flow in Interactive Systems", In CONCUR. Vol. 6269, pp. 102-116. Springer.
BibTeX:
@inproceedings{ds-2010-Alvim-a,
  author = {Mário S. Alvim and Miguel E. Andrés and Catuscia Palamidessi},
  editor = {Paul Gastin and François Laroussinie},
  title = {Information Flow in Interactive Systems},
  booktitle = {CONCUR},
  publisher = {Springer},
  year = {2010},
  volume = {6269},
  pages = {102-116}
}
Alvim MS, Andrés ME and Palamidessi C (2010), "Probabilistic Information Flow", In LICS. , pp. 314-321. IEEE Computer Society.
BibTeX:
@inproceedings{ds-2010-Alvim-b,
  author = {Mário S. Alvim and Miguel E. Andrés and Catuscia Palamidessi},
  title = {Probabilistic Information Flow},
  booktitle = {LICS},
  publisher = {IEEE Computer Society},
  year = {2010},
  pages = {314-321}
}
Andrés ME, Palamidessi C, van Rossum P and Smith G (2010), "Computing the Leakage of Information-Hiding Systems", In TACAS. Vol. 6015, pp. 373-389. Springer.
BibTeX:
@inproceedings{ds-2010-Andres-a,
  author = {Miguel E. Andrés and Catuscia Palamidessi and Peter van Rossum and Geoffrey Smith},
  editor = {Javier Esparza and Rupak Majumdar},
  title = {Computing the Leakage of Information-Hiding Systems},
  booktitle = {TACAS},
  publisher = {Springer},
  year = {2010},
  volume = {6015},
  pages = {373-389}
}
Andrés ME, Palamidessi C, van Rossum P and Sokolova A (2010), "Information Hiding in Probabilistic Concurrent Systems", In QEST. , pp. 17-26. IEEE Computer Society.
BibTeX:
@inproceedings{ds-2010-Andres-b,
  author = {Miguel E. Andrés and Catuscia Palamidessi and Peter van Rossum and Ana Sokolova},
  title = {Information Hiding in Probabilistic Concurrent Systems},
  booktitle = {QEST},
  publisher = {IEEE Computer Society},
  year = {2010},
  pages = {17-26}
}
von Styp S, Bohnenkamp HC and Schmaltz J (2010), "A Conformance Testing Relation for Symbolic Timed Automata", In 8th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'10). Vol. 6246, pp. 243-255. Springer.
BibTeX:
@inproceedings{ds-2010-Styp-a,
  author = {S. von Styp and H. C. Bohnenkamp and J. Schmaltz},
  editor = {Krishnendu Chatterjee and Thomas A. Henzinger},
  title = {A Conformance Testing Relation for Symbolic Timed Automata},
  booktitle = {8th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'10)},
  publisher = {Springer},
  year = {2010},
  volume = {6246},
  pages = {243-255}
}
Batina L, Hoepman J-H, Jacobs B, Mostowski W and Vullers P (2010), "Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings", In Smart Card Research and Advanced Application Conference (CARDIS 2010). (6035), pp. 209-222. Springer-Verlag.
BibTeX:
@inproceedings{ds-2010-Batina-a,
  author = {L. Batina and J.-H. Hoepman and B. Jacobs and W. Mostowski and P. Vullers},
  editor = {Dieter Gollmann and Jean-Louis Lanet and Julien Iguchi-Cartigny},
  title = {Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings},
  booktitle = {Smart Card Research and Advanced Application Conference (CARDIS 2010)},
  publisher = {Springer-Verlag},
  year = {2010},
  number = {6035},
  pages = {209--222}
}
Batina L, Hogenboom J, Mentens N, Moelans J and Vliegen J (2010), "Side-channel evaluation of FPGA implementations of binary Edwards curves", In ICECS, special session Cryptographic Hardware & Embedded Systems. , pp. 4. IEEE.
BibTeX:
@inproceedings{ds-2010-Batina-b,
  author = {L. Batina and J. Hogenboom and N. Mentens and J. Moelans and J. Vliegen},
  title = {Side-channel evaluation of FPGA implementations of binary Edwards curves},
  booktitle = {ICECS, special session Cryptographic Hardware & Embedded Systems},
  publisher = {IEEE},
  year = {2010},
  pages = {4}
}
Batina L, Sakiyama K and Verbauwhede I (2010), "Compact Public Key implementations for RFID and sensor nodes" (ISBN 978-0-387-71827-9), pp. 179-196. Springer-Verlag.
BibTeX:
@inbook{ds-2010-Batina-c,
  author = {L. Batina and K. Sakiyama and I. Verbauwhede},
  editor = {I. Verbauwhede},
  title = {Compact Public Key implementations for RFID and sensor nodes},
  publisher = {Springer-Verlag},
  year = {2010},
  number = {ISBN 978-0-387-71827-9},
  pages = {179--196},
  edition = {1st}
}
Berendsen J, Jansen D, Schmaltz J and Vaandrager F (2010), "The Axiomatization of Override and Update", J. of Applied Logic. Vol. 8(1), pp. 141-150.
BibTeX:
@article{ds-2010-Berendsen-a,
  author = {J. Berendsen and D.N. Jansen and J. Schmaltz and F.W. Vaandrager},
  title = {The Axiomatization of Override and Update},
  journal = {J. of Applied Logic},
  year = {2010},
  volume = {8},
  number = {1},
  pages = {141--150}
}
van den Broek F (2010), "Eavesdropping on GSM: state-of-affairs", Wissec.
