2009 |
87 | EE | Luan Ibraimi,
Qiang Tang,
Pieter H. Hartel,
Willem Jonker:
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes.
ISPEC 2009: 1-12 |
86 | EE | Yee Wei Law,
Marimuthu Palaniswami,
Lodewijk van Hoesel,
Jeroen Doumen,
Pieter H. Hartel,
Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
TOSN 5(1): (2009) |
2008 |
85 | EE | Mohammed G. Khatib,
Pieter H. Hartel:
Power management of MEMS-based storage devices for mobile systems.
CASES 2008: 245-254 |
84 | EE | Mohammed G. Khatib,
Ethan L. Miller,
Pieter H. Hartel:
Workload-based configuration of MEMS-based storage devices for mobile systems.
EMSOFT 2008: 41-50 |
83 | EE | Pieter H. Hartel,
Leon Abelmann,
Mohammed G. Khatib:
Towards Tamper-evident Storage on Patterned Media.
FAST 2008: 283-296 |
82 | EE | Ileana Buhan,
Jeroen Doumen,
Pieter H. Hartel,
Qiang Tang,
Raymond N. J. Veldhuis:
Embedding Renewable Cryptographic Keys into Continuous Noisy Data.
ICICS 2008: 294-310 |
81 | EE | Saeed Sedghi,
Jeroen Doumen,
Pieter H. Hartel,
Willem Jonker:
Towards an Information Theoretic Analysis of Searchable Encryption.
ICICS 2008: 345-360 |
80 | EE | Raluca Marin-Perianu,
Johann Hurink,
Pieter H. Hartel:
A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks.
ISPA 2008: 863-870 |
79 | EE | Qiang Tang,
Pieter H. Hartel,
Willem Jonker:
Inter-domain Identity-Based Proxy Re-encryption.
Inscrypt 2008: 332-347 |
78 | EE | Luan Ibraimi,
Qiang Tang,
Pieter H. Hartel,
Willem Jonker:
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare.
Secure Data Management 2008: 185-198 |
77 | EE | Raluca Marin-Perianu,
Hans Scholten,
Paul J. M. Havinga,
Pieter H. Hartel:
Cluster-based service discovery for heterogeneous wireless sensor networks.
IJPEDS 23(4): 325-346 (2008) |
2007 |
76 | EE | Ileana Buhan,
Jeroen Doumen,
Pieter H. Hartel,
Raymond N. J. Veldhuis:
Fuzzy extractors for continuous distributions.
ASIACCS 2007: 353-355 |
75 | EE | Mohammed G. Khatib,
Berend-Jan van der Zwaag,
Pieter H. Hartel,
Gerard J. M. Smit:
Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads.
ESTImedia 2007: 7-12 |
74 | EE | Ileana Buhan,
Jeroen Doumen,
Pieter H. Hartel,
Raymond N. J. Veldhuis:
Feeling Is Believing: A Secure Template Exchange Protocol.
ICB 2007: 897-906 |
73 | EE | Ricardo Corin,
Sandro Etalle,
Pieter H. Hartel,
Angelika Mader:
Timed analysis of security protocols.
Journal of Computer Security 15(6): 619-645 (2007) |
2006 |
72 | EE | Ileana Buhan,
Asker M. Bazen,
Pieter H. Hartel,
Raymond N. J. Veldhuis:
A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems.
ICB 2006: 728-736 |
71 | EE | Vasughi Sundramoorthy,
Pieter H. Hartel,
Hans Scholten:
On consistency maintenance in service discovery.
IPDPS 2006 |
70 | EE | Damiano Bolzoni,
Sandro Etalle,
Pieter H. Hartel,
Emmanuele Zambon:
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System.
IWIA 2006: 144-156 |
69 | EE | Raluca Marin-Perianu,
Hans Scholten,
Paul J. M. Havinga,
Pieter H. Hartel:
Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks.
LCN 2006: 931-938 |
68 | | Cheun Ngen Chong,
Ricardo Corin,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Yee Wei Law,
Andrew Tokmakoff:
LicenseScript: a logical language for digital rights management.
Annales des Télécommunications 61(3-4): 284-331 (2006) |
67 | EE | Marcin Czenko,
Ha Tran,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications.
Electr. Notes Theor. Comput. Sci. 157(3): 113-130 (2006) |
66 | EE | Yee Wei Law,
Jeroen Doumen,
Pieter H. Hartel:
Survey and benchmark of block ciphers for wireless sensor networks.
