Publications

<< 2008 >>

Barosso, D. and Bartle, R. and Chazeran, C. and de Zwart, M. and Doumen, J.M. and Gorniak, S. and Kaźmierczak, M. and Kaskenmaa, M. and Benavente López, D. and Martin, A. and Naumann, I. and Reynolds, R. and Richardson, J. and Rossow, C. and Rywczyoska, A. and Thumann, M. (2008) Security and privacy in massively-multiplayer online games and social and corporate virtual worlds. ENISA Position Paper 1 ENISA (European Network and Information Security Agency), Crete. ISSN not assigned

Bijlsma, T. and Bekooij, M.J.G. and Jansen, P.G. and Smit, G.J.M. (2008) Communication between Nested Loop Programs via Circular Buffers in an Embedded Multiprocessor System. In: Proceedings of the 11th international workshop on Software & compilers for embedded systems (SCOPES), 14 March 2008, Munich, Germany. pp. 33-42. ACM International Conference Proceeding Series 296. ACM Press. ISBN not assigned

Bolzoni, D. and Crispo, B. and Etalle, S. (2008) ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems. Technical Report TR-CTIT-08-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Bolzoni, D. and Etalle, S. (2008) Approaches in Anomaly-based Network Intrusion Detection Systems. In: Intrusion Detection Systems. Advances in Information Security 38. Springer Verlag, London, pp. 1-16. ISBN 978-0-387-77265-3

Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. Technical Report TR-CTIT-08-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. In: Confederated International Conferences On the Move to Meaningful Internet Systems (OTM), November 9-14, 2008, Monterrey, Mexico. pp. 938-955. Lecture Notes in Computer Science 5332. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-88872-7

Buhan, I.R. (2008) Cryptographic keys from noisy data, theory and applications. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 08-129 ISBN 978-9-03652-738-5

Buhan, I.R. (2008) A New Secure Pairing Protocol using Biometrics. Technical Report TR-CTIT-08-63, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Buhan, I.R. and Doumen, J.M. and Hartel, P.H. (2008) Controlling Leakage of Biometric Information using Dithering. In: 16th European Signal Processing Conference, 25-29 Aug 2008, Lausanne, Switzerland. 1569105382. EUSIPCO. EURASIP, European Association for Signal, Speech and Image Processing. ISBN 978-2-8399-0450-6

Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Tang, Qiang and Veldhuis, R.N.J. (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, 20 - 22 October, 2008, Birmingham, UK. pp. 294-310. Lecture Notes in Computer Science 5308. Springer. ISBN 978-3-540-88624-2

Chmielewski, L. and Brinkman, R. and Hoepman, J.H. and Bos, B. (2008) Using JASON to secure SOA. In: 1st International Workshop on Middleware Security (MIDSEC), 2 Dec 2008, Leuven, Belgium. pp. 13-18. ACM. ISBN 978-1-60558-363-1

Czenko, M.R. and Doumen, J.M. and Etalle, S. (2008) Trust Management in P2P systems using Standard TuLiP. Technical Report TR-CTIT-08-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Czenko, M.R. and Doumen, J.M. and Etalle, S. (2008) Trust Management in P2P Systems Using Standard TuLiP. In: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway. pp. 1-16. IFIP International Federation for Information Processing 263/2008. Springer. ISSN 1571-5736 ISBN 978-0-387-09427-4

Czenko, M.R. and Etalle, S. (2008) LP with Flexible Grouping and Aggregates Using Modes. Technical Report TR-CTIT-08-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Davarynejad, M. and Sedghi, S. and Bahrepour, M. and Ahn, C.W. and Akbarzadeh, M. and Coello Coello, C. A. (2008) Detecting Hidden Information from Watermarked Signal using Granulation Based Fitness Approximation. In: Applications of soft Computing: From Theory to Praxis, 10-28 Nov 2008. pp. 463-472. Advances in Itelligent and Soft Computing 58. Springer Verlag. ISSN 1867-5662 ISBN 978-3-540-89618-0

Dekker, M.A.C. and Crampton, J. and Etalle, S. (2008) RBAC administration in distributed systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, 11-13 June 2008, Estes Park, Colorado, USA. pp. 93-102. ACM. ISBN 978-1-60558-129-3

Dimkov, T. and Tang, Qiang and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. In: Proceedings of the Workshop on Modeling Security (MODSEC08), 28 Sep 2008, Toulouse. 18. CEUR Workshop Proceedings. ISSN 1613-0073

Dimkov, T. and Tang, Qiang and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. Technical Report TR-CTIT-08-57, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Durmaz Incel, O. and Jansen, P.G. (2008) Characterization of multi-channel interference. In: 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, 2008. WiOPT 2008., 1-3 April 2008, Berlin, Germany. pp. 429-435. IEEE Computer Society. ISBN 978-963-9799-18-9