BibTeX:
@article{ds-2010-Broek-a,
  author = {Fabian van den Broek},
  title = {Eavesdropping on GSM: state-of-affairs},
  journal = {Wissec},
  year = {2010},
  note = {http://arxiv.org/abs/1101.0552}
}
Broenink G, Hoepman J-H, van 't Hof C, van Kranenburg R, Smits D and Wisman T (2010), "The Privacy Coach: Supporting customer privacy in the Internet of Things", In Pervasive 2010 Conference Workshop on What can the Internet of Things do for the citizen?. Helsinki, Finland, May 17, 2010. , pp. 72-81.
BibTeX:
@inproceedings{ds-2010-Broenink-a,
  author = {Gerben Broenink and Jaap-Henk Hoepman and Christian van 't Hof and Rob van Kranenburg and David Smits and Tijmen Wisman},
  title = {The Privacy Coach: Supporting customer privacy in the Internet of Things},
  booktitle = {Pervasive 2010 Conference Workshop on What can the Internet of Things do for the citizen?},
  year = {2010},
  pages = {72--81}
}
(2010), "Formal Modeling and Analysis of Timed Systems - 8th International Conference, FORMATS 2010, Klosterneuburg, Austria, September 8-10, 2010. Proceedings", In FORMATS. Vol. 6246 Springer.
BibTeX:
@proceedings{ds-2010-Chatterjee-a,,
  editor = {Krishnendu Chatterjee and Thomas A. Henzinger},
  title = {Formal Modeling and Analysis of Timed Systems - 8th International Conference, FORMATS 2010, Klosterneuburg, Austria, September 8-10, 2010. Proceedings},
  booktitle = {FORMATS},
  publisher = {Springer},
  year = {2010},
  volume = {6246}
}
Coquand T, Palmgren E and Spitters B (2010), "Metric complements of overt closed sets", Mathematical Logic Quarterly.
BibTeX:
@article{ds-2010-Coquand-a,
  author = {Thierry Coquand and Erik Palmgren and Bas Spitters},
  title = {Metric complements of overt closed sets},
  journal = {Mathematical Logic Quarterly},
  year = {2010},
  note = {http://arxiv.org/abs/0906.3433 NOT PUBLISHED YET? },
  url = {http://arxiv.org/abs/0906.3433}
}
Coquand T and Spitters B (2010), "A Constructive Theory of Banach algebras", Logic and Analysis. Vol. 2(11), pp. 1-15.
BibTeX:
@article{ds-2010-Coquand-b,
  author = {Thierry Coquand and Bas Spitters},
  title = {A Constructive Theory of Banach algebras},
  journal = {Logic and Analysis},
  year = {2010},
  volume = {2},
  number = {11},
  pages = {1--15}
}
Dommering E, Jacobs B, Spaink K and van Weelden D (2010), "Wie is U?" Amsterdam Nijgh & Van Ditmar/XS4ALL.
BibTeX:
@book{ds-2010-Dommering-a,
  author = {E. Dommering and B. Jacobs and K. Spaink and D. van Weelden},
  title = {Wie is U?},
  publisher = {Nijgh & Van Ditmar/XS4ALL},
  year = {2010}
}
van Eekelen M (2010), "Leven Lang Computer, Leven Lang Foeteren? Er valt nog veel te leren!", 5 maart, 2010. Open Universiteit Nederland, DataWyse Maastricht.
BibTeX:
@book{ds-2010-Eekelen-a,
  author = {Marko van Eekelen},
  title = {Leven Lang Computer, Leven Lang Foeteren? Er valt nog veel te leren!},
  publisher = {Open Universiteit Nederland, DataWyse Maastricht},
  year = {2010},
  note = {Intreerede}
}
van Eekelen M, Kersten R and van Gastel B (2010), "Software en Energiegebruik", In Duurzame ICT, Grondstof en energiebron voor een duurzame wereld. Den Haag, The Netherlands , pp. 23-33. SDU Uitgevers.
BibTeX:
@incollection{ds-2010-Eekelen-b,
  author = {van Eekelen, Marko and Kersten, Rody and van Gastel, Bernard},
  editor = {Roel Croes},
  title = {Software en Energiegebruik},
  booktitle = {Duurzame ICT, Grondstof en energiebron voor een duurzame wereld},
  publisher = {SDU Uitgevers},
  year = {2010},
  pages = {23--33}
}
van Eekelen M, Kersten R and van Gastel B (2010), "Duutzaamheid van ICT-intensieve organisaties", In Duurzame ICT, Grondstof en energiebron voor een duurzame wereld. Den Haag, The Netherlands , pp. 117-138. SDU Uitgevers.
BibTeX:
@incollection{ds-2010-Eekelen-c,
  author = {van Eekelen, Marko and Kersten, Rody and van Gastel, Bernard},
  editor = {Roel Croes},
  title = {Duutzaamheid van ICT-intensieve organisaties},
  booktitle = {Duurzame ICT, Grondstof en energiebron voor een duurzame wereld},
  publisher = {SDU Uitgevers},
  year = {2010},
  pages = {117-138}
}
(2010), "Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, TACAS 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings", In TACAS. Vol. 6015 Springer.
