Jerry den Hartog
Jerry den Hartog
Email verificata su
Citata da
Citata da
Link-layer jamming attacks on S-MAC
YW Law, P Hartel, J den Hartog, P Havinga
Proceeedings of the Second European Workshop on Wireless Sensor Networks …, 2005
Audit-based compliance control
JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini
International Journal of Information Security 6 (2), 133-151, 2007
A logic for auditing accountability in decentralized systems
R Corin, S Etalle, J Hartog, G Lenzini, I Staicu
IFIP World Computer Congress, TC 1, 187-201, 2004
A machine learning solution to assess privacy policy completeness: (short paper)
E Costante, Y Sun, M Petković, J Den Hartog
Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 91-96, 2012
Formal verification of privacy for RFID systems
M Bruso, K Chatzikokolakis, J Den Hartog
2010 23rd IEEE Computer Security Foundations Symposium, 75-88, 2010
An audit logic for accountability
JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
Security and privacy for innovative automotive applications: A survey
J den Hartog, N Zannone
Computer Communications 132, 17-41, 2018
Verifying probabilistic programs using a Hoare like logic
JI Den Hartog, EP de Vink
International journal of foundations of computer science 13 (03), 315-340, 2002
On-line trust perception: What really matters
E Costante, J Den Hartog, M Petkovic
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
Analysis of XACML policies with SMT
F Turkmen, J Hartog, S Ranise, N Zannone
International Conference on Principles of Security and Trust, 115-134, 2015
A probabilistic Hoare-style logic for game-based cryptographic proofs
R Corin, J Hartog
International Colloquium on Automata, Languages, and Programming, 252-263, 2006
Probabilistic extensions of semantical models
JI den Hartog
PhD thesis, Vrije Universiteit Amsterdam, 2002
Improving DPA by peak distribution analysis
J Pan, JGJ Van Woudenberg, JI Hartog, MF Witteman
International Workshop on Selected Areas in Cryptography, 241-261, 2010
What websites know about you
E Costante, J Hartog, M Petković
Data Privacy Management and Autonomous Spontaneous Security, 146-159, 2012
Formal analysis of XACML policies using SMT
F Turkmen, J den Hartog, S Ranise, N Zannone
Computers & Security 66, 185-203, 2017
A hybrid framework for data loss prevention and detection
E Costante, D Fauri, S Etalle, J Den Hartog, N Zannone
2016 IEEE security and privacy workshops (SPW), 324-333, 2016
Nonmonotonic trust management for P2P applications
M Czenko, H Tran, J Doumen, S Etalle, P Hartel, J den Hartog
Electronic Notes in Theoretical Computer Science 157 (3), 113-130, 2006
PINPAS: a tool for power analysis of smartcards
J Hartog, J Verschuren, E Vink, J Vos, W Wiersma
IFIP International Information Security Conference, 453-457, 2003
A flexible architecture for privacy-aware trust management
K Böhm, S Etalle, J Den Hartog, C Hütter, S Trabelsi, D Trivellato, ...
Journal of theoretical and applied electronic commerce research 5 (2), 77-96, 2010
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation
J Pan, JI Den Hartog, J Lu
International Workshop on Information Security Applications, 178-192, 2009
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20