The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sjouke Mauw: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mauw
    A Certified Email Protocol Using Key Chains. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:525-530 [Conf]
  2. Jos C. M. Baeten, Jan A. Bergstra, Sjouke Mauw, Gert J. Veltink
    A Process Specification Formalism Based on Static COLD. [Citation Graph (0, 0)][DBLP]
    Algebraic Methods, 1989, pp:303-335 [Conf]
  3. Sjouke Mauw
    An Algebraic Specification of Process Algebra, Including Two Examples. [Citation Graph (0, 0)][DBLP]
    Algebraic Methods, 1987, pp:507-554 [Conf]
  4. Sjouke Mauw, Freek Wiedijk
    Specification of the Transit Node in PSFd. [Citation Graph (0, 0)][DBLP]
    Algebraic Methods, 1989, pp:341-361 [Conf]
  5. Sjouke Mauw, Gert J. Veltink
    A Proof Assistant for PSF. [Citation Graph (0, 0)][DBLP]
    CAV, 1991, pp:158-168 [Conf]
  6. Pedro R. D'Argenio, Sjouke Mauw
    Delayed choice for process algebra with abstraction. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1995, pp:501-515 [Conf]
  7. Sjouke Mauw, Hans Mulder
    Regularity of BPA-Systems is Decidable. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1994, pp:34-47 [Conf]
  8. Sjouke Mauw, Michel A. Reniers
    Refinement in Interworkings. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1996, pp:671-686 [Conf]
  9. Cas J. F. Cremers, Sjouke Mauw
    Operational Semantics of Security Protocols. [Citation Graph (0, 0)][DBLP]
    Scenarios: Models, Transformations and Tools, 2003, pp:66-89 [Conf]
  10. Sjouke Mauw, Jan Verschuren, Erik P. de Vink
    A Formalization of Anonymity and Onion Routing. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:109-124 [Conf]
  11. Harald P. E. Vranken, Tomás Garciá Garciá, Sjouke Mauw, Loe M. G. Feijs
    IC Design Validation Using Message Sequence Charts. [Citation Graph (0, 0)][DBLP]
    EUROMICRO, 2000, pp:1122-0 [Conf]
  12. Harm M. A. van Beek, Sjouke Mauw
    Automatic Conformance Testing of Internet Applications. [Citation Graph (0, 0)][DBLP]
    FATES, 2003, pp:205-222 [Conf]
  13. Jos C. M. Baeten, Sjouke Mauw
    Delayed choice: an operator for joining Message Sequence Charts. [Citation Graph (0, 0)][DBLP]
    FORTE, 1994, pp:340-354 [Conf]
  14. André Engels, Sjouke Mauw, Michel A. Reniers
    A Hierarchy of Communication Models for Message Sequence Charts. [Citation Graph (0, 0)][DBLP]
    FORTE, 1997, pp:75-90 [Conf]
  15. Sjouke Mauw, Wouter T. Wiersma, Tim A. C. Willemse
    Language Driven System Design. [Citation Graph (0, 0)][DBLP]
    HICSS, 2002, pp:280- [Conf]
  16. Sjouke Mauw, Martijn Oostdijk
    Foundations of Attack Trees. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:186-198 [Conf]
  17. Axel Belinfante, Jan Feenstra, René G. de Vries, Jan Tretmans, Nicolae Goga, Loe M. G. Feijs, Sjouke Mauw, Lex Heerink
    Formal Test Automation: A Simple Experiment. [Citation Graph (0, 0)][DBLP]
    IWTCS, 1999, pp:179-196 [Conf]
  18. Loe M. G. Feijs, Nicolae Goga, Sjouke Mauw, Jan Tretmans
    Test Selection, Trace Distance and Heuristics. [Citation Graph (0, 0)][DBLP]
    TestCom, 2002, pp:267-282 [Conf]
  19. Jos C. M. Baeten, Harm M. A. van Beek, Sjouke Mauw
    Specifying internet applications with DiCons. [Citation Graph (0, 0)][DBLP]
    SAC, 2001, pp:576-584 [Conf]
  20. Cas J. F. Cremers, Sjouke Mauw
    Checking Secrecy by Means of Partial Order Reduction. [Citation Graph (0, 0)][DBLP]
    SAM, 2004, pp:171-188 [Conf]
  21. Loe M. G. Feijs, Nicolae Goga, Sjouke Mauw
    Probabilities In The Torx Test Derivation Algorithm. [Citation Graph (0, 0)][DBLP]
    SAM, 2000, pp:173-188 [Conf]
  22. Jos C. M. Baeten, Harm M. A. van Beek, Sjouke Mauw
    An MSC Based Representation of DiCons. [Citation Graph (0, 0)][DBLP]
    SDL Forum, 2001, pp:328-347 [Conf]
  23. Sjouke Mauw, Michel A. Reniers
    High-level message sequence charts. [Citation Graph (0, 0)][DBLP]
    SDL Forum, 1997, pp:291-306 [Conf]
  24. André Engels, Loe M. G. Feijs, Sjouke Mauw
    MSC and data: dynamic variables. [Citation Graph (0, 0)][DBLP]
    SDL Forum, 1999, pp:105-0 [Conf]
  25. Gopakumar Nair, Ajeesh Gopalakrishnan, Sjouke Mauw, Erik Moll
    XML Security in the Next Generation Optical Disc Context. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:217-233 [Conf]
  26. Sjouke Mauw, Ivo van Vessem, Bert Bos
    Forward Secure Communication in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:32-42 [Conf]