BibTeX:
@proceedings{ds-2010-Esparza-a,,
  editor = {Javier Esparza and Rupak Majumdar},
  title = {Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, TACAS 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings},
  booktitle = {TACAS},
  publisher = {Springer},
  year = {2010},
  volume = {6015}
}
Fan J, Bailey D, Batina L, Guneysu T, Paar C and Verbauwhede I (2010), "Breaking Elliptic Curves Cryptosystems using Reconfigurable Hardware", In Proceedings of 20th International Conference on Field Programmable Logic and Applications (FPL 2010). Milano, Italy, Aug. 31st--Sep. 2nd, 2010. IEEE.
BibTeX:
@inproceedings{ds-2010-Fan-a,
  author = {J. Fan and D.V. Bailey and L. Batina and T. Guneysu and C. Paar and I. Verbauwhede},
  editor = {M.D. Santambrogio and J. Nurmi},
  title = {Breaking Elliptic Curves Cryptosystems using Reconfigurable Hardware},
  booktitle = {Proceedings of 20th International Conference on Field Programmable Logic and Applications (FPL 2010)},
  publisher = {IEEE},
  year = {2010}
}
Garcia FD and van Rossum P (2010), "Modeling Privacy for Off-Line RFID Systems cards via pairings", In Smart Card Research and Advanced Application Conference (CARDIS 2010). (6035), pp. 194-208. Springer-Verlag.
BibTeX:
@inproceedings{ds-2010-Garcia-a,
  author = {Flavio D. Garcia and Peter van Rossum},
  editor = {Dieter Gollmann and Jean-Louis Lanet and Julien Iguchi-Cartigny},
  title = {Modeling Privacy for Off-Line RFID Systems cards via pairings},
  booktitle = {Smart Card Research and Advanced Application Conference (CARDIS 2010)},
  publisher = {Springer-Verlag},
  year = {2010},
  number = {6035},
  pages = {194--208}
}
Garcia FD, van Rossum P, Verdult R and Schreur RW (2010), "Dismantling SecureMemory, CryptoMemory and CryptoRF", In 17th ACM Conference on Computer and Communications Security (CCS 2010). , pp. 250-259. ACM.
BibTeX:
@inproceedings{ds-2010-Garcia-b,
  author = {Flavio D. Garcia and Peter van Rossum and Roel Verdult and Ronny Wichers Schreur},
  title = {Dismantling SecureMemory, CryptoMemory and CryptoRF},
  booktitle = {17th ACM Conference on Computer and Communications Security (CCS 2010)},
  publisher = {ACM},
  year = {2010},
  pages = {250--259}
}
(2010), "CONCUR 2010 - Concurrency Theory, 21th International Conference, CONCUR 2010, Paris, France, August 31-September 3, 2010. Proceedings", In CONCUR. Vol. 6269 Springer.
BibTeX:
@proceedings{ds-2010-Gastin-a,,
  editor = {Paul Gastin and François Laroussinie},
  title = {CONCUR 2010 - Concurrency Theory, 21th International Conference, CONCUR 2010, Paris, France, August 31-September 3, 2010. Proceedings},
  booktitle = {CONCUR},
  publisher = {Springer},
  year = {2010},
  volume = {6269}
}
Gierlichs B, Batina L, Preneel B and Verbauwhede I (2010), "Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis", In Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference. Vol. 5985, pp. 221-234. Springer-Verlag.
BibTeX:
@inproceedings{ds-2010-Gierlichs-a,
  author = {B. Gierlichs and L. Batina and B. Preneel and I. Verbauwhede},
  editor = {J. Pieprzyk},
  title = {Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis},
  booktitle = {Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference},
  publisher = {Springer-Verlag},
  year = {2010},
  volume = {5985},
  pages = {221--234}
}
Heck P, Klabbers M and van Eekelen M (2010), "A software product certification model", Software Quality Journal. Vol. 18(1), pp. 37-55. Springer Verlag.
BibTeX:
@article{ds-2010-Heck-a,
  author = {Heck, Petra and Klabbers, Martijn and van Eekelen, Marko},
  title = {A software product certification model},
  journal = {Software Quality Journal},
  publisher = {Springer Verlag},
  year = {2010},
  volume = {18},
  number = {1},
  pages = {37--55}
}
van der Heijden M, Hinne M, Verberne S, Hoenkamp E, van der Weide T and Kraaij W (2010), "When is a query a question? Reconstructing wh-requests from ad hoc-queries", In Proceedings of the Query Representation and Understanding workshop at SIGIR 2010. , pp. 17-20.
BibTeX:
@inproceedings{ds-2010-Heijden-a,
  author = {Maarten van der Heijden and Max Hinne and Suzan Verberne and Eduard Hoenkamp and Theo van der Weide and Wessel Kraaij},
  title = {When is a query a question? Reconstructing wh-requests from ad hoc-queries},
  booktitle = {Proceedings of the Query Representation and Understanding workshop at SIGIR 2010},
  year = {2010},
  pages = {17--20}
}
Heunen C and Jacobs B (2010), "Quantum Logic in Dagger Kernel Categories", Order. Vol. 27(2), pp. 177-212.
