| 2008 |
| 61 | EE | Srijith Krishnan Nair,
Andrew S. Tanenbaum,
Gabriela Gheorghe,
Bruno Crispo:
Enforcing DRM policies across applications.
Digital Rights Management Workshop 2008: 87-94 |
| 60 | EE | Fatih Turkmen,
Pietro Mazzoleni,
Bruno Crispo,
Elisa Bertino:
P-CDN: Extending access control capabilities of P2P systems to provide CDN services.
ISCC 2008: 480-486 |
| 59 | EE | Fatih Turkmen,
Bruno Crispo:
Performance evaluation of XACML PDP implementations.
SWS 2008: 37-44 |
| 58 | EE | Pietro Mazzoleni,
Bruno Crispo,
Swaminathan Sivasubramanian,
Elisa Bertino:
XACML Policy Integration Algorithms.
ACM Trans. Inf. Syst. Secur. 11(1): (2008) |
| 57 | EE | Srijith Krishnan Nair,
Patrick N. D. Simpson,
Bruno Crispo,
Andrew S. Tanenbaum:
A Virtual Machine Based Information Flow Control System for Policy Enforcement.
Electr. Notes Theor. Comput. Sci. 197(1): 3-16 (2008) |
| 56 | EE | Srijith Krishnan Nair,
Ron Gerrits,
Bruno Crispo,
Andrew S. Tanenbaum:
Turning Teenagers into Stores.
IEEE Computer 41(2): 58-62 (2008) |
| 2007 |
| 55 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
Springer 2007 |
| 54 | EE | Iulia Ion,
Boris Dragovic,
Bruno Crispo:
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices.
ACSAC 2007: 233-242 |
| 53 | EE | Damiano Bolzoni,
Bruno Crispo,
Sandro Etalle:
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems.
LISA 2007: 141-152 |
| 52 | EE | Srijith Krishnan Nair,
Muhammad Torabi Dashti,
Bruno Crispo,
Andrew S. Tanenbaum:
A Hybrid PKI-IBC Based Ephemerizer System.
SEC 2007: 241-252 |
| 51 | EE | Srijith Krishnan Nair,
Ivan Djordjevic,
Bruno Crispo,
Theodosis Dimitrakos:
Secure web service federation management using tpm virtualisation.
SWS 2007: 73-82 |
| 50 | EE | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum,
Arno Bakker:
Design and implementation of a secure wide-area object middleware.
Computer Networks 51(10): 2484-2513 (2007) |
| 2006 |
| 49 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers
Springer 2006 |
| 48 | EE | Chandana Gamage,
Kemal Bicakci,
Bruno Crispo,
Andrew S. Tanenbaum:
Security for the Mythical Air-Dropped Sensor Network.
ISCC 2006: 41-47 |
| 47 | EE | Melanie R. Rieback,
Georgi Gaydadjiev,
Bruno Crispo,
Rutger F. H. Hofman,
Andrew S. Tanenbaum:
A Platform for RFID Security and Privacy Administration (Awarded Best Paper!).
LISA 2006: 89-102 |
| 46 | EE | Melanie R. Rieback,
Bruno Crispo,
Andrew S. Tanenbaum:
Is Your Cat Infected with a Computer Virus?.
PerCom 2006: 169-179 |
| 45 | EE | Pietro Mazzoleni,
Elisa Bertino,
Bruno Crispo:
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
SACMAT 2006: 219-227 |
| 44 | EE | Andrew S. Tanenbaum,
Chandana Gamage,
Bruno Crispo:
Taking Sensor Networks from the Lab to the Jungle.
IEEE Computer 39(8): 98-100 (2006) |
| 43 | EE | Melanie R. Rieback,
Bruno Crispo,
Andrew S. Tanenbaum:
The Evolution of RFID Security.
IEEE Pervasive Computing 5(1): 62-69 (2006) |
| 42 | EE | Melanie R. Rieback,
Patrick N. D. Simpson,
Bruno Crispo,
Andrew S. Tanenbaum:
RFID malware: Design principles and examples.
Pervasive and Mobile Computing 2(4): 405-426 (2006) |
| 2005 |
| 41 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers
Springer 2005 |
| 40 | EE | Melanie R. Rieback,
Bruno Crispo,
Andrew S. Tanenbaum:
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management.
ACISP 2005: 184-194 |
| 39 | EE | Kemal Bicakci,
Bruno Crispo,
Andrew S. Tanenbaum:
Counting Abuses Using Flexible Off-line Credentials.
ACISP 2005: 548-559 |
| 38 | EE | Srijith Krishnan Nair,
Bogdan C. Popescu,
Chandana Gamage,
Bruno Crispo,
Andrew S. Tanenbaum:
Enabling DRM-Preserving Digital Content Redistribution.
CEC 2005: 151-158 |
| 37 | EE | Bruno Crispo,
Swaminathan Sivasubramanian,
Pietro Mazzoleni,
Elisa Bertino:
P-Hera: Scalable fine-grained access control for P2P infrastructures.
ICPADS (1) 2005: 585-591 |
| 36 | EE | Pietro Mazzoleni,
Bruno Crispo,
Swaminathan Sivasubramanian,
Elisa Bertino:
Efficient Integration of Fine-grained Access Control in Large-scale Grid Services.
IEEE SCC 2005: 77-86 |
| 35 | EE | Bogdan C. Popescu,
Maarten van Steen,
Bruno Crispo,
Andrew S. Tanenbaum,
Jan Sacha,
Ihor Kuz:
Securely Replicated Web Documents.
IPDPS 2005 |
| 34 | EE | Kemal Bicakci,
Bruno Crispo,
Andrew S. Tanenbaum:
How to incorporate revocation status information into the trust metrics for public-key certification.