  27. Wil Janssen, Radu Mateescu, Sjouke Mauw, Peter Fennema, Petra van der Stappen
    Model Checking for Managers. [Citation Graph (0, 0)][DBLP]
    SPIN, 1999, pp:92-107 [Conf]
  28. André Engels, Loe M. G. Feijs, Sjouke Mauw
    Test Generation for Intelligent Networks Using Model Checking. [Citation Graph (0, 0)][DBLP]
    TACAS, 1997, pp:384-398 [Conf]
  29. Sjouke Mauw, Gert J. Veltink
    An Introduction to PSFd. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, Vol.2, 1989, pp:272-285 [Conf]
  30. Sjouke Mauw, Michel A. Reniers
    An Algebraic Semantics of Basic Message Sequence Charts. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1994, v:37, n:4, pp:269-278 [Journal]
  31. Sjouke Mauw
    Introduction by the guest editor. [Citation Graph (0, 0)][DBLP]
    Comput. Lang., 2001, v:27, n:1/3, pp:1-2 [Journal]
  32. Sjouke Mauw
    The Formalization of Message Sequence Charts. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1996, v:28, n:12, pp:1643-1657 [Journal]
  33. Sjouke Mauw, Michel A. Reniers
    Operational Semantics for MSC'96. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:17, pp:1785-1799 [Journal]
  34. Jacob Brunekreef, Joost-Pieter Katoen, Ron Koymans, Sjouke Mauw
    Design and Analysis of Dynamic Leader Election Protocols in Broadcast Networks. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 1996, v:9, n:4, pp:157-171 [Journal]
  35. Jan Friso Groote, Wim H. Hesselink, Sjouke Mauw, Rogier Vermeulen
    An algorithm for the asynchronous Write-All problem based on process collision. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2001, v:14, n:2, pp:75-81 [Journal]
  36. Stefan Blom, Jan Friso Groote, Sjouke Mauw, Alexander Serebrenik
    Analysing the BKE-security Protocol with µCRL. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:139, n:1, pp:49-90 [Journal]
  37. Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink
    A Syntactic Criterion for Injectivity of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:135, n:1, pp:23-38 [Journal]
  38. Sjouke Mauw, Valérie Issarny, Cas J. F. Cremers
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:1-2 [Journal]
  39. Sjouke Mauw, Jan Verschuren, Erik P. de Vink
    Data Anonymity in the FOO Voting Scheme. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:5-28 [Journal]
  40. Jan A. Bergstra, Sjouke Mauw, Freek Wiedijk
    Uniform Algebraic Specifications of Finite Sets with Equality. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 1991, v:2, n:1, pp:43-65 [Journal]
  41. Sjouke Mauw, Wouter T. Wiersma, Tim A. C. Willemse
    Language-Driven System Design. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2004, v:14, n:6, pp:625-663 [Journal]
  42. Marc Voorhoeve, Sjouke Mauw
    Impossible futures and determinism. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2001, v:80, n:1, pp:51-58 [Journal]
  43. Sem C. Borst, Onno J. Boxma, Jan Friso Groote, Sjouke Mauw
    Task Allocation in a Multi-Server System. [Citation Graph (0, 0)][DBLP]
    J. Scheduling, 2003, v:6, n:5, pp:423-436 [Journal]
  44. André Engels, Sjouke Mauw, Michel A. Reniers
    A hierarchy of communication models for Message Sequence Charts. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2002, v:44, n:3, pp:253-292 [Journal]
  45. Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink
    Injective synchronisation: An extension of the authentication hierarchy. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:139-161 [Journal]
  46. Suzana Andova, Cas J. F. Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic
    A framework for compositional verification of security protocols [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  47. Measuring Voter-Controlled Privacy. [Citation Graph (, )][DBLP]


  48. Minimal Message Complexity of Asynchronous Multi-party Contract Signing. [Citation Graph (, )][DBLP]


  49. Secure Ownership and Ownership Transfer in RFID Systems. [Citation Graph (, )][DBLP]


  50. Game-Based Verification of Multi-Party Contract Signing Protocols. [Citation Graph (, )][DBLP]


  51. An Algebra for Trust Dilution and Trust Fusion. [Citation Graph (, )][DBLP]


  52. Untraceability of RFID Protocols. [Citation Graph (, )][DBLP]


  53. Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent [Citation Graph (, )][DBLP]


  54. Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002