Durmaz Incel, O. and Jansen, P.G. and Mullender, S.J. (2008) MC-LMAC: A Multi-Channel MAC Protocol for Wireless Sensor Networks. Technical Report TR-CTIT-08-61, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Engelen, J.B.C. and Khatib, M.G. (2008) A ''Millipede'' scanner model - Energy consumption and performance. Technical Report TR-CTIT-08-51, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Etalle, S. (2008) Nice to know. Technical University of Eindhoven, Eindhoven. ISBN 978-90-386-1427-4

Gong, Zheng and Lai, X.J. and Chen, Kefei (2008) On the Design of Secure and Fast Double Block Length Hash Functions. Technical Report TR-CTIT-08-71, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Gong, Zheng and Long, Yu and Hong, Xuan and Chen, Kefei (2008) Practical Certificateless Aggregate Signatures From Bilinear Maps. Technical Report TR-CTIT-08-74, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Hartel, P.H. and Abelmann, L. and Khatib, M.G. (2008) Towards Tamper-Evident Storage on Patterned Media. In: 6th USENIX Conf. on File and Storage Technologies (FAST), Feb. 26-29, 2008, San Jose, California. pp. 283-296. USENIX Association. ISBN 978-1-931971-56-0

Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow (with appendix). Technical Report TR-CTIT-08-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Hartel, P.H. and Ruys, T.C. and Geilen, M.C.W. (2008) Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow. In: 8th Int. Conf. on Formal Methods in Computer Aided Design (FMCAD), 17-20 Nov. 2008, Portland, Oregon. pp. 161-170. IEEE Computer Society. ISBN 978-1-4244-2735-2

Horsman, M. and Marin-Perianu, M. and Jansen, P.G. and Havinga, P.J.M. (2008) A Simulation Framework for Evaluating Complete Reprogramming Solutions in Wireless Sensor Networks. In: 3rd International Symposium on Wireless Pervasive Computing, 7-9 May 2008, Greece. pp. 6-10. IEEE Computer Society. ISBN 978-1-4244-1653-0

Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. Technical Report TR-CTIT-08-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: Proceedings of the 5th VLDB Workshop, SDM 2008, August 24, 2008, Auckland, New Zealand. pp. 185-198. Lecture Notes in Computer Science 5159. Springer Verlag. ISBN 978-3-540-85258-2

Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. Technical Report TR-CTIT-08-75, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Khatib, M.G. and Engelen, J.B.C. and Hartel, P.H. (2008) Shutdown Policies for MEMS-Based Storage Devices -- Analytical Models. Technical Report TR-CTIT-08-03, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Khatib, M.G. and Hartel, P.H. (2008) Power Management of MEMS-Based Storage Devices for Mobile Systems. In: Proceedings of the 8th ACM & IEEE International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES '08), 19-24 Oct 2008, Atlanta, USA. pp. 245-254. ACM. ISBN 978-1-60558-469-0

Khatib, M.G. and Miller, E.L. and Hartel, P.H. (2008) Workload-Based Configuration of MEMS-Based Storage Devices for Mobile Systems. In: Proceedings of the 8th ACM & IEEE International Conference on Embedded Software (EMSOFT '08), 19-24 Oct 2008, Atlanta, USA. pp. 41-50. ACM. ISBN 978-1-60558-468-3

Law, Yee Wei and Moniava, G. and Gong, Zheng and Hartel, P.H. and Palaniswami, M. (2008) KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks. Technical Report TR-CTIT-08-67, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Mader, A.H. and Marincic, J. and Wupper, H. (2008) Modelling Embedded Systems by Non-Monotonic Refinement. Technical Report TR-CTIT-08-38, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Mader, A.H. and Wupper, H. and Boon, M. and Marincic, J. (2008) A Taxonomy of Modelling Decisions for Embedded Systems Veri?cation. Technical Report TR-CTIT-08-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Marin-Perianu, R.S. (2008) Wireless Sensor Networks in Motion - Clustering Algorithms for Service Discovery and Provisioning. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 08-130 ISBN 978-90-365-2745-3

Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A generalized clustering algorithm for dynamic wireless sensor networks. Technical Report TR-CTIT-08-56, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Marin-Perianu, R.S. and Hurink, J.L. and Hartel, P.H. (2008) A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks. In: Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA-08), 10-12 Dec 2008, Sydney, Australia. pp. 863-870. IEEE Computer Society. ISBN 978-0-7695-3471-8