BibTeX:
@article{ds-2010-Heunen-a,
  author = {C. Heunen and B. Jacobs},
  title = {Quantum Logic in Dagger Kernel Categories},
  journal = {Order},
  year = {2010},
  volume = {27(2)},
  pages = {177--212},
  doi = {10.1007/s11083-010-9145-5}
}
Hoepman J-H (2010), "Distributed Double Spending Prevention", In 15th Int. Workshop on Security Protocols 2007. , pp. 152-165.
BibTeX:
@inproceedings{ds-2010-Hoepman-a,
  author = {Jaap-Henk Hoepman},
  editor = {B. Christianson and B. Crispo and J. A. Malcolm and M. Roe},
  title = {Distributed Double Spending Prevention},
  booktitle = {15th Int. Workshop on Security Protocols 2007},
  year = {2010},
  pages = {152--165}
}
Hoepman J-H and Huitema G (2010), "Privacy Enhanced Fraud Resistant Road Pricing", In What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience. Brisbane, Australia, September, 2010. Vol. 328, pp. 202-213. Springer.
BibTeX:
@inproceedings{ds-2010-Hoepman-b,
  author = {Jaap-Henk Hoepman and George Huitema},
  title = {Privacy Enhanced Fraud Resistant Road Pricing},
  booktitle = {What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience},
  publisher = {Springer},
  year = {2010},
  volume = {328},
  pages = {202-213}
}
Hoepman J-H, Jacobs B and Vullers P (2010), "Privacy and Security Issues in e-Ticketing: Optimisation of Smart Card-based Attribute-proving", In Workshop on Foundations of Security and Privacy (FCS-PrivMod). Edinburgh, UK, July 14--15, 2010.
BibTeX:
@inproceedings{ds-2010-Hoepman-c,
  author = {Jaap-Henk Hoepman and Bart Jacobs and Pim Vullers},
  title = {Privacy and Security Issues in e-Ticketing: Optimisation of Smart Card-based Attribute-proving},
  booktitle = {Workshop on Foundations of Security and Privacy (FCS-PrivMod)},
  year = {2010},
  note = { NOT PUBLISHED YET? }
}
Hoepman J-H and Joosten R (2010), "Practical Schemes For Privacy & Security Enhanced RFID (extended abstract)", In 4th Workshop on Inf. Security Theory and Practices. Passau, Germany, April 12--14, 2010. , pp. 138-53. Springer-Verlag.
BibTeX:
@inproceedings{ds-2010-Hoepman-d,
  author = {Jaap-Henk Hoepman and Rieks Joosten},
  title = {Practical Schemes For Privacy & Security Enhanced RFID (extended abstract)},
  booktitle = {4th Workshop on Inf. Security Theory and Practices},
  publisher = {Springer-Verlag},
  year = {2010},
  pages = {138-53}
}
I. Hasuo BJ and Niqui M (2010), "Coalgebraic Representation Theory of Fractals", In Mathematical Foundations of Programming Semantics. (265), pp. 351-368. Elsevier, Amsterdam.
BibTeX:
@inproceedings{ds-2010-I.Hasuo-a,
  author = {I. Hasuo, B. Jacobs and M. Niqui},
  editor = {P. Selinger},
  title = {Coalgebraic Representation Theory of Fractals},
  booktitle = {Mathematical Foundations of Programming Semantics},
  publisher = {Elsevier, Amsterdam},
  year = {2010},
  number = {265},
  pages = {351--368},
  doi = {10.1016/j.entcs.2010.08.021}
}
Jacobs B (2010), "From Coalgebraic to Monoidal Traces", In Coalgebraic Methods in Computer Science. Vol. 264, pp. 125-140. Elsevier, Amsterdam.
BibTeX:
@inproceedings{ds-2010-Jacobs-a,
  author = {B. Jacobs},
  editor = {B. Jacobs and M. Niqui and J. Rutten and A. Silva},
  title = {From Coalgebraic to Monoidal Traces},
  booktitle = {Coalgebraic Methods in Computer Science},
  publisher = {Elsevier, Amsterdam},
  year = {2010},
  volume = {264},
  pages = {125--140},
  doi = {10.1016/j.entcs.2010.07.017}
}
Jacobs B (2010), "Architecture is Politics: Security and Privacy Issues in Transport and Beyond", In Data Protection in a Profiled World. , pp. 289-299. Springer, Berlin.
BibTeX:
@inproceedings{ds-2010-Jacobs-b,
  author = {B. Jacobs},
  editor = {S. Gutwirth and Y. Poullet and P. De Hert},
  title = {Architecture is Politics: Security and Privacy Issues in Transport and Beyond},
  booktitle = {Data Protection in a Profiled World},
  publisher = {Springer, Berlin},
  year = {2010},
  pages = {289--299}
}
Jacobs B (2010), "Orthomodular lattices, Foulis Semigroups and Dagger Kernel Categories", Logical Methods in Comp. Sci.. Vol. 6(2)
BibTeX:
@article{ds-2010-Jacobs-c,
  author = {B. Jacobs},
  title = {Orthomodular lattices, Foulis Semigroups and Dagger Kernel Categories},
  journal = {Logical Methods in Comp. Sci.},
  year = {2010},
  volume = {6},
  number = {2},
  note = {http://arxiv.org/pdf/0912.0931}
}
Jacobs B (2010), "Convexity, duality, and effects", In IFIP Theoretical Computer Science 2010. (82(1)), pp. 1-19. Springer, Boston.
