Folgen
Sjouke Mauw
Sjouke Mauw
Professor in Security and Trust of Software Systems, University of Luxembourg
Bestätigte E-Mail-Adresse bei uni.lu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Foundations of attack trees
S Mauw, M Oostdijk
Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006
6802006
Foundations of attack–defense trees
B Kordy, S Mauw, S Radomirović, P Schweitzer
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011
3592011
An algebraic semantics of basic message sequence charts
S Mauw, MA Reniers
The computer journal 37 (4), 269-277, 1994
2191994
Attack–defense trees
B Kordy, S Mauw, S Radomirović, P Schweitzer
Journal of Logic and Computation 24 (1), 55-87, 2014
2132014
Operational Semantics and Verification of Security Protocols
C Cremers, S Mauw
Operational Semantics and Verification of Security Protocols, 2012
202*2012
Formal test automation: A simple experiment
A Belinfante, J Feenstra, RG de Vries, J Tretmans, N Goga, L Feijs, ...
Testing of Communicating Systems: Methods and Applications, 179-196, 1999
1971999
A process specification formalism
S Mauw, GJ Veltink
Fundamenta Informaticae 13 (2), 85-139, 1990
1631990
High-level message sequence charts
S Mauw, MA Reniers
SDL'97: Time for Testing, 291-306, 1997
1611997
Test generation for intelligent networks using model checking
A Engels, L Feijs, S Mauw
Tools and Algorithms for the Construction and Analysis of Systems: Third …, 1997
1441997
ADTool: security analysis with attack–defense trees
B Kordy, P Kordy, S Mauw, P Schweitzer
International conference on quantitative evaluation of systems, 173-176, 2013
1282013
Attack trees with sequential conjunction
R Jhawar, B Kordy, S Mauw, S Radomirović, R Trujillo-Rasua
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
1242015
Design and analysis of dynamic leader election protocols in broadcast networks
J Brunekreef, JP Katoen, R Koymans, S Mauw
Distributed Computing 9, 157-171, 1996
1221996
Model checking for managers
W Janssen, R Mateescu, S Mauw, P Fennema, P Van Der Stappen
Theoretical and Practical Aspects of SPIN Model Checking: 5th and 6th …, 1999
1081999
A formalization of anonymity and onion routing
S Mauw, JHS Verschuren, EP de Vink
Computer Security–ESORICS 2004: 9th European Symposium on Research in …, 2004
1072004
Algebraic specification of communication protocols
S Mauw, GJ Veltink
Cambridge university press, 2008
962008
Untraceability of RFID protocols
T Van Deursen, S Mauw, S Radomirović
Information Security Theory and Practices. Smart Devices, Convergence and …, 2008
952008
A framework for compositional verification of security protocols
S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović
Information and Computation 206 (2-4), 425-459, 2008
872008
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting
CF Torres, H Jonker, S Mauw
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
852015
Operational semantics of security protocols
C Cremers, S Mauw
Scenarios: Models, Transformations and Tools: International Workshop …, 2005
852005
Privacy and verifiability in voting systems: Methods, developments and trends
H Jonker, S Mauw, J Pang
Computer Science Review 10, 1-30, 2013
792013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20