TOSN 2(1): 65-93 (2006) |
2005 |
65 | | Cheun Ngen Chong,
Sandro Etalle,
Pieter H. Hartel,
Rieks Joosten,
Geert Kleinhuis:
Service Brokerage in Prolog.
ICEIS (3) 2005: 409-412 |
64 | EE | Vasughi Sundramoorthy,
Pieter H. Hartel,
Jerry den Hartog,
Hans Scholten,
C. Tan:
Functional Principles of Registry-based Service Discovery.
LCN 2005: 209-217 |
63 | EE | Yee Wei Law,
Lodewijk van Hoesel,
Jeroen Doumen,
Pieter H. Hartel,
Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
SASN 2005: 76-88 |
62 | | Jieyin Cheng,
Cheun Ngen Chong,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Stefan Nikolaus:
StreamTo: Streaming Content using a Tamper-Resistant Token.
SEC 2005: 601-612 |
61 | EE | Pieter H. Hartel:
A Trace Semantics for Positive Core XPath.
TIME 2005: 103-112 |
60 | EE | Ricardo Corin,
Sandro Etalle,
Pieter H. Hartel,
Angelika Mader:
Timed Analysis of Security Protocols
CoRR abs/cs/0503036: (2005) |
59 | EE | Marcin Czenko,
Ha Tran,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications
CoRR abs/cs/0510061: (2005) |
58 | EE | Damiano Bolzoni,
Emmanuele Zambon,
Sandro Etalle,
Pieter H. Hartel:
Poseidon: a 2-tier Anomaly-based Intrusion Detection System
CoRR abs/cs/0511043: (2005) |
57 | EE | Ricardo Corin,
Sandro Etalle,
Pieter H. Hartel,
Antonio Durante:
A Trace Logic for Local Security Properties.
Electr. Notes Theor. Comput. Sci. 118: 129-143 (2005) |
2004 |
56 | EE | Pieter H. Hartel,
Pascal van Eck,
Sandro Etalle,
Roel Wieringa:
Modelling Mobility Aspects of Security Policies.
CASSIS 2004: 172-191 |
55 | EE | Ricardo Corin,
Sandro Etalle,
Pieter H. Hartel,
Angelika Mader:
Timed model checking of security protocols.
FMSE 2004: 23-32 |
54 | | Raymond N. J. Veldhuis,
Asker M. Bazen,
Joost A. Kauffman,
Pieter H. Hartel:
Biometric verification based on grip-pattern recognition.
Security, Steganography, and Watermarking of Multimedia Contents 2004: 634-641 |
53 | EE | Cheun Ngen Chong,
Bin Ren,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Ricardo Corin:
License Protection with a Tamper-Resistant Token.
WISA 2004: 223-237 |
52 | | Richard Brinkman,
Ling Feng,
Jeroen Doumen,
Pieter H. Hartel,
Willem Jonker:
Efficient Tree Search in Encrypted Data.
WOSIS 2004: 126-135 |
51 | EE | Ricardo Corin,
Antonio Durante,
Sandro Etalle,
Pieter H. Hartel:
A Trace Logic for Local Security Properties
CoRR cs.CR/0411010: (2004) |
50 | EE | Richard Brinkman,
Ling Feng,
Jeroen Doumen,
Pieter H. Hartel,
Willem Jonker:
Efficient Tree Search in Encrypted Data.
Information Systems Security 13(3): 14-21 (2004) |
49 | EE | Pieter H. Hartel,
Henk L. Muller,
Hugh Glaser:
The Functional "C" experience.
J. Funct. Program. 14(2): 129-135 (2004) |
48 | | Ton Kalker,
Dick H. J. Epema,
Pieter H. Hartel,
Reginald L. Lagendijk,
Maarten van Steen:
Music2Share - Copyright-Compliant Music Sharing in P2P Systems.
Proceedings of the IEEE 92(6): 961-970 (2004) |
2003 |
47 | EE | Cheun Ngen Chong,
Sandro Etalle,
Pieter H. Hartel,
Yee Wei Law:
Approximating Fair Use in LicenseScript.
ICADL 2003: 432-443 |
46 | EE | Cheun Ngen Chong,
Sandro Etalle,
Pieter H. Hartel:
Comparing Logic-Based and XML-Based Rights Expression Languages.
OTM Workshops 2003: 779-792 |
45 | EE | Yee Wei Law,
Ricardo Corin,
Sandro Etalle,
Pieter H. Hartel:
A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks.
PWC 2003: 27-39 |
44 | | Yee Wei Law,
Sandro Etalle,
Pieter H. Hartel:
Assessing Security in Energy-Efficient Sensor Networks.