Marin-Perianu, R.S. and Scholten, J. and Havinga, P.J.M. and Hartel, P.H. (2008) Cluster-based service discovery for heterogeneous wireless sensor networks. International Journal of Parallel, Emergent and Distributed Systems, 23 (4). pp. 325-346. ISSN 1744-5760

Marincic, J. and Mader, A.H. and Wieringa, R.J. (2008) Classifying Assumptions Made During Requirements Verification of Embedded Systems. In: Requirements Engineering: Foundation for Software Quality, 14th International Working Conference, REFSQ 2008, 16-17 Jun 2008, Montpellier, France. pp. 141-146. Springer Verlag. ISBN 978-3-540-69060-3

Marincic, J. and Mader, A.H. and Wupper, H. and Wieringa, R.J. (2008) Non-monotonic modelling from initial requirements: a proposal and comparison with monotonic modelling methods. In: IWAAPF '08: Proceedings of the 3rd international workshop on Applications and advances of problem frames, 10 May 2008, Leipzig, Germany. pp. 67-73. ACM. ISBN 978-1-60558-020-3

Morali, A. and Zambon, Emmanuele and Etalle, S. and Overbeek, P. (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. Technical Report TR-CTIT-08-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Morali, A. and Zambon, Emmanuele and Etalle, S. and Overbeek, P. (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. In: Third IEEE International Workshop on Business-Driven IT Management, 07 Apr 2008, Salvador, Brazil. pp. 31-40. IEEE Computer Society. ISBN 978-1-4244-2191-6

Morali, A. and Zambon, Emmanuele and Houmb, S.H. and Sallhammar, K. and Etalle, S. (2008) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. Technical Report TR-CTIT-08-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Nikova, S.I. and Rijmen, V. and Schlaffer, M. (2008) Using normal bases for compact hardware implementations of the AES S-box. In: 6th International Conference Security in Communication Networks (SCN), 10-12 Sep 2008, Amalfi, Italy. pp. 236-245. Lecture Notes in Computer Science 5229. Springer Verlag. ISBN 978-3-540-85854-6

Pieters, W. (2008) Vertrouwen en werkelijkheid in de stemcomputercontroverse. In: Burger in Uitvoering. Jaarboek Kennissamenleving 4. Aksant, Amsterdam, pp. 17-25. ISBN 978-90-5260-307-0

Pieters, W. (2008) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2008 (3). pp. 18-20. ISSN 1569-1063

Pieters, W. (2008) Betrouwbaarheid of vertrouwbaarheid : Vertrouwen in technologie en bestuur. Openbaar bestuur, 18 (10). pp. 27-30. ISSN 0925-7322

Pieters, W. (2008) La volonté machinale: understanding the electronic voting controversy. PhD thesis, Radboud University Nijmegen. ISBN 978-90-9022554-8

Pieters, W. and Becker, M.J. (2008) Ethics of e-voting: an essay on requirements and values in Internet elections. In: E-Democracy: Concepts and Practices. Icfai University Press, pp. 134-157. ISBN 978-81-314-1914-4

Scholten, J. and van Dijk, H.W. (2008) Home Network Security. In: ICN2008, The Seventh International Conference on Networking, 13-18 Apr 2008, Cancun, Mexico. pp. 249-255. IEEE Computer Society. ISBN 978-0-7695-3106-9

Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version). Technical Report TR-CTIT-08-50, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption. In: 10th international conference on information and communication security, 20-22 Oct 2008, Birmingham, UK. pp. 345-360. Lecture Notes in Computer Science 5308. Springer. ISSN 0302-9743 ISBN 978-3-540-88624-2

Tang, Qiang (2008) Type-based Proxy Re-encryption and its Construction. Technical Report TR-CTIT-08-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Tang, Qiang (2008) Revisit the Concept of PEKS: Problems and a Possible Solution. Technical Report TR-CTIT-08-54, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Tang, Qiang (2008) On Using Encryption Techniques to Enhance Sticky Policies Enforcement. Technical Report TR-CTIT-08-64, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Tang, Qiang (2008) Type-Based Proxy Re-encryption and Its Construction. In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, December 14-17, 2008, Kharagpur, India. pp. 130-144. Lecture Notes in Computer Science 5365. Springer Verlag. ISBN 978-3-540-89753-8

Tang, Qiang and Bringer, J. and Chabanne, H. and Pointcheval, D. (2008) A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, April 21-23, 2008, Sydney, Australia. pp. 56-70. Lecture Notes in Computer Science 4991. Springer Verlag. ISBN 978-3-540-79103-4

Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Inter-domain Identity-based Proxy Re-encryption. Technical Report TR-CTIT-08-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Zych, A.K. and Doumen, J.M. and Jonker, W. and Hartel, P.H. and Petkovic, M. (2008) Method of Key Management. Patent WO2008026184 (Assigned).