The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bart De Decker: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bart De Decker
    Unix Security & Kerberos. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:257-274 [Conf]
  2. Bart De Decker
    Introduction to Computer Security. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:377-393 [Conf]
  3. Philip Vanneste, Bart De Decker, Marcin Chrzanowski, Ken Warkentyne
    Panel Discussion: The Use of Internet in Education. [Citation Graph (0, 0)][DBLP]
    CALISCE, 1996, pp:39-41 [Conf]
  4. Liesje Demuynck, Bart De Decker
    Privacy-Preserving Electronic Health Records. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:150-159 [Conf]
  5. Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen
    Assessment of Palm OS Susceptibility to Malicious Code Threats. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:240-249 [Conf]
  6. Vincent Naessens, Liesje Demuynck, Bart De Decker
    A Fair Anonymous Submission and Review System. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:43-53 [Conf]
  7. Kristof Verslype, Bart De Decker
    A Flexible and Open DRM Framework. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:173-184 [Conf]
  8. Bart De Decker, Gregory Neven, Frank Piessens, Erik Van Hoeymissen
    Second Price Auctions, A Case Study of Secure Distributed Computating. [Citation Graph (0, 0)][DBLP]
    DAIS, 2001, pp:217-228 [Conf]
  9. Sam Michiels, Kristof Verslype, Wouter Joosen, Bart De Decker
    Towards a software architecture for DRM. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2005, pp:65-74 [Conf]
  10. Bart De Decker, Frank Piessens, Erik Van Hoeymissen, Gregory Neven
    Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations. [Citation Graph (0, 0)][DBLP]
    MATA, 2000, pp:219-232 [Conf]
  11. Vincent Naessens, Bart Vanhaute, Bart De Decker
    Securing RMI Communication. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:93-106 [Conf]
  12. Bart De Win, Bart Vanhaute, Bart De Decker
    Security Through Aspect-Oriented Programming. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:125-138 [Conf]
  13. Steven Gevers, Bart De Decker
    Privacy Friendly Information Disclosure. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:636-646 [Conf]
  14. Yolande Berbers, Bart De Decker, Wouter Joosen, Frank Matthijs, Bert Robben
    Management of Events in a multi-agent system. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1997, pp:1141-1150 [Conf]
  15. Bart De Decker, Gregory Neven, Frank Piessens
    Secure Vickrey Auctions without a Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:337-348 [Conf]
  16. T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker
    On Securely Scheduling a Meeting. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:183-198 [Conf]
  17. Vincent Naessens, Bart De Decker
    A Methodology for Designing Controlled Anonymous Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:111-122 [Conf]
  18. Vincent Naessens, Bart De Decker, Liesje Demuynck
    Accountable Anonymous E-Mail. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:3-18 [Conf]
  19. Gregory Neven, Frank Piessens, Bart De Decker
    On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:361-370 [Conf]
  20. Bart De Win, Jan Van den Bergh 0002, Frank Matthijs, Bart De Decker, Wouter Joosen
    A Security Architecture for Electronic Commerce Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:491-500 [Conf]
  21. Yolande Berbers, Bart De Decker, Wouter Joosen
    Infrastructure for mobile agents. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1996, pp:173-180 [Conf]
  22. Frank Piessens, Bart De Decker, Bart De Win
    Developing secure software. A survey and classification of common software vulnerabilities. [Citation Graph (0, 0)][DBLP]
    IICIS, 2001, pp:27-40 [Conf]
  23. Bart De Win, Bart Vanhaute, Bart De Decker
    How aspect-oriented programming can help to build secure software. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  24. Stefan Brands, Liesje Demuynck, Bart De Decker
    A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:400-415 [Conf]

  25. Linking Privacy Solutions to Developer Goals. [Citation Graph (, )][DBLP]


  26. PriMan : A Privacy-Preserving Identity Framework. [Citation Graph (, )][DBLP]


  27. A Privacy-Preserving Ticketing System. [Citation Graph (, )][DBLP]


  28. Privacy-Preserving Telemonitoring for eHealth. [Citation Graph (, )][DBLP]


  29. A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System. [Citation Graph (, )][DBLP]


  30. Anonymous, Yet Trustworthy Auctions. [Citation Graph (, )][DBLP]


  31. A Credential-Based System for the Anonymous Delegation of Rights. [Citation Graph (, )][DBLP]


  32. Ubiquitous Privacy-Preserving Identity Managment. [Citation Graph (, )][DBLP]


  33. Security and Privacy Improvements for the Belgian eID Technology. [Citation Graph (, )][DBLP]


  34. Service and Timeframe Dependent Unlinkable One-time Pseudonyms. [Citation Graph (, )][DBLP]


  35. Enhancing privacy in identity management systems. [Citation Graph (, )][DBLP]


  36. Specification of Fair Data Practice Principles Using Privacy Policy Languages. [Citation Graph (, )][DBLP]


  37. Extending the Belgian eID Technology with Mobile Security Functionality. [Citation Graph (, )][DBLP]


Search in 0.347secs, Finished in 0.350secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002