SEC 2003: 459-463 |
43 | | Cheun Ngen Chong,
Zhonghong Peng,
Pieter H. Hartel:
Secure Audit Logging with Tamper-Resistant Hardware.
SEC 2003: 73-84 |
2002 |
42 | EE | Erik Poll,
Pieter H. Hartel,
Eduard de Jong:
A Java Reference Model of Transacted Memory for Smart Cards.
CARDIS 2002: 75-86 |
41 | | Pieter H. Hartel:
The State of WG 8.8.
CARDIS 2002 |
40 | EE | Cheun Ngen Chong,
René van Buuren,
Pieter H. Hartel,
Geert Kleinhuis:
Security Attributes Based Digital Rights Management.
IDMS/PROMS 2002: 339-352 |
39 | EE | Hans Scholten,
Pierre G. Jansen,
Ferdy Hanssen,
Pieter H. Hartel,
T. Hattink,
Vasughi Sundramoorthy:
Multimedia QoS in Low-Cost Home Networks.
LCN 2002: 327-328 |
2001 |
38 | EE | Neil J. Henderson,
Neil M. White,
Pieter H. Hartel:
iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric.
E-smart 2001: 124-134 |
37 | EE | Pieter H. Hartel,
Michael J. Butler,
Eduard de Jong,
Mark Longley:
Transacted Memory for Smart Cards.
FME 2001: 478-499 |
36 | EE | Adam Field,
Pieter H. Hartel,
Wim Mooij:
Personal DJ, an architecture for personalised content delivery.
WWW 2001: 1-7 |
35 | EE | Pieter H. Hartel,
Luc Moreau:
Formalizing the safety of Java, the Java virtual machine, and Java card.
ACM Comput. Surv. 33(4): 517-558 (2001) |
34 | EE | Josep Domingo-Ferrer,
Pieter H. Hartel:
Current directions in smart cards.
Computer Networks 36(4): 377-379 (2001) |
2000 |
33 | | Pieter H. Hartel:
Formalising Java Safety - An overview.
CARDIS 2000: 115-134 |
32 | | Neil Henderson,
Pieter H. Hartel:
Pressure Sequence - A Novel Method of Protecting Smart Cards.
CARDIS 2000: 241-256 |
31 | EE | Pieter H. Hartel,
Eduard de Jong:
A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations.
Java Card Workshop 2000: 52-72 |
30 | | Hugh Glaser,
Pieter H. Hartel,
Paul W. Garratt:
Programming by Numbers: A Programming Method for Novices.
Comput. J. 43(4): 252-265 (2000) |
29 | EE | Stephan Diehl,
Pieter H. Hartel,
Peter Sestoft:
Abstract machines for programming language implementation.
Future Generation Comp. Syst. 16(7): 739-751 (2000) |
28 | EE | Stephan Diehl,
Pieter H. Hartel,
Peter Sestoft:
Principles of abstract machines.
Future Generation Comp. Syst. 16(7): (2000) |
1999 |
27 | EE | Pieter H. Hartel,
Michael J. Butler,
Moshe Levy:
The Operational Semantics of a Java Secure Processor.
Formal Syntax and Semantics of Java 1999: 313-352 |
26 | EE | Michael J. Butler,
Pieter H. Hartel:
Reasoning about Grover's quantum search algorithm using probabilistic wp.
ACM Trans. Program. Lang. Syst. 21(3): 417-429 (1999) |
25 | | Sandro Etalle,
Pieter H. Hartel,
Willem G. Vree:
Declarative solutions to partitioned-grid problems.
Softw., Pract. Exper. 29(13): 1173-1200 (1999) |
24 | | Pieter H. Hartel:
LETOS - a lightweight execution tool for operational semantics.
Softw., Pract. Exper. 29(15): 1379-1416 (1999) |
1998 |
23 | | Pieter H. Hartel,
Jake Hill,
Matt Sims:
An Operational Model of QuickPay - Extended Abstract.
CARDIS 1998: 19-28 |
1997 |
22 | | Hugh Glaser,
Pieter H. Hartel,
Herbert Kuchen:
Programming Languages: Implementations, Logics, and Programs, 9th International Symposium, PLILP'97, Including a Special Trach on Declarative Programming Languages in Education, Southampton, UK, September 3-5, 1997, Proceedings
Springer 1997 |
1996 |
21 | | Pieter H. Hartel,
Jean-Jacques Quisquater:
Introduction to CARDIS 1996.
CARDIS 1996 |
20 | | Hugh Glaser,
Pieter H. Hartel,
Eduard K. de Jong Frz:
Structuring and Visualising an IC-card Security Standard.
