Prof. Dr. Sjouke Mauw
![]() |
|
||||||
Faculté ou Centre | Faculté des Sciences, des Technologies et de Médecine | ||||||
Department | Département Informatique | ||||||
Adresse postale |
Université du Luxembourg Maison du Nombre 6, Avenue de la Fonte L-4364 Esch-sur-Alzette |
||||||
Bureau sur le campus | MNO, E03 0325-020 | ||||||
![]() |
|||||||
Téléphone | (+352) 46 66 44 5480 | ||||||
Video |
![]() Prof. Sjouke Mauw (SnT)
|
||||||
Since January 2007 I am full professor in "Security and Trust of Software Systems" at the University of Luxembourg in the Computer Science and Communications Research Unit.
Until 2007, I was associate professor (UHD) in computer science at the Formal Methods group of the Eindhoven University of Technology.
Topics of research
- Security protocols
- Security assessment
- Privacy
- Attack trees
- Digital Rights Management
- Mobile ad-hoc and sensor networks
- RFID's
For more Information see here.
Last updated on: mardi 29 octobre 2019

2022

; ; ; ;
in IEEE Computer Security Foundations Symposium, August 7 - 10, 2022, Haifa, Israel (2022)
2021

; ; ;
in Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (2021, October)

; ; ;
in IEEE 34th Computer Security Foundations Symposium, Dubrovnik 21-25 June 2021 (2021, June)

; ;
in Proceedings of the 3rd Multidisciplinary International Symposium on Disinformation in Open Online Media (2021)

;
in Logical Methods in Computer Science (2021), 17(2), 241--2452

; ; ; ;
in Theoretical Aspects of Computing -- ICTAC 2021 (2021)
2020

; ; ; ;
in Computers and Security (2020), 88(101630),

; ; ;
in Chen, Liqun; Li, Ninghui; Liang, Kaitai; Schneider, Steve (Eds.) Computer Security - ESORICS 2020 (2020, September 13)

; ;
in Proceedings on Privacy Enhancing Technologies (2020), 2020(4), 131-152

; ; ; ; ;
in Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20), October 5–9, 2020, Taipei, Taiwan (2020)

; ; ;
in Graphical Models for Security - 7th International Workshop (2020)

;
in Proc.\ 6th International Workshop on Graphical Models for Security (GraMSec'19) (2020)

; ; ; ; ;
in ACM Transactions on Software Engineering and Methodology (2020), 29(4), 1-35
2019

; ; ;
in Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity (2019, September 23)

;
Book published by Springer (2019)

;
in Proc. 6th International Workshop on Graphical Models for Security (GraMSec'19) (2019)

; ;
in Data Mining and Knowledge Discovery (2019), 33(5), 1357-1392

; ; ;
in Post-collusion security and distance bounding (2019, November 11)
2018

; ;
in Proc.\ 5th International Workshop on Graphical Models for Security (GraMSec'18) (2018)

; ; ;
in Katsikas, Sokratis; Alcaraz, Cristina (Eds.) Security and Trust Management. STM 2018. (2018, October)

; ;
Book published by Springer (2018)

; ;
in Transactions on Data Privacy (2018), 11(2), 169-198

; ;
in Knowledge and Information Systems (2018)

; ; ;
in Automated Identification of Desynchronisation Attacks on Shared Secrets (2018, September)

; ; ;
in Proceedings of IEEE Symposium on Security and Privacy (SP), San Francisco 21-23 May 2018 (2018)
2017

; ; ; ;
in Livraga, Giovanni; Mitchell, Chris J. (Eds.) Security and Trust Management - 13th International Workshop (2017, September)

; ;
in Fundamenta Informaticae (2017), 153(1-2), 57-86

;
in Scanlon, Marc; Le-Khac, Nhien-An (Eds.) Proc. 16th European Conference on Cyber Warfare and Security (2017)

;
in Stajano, F. (Ed.) Proc. 25th Security Protocols Workshop (2017)

; ;
in Krimmer, L. (Ed.) Proc. 2nd International Joint Conference on Electronic Voting (2017)
2016

; ; ; ;
in Proc. of GraMSec (2016)

