Search the dblp DataBase
Sjouke Mauw :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jan Cederquist , Muhammad Torabi Dashti , Sjouke Mauw A Certified Email Protocol Using Key Chains. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:525-530 [Conf ] Jos C. M. Baeten , Jan A. Bergstra , Sjouke Mauw , Gert J. Veltink A Process Specification Formalism Based on Static COLD. [Citation Graph (0, 0)][DBLP ] Algebraic Methods, 1989, pp:303-335 [Conf ] Sjouke Mauw An Algebraic Specification of Process Algebra, Including Two Examples. [Citation Graph (0, 0)][DBLP ] Algebraic Methods, 1987, pp:507-554 [Conf ] Sjouke Mauw , Freek Wiedijk Specification of the Transit Node in PSFd . [Citation Graph (0, 0)][DBLP ] Algebraic Methods, 1989, pp:341-361 [Conf ] Sjouke Mauw , Gert J. Veltink A Proof Assistant for PSF. [Citation Graph (0, 0)][DBLP ] CAV, 1991, pp:158-168 [Conf ] Pedro R. D'Argenio , Sjouke Mauw Delayed choice for process algebra with abstraction. [Citation Graph (0, 0)][DBLP ] CONCUR, 1995, pp:501-515 [Conf ] Sjouke Mauw , Hans Mulder Regularity of BPA-Systems is Decidable. [Citation Graph (0, 0)][DBLP ] CONCUR, 1994, pp:34-47 [Conf ] Sjouke Mauw , Michel A. Reniers Refinement in Interworkings. [Citation Graph (0, 0)][DBLP ] CONCUR, 1996, pp:671-686 [Conf ] Cas J. F. Cremers , Sjouke Mauw Operational Semantics of Security Protocols. [Citation Graph (0, 0)][DBLP ] Scenarios: Models, Transformations and Tools, 2003, pp:66-89 [Conf ] Sjouke Mauw , Jan Verschuren , Erik P. de Vink A Formalization of Anonymity and Onion Routing. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:109-124 [Conf ] Harald P. E. Vranken , Tomás Garciá Garciá , Sjouke Mauw , Loe M. G. Feijs IC Design Validation Using Message Sequence Charts. [Citation Graph (0, 0)][DBLP ] EUROMICRO, 2000, pp:1122-0 [Conf ] Harm M. A. van Beek , Sjouke Mauw Automatic Conformance Testing of Internet Applications. [Citation Graph (0, 0)][DBLP ] FATES, 2003, pp:205-222 [Conf ] Jos C. M. Baeten , Sjouke Mauw Delayed choice: an operator for joining Message Sequence Charts. [Citation Graph (0, 0)][DBLP ] FORTE, 1994, pp:340-354 [Conf ] André Engels , Sjouke Mauw , Michel A. Reniers A Hierarchy of Communication Models for Message Sequence Charts. [Citation Graph (0, 0)][DBLP ] FORTE, 1997, pp:75-90 [Conf ] Sjouke Mauw , Wouter T. Wiersma , Tim A. C. Willemse Language Driven System Design. [Citation Graph (0, 0)][DBLP ] HICSS, 2002, pp:280- [Conf ] Sjouke Mauw , Martijn Oostdijk Foundations of Attack Trees. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:186-198 [Conf ] Axel Belinfante , Jan Feenstra , René G. de Vries , Jan Tretmans , Nicolae Goga , Loe M. G. Feijs , Sjouke Mauw , Lex Heerink Formal Test Automation: A Simple Experiment. [Citation Graph (0, 0)][DBLP ] IWTCS, 1999, pp:179-196 [Conf ] Loe M. G. Feijs , Nicolae Goga , Sjouke Mauw , Jan Tretmans Test Selection, Trace Distance and Heuristics. [Citation Graph (0, 0)][DBLP ] TestCom, 2002, pp:267-282 [Conf ] Jos C. M. Baeten , Harm M. A. van Beek , Sjouke Mauw Specifying internet applications with DiCons. [Citation Graph (0, 0)][DBLP ] SAC, 2001, pp:576-584 [Conf ] Cas J. F. Cremers , Sjouke Mauw Checking Secrecy by Means of Partial Order Reduction. [Citation Graph (0, 0)][DBLP ] SAM, 2004, pp:171-188 [Conf ] Loe M. G. Feijs , Nicolae Goga , Sjouke Mauw Probabilities In The Torx Test Derivation Algorithm. [Citation Graph (0, 0)][DBLP ] SAM, 2000, pp:173-188 [Conf ] Jos C. M. Baeten , Harm M. A. van Beek , Sjouke Mauw An MSC Based Representation of DiCons. [Citation Graph (0, 0)][DBLP ] SDL Forum, 2001, pp:328-347 [Conf ] Sjouke Mauw , Michel A. Reniers High-level message sequence charts. [Citation Graph (0, 0)][DBLP ] SDL Forum, 1997, pp:291-306 [Conf ] André Engels , Loe M. G. Feijs , Sjouke Mauw MSC and data: dynamic variables. [Citation Graph (0, 0)][DBLP ] SDL Forum, 1999, pp:105-0 [Conf ] Gopakumar Nair , Ajeesh Gopalakrishnan , Sjouke Mauw , Erik Moll XML Security in the Next Generation Optical Disc Context. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2005, pp:217-233 [Conf ] Sjouke Mauw , Ivo van Vessem , Bert Bos Forward Secure Communication in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] SPC, 2006, pp:32-42 [Conf ] Wil Janssen , Radu Mateescu , Sjouke Mauw , Peter Fennema , Petra van der Stappen Model Checking for Managers. [Citation Graph (0, 0)][DBLP ] SPIN, 1999, pp:92-107 [Conf ] André Engels , Loe M. G. Feijs , Sjouke Mauw Test Generation for Intelligent Networks Using Model Checking. [Citation Graph (0, 0)][DBLP ] TACAS, 1997, pp:384-398 [Conf ] Sjouke Mauw , Gert J. Veltink An Introduction to PSFd. [Citation Graph (0, 0)][DBLP ] TAPSOFT, Vol.2, 1989, pp:272-285 [Conf ] Sjouke Mauw , Michel A. Reniers An Algebraic Semantics of Basic Message Sequence Charts. [Citation Graph (0, 0)][DBLP ] Comput. J., 1994, v:37, n:4, pp:269-278 [Journal ] Sjouke Mauw Introduction by the guest editor. [Citation Graph (0, 0)][DBLP ] Comput. Lang., 2001, v:27, n:1/3, pp:1-2 [Journal ] Sjouke Mauw The Formalization of Message Sequence Charts. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1996, v:28, n:12, pp:1643-1657 [Journal ] Sjouke Mauw , Michel A. Reniers Operational Semantics for MSC'96. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:17, pp:1785-1799 [Journal ] Jacob Brunekreef , Joost-Pieter Katoen , Ron Koymans , Sjouke Mauw Design and Analysis of Dynamic Leader Election Protocols in Broadcast Networks. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 1996, v:9, n:4, pp:157-171 [Journal ] Jan Friso Groote , Wim H. Hesselink , Sjouke Mauw , Rogier Vermeulen An algorithm for the asynchronous Write-All problem based on process collision. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 2001, v:14, n:2, pp:75-81 [Journal ] Stefan Blom , Jan Friso Groote , Sjouke Mauw , Alexander Serebrenik Analysing the BKE-security Protocol with µ CRL. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:139, n:1, pp:49-90 [Journal ] Cas J. F. Cremers , Sjouke Mauw , Erik P. de Vink A Syntactic Criterion for Injectivity of Authentication Protocols. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:135, n:1, pp:23-38 [Journal ] Sjouke Mauw , Valérie Issarny , Cas J. F. Cremers Preface. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:1-2 [Journal ] Sjouke Mauw , Jan Verschuren , Erik P. de Vink Data Anonymity in the FOO Voting Scheme. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:5-28 [Journal ] Jan A. Bergstra , Sjouke Mauw , Freek Wiedijk Uniform Algebraic Specifications of Finite Sets with Equality. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 1991, v:2, n:1, pp:43-65 [Journal ] Sjouke Mauw , Wouter T. Wiersma , Tim A. C. Willemse Language-Driven System Design. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 2004, v:14, n:6, pp:625-663 [Journal ] Marc Voorhoeve , Sjouke Mauw Impossible futures and determinism. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2001, v:80, n:1, pp:51-58 [Journal ] Sem C. Borst , Onno J. Boxma , Jan Friso Groote , Sjouke Mauw Task Allocation in a Multi-Server System. [Citation Graph (0, 0)][DBLP ] J. Scheduling, 2003, v:6, n:5, pp:423-436 [Journal ] André Engels , Sjouke Mauw , Michel A. Reniers A hierarchy of communication models for Message Sequence Charts. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2002, v:44, n:3, pp:253-292 [Journal ] Cas J. F. Cremers , Sjouke Mauw , Erik P. de Vink Injective synchronisation: An extension of the authentication hierarchy. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:367, n:1-2, pp:139-161 [Journal ] Suzana Andova , Cas J. F. Cremers , Kristian Gjøsteen , Sjouke Mauw , Stig Fr. Mjølsnes , Sasa Radomirovic A framework for compositional verification of security protocols [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Measuring Voter-Controlled Privacy. [Citation Graph (, )][DBLP ] Minimal Message Complexity of Asynchronous Multi-party Contract Signing. [Citation Graph (, )][DBLP ] Secure Ownership and Ownership Transfer in RFID Systems. [Citation Graph (, )][DBLP ] Game-Based Verification of Multi-Party Contract Signing Protocols. [Citation Graph (, )][DBLP ] An Algebra for Trust Dilution and Trust Fusion. [Citation Graph (, )][DBLP ] Untraceability of RFID Protocols. [Citation Graph (, )][DBLP ] Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent [Citation Graph (, )][DBLP ] Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.007secs