2008 |
30 | EE | Kristof Verslype,
Bart De Decker,
Vincent Naessens,
Girma Nigusse,
Jorn Lapon,
Pieter Verhaeghe:
A Privacy-Preserving Ticketing System.
DBSec 2008: 97-112 |
29 | EE | Bart De Decker,
Mohamed Layouni,
Hans Vangheluwe,
Kristof Verslype:
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System.
EuroPKI 2008: 118-133 |
28 | EE | Kristof Verslype,
Bart De Decker:
Ubiquitous Privacy-Preserving Identity Managment.
SEC 2008: 589-603 |
2007 |
27 | EE | Stefan Brands,
Liesje Demuynck,
Bart De Decker:
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users.
ACISP 2007: 400-415 |
26 | EE | Liesje Demuynck,
Bart De Decker,
Wouter Joosen:
A Credential-Based System for the Anonymous Delegation of Rights.
SEC 2007: 169-180 |
25 | EE | Steven Gevers,
Kristof Verslype,
Bart De Decker:
Enhancing privacy in identity management systems.
WPES 2007: 60-63 |
2006 |
24 | EE | Kristof Verslype,
Bart De Decker:
A Flexible and Open DRM Framework.
Communications and Multimedia Security 2006: 173-184 |
23 | EE | Vincent Naessens,
Liesje Demuynck,
Bart De Decker:
A Fair Anonymous Submission and Review System.
Communications and Multimedia Security 2006: 43-53 |
22 | EE | Steven Gevers,
Bart De Decker:
Privacy Friendly Information Disclosure.
OTM Workshops (1) 2006: 636-646 |
21 | EE | Vincent Naessens,
Bart De Decker:
A Methodology for Designing Controlled Anonymous Applications.
SEC 2006: 111-122 |
2005 |
20 | EE | Liesje Demuynck,
Bart De Decker:
Privacy-Preserving Electronic Health Records.
Communications and Multimedia Security 2005: 150-159 |
19 | EE | Tom Goovaerts,
Bart De Win,
Bart De Decker,
Wouter Joosen:
Assessment of Palm OS Susceptibility to Malicious Code Threats.
Communications and Multimedia Security 2005: 240-249 |
18 | EE | Sam Michiels,
Kristof Verslype,
Wouter Joosen,
Bart De Decker:
Towards a software architecture for DRM.
Digital Rights Management Workshop 2005: 65-74 |
17 | | Vincent Naessens,
Bart De Decker,
Liesje Demuynck:
Accountable Anonymous E-Mail.
SEC 2005: 3-18 |
2003 |
16 | | Bart De Decker,
Gregory Neven,
Frank Piessens:
Secure Vickrey Auctions without a Trusted Third Party.
SEC 2003: 337-348 |
2002 |
15 | | Bart De Win,
Bart Vanhaute,
Bart De Decker:
How aspect-oriented programming can help to build secure software.
Informatica (Slovenia) 26(2): (2002) |
2001 |
14 | | Bart De Decker,
Frank Piessens,
Jan Smits,
Els Van Herreweghen:
Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium
Kluwer 2001 |
13 | | Bart De Decker,
Gregory Neven,
Frank Piessens,
Erik Van Hoeymissen:
Second Price Auctions, A Case Study of Secure Distributed Computating.
DAIS 2001: 217-228 |
12 | | Frank Piessens,
Bart De Decker,
Bart De Win:
Developing secure software. A survey and classification of common software vulnerabilities.
IICIS 2001: 27-40 |
11 | | Bart De Win,
Bart Vanhaute,
Bart De Decker:
Security Through Aspect-Oriented Programming.
Network Security 2001: 125-138 |
10 | | Vincent Naessens,
Bart Vanhaute,
Bart De Decker:
Securing RMI Communication.
Network Security 2001: 93-106 |
9 | | T. Herlea,
Joris Claessens,
Bart Preneel,
Gregory Neven,
Frank Piessens,
Bart De Decker:
On Securely Scheduling a Meeting.
SEC 2001: 183-198 |
2000 |
8 | EE | Bart De Decker,
Frank Piessens,
Erik Van Hoeymissen,
Gregory Neven:
Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations.
MATA 2000: 219-232 |
7 | | Gregory Neven,
Frank Piessens,
Bart De Decker:
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
SEC 2000: 361-370 |
6 | | Bart De Win,
Jan Van den Bergh,
Frank Matthijs,
Bart De Decker,
Wouter Joosen:
A Security Architecture for Electronic Commerce Applications.
SEC 2000: 491-500 |
1997 |
5 | | Yolande Berbers,
Bart De Decker,
Wouter Joosen,
Frank Matthijs,
Bert Robben:
Management of Events in a multi-agent system.
PDPTA 1997: 1141-1150 |
4 | EE | Bart De Decker:
Introduction to Computer Security.
State of the Art in Applied Cryptography 1997: 377-393 |
1996 |
3 | EE | Yolande Berbers,
Bart De Decker,
Wouter Joosen:
Infrastructure for mobile agents.
ACM SIGOPS European Workshop 1996: 173-180 |
2 | | Philip Vanneste,
Bart De Decker,
Marcin Chrzanowski,
Ken Warkentyne:
Panel Discussion: The Use of Internet in Education.
CALISCE 1996: 39-41 |
1991 |
1 | | Bart De Decker:
Unix Security & Kerberos.
Computer Security and Industrial Cryptography 1991: 257-274 |