|
Search the dblp DataBase
Bart De Decker:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Bart De Decker
Unix Security & Kerberos. [Citation Graph (0, 0)][DBLP] Computer Security and Industrial Cryptography, 1991, pp:257-274 [Conf]
- Bart De Decker
Introduction to Computer Security. [Citation Graph (0, 0)][DBLP] State of the Art in Applied Cryptography, 1997, pp:377-393 [Conf]
- Philip Vanneste, Bart De Decker, Marcin Chrzanowski, Ken Warkentyne
Panel Discussion: The Use of Internet in Education. [Citation Graph (0, 0)][DBLP] CALISCE, 1996, pp:39-41 [Conf]
- Liesje Demuynck, Bart De Decker
Privacy-Preserving Electronic Health Records. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:150-159 [Conf]
- Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen
Assessment of Palm OS Susceptibility to Malicious Code Threats. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:240-249 [Conf]
- Vincent Naessens, Liesje Demuynck, Bart De Decker
A Fair Anonymous Submission and Review System. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:43-53 [Conf]
- Kristof Verslype, Bart De Decker
A Flexible and Open DRM Framework. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:173-184 [Conf]
- Bart De Decker, Gregory Neven, Frank Piessens, Erik Van Hoeymissen
Second Price Auctions, A Case Study of Secure Distributed Computating. [Citation Graph (0, 0)][DBLP] DAIS, 2001, pp:217-228 [Conf]
- Sam Michiels, Kristof Verslype, Wouter Joosen, Bart De Decker
Towards a software architecture for DRM. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2005, pp:65-74 [Conf]
- Bart De Decker, Frank Piessens, Erik Van Hoeymissen, Gregory Neven
Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations. [Citation Graph (0, 0)][DBLP] MATA, 2000, pp:219-232 [Conf]
- Vincent Naessens, Bart Vanhaute, Bart De Decker
Securing RMI Communication. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:93-106 [Conf]
- Bart De Win, Bart Vanhaute, Bart De Decker
Security Through Aspect-Oriented Programming. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:125-138 [Conf]
- Steven Gevers, Bart De Decker
Privacy Friendly Information Disclosure. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:636-646 [Conf]
- Yolande Berbers, Bart De Decker, Wouter Joosen, Frank Matthijs, Bert Robben
Management of Events in a multi-agent system. [Citation Graph (0, 0)][DBLP] PDPTA, 1997, pp:1141-1150 [Conf]
- Bart De Decker, Gregory Neven, Frank Piessens
Secure Vickrey Auctions without a Trusted Third Party. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:337-348 [Conf]
- T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker
On Securely Scheduling a Meeting. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:183-198 [Conf]
- Vincent Naessens, Bart De Decker
A Methodology for Designing Controlled Anonymous Applications. [Citation Graph (0, 0)][DBLP] SEC, 2006, pp:111-122 [Conf]
- Vincent Naessens, Bart De Decker, Liesje Demuynck
Accountable Anonymous E-Mail. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:3-18 [Conf]
- Gregory Neven, Frank Piessens, Bart De Decker
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:361-370 [Conf]
- Bart De Win, Jan Van den Bergh 0002, Frank Matthijs, Bart De Decker, Wouter Joosen
A Security Architecture for Electronic Commerce Applications. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:491-500 [Conf]
- Yolande Berbers, Bart De Decker, Wouter Joosen
Infrastructure for mobile agents. [Citation Graph (0, 0)][DBLP] ACM SIGOPS European Workshop, 1996, pp:173-180 [Conf]
- Frank Piessens, Bart De Decker, Bart De Win
Developing secure software. A survey and classification of common software vulnerabilities. [Citation Graph (0, 0)][DBLP] IICIS, 2001, pp:27-40 [Conf]
- Bart De Win, Bart Vanhaute, Bart De Decker
How aspect-oriented programming can help to build secure software. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Stefan Brands, Liesje Demuynck, Bart De Decker
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. [Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:400-415 [Conf]
Linking Privacy Solutions to Developer Goals. [Citation Graph (, )][DBLP]
PriMan : A Privacy-Preserving Identity Framework. [Citation Graph (, )][DBLP]
A Privacy-Preserving Ticketing System. [Citation Graph (, )][DBLP]
Privacy-Preserving Telemonitoring for eHealth. [Citation Graph (, )][DBLP]
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System. [Citation Graph (, )][DBLP]
Anonymous, Yet Trustworthy Auctions. [Citation Graph (, )][DBLP]
A Credential-Based System for the Anonymous Delegation of Rights. [Citation Graph (, )][DBLP]
Ubiquitous Privacy-Preserving Identity Managment. [Citation Graph (, )][DBLP]
Security and Privacy Improvements for the Belgian eID Technology. [Citation Graph (, )][DBLP]
Service and Timeframe Dependent Unlinkable One-time Pseudonyms. [Citation Graph (, )][DBLP]
Enhancing privacy in identity management systems. [Citation Graph (, )][DBLP]
Specification of Fair Data Practice Principles Using Privacy Policy Languages. [Citation Graph (, )][DBLP]
Extending the Belgian eID Technology with Mobile Security Functionality. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.305secs
|