Stebėti
Pieter Hartel
Pieter Hartel
Professor Emeritus Cyber security
Patvirtintas el. paštas tudelft.nl - Pagrindinis puslapis
Pavadinimas
Cituota
Cituota
Metai
A Survey of Provably Secure Searchable Encryption
C Bösch, P Hartel, W Jonker, A Peter
ACM Computing Surveys (CSUR) 47 (2), Article 18, 2015
4152015
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
YW Law, M Palaniswami, LV Hoesel, J Doumen, P Hartel, P Havinga
ACM Transactions on Sensor Networks (TOSN) 5 (1), 1-38, 2009
4042009
Survey and benchmark of block ciphers for wireless sensor networks
YW Law, J Doumen, P Hartel
ACM Transactions on Sensor Networks (TOSN) 2 (1), 65-93, 2006
4022006
Mediated ciphertext-policy attribute-based encryption and its application
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
Int. Workshop on Information Security Applications (WISA), 309-323, 2009
3342009
Computationally efficient searchable symmetric encryption
P Van Liesdonk, S Sedghi, J Doumen, P Hartel, W Jonker
Int. Workshop on Secure Data Management (SDM), 87-100, 2010
3102010
Through the eye of the PLC: semantic security monitoring for industrial processes
D Hadžiosmanović, R Sommer, E Zambon, PH Hartel
30th Annual Computer Security Applications Conference (ACSAC), 126-135, 2014
2922014
Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources
S Barth, MDT de Jong, M Junger, PH Hartel, JC Roppelt
Telematics and Informatics 41, 55-69, 2019
2612019
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
1842013
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
L Ibraimi, Q Tang, P Hartel, W Jonker
Int. Conf. on Information Security Practice and Experience (ISPEC), 1-12, 2009
1842009
Poseidon: a 2-tier anomaly-based network intrusion detection system
D Bolzoni, S Etalle, P Hartel
4th IEEE Int. Workshop on Information Assurance (IWIA), 10 pp.-156, 2006
1782006
The persuasion and security awareness experiment: reducing the success of social engineering attacks
JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
Journal of experimental criminology 11, 97-115, 2015
1502015
Link-layer jamming attacks on S-MAC
YW Law, P Hartel, J den Hartog, P Havinga
2nd Eu. Workshop on Wireless Sensor Networks (EWSN), 217-225, 2005
1322005
Fuzzy extractors for continuous distributions
I Buhan, J Doumen, P Hartel, R Veldhuis
2nd ACM Symp. on Information, computer and comms. security (AsiaCCS), 353-355, 2007
1282007
Benchmarking implementations of functional languages with ‘Pseudoknot’, a float-intensive benchmark
PH Hartel, M Feeley, M Alt, L Augustsson, P Baumann, M Beemster, ...
Journal of functional programming 6 (4), 621-655, 1996
128*1996
How effective is anti-phishing training for children?
E Lastdrager, IC Gallardo, P Hartel, M Junger
Thirteenth Symposium on Usable Privacy and Security (SOUPS), 229-239, 2017
1232017
Formalizing the safety of Java, the Java virtual machine, and Java card
PH Hartel, L Moreau
ACM Computing Surveys (CSUR) 33 (4), 517-558, 2001
1172001
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
University of Twente, 2009
1152009
A log mining approach for process monitoring in SCADA
D Hadžiosmanović, D Bolzoni, PH Hartel
International Journal of Information Security 11, 231-251, 2012
1042012
A classification of service discovery protocols
RS Marin-Perianu, PH Hartel, J Scholten
Centre for Telematics and Information Technology University of Twente, 2005
1042005
Assessing security in energy-efficient sensor networks
YW Law, S Etalle, PH Hartel
18th IFIP TC11 Int. Conf. on Information Security (SEC), 459-463, 2003
1022003
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20