@article{MauwWW04, title = {Language-Driven System Design}, author = {Sjouke Mauw and Wouter T. Wiersma and Tim A. C. Willemse}, year = {2004}, doi = {10.1142/S0218194004001828}, url = {http://dx.doi.org/10.1142/S0218194004001828}, tags = {language design, C++, design}, researchr = {https://researchr.org/publication/MauwWW04}, cites = {0}, citedby = {0}, journal = {International Journal of Software Engineering and Knowledge Engineering}, volume = {14}, number = {6}, pages = {625-663}, } @article{MassacciPM08, title = {Preface}, author = {Fabio Massacci and Frank Piessens and Sjouke Mauw}, year = {2008}, doi = {10.1016/j.scico.2008.09.002}, url = {http://dx.doi.org/10.1016/j.scico.2008.09.002}, researchr = {https://researchr.org/publication/MassacciPM08}, cites = {0}, citedby = {0}, journal = {Science of Computer Programming}, volume = {74}, number = {1-2}, pages = {1}, } @inproceedings{KordyMRS10, title = {Foundations of Attack-Defense Trees}, author = {Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Patrick Schweitzer}, year = {2010}, doi = {10.1007/978-3-642-19751-2_6}, url = {http://dx.doi.org/10.1007/978-3-642-19751-2_6}, researchr = {https://researchr.org/publication/KordyMRS10}, cites = {0}, citedby = {0}, pages = {80-95}, booktitle = {Formal Aspects of Security and Trust - 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers}, editor = {Pierpaolo Degano and Sandro Etalle and Joshua D. Guttman}, volume = {6561}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-19750-5}, } @inproceedings{JonkerMP09, title = {Measuring Voter-Controlled Privacy}, author = {Hugo L. Jonker and Sjouke Mauw and Jun Pang}, year = {2009}, doi = {10.1109/ARES.2009.81}, url = {http://dx.doi.org/10.1109/ARES.2009.81}, researchr = {https://researchr.org/publication/JonkerMP09}, cites = {0}, citedby = {0}, pages = {289-298}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan}, publisher = {IEEE Computer Society}, } @inproceedings{ZhangZPM09, title = {Game-Based Verification of Multi-Party Contract Signing Protocols}, author = {Ying Zhang and Chenyi Zhang and Jun Pang and Sjouke Mauw}, year = {2009}, doi = {10.1007/978-3-642-12459-4_14}, url = {http://dx.doi.org/10.1007/978-3-642-12459-4_14}, tags = {rule-based, contracts, protocol}, researchr = {https://researchr.org/publication/ZhangZPM09}, cites = {0}, citedby = {0}, pages = {186-200}, booktitle = {Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers}, editor = {Pierpaolo Degano and Joshua D. Guttman}, volume = {5983}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-12458-7}, } @inproceedings{MauwR97, title = {High-level message sequence charts}, author = {Sjouke Mauw and Michel A. Reniers}, year = {1997}, researchr = {https://researchr.org/publication/MauwR97}, cites = {0}, citedby = {0}, pages = {291-306}, booktitle = {SDL 97 Time for Testing, SDL, MSC and Trends - 8th International SDL Forum, Evry, France, 23-29 September 1997, Proceedings}, editor = {Ana R. Cavalli and Amardeo Sarma}, publisher = {Elsevier}, } @article{MauwVV07, title = {Data Anonymity in the FOO Voting Scheme}, author = {Sjouke Mauw and Jan Verschuren and Erik P. de Vink}, year = {2007}, doi = {10.1016/j.entcs.2006.11.001}, url = {http://dx.doi.org/10.1016/j.entcs.2006.11.001}, tags = {data-flow}, researchr = {https://researchr.org/publication/MauwVV07}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {168}, pages = {5-28}, } @inproceedings{MauwV91, title = {A Proof Assistant for PSF}, author = {Sjouke Mauw and Gert J. Veltink}, year = {1991}, tags = {proof assistant}, researchr = {https://researchr.org/publication/MauwV91}, cites = {0}, citedby = {0}, pages = {158-168}, booktitle = {Computer Aided Verification, 3rd International Workshop, CAV 91, Aalborg, Denmark, July, 1-4, 1991, Proceedings}, editor = {Kim Guldstrand Larsen and Arne Skou}, volume = {575}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-55179-4}, } @article{JonkerMP09-0, title = {A formal framework for quantifying voter-controlled privacy}, author = {Hugo L. Jonker and Sjouke Mauw and Jun Pang}, year = {2009}, doi = {10.1016/j.jalgor.2009.02.007}, url = {http://dx.doi.org/10.1016/j.jalgor.2009.02.007}, researchr = {https://researchr.org/publication/JonkerMP09-0}, cites = {0}, citedby = {0}, journal = {J. Algorithms}, volume = {64}, number = {2-3}, pages = {89-105}, } @inproceedings{MauwRD09, title = {Minimal Message Complexity of Asynchronous Multi-party Contract Signing}, author = {Sjouke Mauw and Sasa Radomirovic and Mohammad Torabi Dashti}, year = {2009}, doi = {10.1109/CSF.2009.15}, url = {http://doi.ieeecomputersociety.org/10.1109/CSF.2009.15}, tags = {contracts}, researchr = {https://researchr.org/publication/MauwRD09}, cites = {0}, citedby = {0}, pages = {13-25}, booktitle = {Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009}, publisher = {IEEE Computer Society}, isbn = {978-0-7695-3712-2}, } @inproceedings{BaetenBM01, title = {Specifying internet applications with DiCons}, author = {Jos C. M. Baeten and Harm M. A. van Beek and Sjouke Mauw}, year = {2001}, doi = {10.1145/372202.372466}, url = {http://doi.acm.org/10.1145/372202.372466}, tags = {C++}, researchr = {https://researchr.org/publication/BaetenBM01}, cites = {0}, citedby = {0}, pages = {576-584}, booktitle = {Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), March 11-14, 2001, Las Vegas, NV, USA}, publisher = {ACM}, } @inproceedings{MauwW89, title = {Specification of the Transit Node in PSF::d::}, author = {Sjouke Mauw and Freek Wiedijk}, year = {1989}, researchr = {https://researchr.org/publication/MauwW89}, cites = {0}, citedby = {0}, pages = {341-361}, booktitle = {Algebraic Methods II: Theory, Tools and Applications [papers from a workshop in Mierlo, The Netherlands, September 1989]}, editor = {Jan A. Bergstra and Loe M. G. Feijs}, volume = {490}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-53912-3}, } @article{BorstBGM03, title = {Task Allocation in a Multi-Server System}, author = {Sem C. Borst and Onno J. Boxma and Jan Friso Groote and Sjouke Mauw}, year = {2003}, tags = {C++}, researchr = {https://researchr.org/publication/BorstBGM03}, cites = {0}, citedby = {0}, journal = {J. Scheduling}, volume = {6}, number = {5}, pages = {423-436}, } @inproceedings{MauwV89, title = {An Introduction to PSFd}, author = {Sjouke Mauw and Gert J. Veltink}, year = {1989}, researchr = {https://researchr.org/publication/MauwV89}, cites = {0}, citedby = {0}, pages = {272-285}, booktitle = {TAPSOFT 89: Proceedings of the International Joint Conference on Theory and Practice of Software Development, Barcelona, Spain, March 13-17, 1989, Volume 2: Advanced Seminar on Foundations of Innovative Software Development II and Colloquium on Current Is}, editor = {Josep Díaz and Fernando Orejas}, volume = {352}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-50940-2}, } @inproceedings{MauwM94, title = {Regularity of BPA-Systems is Decidable}, author = {Sjouke Mauw and Hans Mulder}, year = {1994}, researchr = {https://researchr.org/publication/MauwM94}, cites = {0}, citedby = {0}, pages = {34-47}, booktitle = {CONCUR 94, Concurrency Theory, 5th International Conference, Uppsala, Sweden, August 22-25, 1994, Proceedings}, editor = {Bengt Jonsson and Joachim Parrow}, volume = {836}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-58329-7}, } @inproceedings{BaetenBMV89, title = {A Process Specification Formalism Based on Static COLD}, author = {Jos C. M. Baeten and Jan A. Bergstra and Sjouke Mauw and Gert J. Veltink}, year = {1989}, tags = {rule-based, C++}, researchr = {https://researchr.org/publication/BaetenBMV89}, cites = {0}, citedby = {0}, pages = {303-335}, booktitle = {Algebraic Methods II: Theory, Tools and Applications [papers from a workshop in Mierlo, The Netherlands, September 1989]}, editor = {Jan A. Bergstra and Loe M. G. Feijs}, volume = {490}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-53912-3}, } @inproceedings{FeijsGMT02, title = {Test Selection, Trace Distance and Heuristics}, author = {Loe M. G. Feijs and Nicolae Goga and Sjouke Mauw and Jan Tretmans}, year = {2002}, tags = {testing}, researchr = {https://researchr.org/publication/FeijsGMT02}, cites = {0}, citedby = {0}, pages = {267-282}, booktitle = {Testing of Communicating Systems XIV, Applications to Internet Technologies and Services, Proceedings of the IFIP 14th International Conference on Testing Communicating Systems - TestCom 2002, Berlin, Germany, March 19-22, 2002}, editor = {Ina Schieferdecker and Hartmut König and Adam Wolisz}, volume = {210}, series = {IFIP Conference Proceedings}, publisher = {Kluwer}, isbn = {0-7923-7695-1}, } @inproceedings{DeursenMR08, title = {Untraceability of RFID Protocols}, author = {Ton van Deursen and Sjouke Mauw and Sasa Radomirovic}, year = {2008}, doi = {10.1007/978-3-540-79966-5_1}, url = {http://dx.doi.org/10.1007/978-3-540-79966-5_1}, tags = {protocol}, researchr = {https://researchr.org/publication/DeursenMR08}, cites = {0}, citedby = {0}, pages = {1-15}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, volume = {5019}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-79965-8}, } @article{Mauw01, title = {Introduction by the guest editor}, author = {Sjouke Mauw}, year = {2001}, researchr = {https://researchr.org/publication/Mauw01}, cites = {0}, citedby = {0}, journal = {Computer Languages, Systems \& Structures}, volume = {27}, number = {1/3}, pages = {1-2}, } @inproceedings{DArgenioM95, title = {Delayed choice for process algebra with abstraction}, author = {Pedro R. D Argenio and Sjouke Mauw}, year = {1995}, tags = {process algebra, algebra, abstraction}, researchr = {https://researchr.org/publication/DArgenioM95}, cites = {0}, citedby = {0}, pages = {501-515}, booktitle = {CONCUR 95: Concurrency Theory, 6th International Conference, Philadelphia, PA, USA, August 21-24, 1995, Proceedings}, editor = {Insup Lee and Scott A. Smolka}, volume = {962}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-60218-6}, } @inproceedings{CremersM03, title = {Operational Semantics of Security Protocols}, author = {Cas J. F. Cremers and Sjouke Mauw}, year = {2003}, doi = {10.1007/11495628_4}, url = {http://dx.doi.org/10.1007/11495628_4}, tags = {semantics, protocol, security, operational semantics}, researchr = {https://researchr.org/publication/CremersM03}, cites = {0}, citedby = {0}, pages = {66-89}, booktitle = {Scenarios: Models, Transformations and Tools, International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers}, editor = {Stefan Leue and Tarja Systä}, volume = {3466}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-26189-3}, } @article{GrooteHMV01, title = {An algorithm for the asynchronous Write-All problem based on process collision}, author = {Jan Friso Groote and Wim H. Hesselink and Sjouke Mauw and Rogier Vermeulen}, year = {2001}, url = {http://link.springer.de/link/service/journals/00446/bibs/1014002/10140075.htm}, tags = {rule-based}, researchr = {https://researchr.org/publication/GrooteHMV01}, cites = {0}, citedby = {0}, journal = {Distributed Computing}, volume = {14}, number = {2}, pages = {75-81}, } @inproceedings{JanssenMMFS99, title = {Model Checking for Managers}, author = {Wil Janssen and Radu Mateescu and Sjouke Mauw and Peter Fennema and Petra van der Stappen}, year = {1999}, url = {http://link.springer.de/link/service/series/0558/bibs/1680/16800092.htm}, tags = {model checking, meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/JanssenMMFS99}, cites = {0}, citedby = {0}, pages = {92-107}, booktitle = {Theoretical and Practical Aspects of SPIN Model Checking, 5th and 6th International SPIN Workshops, Trento, Italy, July 5, 1999, Toulouse, France, September 21 and 24 1999, Proceedings}, editor = {Dennis Dams and Rob Gerth and Stefan Leue and Mieke Massink}, volume = {1680}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-66499-8}, } @article{CremersMV06, title = {Injective synchronisation: An extension of the authentication hierarchy}, author = {Cas J. F. Cremers and Sjouke Mauw and Erik P. de Vink}, year = {2006}, doi = {10.1016/j.tcs.2006.08.034}, url = {http://dx.doi.org/10.1016/j.tcs.2006.08.034}, researchr = {https://researchr.org/publication/CremersMV06}, cites = {0}, citedby = {0}, journal = {Theoretical Computer Science}, volume = {367}, number = {1-2}, pages = {139-161}, } @inproceedings{CremersM04, title = {Checking Secrecy by Means of Partial Order Reduction}, author = {Cas J. F. Cremers and Sjouke Mauw}, year = {2004}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3319&spage=171}, researchr = {https://researchr.org/publication/CremersM04}, cites = {0}, citedby = {0}, pages = {171-188}, booktitle = {System Analysis and Modeling, 4th International SDL and MSCWorkshop, SAM 2004, Ottawa, Canada, June 1-4, 2004, Revised Selected Papers}, editor = {Daniel Amyot and Alan W. Williams}, volume = {3319}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-24561-8}, } @article{BrunekreefKKM96, title = {Design and Analysis of Dynamic Leader Election Protocols in Broadcast Networks}, author = {Jacob Brunekreef and Joost-Pieter Katoen and Ron Koymans and Sjouke Mauw}, year = {1996}, tags = {protocol, analysis, design}, researchr = {https://researchr.org/publication/BrunekreefKKM96}, cites = {0}, citedby = {0}, journal = {Distributed Computing}, volume = {9}, number = {4}, pages = {157-171}, } @inproceedings{DeursenMRV09, title = {Secure Ownership and Ownership Transfer in RFID Systems}, author = {Ton van Deursen and Sjouke Mauw and Sasa Radomirovic and Pim Vullers}, year = {2009}, doi = {10.1007/978-3-642-04444-1_39}, url = {http://dx.doi.org/10.1007/978-3-642-04444-1_39}, researchr = {https://researchr.org/publication/DeursenMRV09}, cites = {0}, citedby = {0}, pages = {637-654}, booktitle = {Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, editor = {Michael Backes and Peng Ning}, volume = {5789}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-04443-4}, } @article{BergstraMW91, title = {Uniform Algebraic Specifications of Finite Sets with Equality}, author = {Jan A. Bergstra and Sjouke Mauw and Freek Wiedijk}, year = {1991}, tags = {algebraic specification, algebra}, researchr = {https://researchr.org/publication/BergstraMW91}, cites = {0}, citedby = {0}, journal = {Int. J. Found. Comput. Sci.}, volume = {2}, number = {1}, pages = {43-65}, } @article{MauwR94, title = {An Algebraic Semantics of Basic Message Sequence Charts}, author = {Sjouke Mauw and Michel A. Reniers}, year = {1994}, tags = {semantics, algebra}, researchr = {https://researchr.org/publication/MauwR94}, cites = {0}, citedby = {0}, journal = {Comput. J.