; ; ; ; ;
in Quantitative Evaluation of Systems - 13th International Conference (2016)

; ; ;
Book published by Springer (2016)

; ;
in 12th International Workshop on Security and Trust Management (2016)

; ;
in Barthe, Gilles; Markatos, Evangelos (Eds.) Security and Trust Management - STM 2016 (2016)

; ;
in Hancke, Gerard P.; Markantonakis, Konstantinos (Eds.) Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (2016, December)

; ;
in Proceedings of the 1st IEEE European Symposium on Security and Privacy (2016)

; ;
in Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (2016)
2015

; ;
in Computer Communications (2015), 67

; ;
in Pernul, Günther; Y A Ryan, Peter; Weippl, Edgar (Eds.) Computer Security -- ESORICS 2015 (2015)

; ; ; ;
in Proceedings of the 30th IFIP TC 11 International Conference ICT Systems Security and Privacy Protection (SEC 2015) (2015)

; ;
in Computers electrical engineering (2015)

in Proc.\ 23rd Security Protocols Workshop (2015)

;
in Proc. 8th Workshop on Security and Trust Management, Pisa, Italy, September 13-14 2012 (2015)

;
in Proc. 4th Conference on Principles of Security and Trust (POST'15) (2015)

; ;
Book published by EPTCS - 184 (2015)
2014

; ;
in First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014 (2014)

; ; ;
in 19th International Symposium on Formal Methods (FM'14), 12-16 May 2014 (2014, May)

;
Book published by Springer (2014)

; ; ; ; ; ; ; ; ;
Report (2014)

; ; ;
in 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014 (2014)

; ; ;
in 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014 (2014)
2013

; ; ; ; ;
in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)

; ; ; ;
in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)

; ; ;
in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75

; ;
in Computer Science Review (2013)

; ; ;
in 10th International Conference on Quantitative Evaluation of SysTems (2013)

; ;
in 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (2013)
2012

; ; ; ; ;
in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

; ; ;
in Proc. 7th International Conference on Availability, Reliability and Security (2012)

;
Book published by Springer-Verlag (2012)

; ;
in Digital Enlightenment Yearbook 2012 (2012)

; ;
in Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers (2012)

; ; ;
in Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (2012)

; ; ;
in European Navigation Conference (ENC 2012) (2012)

; ; ;
in Decision Support Systems (2012), 53(3), 418-424

; ; ; ;
in Journal of Computer Security (2012), 20(4), 437-459

; ; ; ; ;
in Transactions on Computational Systems Biology (2012), XIV

; ; ;
in Innovations in Systems and Software Engineering (2012), 8
2011

; ;
in Proc. 19th International Workshop on Security Protocols (2011)

in Proceedings of 19th Security Protocols Workshop (2011), 7114

; ; ; ;
in Proc. 6th International Workshop on Security and Trust Management (2011)

; ; ; ; ;
in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67
2010

; ; ;
in Proceedings of GameSec 2010 (2010)

; ; ;
in Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (2010)

; ; ;
in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)
2009

; ; ; ;
in Proc. 7th Australasian Information Security Conference - AISC'09 (2009)

; ; ; ;
in Seventh Australasian Information Security Conference (AISC 2009) (2009)

;
in Proc. 7th Workshop on Formal Aspects in Security and Trust (2009)

;
in Handbook of Research on Secure Multimedia Distribution (2009)

; ;
in Journal of Algorithms in Cognition, Informatics and Logic (2009)

; ;
in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)

; ;
in Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09) (2009)

; ; ;
in Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (2009)
2008

; ; ; ; ;
in Information and Computation (2008), 206(2-4), 425-459

; ;
in Fifth Annual IEEE Consumer Communications & Networking Conference 2008 (CCNC'08) (2008)

; ;
in Electronic Notes in Theoretical Computer Science (2008), 197(2), 31-43

; ;
in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (2008)
2007

; ;
in Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01 (AINAW'07) (2007)

; ;
in Electronic Notes in Theoretical Computer Science (2007), 168
2006

; ;
in Theoretical Computer Science (2006), 367(1-2), 139-161
1999
1996

; ; ;
in Distributed Computing (1996), 9(4), 157-171