Sjouke Mauw
Sjouke Mauw
Professor in Security and Trust of Software Systems, University of Luxembourg
Dirección de correo verificada de uni.lu - Página principal
Título
Citado por
Citado por
Año
Foundations of attack trees
S Mauw, M Oostdijk
International Conference on Information Security and Cryptology, 186-198, 2005
4782005
Foundations of attack–defense trees
B Kordy, S Mauw, S Radomirović, P Schweitzer
International Workshop on Formal Aspects in Security and Trust, 80-95, 2010
2272010
An algebraic semantics of basic message sequence charts
S Mauw, MA Reniers
The computer journal 37 (4), 269-277, 1994
2081994
Formal test automation: A simple experiment
A Belinfante, J Feenstra, RG de Vries, J Tretmans, N Goga, L Feijs, ...
Testing of Communicating Systems, 179-196, 1999
1791999
A process specification formalism
S Mauw, GJ Veltink
Fundamenta Informaticae 13 (2), 85-139, 1990
1521990
High-level message sequence charts
S Mauw, MA Reniers
SDL'97: Time for Testing, 291-306, 1997
1501997
Attack–defense trees
B Kordy, S Mauw, S Radomirović, P Schweitzer
Journal of Logic and Computation 24 (1), 55-87, 2014
1362014
Test generation for intelligent networks using model checking
A Engels, L Feijs, S Mauw
International Workshop on Tools and Algorithms for the Construction and …, 1997
1351997
Security properties
C Cremers, S Mauw
Operational Semantics and Verification of Security Protocols, 37-65, 2012
1162012
Design and analysis of dynamic leader election protocols in broadcast networks
J Brunekreef, JP Katoen, R Koymans, S Mauw
Distributed Computing 9 (4), 157, 1996
1101996
Algebraic specification of communication protocols
S Mauw, GJ Veltink
Cambridge university press, 2008
952008
Model checking for managers
W Janssen, R Mateescu, S Mauw, P Fennema, P Van Der Stappen
International SPIN Workshop on Model Checking of Software, 92-107, 1999
951999
A formalization of anonymity and onion routing
S Mauw, JHS Verschuren, EP de Vink
European Symposium on Research in Computer Security, 109-124, 2004
932004
A new formal proof model for RFID location privacy
J Ha, S Moon, J Zhou, J Ha
European symposium on research in computer security, 267-281, 2008
882008
Untraceability of RFID protocols
T Van Deursen, S Mauw, S Radomirović
IFIP International Workshop on Information Security Theory and Practices, 1-15, 2008
862008
ADTool: security analysis with attack–defense trees
B Kordy, P Kordy, S Mauw, P Schweitzer
International conference on quantitative evaluation of systems, 173-176, 2013
83*2013
Operational semantics of security protocols
C Cremers, S Mauw
Scenarios: Models, Transformations and Tools, 66-89, 2005
782005
A framework for compositional verification of security protocols
S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović
Information and Computation 206 (2-4), 425-459, 2008
772008
The formalization of message sequence charts
S Mauw
Computer Networks and ISDN Systems 28 (12), 1643-1657, 1996
751996
Verifying business processes using SPIN
W Janssen, R Mateescu, S Mauw, J Springintveld
Proceedings of the 4th International SPIN Workshop, 21-36, 1998
671998
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20