The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Pieter H. Hartel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Pieter H. Hartel, Marc Feeley, Martin Alt, Lennart Augustsson, Peter Baumann, Marcel Beemster, Emmanuel Chailloux, Christine H. Flood, Wolfgang Grieskamp, John H. G. van Groningen, Kevin Hammond, Bogumil Hausman, Melody Y. Ivory, Richard E. Jones, Jasper Kamperman, Peter Lee, Xavier Leroy, Rafael Dueire Lins, Sandra Loosemore, Niklas Röjemo, Manuel Serrano, Jean-Pierre Talpin, Jon Thackray, Stephen Thomas, Pum Walters, Pierre Weis, Peter Wentworth
    Benchmarking Implementations of Functional Languages with `Pseudoknot', a Float-Intensive Benchmark. [Citation Graph (1, 0)][DBLP]
    J. Funct. Program., 1996, v:6, n:4, pp:621-655 [Journal]
  2. Marjan I. Alberda, Pieter H. Hartel, Eduard K. de Jong Frz
    Using formal methods to cultivate trust in Smart Card Operating Systems. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1996, pp:- [Conf]
  3. Hugh Glaser, Pieter H. Hartel, Eduard K. de Jong Frz
    Structuring and Visualising an IC-card Security Standard. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1996, pp:- [Conf]
  4. Erik Poll, Pieter H. Hartel, Eduard de Jong
    A Java Reference Model of Transacted Memory for Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2002, pp:75-86 [Conf]
  5. Pieter H. Hartel
    Formalising Java Safety - An overview. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:115-134 [Conf]
  6. Pieter H. Hartel
    The State of WG 8.8. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2002, pp:- [Conf]
  7. Pieter H. Hartel, Jake Hill, Matt Sims
    An Operational Model of QuickPay - Extended Abstract. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:19-28 [Conf]
  8. Pieter H. Hartel, Jean-Jacques Quisquater
    Introduction to CARDIS 1996. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1996, pp:- [Conf]
  9. Neil Henderson, Pieter H. Hartel
    Pressure Sequence - A Novel Method of Protecting Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:241-256 [Conf]
  10. Pieter H. Hartel, Pascal van Eck, Sandro Etalle, Roel Wieringa
    Modelling Mobility Aspects of Security Policies. [Citation Graph (0, 0)][DBLP]
    CASSIS, 2004, pp:172-191 [Conf]
  11. Koen Langendoen, Pieter H. Hartel
    FCG: A Code Generator for Lazy Functional Languages. [Citation Graph (0, 0)][DBLP]
    CC, 1992, pp:278-296 [Conf]
  12. Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
    Timed model checking of security protocols. [Citation Graph (0, 0)][DBLP]
    FMSE, 2004, pp:23-32 [Conf]
  13. Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis
    Fuzzy extractors for continuous distributions. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:353-355 [Conf]
  14. Neil J. Henderson, Neil M. White, Pieter H. Hartel
    iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric. [Citation Graph (0, 0)][DBLP]
    E-smart, 2001, pp:124-134 [Conf]
  15. Pieter H. Hartel, Michael J. Butler, Eduard de Jong, Mark Longley
    Transacted Memory for Smart Cards. [Citation Graph (0, 0)][DBLP]
    FME, 2001, pp:478-499 [Conf]
  16. Pieter H. Hartel, Koen Langendoen
    Benchmarking Implementations of Lazy Functional Languages. [Citation Graph (0, 0)][DBLP]
    FPCA, 1993, pp:341-349 [Conf]
  17. Pieter H. Hartel, Bert van Es, Dick Tromp
    Basic Proof Skills of Computer Science Students. [Citation Graph (0, 0)][DBLP]
    FPLE, 1995, pp:269-287 [Conf]
  18. Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Yee Wei Law
    Approximating Fair Use in LicenseScript. [Citation Graph (0, 0)][DBLP]
    ICADL, 2003, pp:432-443 [Conf]
  19. Ileana Buhan, Asker M. Bazen, Pieter H. Hartel, Raymond N. J. Veldhuis
    A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems. [Citation Graph (0, 0)][DBLP]
    ICB, 2006, pp:728-736 [Conf]
  20. Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Rieks Joosten, Geert Kleinhuis
    Service Brokerage in Prolog. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2005, pp:409-412 [Conf]
  21. Cheun Ngen Chong, René van Buuren, Pieter H. Hartel, Geert Kleinhuis
    Security Attributes Based Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    IDMS/PROMS, 2002, pp:339-352 [Conf]
  22. Yee Wei Law, Ricardo Corin, Sandro Etalle, Pieter H. Hartel
    A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:27-39 [Conf]
  23. Vasughi Sundramoorthy, Pieter H. Hartel, Hans Scholten
    On consistency maintenance in service discovery. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  24. Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon
    POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:144-156 [Conf]
  25. Pieter H. Hartel, Michael J. Butler, Moshe Levy
    The Operational Semantics of a Java Secure Processor. [Citation Graph (0, 0)][DBLP]
    Formal Syntax and Semantics of Java, 1999, pp:313-352 [Conf]
  26. Pieter H. Hartel, Eduard de Jong
    A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations. [Citation Graph (0, 0)][DBLP]
    Java Card Workshop, 2000, pp:52-72 [Conf]
  27. Hans Scholten, Pierre G. Jansen, Ferdy Hanssen, Pieter H. Hartel, T. Hattink, Vasughi Sundramoorthy
    Multimedia QoS in Low-Cost Home Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2002, pp:327-328 [Conf]
  28. Vasughi Sundramoorthy, Pieter H. Hartel, Jerry den Hartog, Hans Scholten, C. Tan
    Functional Principles of Registry-based Service Discovery. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:209-217 [Conf]
  29. Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel
    Comparing Logic-Based and XML-Based Rights Expression Languages. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2003, pp:779-792 [Conf]
  30. Hugh McEvoy, Pieter H. Hartel
    Local Linear Logic for Locality Consciousness in Multiset Transformation [Citation Graph (0, 0)][DBLP]
    PLILP, 1995, pp:357-379 [Conf]
  31. Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga
    Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:76-88 [Conf]
  32. Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus
    StreamTo: Streaming Content using a Tamper-Resistant Token. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:601-612 [Conf]
  33. Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
    Secure Audit Logging with Tamper-Resistant Hardware. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:73-84 [Conf]
  34. Yee Wei Law, Sandro Etalle, Pieter H. Hartel