BibTeX:
@inproceedings{ds-2010-Jacobs-d,
  author = {B. Jacobs},
  editor = {C.S. Calude and V. Sassone},
  title = {Convexity, duality, and effects},
  booktitle = {IFIP Theoretical Computer Science 2010},
  publisher = {Springer, Boston},
  year = {2010},
  number = {82(1)},
  pages = {1--19}
}
Jacobs B (2010), "Het elektronisch patiëntendossier vanuit informatiebeveiligingsperspectief", In Databases. Over ICT-beloftes, informatiehonger en digitale autonomie. , pp. 44-52. Rathenau Instituut.
BibTeX:
@incollection{ds-2010-Jacobs-e,
  author = {B. Jacobs},
  editor = {G. Munnichs and M. Schuijff and M. Besters},
  title = {Het elektronisch patiëntendossier vanuit informatiebeveiligingsperspectief},
  booktitle = {Databases. Over ICT-beloftes, informatiehonger en digitale autonomie},
  publisher = {Rathenau Instituut},
  year = {2010},
  pages = {44--52}
}
Jacobs B (2010), "Moeten we echt alles opslaan?", NRC., February 3, 2010.
BibTeX:
@article{ds-2010-Jacobs-f,
  author = {B. Jacobs},
  title = {Moeten we echt alles opslaan?},
  journal = {NRC},
  year = {2010},
  note = {Opinion article}
}
Jacobs B and Sokolova A (2010), "Exemplaric Expressivity of Modal Logics", Journ. of Logic and Computation. Vol. 20(5), pp. 1041-1068.
BibTeX:
@article{ds-2010-Jacobs-g,
  author = {B. Jacobs and A. Sokolova},
  title = {Exemplaric Expressivity of Modal Logics},
  journal = {Journ. of Logic and Computation},
  year = {2010},
  volume = {20(5)},
  pages = {1041--1068}
}
Knezević M, Batina L, Mulder ED, Fan J, Gierlichs B, Lee Y, Maes R and Verbauwhede I (2010), "Handbook of Signal Processing Systems" (XXXVIII), pp. 161-177. Springer-Verlag.
BibTeX:
@inbook{ds-2010-Knezevic-a,
  author = {M. Knezević and L. Batina and E. De Mulder and J. Fan and B. Gierlichs and Y.K. Lee and R. Maes and I. Verbauwhede},
  editor = {S.S. Bhattacharyya and E.F. Deprettere and R. Leupers and J. Takala},
  title = {Handbook of Signal Processing Systems},
  publisher = {Springer-Verlag},
  year = {2010},
  number = {XXXVIII},
  pages = {161--177},
  edition = {1st}
}
de Koning Gans G and Garcia F (2010), "Towards a Practical Solution to the RFID Desynchronization Problem", In Radio Frequency Identification: Security and Privacy Issues. Vol. 6370, pp. 203-219. Springer-Verlag.
BibTeX:
@inproceedings{ds-2010-KoningGans-a,
  author = {de Koning Gans, Gerhard and Garcia, Flavio},
  editor = {Ors Yalcin, S.},
  title = {Towards a Practical Solution to the RFID Desynchronization Problem},
  booktitle = {Radio Frequency Identification: Security and Privacy Issues},
  publisher = {Springer-Verlag},
  year = {2010},
  volume = {6370},
  pages = {203-219},
  doi = {10.1007/978-3-642-16822-2_17}
}
de Koning Gans G and Verheul E (2010), "Best Effort and Practice Activation Codes", WISSEC.
BibTeX:
@article{ds-2010-KoningGans-b,
  author = {Gerhard de Koning Gans and Eric Verheul},
  title = {Best Effort and Practice Activation Codes},
  journal = {WISSEC},
  year = {2010},
  note = {http://arxiv.org/pdf/1101.0698v1}
}
Larson M, Ordelman R, Metze F, Kraaij W and de Jong F (2010), "Multimedia content with a speech track: ACM multimedia 2010 workshop on searching spontaneous conversational speech", In Proceedings of the international conference on Multimedia. New York, NY, USA , pp. 1747-1748. ACM.
BibTeX:
@inproceedings{ds-2010-Larson-a,
  author = {Larson, Martha and Ordelman, Roeland and Metze, Florian and Kraaij, Wessel and de Jong, Franciska},
  title = {Multimedia content with a speech track: ACM multimedia 2010 workshop on searching spontaneous conversational speech},
  booktitle = {Proceedings of the international conference on Multimedia},
  publisher = {ACM},
  year = {2010},
  pages = {1747--1748},
  url = {http://doi.acm.org/10.1145/1873951.1874351},
  doi = {10.1145/1873951.1874351}
}
Lee Y, Batina L, Singelée D and Verbauwhede I (2010), "Low-Cost Untraceable Authentication Protocols for RFID", In Proceedings of the 2010th ACM conference on Wireless network security (WiSec 2010). Hoboken, NJ, March 22--24, 2010. ACM.
BibTeX:
@inproceedings{ds-2010-Lee-a,
  author = {Y.K. Lee and L. Batina and D. Singelée and I. Verbauwhede},
  editor = {C. Nita-Rotaru and F. Stajano and S. Wetzel},
  title = {Low-Cost Untraceable Authentication Protocols for RFID},
  booktitle = {Proceedings of the 2010th ACM conference on Wireless network security (WiSec 2010)},
  publisher = {ACM},
  year = {2010}
}
Lee Y, Batina L, Singelée D and Verbauwhede I (2010), "WideWeak Privacy - Preserving RFID Authentication Protocols", In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 45, Proceedings of International Conference on Mobile Lightweight Wireless Systems. Springer.