}, volume = {37}, number = {4}, pages = {269-278}, } @inproceedings{MauwVV04, title = {A Formalization of Anonymity and Onion Routing}, author = {Sjouke Mauw and Jan Verschuren and Erik P. de Vink}, year = {2004}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3193&spage=109}, tags = {routing}, researchr = {https://researchr.org/publication/MauwVV04}, cites = {0}, citedby = {0}, pages = {109-124}, booktitle = {Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, volume = {3193}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-22987-6}, } @inproceedings{Mauw87, title = {An Algebraic Specification of Process Algebra, Including Two Examples}, author = {Sjouke Mauw}, year = {1987}, tags = {process algebra, algebraic specification, algebra}, researchr = {https://researchr.org/publication/Mauw87}, cites = {0}, citedby = {0}, pages = {507-554}, booktitle = {Algebraic Methods: Theory, Tools and Applications [papers from a workshop in Passau, Germany, June 9-11, 1987]}, editor = {Martin Wirsing and Jan A. Bergstra}, volume = {394}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-51698-0}, } @inproceedings{EngelsMR97, title = {A Hierarchy of Communication Models for Message Sequence Charts}, author = {André Engels and Sjouke Mauw and Michel A. Reniers}, year = {1997}, researchr = {https://researchr.org/publication/EngelsMR97}, cites = {0}, citedby = {0}, pages = {75-90}, booktitle = {Formal Description Techniques and Protocol Specification, Testing and Verification, FORTE X / PSTV XVII 97, IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE X) and Pr}, editor = {Atsushi Togashi and Tadanori Mizuno and Norio Shiratori and Teruo Higashino}, volume = {107}, series = {IFIP Conference Proceedings}, publisher = {Chapman & Hall}, isbn = {0-412-82060-9}, } @article{AndovaCGMMR08, title = {A framework for compositional verification of security protocols}, author = {Suzana Andova and Cas J. F. Cremers and Kristian Gjøsteen and Sjouke Mauw and Stig Fr. Mjølsnes and Sasa Radomirovic}, year = {2008}, doi = {10.1016/j.ic.2007.07.002}, url = {http://dx.doi.org/10.1016/j.ic.2007.07.002}, tags = {protocol, composition, security}, researchr = {https://researchr.org/publication/AndovaCGMMR08}, cites = {0}, citedby = {0}, journal = {Inf. Comput.}, volume = {206}, number = {2-4}, pages = {425-459}, } @inproceedings{VrankenGMF00, title = {IC Design Validation Using Message Sequence Charts}, author = {Harald P. E. Vranken and Tomás Garciá Garciá and Sjouke Mauw and Loe M. G. Feijs}, year = {2000}, url = {http://csdl.computer.org/comp/proceedings/euromicro/2000/0780/01/07811220abs.htm}, tags = {design}, researchr = {https://researchr.org/publication/VrankenGMF00}, cites = {0}, citedby = {0}, pages = {1122}, booktitle = {26th EUROMICRO 2000 Conference, Informatics: Inventing the Future, 5-7 September 2000, Maastricht, The Netherlands}, publisher = {IEEE Computer Society}, isbn = {0-7695-0780-8}, } @inproceedings{MauwR96, title = {Refinement in Interworkings}, author = {Sjouke Mauw and Michel A. Reniers}, year = {1996}, tags = {refinement}, researchr = {https://researchr.org/publication/MauwR96}, cites = {0}, citedby = {0}, pages = {671-686}, booktitle = {CONCUR 96, Concurrency Theory, 7th International Conference, Pisa, Italy, August 26-29, 1996, Proceedings}, editor = {Ugo Montanari and Vladimiro Sassone}, volume = {1119}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-61604-7}, } @inproceedings{BelinfanteFVTGFMH99, title = {Formal Test Automation: A Simple Experiment}, author = {Axel Belinfante and Jan Feenstra and René G. de Vries and Jan Tretmans and Nicolae Goga and Loe M. G. Feijs and Sjouke Mauw and Lex Heerink}, year = {1999}, tags = {testing}, researchr = {https://researchr.org/publication/BelinfanteFVTGFMH99}, cites = {0}, citedby = {0}, pages = {179-196}, booktitle = {Testing of Communicating Systems: Method and Applications, IFIP TC6 12:::th::: International Workshop on Testing Communicating Systems, September 1-3, 1999, Budapest, Hungary}, editor = {Gyula Csopaki and Sarolta Dibuz and Katalin Tarnay}, volume = {147}, series = {IFIP Conference Proceedings}, publisher = {Kluwer}, isbn = {0-7923-8581-0}, } @inproceedings{AlcaldeM09, title = {An Algebra for Trust Dilution and Trust Fusion}, author = {Baptiste Alcalde and Sjouke Mauw}, year = {2009}, doi = {10.1007/978-3-642-12459-4_2}, url = {http://dx.doi.org/10.1007/978-3-642-12459-4_2}, tags = { algebra}, researchr = {https://researchr.org/publication/AlcaldeM09}, cites = {0}, citedby = {0}, pages = {4-20}, booktitle = {Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers}, editor = {Pierpaolo Degano and Joshua D. Guttman}, volume = {5983}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-12458-7}, } @inproceedings{MauwWW02, title = {Language Driven System Design}, author = {Sjouke Mauw and Wouter T. Wiersma and Tim A. C. Willemse}, year = {2002}, url = {http://dlib2.computer.org/conferen/hicss/1435/pdf/14350280b.pdf?}, tags = {language design, C++, design}, researchr = {https://researchr.org/publication/MauwWW02}, cites = {0}, citedby = {0}, pages = {280}, booktitle = {HICSS}, } @inproceedings{EngelsFM97, title = {Test Generation for Intelligent Networks Using Model Checking}, author = {André Engels and Loe M. G. Feijs and Sjouke Mauw}, year = {1997}, tags = {model checking, meta-model, testing, Meta-Environment}, researchr = {https://researchr.org/publication/EngelsFM97}, cites = {0}, citedby = {0}, pages = {384-398}, booktitle = {Tools and Algorithms for Construction and Analysis of Systems, Third International Workshop, TACAS 97, Enschede, The Netherlands, April 2-4, 1997, Proceedings}, editor = {Ed Brinksma}, volume = {1217}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-62790-1}, } @article{MauwR99, title = {Operational Semantics for MSC 96}, author = {Sjouke Mauw and Michel A. Reniers}, year = {1999}, doi = {10.1016/S1389-1286(99)00060-2}, url = {http://dx.doi.org/10.1016/S1389-1286(99)00060-2}, tags = {semantics, operational semantics}, researchr = {https://researchr.org/publication/MauwR99}, cites = {0}, citedby = {0}, journal = {Computer Networks}, volume = {31}, number = {17}, pages = {1785-1799}, } @article{MauwIC06, title = {Preface}, author = {Sjouke Mauw and Valérie Issarny and Cas J. F. Cremers}, year = {2006}, doi = {10.1016/j.entcs.2005.09.045}, url = {http://dx.doi.org/10.1016/j.entcs.2005.09.045}, researchr = {https://researchr.org/publication/MauwIC06}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {1-2}, } @article{BlomGMS05, title = {Analysing the BKE-security Protocol with ::::µ::::CRL}, author = {Stefan Blom and Jan Friso Groote and Sjouke Mauw and Alexander Serebrenik}, year = {2005}, doi = {10.1016/j.entcs.2005.09.005}, url = {http://dx.doi.org/10.1016/j.entcs.2005.09.005}, tags = {protocol, security}, researchr = {https://researchr.org/publication/BlomGMS05}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {139}, number = {1}, pages = {49-90}, } @article{Mauw96, title = {The Formalization of Message Sequence Charts}, author = {Sjouke Mauw}, year = {1996}, doi = {10.1016/0169-7552(95)00123-9}, url = {http://dx.doi.org/10.1016/0169-7552(95)00123-9}, researchr = {https://researchr.org/publication/Mauw96}, cites = {0}, citedby = {0}, journal = {Computer Networks}, volume = {28}, number = {12}, pages = {1643-1657}, } @inproceedings{BeekM03, title = {Automatic Conformance Testing of Internet Applications}, author = {Harm M. A. van Beek and Sjouke Mauw}, year = {2003}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2931&spage=205}, tags = {testing}, researchr = {https://researchr.org/publication/BeekM03}, cites = {0}, citedby = {0}, pages = {205-222}, booktitle = {Formal Approaches to Software Testing, Third International Workshop on Formal Approaches to Testing of Software, FATES 2003, Montreal, Quebec, Canada, October 6th, 2003}, editor = {Alexandre Petrenko and Andreas Ulrich}, volume = {2931}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-20894-1}, } @article{CeelenMR08, title = {Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks}, author = {Pieter