CARDIS 1996 |
19 | | Marjan I. Alberda,
Pieter H. Hartel,
Eduard K. de Jong Frz:
Using formal methods to cultivate trust in Smart Card Operating Systems.
CARDIS 1996 |
18 | | Pieter H. Hartel,
Hugh Glaser:
The Resource Constrained Shortest Path Problem Implemented in a Lazy Functional Language.
J. Funct. Program. 6(1): 29-45 (1996) |
17 | | Pieter H. Hartel,
Marc Feeley,
Martin Alt,
Lennart Augustsson,
Peter Baumann,
Marcel Beemster,
Emmanuel Chailloux,
Christine H. Flood,
Wolfgang Grieskamp,
John H. G. van Groningen,
Kevin Hammond,
Bogumil Hausman,
Melody Y. Ivory,
Richard E. Jones,
Jasper Kamperman,
Peter Lee,
Xavier Leroy,
Rafael Dueire Lins,
Sandra Loosemore,
Niklas Röjemo,
Manuel Serrano,
Jean-Pierre Talpin,
Jon Thackray,
Stephen Thomas,
Pum Walters,
Pierre Weis,
Peter Wentworth:
Benchmarking Implementations of Functional Languages with `Pseudoknot', a Float-Intensive Benchmark.
J. Funct. Program. 6(4): 621-655 (1996) |
1995 |
16 | | Pieter H. Hartel,
Marinus J. Plasmeijer:
Functional Programming Languages in Education, First International Symposium, FPLE'95, Nijmegen, The Netherlands, December 4-6, 1995, Proceedings
Springer 1995 |
15 | | Pieter H. Hartel,
Bert van Es,
Dick Tromp:
Basic Proof Skills of Computer Science Students.
FPLE 1995: 269-287 |
14 | | Hugh McEvoy,
Pieter H. Hartel:
Local Linear Logic for Locality Consciousness in Multiset Transformation
PLILP 1995: 357-379 |
13 | EE | Pieter H. Hartel,
Rutger F. H. Hofman,
Koen Langendoen,
Henk L. Muller,
Willem G. Vree,
Louis O. Hertzberger:
A toolkit for parallel functional programming.
Concurrency - Practice and Experience 7(8): 765-793 (1995) |
12 | | Pieter H. Hartel,
Marinus J. Plasmeijer:
Special Issue on State-of-the-Art Applications of Pure Functional Programming Languages.
J. Funct. Program. 5(3): 279-281 (1995) |
11 | | Willem G. Vree,
Pieter H. Hartel:
Communication Lifting: Fixed Point Computation for Parallelism.
J. Funct. Program. 5(4): 549-581 (1995) |
10 | | A. Reza Haydarlou,
Pieter H. Hartel:
Thunk Lifting: Reducing Heap Usage in an Implementation of a Lazy Functional Language.
Journal of Functional and Logic Programming 1995(1): (1995) |
1994 |
9 | | Pieter H. Hartel,
Willem G. Vree:
Experiments wiht Destructive Updates in a Lazy Functional Language.
Comput. Lang. 20(3): 177-192 (1994) |
8 | | Pieter H. Hartel,
Hugh Glaser,
John M. Wild:
Compilation of Functional Languages using Flow Graph Analysis.
Softw., Pract. Exper. 24(2): 127-173 (1994) |
1993 |
7 | | Pieter H. Hartel,
Koen Langendoen:
Benchmarking Implementations of Lazy Functional Languages.
FPCA 1993: 341-349 |
1992 |
6 | | Koen Langendoen,
Pieter H. Hartel:
FCG: A Code Generator for Lazy Functional Languages.
CC 1992: 278-296 |
1991 |
5 | | Pieter H. Hartel:
Performance of Lazy Combinator Graph Reduction.
Softw., Pract. Exper. 21(3): 299-329 (1991) |
1990 |
4 | | Pieter H. Hartel:
A Comparison of Three Garbage Collection Algorithms.
Structured Programming 11(3): 117-128 (1990) |
1988 |
3 | | Pieter H. Hartel:
The Average Size of Ordered Binary Subgraphs.
WG 1988: 327-351 |
2 | | Pieter H. Hartel,
Arthur H. Veen:
Statistics on Graph Reduction of SASL Programs.
Softw., Pract. Exper. 18(3): 239-253 (1988) |
1983 |
1 | | Jan van den Bos,
Marinus J. Plasmeijer,
Pieter H. Hartel:
Input-Output Tools: A Language Facility for Interactive and Real-Time Systems.
IEEE Trans. Software Eng. 9(3): 247-259 (1983) |