    Assessing Security in Energy-Efficient Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:459-463 [Conf]
  35. Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker
    Efficient Tree Search in Encrypted Data. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:126-135 [Conf]
  36. Raymond N. J. Veldhuis, Asker M. Bazen, Joost A. Kauffman, Pieter H. Hartel
    Biometric verification based on grip-pattern recognition. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:634-641 [Conf]
  37. Pieter H. Hartel
    A Trace Semantics for Positive Core XPath. [Citation Graph (0, 0)][DBLP]
    TIME, 2005, pp:103-112 [Conf]
  38. Pieter H. Hartel
    The Average Size of Ordered Binary Subgraphs. [Citation Graph (0, 0)][DBLP]
    WG, 1988, pp:327-351 [Conf]
  39. Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin
    License Protection with a Tamper-Resistant Token. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:223-237 [Conf]
  40. Adam Field, Pieter H. Hartel, Wim Mooij
    Personal DJ, an architecture for personalised content delivery. [Citation Graph (0, 0)][DBLP]
    WWW, 2001, pp:1-7 [Conf]
  41. Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, Andrew Tokmakoff
    LicenseScript: a logical language for digital rights management. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2006, v:61, n:3-4, pp:284-331 [Journal]
  42. Hugh Glaser, Pieter H. Hartel, Paul W. Garratt
    Programming by Numbers: A Programming Method for Novices. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2000, v:43, n:4, pp:252-265 [Journal]
  43. Pieter H. Hartel, Willem G. Vree
    Experiments wiht Destructive Updates in a Lazy Functional Language. [Citation Graph (0, 0)][DBLP]
    Comput. Lang., 1994, v:20, n:3, pp:177-192 [Journal]
  44. Josep Domingo-Ferrer, Pieter H. Hartel
    Current directions in smart cards. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:36, n:4, pp:377-379 [Journal]
  45. Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter H. Hartel
    A Trace Logic for Local Security Properties [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  46. Pieter H. Hartel, Luc Moreau
    Formalizing the safety of Java, the Java virtual machine, and Java card. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 2001, v:33, n:4, pp:517-558 [Journal]
  47. Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Antonio Durante
    A Trace Logic for Local Security Properties. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:129-143 [Journal]
  48. Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog
    Nonmonotonic Trust Management for P2P Applications. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:113-130 [Journal]
  49. A. Reza Haydarlou, Pieter H. Hartel
    Thunk Lifting: Reducing Heap Usage in an Implementation of a Lazy Functional Language. [Citation Graph (0, 0)][DBLP]
    Journal of Functional and Logic Programming, 1995, v:1995, n:1, pp:- [Journal]
  50. Pieter H. Hartel, Hugh Glaser
    The Resource Constrained Shortest Path Problem Implemented in a Lazy Functional Language. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 1996, v:6, n:1, pp:29-45 [Journal]
  51. Pieter H. Hartel, Henk L. Muller, Hugh Glaser
    The Functional "C" experience. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 2004, v:14, n:2, pp:129-135 [Journal]
  52. Pieter H. Hartel, Marinus J. Plasmeijer
    Special Issue on State-of-the-Art Applications of Pure Functional Programming Languages. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 1995, v:5, n:3, pp:279-281 [Journal]
  53. Willem G. Vree, Pieter H. Hartel
    Communication Lifting: Fixed Point Computation for Parallelism. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 1995, v:5, n:4, pp:549-581 [Journal]
  54. Ton Kalker, Dick H. J. Epema, Pieter H. Hartel, Reginald L. Lagendijk, Maarten van Steen
    Music2Share - Copyright-Compliant Music Sharing in P2P Systems. [Citation Graph (0, 0)][DBLP]
    Proceedings of the IEEE, 2004, v:92, n:6, pp:961-970 [Journal]
  55. Sandro Etalle, Pieter H. Hartel, Willem G. Vree
    Declarative solutions to partitioned-grid problems. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1999, v:29, n:13, pp:1173-1200 [Journal]
  56. Pieter H. Hartel
    Performance of Lazy Combinator Graph Reduction. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1991, v:21, n:3, pp:299-329 [Journal]
  57. Pieter H. Hartel
    LETOS - a lightweight execution tool for operational semantics. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1999, v:29, n:15, pp:1379-1416 [Journal]
  58. Pieter H. Hartel, Hugh Glaser, John M. Wild
    Compilation of Functional Languages using Flow Graph Analysis. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1994, v:24, n:2, pp:127-173 [Journal]
  59. Pieter H. Hartel, Arthur H. Veen
    Statistics on Graph Reduction of SASL Programs. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1988, v:18, n:3, pp:239-253 [Journal]
  60. Pieter H. Hartel
    A Comparison of Three Garbage Collection Algorithms. [Citation Graph (0, 0)][DBLP]
    Structured Programming, 1990, v:11, n:3, pp:117-128 [Journal]
  61. Michael J. Butler, Pieter H. Hartel
    Reasoning about Grover's quantum search algorithm using probabilistic wp. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1999, v:21, n:3, pp:417-429 [Journal]
  62. Yee Wei Law, Jeroen Doumen, Pieter H. Hartel
    Survey and benchmark of block ciphers for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2006, v:2, n:1, pp:65-93 [Journal]
  63. Jan van den Bos, Marinus J. Plasmeijer, Pieter H. Hartel
    Input-Output Tools: A Language Facility for Interactive and Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1983, v:9, n:3, pp:247-259 [Journal]
  64. Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis
    Feeling Is Believing: A Secure Template Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    ICB, 2007, pp:897-906 [Conf]
  65. Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
    Timed Analysis of Security Protocols [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  66. Stephan Diehl, Pieter H. Hartel, Peter Sestoft
    Principles of abstract machines. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:7, pp:- [Journal]
  67. Stephan Diehl, Pieter H. Hartel, Peter Sestoft
    Abstract machines for programming language implementation. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:7, pp:739-751 [Journal]