SAC 2005: 1594-1598 |
| 33 | EE | Melanie R. Rieback,
Bruno Crispo,
Andrew S. Tanenbaum:
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags.
Security Protocols Workshop 2005: 51-59 |
| 2004 |
| 32 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers
Springer 2004 |
| 31 | EE | Bruno Crispo,
Bogdan C. Popescu,
Andrew S. Tanenbaum:
Symmetric Key Authentication Services Revisited.
ACISP 2004: 248-261 |
| 30 | | Elisa Bertino,
Bruno Crispo,
Pietro Mazzoleni:
Supporting Multi-Dimensional Trustworthiness for Grid Workflows.
DELOS Workshop: Digital Library Architectures 2004: 195-204 |
| 29 | EE | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum,
Frank Kamperman:
A DRM security architecture for home networks.
Digital Rights Management Workshop 2004: 1-10 |
| 28 | EE | Elisa Bertino,
Pietro Mazzoleni,
Bruno Crispo,
Swaminathan Sivasubramanian,
Elena Ferrari:
Towards Supporting Fine-Grained Access Control for Grid Resources.
FTDCS 2004: 59-65 |
| 27 | EE | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum:
Support for multi-level security policies in DRM architectures.
NSPW 2004: 3-9 |
| 26 | EE | Elisa Bertino,
Bruno Crispo,
James Joshi,
Wengliang (Kevin) Du,
Ravi S. Sandhu:
Security for grid-based computing systems issues and challenges.
SACMAT 2004: 125 |
| 25 | EE | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum:
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System.
Security Protocols Workshop 2004: 213-220 |
| 2003 |
| 24 | | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum:
Secure Data Replication over Untrusted Hosts.
HotOS 2003: 121-126 |
| 23 | EE | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum:
A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System.
ISCC 2003: 225-231 |
| 22 | EE | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum,
Maas Zeeman:
Enforcing Security Policies for Distributed Objects Applications.
Security Protocols Workshop 2003: 119-130 |
| 2002 |
| 21 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers
Springer 2002 |
| 20 | | Francesco Bergadano,
Davide Cavagnino,
Bruno Crispo:
Individual Authentication in Multiparty Communications.
Computers & Security 21(8): 719-735 (2002) |
| 2001 |
| 19 | | Bruce Christianson,
Bruno Crispo,
Michael Roe:
Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers
Springer 2001 |
| 18 | EE | Bruno Crispo,
Giancarlo Ruffo:
Reasoning about Accountability within Delegation.
ICICS 2001: 251-260 |
| 17 | EE | Bruno Crispo:
Delegation Protocols for Electronic Commerce.
ISCC 2001: 674-679 |
| 2000 |
| 16 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings
Springer 2000 |
| 15 | | Francesco Bergadano,
Davide Cavagnino,
Bruno Crispo:
Individual Single Source Authentication on the MBone.
IEEE International Conference on Multimedia and Expo (I) 2000: 541-544 |
| 14 | EE | Bruce Christianson,
Bruno Crispo,
James A. Malcolm:
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.
Security Protocols Workshop 2000: 182-183 |
| 13 | EE | Francesco Bergadano,
Davide Cavagnino,
Bruno Crispo:
Chained Stream Authentication.
Selected Areas in Cryptography 2000: 144-157 |
| 12 | EE | Bruno Crispo,
Peter Landrock,
Václav Matyás Jr.:
WWW security and trusted third party services.
Future Generation Comp. Syst. 16(4): 331-341 (2000) |
| 1999 |
| 11 | | Bruce Christianson,
Bruno Crispo,
William S. Harbison,
Michael Roe:
Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings
Springer 1999 |
| 10 | | Francesco Bergadano,
Davide Cavagnino,
Bruno Crispo:
Issues in Multicast Security.
Security Protocols Workshop 1999: 119-139 |
| 1998 |
| 9 | | Bruce Christianson,
Bruno Crispo,
T. Mark A. Lomas,
Michael Roe:
Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings
Springer 1998 |
| 8 | EE | Bruno Crispo:
Delegation of Responsibility (Position Paper).
Security Protocols Workshop 1998: 118-124 |
| 7 | EE | Bruno Crispo:
Delegation of Responsibility (Transcript of Discussion).
Security Protocols Workshop 1998: 125-130 |
| 6 | EE | Francesco Bergadano,
Bruno Crispo,
Giancarlo Ruffo:
High Dictionary Compression for Proactive Password Checking.
ACM Trans. Inf. Syst. Secur. 1(1): 3-25 (1998) |
| 5 | | Ross J. Anderson,
Francesco Bergadano,
Bruno Crispo,
Jong-Hyeon Lee,
Charalampos Manifavas,
Roger M. Needham:
A New Family of Authentication Protocols.
Operating Systems Review 32(4): 9-20 (1998) |
| 1997 |
| 4 | EE | Francesco Bergadano,
Bruno Crispo,
Giancarlo Ruffo:
Proactive Password Checking with Decision Trees.
ACM Conference on Computer and Communications Security 1997: 67-77 |
| 3 | | Bruno Crispo:
How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments.
Security Protocols Workshop 1997: 53-65 |
| 2 | | Francesco Bergadano,
Bruno Crispo,
T. Mark A. Lomas:
Strong Authentication and Privacy with Standard Browsers.
Journal of Computer Security 5(3): 191-212 (1997) |
| 1996 |
| 1 | | Bruno Crispo,
T. Mark A. Lomas:
A Certification Scheme for Electronic Commerce.
Security Protocols Workshop 1996: 19-32 |