BibTeX:
@inproceedings{ds-2010-Lee-b,
  author = {Y.K. Lee and L. Batina and D. Singelée and I. Verbauwhede},
  editor = {J. Alonso-Zarate and O. Hoffmann},
  title = {WideWeak Privacy - Preserving RFID Authentication Protocols},
  booktitle = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 45, Proceedings of International Conference on Mobile Lightweight Wireless Systems},
  publisher = {Springer},
  year = {2010}
}
Lee Y, Singelée LBD, Preneel B and Verbauwhede I (2010), "Towards Hardware-Intrinsic Security" (CCCXC), pp. 237-257. Springer-Verlag.
BibTeX:
@inbook{ds-2010-Lee-c,
  author = {Y.K. Lee and L. Batina D. Singelée and B. Preneel and I. Verbauwhede},
  editor = {A.-R. Sadeghi and D. Naccache},
  title = {Towards Hardware-Intrinsic Security},
  publisher = {Springer-Verlag},
  year = {2010},
  number = {CCCXC},
  pages = {237--257},
  edition = {1st}
}
Li Y, Sakiyama K, Batina L, Nakatsu D and Ohta K (2010), "Power Variance Analysis Breaks a Masked ASIC Implementations of AES", In Design, Automation & Test in Europe (DATE 2010). , pp. 1059-1064. IEEE.
BibTeX:
@inproceedings{ds-2010-Li-a,
  author = {Y. Li and K. Sakiyama and L. Batina and D. Nakatsu and K. Ohta},
  title = {Power Variance Analysis Breaks a Masked ASIC Implementations of AES},
  booktitle = {Design, Automation & Test in Europe (DATE 2010)},
  publisher = {IEEE},
  year = {2010},
  pages = {1059--1064}
}
Madlener K, Smetsers S and van Eekelen M (2010), "A Formal Verification Study on the Rotterdam Storm Surge Barrier", In Formal Methods and Software Engineering. Vol. 6447, pp. 287-302. Springer Berlin / Heidelberg.
BibTeX:
@incollection{ds-2010-Madlener-a,
  author = {Madlener, Ken and Smetsers, Sjaak and van Eekelen, Marko},
  editor = {Dong, Jin and Zhu, Huibiao},
  title = {A Formal Verification Study on the Rotterdam Storm Surge Barrier},
  booktitle = {Formal Methods and Software Engineering},
  publisher = {Springer Berlin / Heidelberg},
  year = {2010},
  volume = {6447},
  pages = {287-302}
}
(2010), "Leveraging Applications of Formal Methods, Verification, and Validation - 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18-21, 2010, Proceedings, Part I", In ISoLA (1). Vol. 6415 Springer.
BibTeX:
@proceedings{ds-2010-Margaria-a,,
  editor = {Tiziana Margaria and Bernhard Steffen},
  title = {Leveraging Applications of Formal Methods, Verification, and Validation - 4th International Symposium on Leveraging Applications, ISoLA 2010, Heraklion, Crete, Greece, October 18-21, 2010, Proceedings, Part I},
  booktitle = {ISoLA (1)},
  publisher = {Springer},
  year = {2010},
  volume = {6415}
}
Mostowski W and Poll E (2010), "Electronic Passports in a Nutshell". Thesis at: Radboud University Nijmegen. (ICIS-R10004)
BibTeX:
@techreport{ds-2010-Mostowski-a,
  author = {Mostowski, W. and Poll, E.},
  title = {Electronic Passports in a Nutshell},
  school = {Radboud University Nijmegen},
  year = {2010},
  number = {ICIS--R10004}
}
O'Connor R and Spitters B (2010), "A computer verified, monadic, functional implementation of the integral", Theoretical Computer Science. Vol. 411(37), pp. 3386-3402.
BibTeX:
@article{ds-2010-OConnor-a,
  author = {Russell O'Connor and Bas Spitters},
  title = {A computer verified, monadic, functional implementation of the integral},
  journal = {Theoretical Computer Science},
  year = {2010},
  volume = {411},
  number = {37},
  pages = {3386--3402},
  url = {http://arxiv.org/abs/0809.1552},
  doi = {10.1016/j.tcs.2010.05.031}
}
Over P, Awad G, Michel M, Fiscus J, Kraaij W and Smeaton AF (2010), "TRECVID 2009 -- Goals, Tasks, Data, Evaluation Mechanisms and Metrics", In Proceedings of TRECVID 2009.
BibTeX:
@inproceedings{ds-2010-Over-a,
  author = {Paul Over and George Awad and Martial Michel and Jonathan Fiscus and Wessel Kraaij and Alan F. Smeaton},
  title = {TRECVID 2009 -- Goals, Tasks, Data, Evaluation Mechanisms and Metrics},
  booktitle = {Proceedings of TRECVID 2009},
  year = {2010}
}
Pscheidt M and Weide Tvd (2010), "Sustainability of collaborative information system development projects � a North-South case study", In IDIA2009.
