dblp.uni-trier.dewww.uni-trier.de

Bart De Decker

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
30EEKristof Verslype, Bart De Decker, Vincent Naessens, Girma Nigusse, Jorn Lapon, Pieter Verhaeghe: A Privacy-Preserving Ticketing System. DBSec 2008: 97-112
29EEBart De Decker, Mohamed Layouni, Hans Vangheluwe, Kristof Verslype: A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System. EuroPKI 2008: 118-133
28EEKristof Verslype, Bart De Decker: Ubiquitous Privacy-Preserving Identity Managment. SEC 2008: 589-603
2007
27EEStefan Brands, Liesje Demuynck, Bart De Decker: A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. ACISP 2007: 400-415
26EELiesje Demuynck, Bart De Decker, Wouter Joosen: A Credential-Based System for the Anonymous Delegation of Rights. SEC 2007: 169-180
25EESteven Gevers, Kristof Verslype, Bart De Decker: Enhancing privacy in identity management systems. WPES 2007: 60-63
2006
24EEKristof Verslype, Bart De Decker: A Flexible and Open DRM Framework. Communications and Multimedia Security 2006: 173-184
23EEVincent Naessens, Liesje Demuynck, Bart De Decker: A Fair Anonymous Submission and Review System. Communications and Multimedia Security 2006: 43-53
22EESteven Gevers, Bart De Decker: Privacy Friendly Information Disclosure. OTM Workshops (1) 2006: 636-646
21EEVincent Naessens, Bart De Decker: A Methodology for Designing Controlled Anonymous Applications. SEC 2006: 111-122
2005
20EELiesje Demuynck, Bart De Decker: Privacy-Preserving Electronic Health Records. Communications and Multimedia Security 2005: 150-159
19EETom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen: Assessment of Palm OS Susceptibility to Malicious Code Threats. Communications and Multimedia Security 2005: 240-249
18EESam Michiels, Kristof Verslype, Wouter Joosen, Bart De Decker: Towards a software architecture for DRM. Digital Rights Management Workshop 2005: 65-74
17 Vincent Naessens, Bart De Decker, Liesje Demuynck: Accountable Anonymous E-Mail. SEC 2005: 3-18
2003
16 Bart De Decker, Gregory Neven, Frank Piessens: Secure Vickrey Auctions without a Trusted Third Party. SEC 2003: 337-348
2002
15 Bart De Win, Bart Vanhaute, Bart De Decker: How aspect-oriented programming can help to build secure software. Informatica (Slovenia) 26(2): (2002)
2001
14 Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen: Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium Kluwer 2001
13 Bart De Decker, Gregory Neven, Frank Piessens, Erik Van Hoeymissen: Second Price Auctions, A Case Study of Secure Distributed Computating. DAIS 2001: 217-228
12 Frank Piessens, Bart De Decker, Bart De Win: Developing secure software. A survey and classification of common software vulnerabilities. IICIS 2001: 27-40
11 Bart De Win, Bart Vanhaute, Bart De Decker: Security Through Aspect-Oriented Programming. Network Security 2001: 125-138
10 Vincent Naessens, Bart Vanhaute, Bart De Decker: Securing RMI Communication. Network Security 2001: 93-106
9 T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker: On Securely Scheduling a Meeting. SEC 2001: 183-198
2000
8EEBart De Decker, Frank Piessens, Erik Van Hoeymissen, Gregory Neven: Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations. MATA 2000: 219-232
7 Gregory Neven, Frank Piessens, Bart De Decker: On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. SEC 2000: 361-370
6 Bart De Win, Jan Van den Bergh, Frank Matthijs, Bart De Decker, Wouter Joosen: A Security Architecture for Electronic Commerce Applications. SEC 2000: 491-500
1997
5 Yolande Berbers, Bart De Decker, Wouter Joosen, Frank Matthijs, Bert Robben: Management of Events in a multi-agent system. PDPTA 1997: 1141-1150
4EEBart De Decker: Introduction to Computer Security. State of the Art in Applied Cryptography 1997: 377-393
1996
3EEYolande Berbers, Bart De Decker, Wouter Joosen: Infrastructure for mobile agents. ACM SIGOPS European Workshop 1996: 173-180
2 Philip Vanneste, Bart De Decker, Marcin Chrzanowski, Ken Warkentyne: Panel Discussion: The Use of Internet in Education. CALISCE 1996: 39-41
1991
1 Bart De Decker: Unix Security & Kerberos. Computer Security and Industrial Cryptography 1991: 257-274

Coauthor Index

1Yolande Berbers [3] [5]
2Jan Van den Bergh [6]
3Stefan Brands [27]
4Marcin Chrzanowski [2]
5Joris Claessens [9]
6Liesje Demuynck [17] [20] [23] [26] [27]
7Steven Gevers [22] [25]
8Tom Goovaerts [19]
9T. Herlea [9]
10Els Van Herreweghen [14]
11Erik Van Hoeymissen [8] [13]
12Wouter Joosen [3] [5] [6] [18] [19] [26]
13Jorn Lapon [30]
14Mohamed Layouni [29]
15Frank Matthijs [5] [6]
16Sam Michiels [18]
17Vincent Naessens [10] [17] [21] [23] [30]
18Gregory Neven [7] [8] [9] [13] [16]
19Girma Nigusse [30]
20Frank Piessens [7] [8] [9] [12] [13] [14] [16]
21Bart Preneel [9]
22Bert Robben [5]
23Jan Smits [14]
24Hans Vangheluwe [29]
25Bart Vanhaute [10] [11] [15]
26Philip Vanneste [2]
27Pieter Verhaeghe [30]
28Kristof Verslype [18] [24] [25] [28] [29] [30]
29Ken Warkentyne [2]
30Bart De Win [6] [11] [12] [15] [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)