Ceelen and Sjouke Mauw and Sasa Radomirovic}, year = {2008}, doi = {10.1016/j.entcs.2007.12.015}, url = {http://dx.doi.org/10.1016/j.entcs.2007.12.015}, researchr = {https://researchr.org/publication/CeelenMR08}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {31-43}, } @article{VoorhoeveM01, title = {Impossible futures and determinism}, author = {Marc Voorhoeve and Sjouke Mauw}, year = {2001}, doi = {10.1016/S0020-0190(01)00217-4}, url = {http://dx.doi.org/10.1016/S0020-0190(01)00217-4}, researchr = {https://researchr.org/publication/VoorhoeveM01}, cites = {0}, citedby = {0}, journal = {Inf. Process. Lett.}, volume = {80}, number = {1}, pages = {51-58}, } @inproceedings{EngelsFM99, title = {MSC and data: dynamic variables}, author = {André Engels and Loe M. G. Feijs and Sjouke Mauw}, year = {1999}, tags = {data-flow}, researchr = {https://researchr.org/publication/EngelsFM99}, cites = {0}, citedby = {0}, pages = {105}, booktitle = {SDL 99 The Next Millennium, 9th International SDL Forum, Montréal, Québec, Canada, 21-25 June, 1999, Proceedings}, editor = {Rachida Dssouli and Gregor von Bochmann and Yair Lahav}, publisher = {Elsevier}, } @inproceedings{CederquistDM07, title = {A Certified Email Protocol Using Key Chains}, author = {Jan Cederquist and Muhammad Torabi Dashti and Sjouke Mauw}, year = {2007}, doi = {10.1109/AINAW.2007.10}, url = {http://doi.ieeecomputersociety.org/10.1109/AINAW.2007.10}, tags = {protocol}, researchr = {https://researchr.org/publication/CederquistDM07}, cites = {0}, citedby = {0}, pages = {525-530}, booktitle = {21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada}, publisher = {IEEE Computer Society}, } @article{CremersMV05, title = {A Syntactic Criterion for Injectivity of Authentication Protocols}, author = {Cas J. F. Cremers and Sjouke Mauw and Erik P. de Vink}, year = {2005}, doi = {10.1016/j.entcs.2005.06.006}, url = {http://dx.doi.org/10.1016/j.entcs.2005.06.006}, tags = {protocol}, researchr = {https://researchr.org/publication/CremersMV05}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, pages = {23-38}, } @inproceedings{BaetenBM01:0, title = {An MSC Based Representation of DiCons}, author = {Jos C. M. Baeten and Harm M. A. van Beek and Sjouke Mauw}, year = {2001}, url = {http://link.springer.de/link/service/series/0558/bibs/2078/20780328.htm}, tags = {rule-based, C++}, researchr = {https://researchr.org/publication/BaetenBM01%3A0}, cites = {0}, citedby = {0}, pages = {328-347}, booktitle = {SDL 2001: Meeting UML, 10th International SDL Forum Copenhagen, Denmark, June 27-29, 2001, Proceedings}, editor = {Rick Reed and Jeanne Reed}, volume = {2078}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-42281-1}, } @inproceedings{MauwO05, title = {Foundations of Attack Trees}, author = {Sjouke Mauw and Martijn Oostdijk}, year = {2005}, doi = {10.1007/11734727_17}, url = {http://dx.doi.org/10.1007/11734727_17}, researchr = {https://researchr.org/publication/MauwO05}, cites = {0}, citedby = {0}, pages = {186-198}, booktitle = {Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, editor = {Dongho Won and Seungjoo Kim}, volume = {3935}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-33354-1}, } @inproceedings{NairGMM05, title = {XML Security in the Next Generation Optical Disc Context}, author = {Gopakumar Nair and Ajeesh Gopalakrishnan and Sjouke Mauw and Erik Moll}, year = {2005}, doi = {10.1007/11552338_15}, url = {http://dx.doi.org/10.1007/11552338_15}, tags = {XML, XML Schema, security, context-aware}, researchr = {https://researchr.org/publication/NairGMM05}, cites = {0}, citedby = {0}, pages = {217-233}, booktitle = {Secure Data Management, Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, editor = {Willem Jonker and Milan Petkovic}, volume = {3674}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-28798-1}, } @inproceedings{MauwVB06, title = {Forward Secure Communication in Wireless Sensor Networks}, author = {Sjouke Mauw and Ivo van Vessem and Bert Bos}, year = {2006}, doi = {10.1007/11734666_4}, url = {http://dx.doi.org/10.1007/11734666_4}, tags = {wireless sensor networks}, researchr = {https://researchr.org/publication/MauwVB06}, cites = {0}, citedby = {0}, pages = {32-42}, booktitle = {Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings}, editor = {John A. Clark and Richard F. Paige and Fiona A. C. Polack and Phillip J. Brooke}, volume = {3934}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-33376-2}, } @inproceedings{FeijsGM00, title = {Probabilities In The Torx Test Derivation Algorithm}, author = {Loe M. G. Feijs and Nicolae Goga and Sjouke Mauw}, year = {2000}, tags = {testing}, researchr = {https://researchr.org/publication/FeijsGM00}, cites = {0}, citedby = {0}, pages = {173-188}, booktitle = {SAM 2000, 2nd Workshop on SDL and MSC, Col de Porte, Grenoble, France, June 26-28, 2000}, editor = {Edel Sherratt}, publisher = {VERIMAG, IRISA, SDL Forum}, } @inproceedings{KordyMMS10, title = {Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent}, author = {Barbara Kordy and Sjouke Mauw and Matthijs Melissen and Patrick Schweitzer}, year = {2010}, doi = {10.1007/978-3-642-17197-0_17}, url = {http://dx.doi.org/10.1007/978-3-642-17197-0_17}, researchr = {https://researchr.org/publication/KordyMMS10}, cites = {0}, citedby = {0}, pages = {245-256}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, editor = {Tansu Alpcan and Levente Buttyán and John S. Baras}, volume = {6442}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-17196-3}, } @article{EngelsMR02, title = {A hierarchy of communication models for Message Sequence Charts}, author = {André Engels and Sjouke Mauw and Michel A. Reniers}, year = {2002}, doi = {10.1016/S0167-6423(02)00022-9}, url = {http://dx.doi.org/10.1016/S0167-6423(02)00022-9}, researchr = {https://researchr.org/publication/EngelsMR02}, cites = {0}, citedby = {0}, journal = {Science of Computer Programming}, volume = {44}, number = {3}, pages = {253-292}, } @inproceedings{BaetenM94, title = {Delayed choice: an operator for joining Message Sequence Charts}, author = {Jos C. M. Baeten and Sjouke Mauw}, year = {1994}, tags = {C++}, researchr = {https://researchr.org/publication/BaetenM94}, cites = {0}, citedby = {0}, pages = {340-354}, booktitle = {Formal Description Techniques VII, Proceedings of the 7th IFIP WG6.1 International Conference on Formal Description Techniques, Berne, Switzerland, 1994}, editor = {Dieter Hogrefe and Stefan Leue}, volume = {6}, series = {IFIP Conference Proceedings}, publisher = {Chapman & Hall}, isbn = {0-412-64450-9}, } @proceedings{concur:1999, title = {CONCUR 99: Concurrency Theory, 10th International Conference, Eindhoven, The Netherlands, August 24-27, 1999, Proceedings}, year = {1999}, researchr = {https://researchr.org/publication/concur%3A1999}, cites = {0}, citedby = {0}, booktitle = {CONCUR 99: Concurrency Theory, 10th International Conference, Eindhoven, The Netherlands, August 24-27, 1999, Proceedings}, conference = {concur}, editor = {Jos C. M. Baeten and Sjouke Mauw}, volume = {1664}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-66425-4}, } @proceedings{europki:2008, title = {Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings}, year = {2008}, researchr = {https://researchr.org/publication/europki%3A2008}, cites = {0}, citedby = {0}, booktitle = {Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings}, conference = {europki}, editor = {Stig Fr. Mjølsnes and Sjouke Mauw and Sokratis K. Katsikas}, volume = {5057}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-69484-7}, }