BibTeX:
@inproceedings{ds-2010-Pscheidt-a,
  author = {Pscheidt, M. and Weide, Th.P. van der},
  title = {Sustainability of collaborative information system development projects � a North-South case study},
  booktitle = {IDIA2009},
  year = {2010}
}
Raaijmakers S and Kraaij W (2010), "Classifier Calibration for Multi-Domain Sentiment Classification", In Proceedings of the Fourth International Conference on Weblogs and Social Media, ICWSM 2010, Washington, DC, USA, May 23-26, 2010. The AAAI Press.
BibTeX:
@inproceedings{ds-2010-Raaijmakers-a,
  author = {Stephan Raaijmakers and Wessel Kraaij},
  editor = {William W. Cohen and Samuel Gosling},
  title = {Classifier Calibration for Multi-Domain Sentiment Classification},
  booktitle = {Proceedings of the Fourth International Conference on Weblogs and Social Media, ICWSM 2010, Washington, DC, USA, May 23-26, 2010},
  publisher = {The AAAI Press},
  year = {2010}
}
Rutten LMWJ and van Eekelen MCJD (2010), "Efficient and formally proven reduction of large integers by small moduli", ACM Trans. Math. Softw.. Vol. 37(2)
BibTeX:
@article{ds-2010-Rutten-a,
  author = {Luc M. W. J. Rutten and Marko C. J. D. van Eekelen},
  title = {Efficient and formally proven reduction of large integers by small moduli},
  journal = {ACM Trans. Math. Softw.},
  year = {2010},
  volume = {37},
  number = {2},
  doi = {10.1145/1731022.1731026}
}
Sakiyama K and Batina L (2010), "Compact Public Key implementations for RFID and sensor nodes" (ISBN 978-0-387-71827-9), pp. 63-78. Springer-Verlag.
BibTeX:
@inbook{ds-2010-Sakiyama-a,
  author = {K. Sakiyama and L. Batina},
  editor = {I. Verbauwhede},
  title = {Compact Public Key implementations for RFID and sensor nodes},
  publisher = {Springer-Verlag},
  year = {2010},
  number = {ISBN 978-0-387-71827-9},
  pages = {63--78},
  edition = {1st}
}
Shkaravska O and Eekelen Mv (2010), "Univariate Polynomial Solutions of Nonlinear Polynomial Recurrence Relations". Thesis at: Radboud University Nijmegen., April, 2010. (ICIS-R10003)
BibTeX:
@techreport{ds-2010-Shkaravska-a,
  author = {Shkaravska, Olha and Eekelen, Marko van},
  title = {Univariate Polynomial Solutions of Nonlinear Polynomial Recurrence Relations},
  school = {Radboud University Nijmegen},
  year = {2010},
  number = {ICIS--R10003}
}
Shkaravska O, Kersten R and van Eekelen M (2010), "Test-Based Inference of Polynomial Loop-Bound Functions", In PPPJ'10: Proceedings of the 8th International Conference on the Principles and Practice of Programming in Java. Vienna, Austria , pp. 99-108.
BibTeX:
@inproceedings{ds-2010-Shkaravska-b,
  author = {Shkaravska, Olha and Kersten, Rody and van Eekelen, Marko},
  editor = {Krall, Andreas and Mössenböck, Hanspeter},
  title = {Test-Based Inference of Polynomial Loop-Bound Functions},
  booktitle = {PPPJ'10: Proceedings of the 8th International Conference on the Principles and Practice of Programming in Java},
  year = {2010},
  pages = {99--108}
}
Spitters B (2010), "Constructive pointfree topology eliminates non-constructive representation theorems from Riesz space theory", Order. Vol. 27(2), pp. 225-233.
BibTeX:
@article{ds-2010-Spitters-a,
  author = {Bas Spitters},
  title = {Constructive pointfree topology eliminates non-constructive representation theorems from Riesz space theory},
  journal = {Order},
  year = {2010},
  volume = {27},
  number = {2},
  pages = {225--233},
  note = {http://arxiv.org/abs/0807.2454},
  url = {http://arxiv.org/abs/0807.2454},
  doi = {10.1007/s11083-010-9147-3}
}
Spitters B (2010), "Locatedness and overt sublocales", Annals of Pure and Applied Logic. Vol. 162(1), pp. 36-54.
BibTeX:
@article{ds-2010-Spitters-b,
  author = {Bas Spitters},
  title = {Locatedness and overt sublocales},
  journal = {Annals of Pure and Applied Logic},
  year = {2010},
  volume = {162},
  number = {1},
  pages = {36--54},
  doi = {10.1016/j.apal.2010.07.002}
}
Spitters B (2010), "The space of measurement outcomes as a spectrum for non-commutative algebras", EPTCS. Vol. 26, pp. 127-133.
BibTeX:
@article{ds-2010-Spitters-c,
  author = {Bas Spitters},
  title = {The space of measurement outcomes as a spectrum for non-commutative algebras},
  journal = {EPTCS},
  year = {2010},
  volume = {26},
  pages = {127--133},
  doi = {10.4204/EPTCS.26.12}
}
Spitters B and van der Weegen E (2010), "Type classes for mathematics in Type Theory", In Interactive Theorem Proving, First International Conference, ITP2010. Edinburgh, July, 2010. (6172), pp. 490-493. Springer-Verlag.
