Követés
Pieter Hartel
Pieter Hartel
Professor Emeritus Cyber security
E-mail megerősítve itt: tudelft.nl - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
A Survey of Provably Secure Searchable Encryption
C Bösch, P Hartel, W Jonker, A Peter
ACM Computing Surveys (CSUR) 47 (2), Article 18, 2015
4052015
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
YW Law, M Palaniswami, LV Hoesel, J Doumen, P Hartel, P Havinga
ACM Transactions on Sensor Networks (TOSN) 5 (1), 1-38, 2009
4022009
Survey and benchmark of block ciphers for wireless sensor networks
YW Law, J Doumen, P Hartel
ACM Transactions on Sensor Networks (TOSN) 2 (1), 65-93, 2006
4002006
Mediated ciphertext-policy attribute-based encryption and its application
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
Int. Workshop on Information Security Applications (WISA), 309-323, 2009
3322009
Computationally efficient searchable symmetric encryption
P Van Liesdonk, S Sedghi, J Doumen, P Hartel, W Jonker
Int. Workshop on Secure Data Management (SDM), 87-100, 2010
3042010
Through the eye of the PLC: semantic security monitoring for industrial processes
D Hadžiosmanović, R Sommer, E Zambon, PH Hartel
30th Annual Computer Security Applications Conference (ACSAC), 126-135, 2014
2882014
Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources
S Barth, MDT de Jong, M Junger, PH Hartel, JC Roppelt
Telematics and Informatics 41, 55-69, 2019
2332019
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
L Ibraimi, Q Tang, P Hartel, W Jonker
Int. Conf. on Information Security Practice and Experience (ISPEC), 1-12, 2009
1832009
Poseidon: a 2-tier anomaly-based network intrusion detection system
D Bolzoni, S Etalle, P Hartel
4th IEEE Int. Workshop on Information Assurance (IWIA), 10 pp.-156, 2006
1792006
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
1732013
The persuasion and security awareness experiment: reducing the success of social engineering attacks
JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
Journal of experimental criminology 11, 97-115, 2015
1472015
Link-layer jamming attacks on S-MAC
YW Law, P Hartel, J den Hartog, P Havinga
2nd Eu. Workshop on Wireless Sensor Networks (EWSN), 217-225, 2005
1332005
Fuzzy extractors for continuous distributions
I Buhan, J Doumen, P Hartel, R Veldhuis
2nd ACM Symp. on Information, computer and comms. security (AsiaCCS), 353-355, 2007
1272007
Benchmarking implementations of functional languages with ‘Pseudoknot’, a float-intensive benchmark
PH Hartel, M Feeley, M Alt, L Augustsson, P Baumann, M Beemster, ...
Journal of functional programming 6 (4), 621-655, 1996
126*1996
Formalizing the safety of Java, the Java virtual machine, and Java card
PH Hartel, L Moreau
ACM Computing Surveys (CSUR) 33 (4), 517-558, 2001
1162001
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
University of Twente, 2009
1142009
How effective is anti-phishing training for children?
E Lastdrager, IC Gallardo, P Hartel, M Junger
Thirteenth Symposium on Usable Privacy and Security (SOUPS), 229-239, 2017
1082017
A classification of service discovery protocols
RS Marin-Perianu, PH Hartel, J Scholten
Centre for Telematics and Information Technology University of Twente, 2005
1042005
A log mining approach for process monitoring in SCADA
D Hadžiosmanović, D Bolzoni, PH Hartel
International Journal of Information Security 11, 231-251, 2012
1032012
Assessing security in energy-efficient sensor networks
YW Law, S Etalle, PH Hartel
18th IFIP TC11 Int. Conf. on Information Security (SEC), 459-463, 2003
1032003
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20