  68. Power management of MEMS-based storage devices for mobile systems. [Citation Graph (, )][DBLP]


  69. Inter-domain Identity-Based Proxy Re-encryption. [Citation Graph (, )][DBLP]


  70. Workload-based configuration of MEMS-based storage devices for mobile systems. [Citation Graph (, )][DBLP]


  71. Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. [Citation Graph (, )][DBLP]


  72. Towards Tamper-evident Storage on Patterned Media. [Citation Graph (, )][DBLP]


  73. Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow. [Citation Graph (, )][DBLP]


  74. Embedding Renewable Cryptographic Keys into Continuous Noisy Data. [Citation Graph (, )][DBLP]


  75. Towards an Information Theoretic Analysis of Searchable Encryption. [Citation Graph (, )][DBLP]


  76. Towards Secure and Practical MACs for Body Sensor Networks. [Citation Graph (, )][DBLP]


  77. A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  78. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. [Citation Graph (, )][DBLP]


  79. Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  80. Policies for probe-wear leveling in MEMS-based storage devices. [Citation Graph (, )][DBLP]


  81. Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  82. MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. [Citation Graph (, )][DBLP]


  83. Searching Keywords with Wildcards on Encrypted Data. [Citation Graph (, )][DBLP]


  84. Computationally Efficient Searchable Symmetric Encryption. [Citation Graph (, )][DBLP]


  85. A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. [Citation Graph (, )][DBLP]


  86. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. [Citation Graph (, )][DBLP]


  87. A toolkit for parallel functional programming. [Citation Graph (, )][DBLP]


  88. Nonmonotonic Trust Management for P2P Applications [Citation Graph (, )][DBLP]


  89. Poseidon: a 2-tier Anomaly-based Intrusion Detection System [Citation Graph (, )][DBLP]


Search in 3.060secs, Finished in 3.065secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002