Link-layer jamming attacks on S-MAC YW Law, P Hartel, J den Hartog, P Havinga Proceeedings of the Second European Workshop on Wireless Sensor Networks …, 2005 | 131 | 2005 |
Audit-based compliance control JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini International Journal of Information Security 6 (2), 133-151, 2007 | 121 | 2007 |
A logic for auditing accountability in decentralized systems R Corin, S Etalle, J Hartog, G Lenzini, I Staicu IFIP World Computer Congress, TC 1, 187-201, 2004 | 107 | 2004 |
A machine learning solution to assess privacy policy completeness: (short paper) E Costante, Y Sun, M Petković, J Den Hartog Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 91-96, 2012 | 90 | 2012 |
Formal verification of privacy for RFID systems M Bruso, K Chatzikokolakis, J Den Hartog 2010 23rd IEEE Computer Security Foundations Symposium, 75-88, 2010 | 90 | 2010 |
An audit logic for accountability JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005 | 80 | 2005 |
Security and privacy for innovative automotive applications: A survey J den Hartog, N Zannone Computer Communications 132, 17-41, 2018 | 78 | 2018 |
Verifying probabilistic programs using a Hoare like logic JI Den Hartog, EP de Vink International journal of foundations of computer science 13 (03), 315-340, 2002 | 65 | 2002 |
On-line trust perception: What really matters E Costante, J Den Hartog, M Petkovic 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011 | 64 | 2011 |
Analysis of XACML policies with SMT F Turkmen, J Hartog, S Ranise, N Zannone International Conference on Principles of Security and Trust, 115-134, 2015 | 63 | 2015 |
A probabilistic Hoare-style logic for game-based cryptographic proofs R Corin, J Hartog International Colloquium on Automata, Languages, and Programming, 252-263, 2006 | 54 | 2006 |
Probabilistic extensions of semantical models JI den Hartog PhD thesis, Vrije Universiteit Amsterdam, 2002 | 52 | 2002 |
Improving DPA by peak distribution analysis J Pan, JGJ Van Woudenberg, JI Hartog, MF Witteman International Workshop on Selected Areas in Cryptography, 241-261, 2010 | 48 | 2010 |
What websites know about you E Costante, J Hartog, M Petković Data Privacy Management and Autonomous Spontaneous Security, 146-159, 2012 | 42 | 2012 |
Formal analysis of XACML policies using SMT F Turkmen, J den Hartog, S Ranise, N Zannone Computers & Security 66, 185-203, 2017 | 39 | 2017 |
A hybrid framework for data loss prevention and detection E Costante, D Fauri, S Etalle, J Den Hartog, N Zannone 2016 IEEE security and privacy workshops (SPW), 324-333, 2016 | 39 | 2016 |
Nonmonotonic trust management for P2P applications M Czenko, H Tran, J Doumen, S Etalle, P Hartel, J den Hartog Electronic Notes in Theoretical Computer Science 157 (3), 113-130, 2006 | 34 | 2006 |
PINPAS: a tool for power analysis of smartcards J Hartog, J Verschuren, E Vink, J Vos, W Wiersma IFIP International Information Security Conference, 453-457, 2003 | 33 | 2003 |
A flexible architecture for privacy-aware trust management K Böhm, S Etalle, J Den Hartog, C Hütter, S Trabelsi, D Trivellato, ... Journal of theoretical and applied electronic commerce research 5 (2), 77-96, 2010 | 32 | 2010 |
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation J Pan, JI Den Hartog, J Lu International Workshop on Information Security Applications, 178-192, 2009 | 31 | 2009 |