BibTeX:
@inproceedings{ds-2010-Spitters-d,
  author = {Bas Spitters and Eelis van der Weegen},
  editor = {Matt Kaufmann and Lawrence Paulson},
  title = {Type classes for mathematics in Type Theory},
  booktitle = {Interactive Theorem Proving, First International Conference, ITP2010},
  publisher = {Springer-Verlag},
  year = {2010},
  number = {6172},
  pages = {490--493}
}
Trieschnigg R, Hiemstra D, de Jong F and Kraaij W (2010), "A Cross-lingual Framework for Monolingual Biomedical Information Retrieval", In Proceedings of the 19th ACM conference on Information and knowledge management (CIKM '10). New York , pp. 10. ACM.
BibTeX:
@inproceedings{ds-2010-Trieschnigg-a,
  author = {R.B. Trieschnigg and D. Hiemstra and F.M.G. de Jong and W. Kraaij},
  title = {A Cross-lingual Framework for Monolingual Biomedical Information Retrieval},
  booktitle = {Proceedings of the 19th ACM conference on Information and knowledge management (CIKM '10)},
  publisher = {ACM},
  year = {2010},
  pages = {10}
}
Verbeek F and Schmaltz J (2010), "A Formal Proof of a Necessary and Sufficient Condition for Deadlock-Free Adaptive Networks", In Interactive Theorem Proving, First International Conference, ITP2010. Edinburgh, July, 2010. (6172), pp. 67-82. Springer-Verlag.
BibTeX:
@inproceedings{ds-2010-Verbeek-a,
  author = {F. Verbeek and J. Schmaltz},
  editor = {Matt Kaufmann and Lawrence Paulson},
  title = {A Formal Proof of a Necessary and Sufficient Condition for Deadlock-Free Adaptive Networks},
  booktitle = {Interactive Theorem Proving, First International Conference, ITP2010},
  publisher = {Springer-Verlag},
  year = {2010},
  number = {6172},
  pages = {67-82},
  note = {Part of FloC 2010}
}
Verbeek F and Schmaltz J (2010), "Formal Validation of Networks-on-Chips: Deadlock and Evacuation", In Proc. of International Conference on Design, Automation and Test Europe (DATE'10)., March, 2010. , pp. 1701-1706. ACM/IEEE.
BibTeX:
@inproceedings{ds-2010-Verbeek-b,
  author = {F. Verbeek and J. Schmaltz},
  title = {Formal Validation of Networks-on-Chips: Deadlock and Evacuation},
  booktitle = {Proc. of International Conference on Design, Automation and Test Europe (DATE'10)},
  publisher = {ACM/IEEE},
  year = {2010},
  pages = {1701--1706}
}
Verberne S, Hinne M, van der Heijden M, Hoenkamp E, Kraaij W and van der Weide T (2010), "How does the Library Searcher Behave? A Contrastive Study of Library Search against Ad-hoc Search", In Proceedings of the Conference on Multilingual and Multimodal Information Access Evaluation (CLEF 2010), logCLEF workshop.
BibTeX:
@inproceedings{ds-2010-Verberne-a,
  author = {Suzan Verberne and Max Hinne and Maarten van der Heijden and Eduard Hoenkamp and Wessel Kraaij and Theo van der Weide},
  title = {How does the Library Searcher Behave? A Contrastive Study of Library Search against Ad-hoc Search},
  booktitle = {Proceedings of the Conference on Multilingual and Multimodal Information Access Evaluation (CLEF 2010), logCLEF workshop},
  year = {2010}
}
(2010), "QEST 2010, Seventh International Conference on the Quantitative Evaluation of Systems, Williamsburg, Viginia, USA, 15-18 September 2010", In QEST. IEEE Computer Society.
BibTeX:
@proceedings{ds-2010--a,,
  title = {QEST 2010, Seventh International Conference on the Quantitative Evaluation of Systems, Williamsburg, Viginia, USA, 15-18 September 2010},
  booktitle = {QEST},
  publisher = {IEEE Computer Society},
  year = {2010}
}
(2010), "Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science, LICS 2010, 11-14 July 2010, Edinburgh, United Kingdom", In LICS. IEEE Computer Society.
BibTeX:
@proceedings{ds-2010--b,,
  title = {Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science, LICS 2010, 11-14 July 2010, Edinburgh, United Kingdom},
  booktitle = {LICS},
  publisher = {IEEE Computer Society},
  year = {2010}
}
(2010), "Selected, revised papers of FOPARA 2009 --- Intl. Workshop on Foundational and Practical Aspects of Resource Analysis, Revised Selected Papers" Eindhoven, The Netherlands Vol. 6324 Springer.
BibTeX:
@proceedings{ds-2010--c,,
  title = {Selected, revised papers of FOPARA 2009 --- Intl. Workshop on Foundational and Practical Aspects of Resource Analysis, Revised Selected Papers},
  publisher = {Springer},
  year = {2010},
  volume = {6324}
}

2009

Larson M, Ordelman R, de Jong F, Kraaij W and Köhler J (2009), "Searching multimedia content with a spontaneous conversational speech track", In ACM Multimedia. , pp. 1159-1160. ACM.
BibTeX:
@inproceedings{sos-2009-Larson-a,
  author = {Martha Larson and Roeland Ordelman and Franciska de Jong and Wessel Kraaij and Joachim Köhler},
  editor = {Wen Gao and Yong Rui and Alan Hanjalic and Changsheng Xu and Eckehard G. Steinbach and Abdulmotaleb El-Saddik