Home // SnT // Research // APSIA // Publications

Publications

In press

Full Text
See detailModelling Metrics for Transparency in Medical Systems
Pierina Brustolin Spagnuelo, Dayana; Bartolini, Cesare; Lenzini, Gabriele

in Proceedings of TrustBus 2017 (in press)

Top of Page

2018

Full Text
See detailA Security Analysis, and a Fix, of a Code-Corrupted Honeywords System
Genç, Ziya Alper; Lenzini, Gabriele; Ryan, Peter; Vazquez Sandoval, Itzel

in Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018)

Top of Page

2017

Full Text
See detailA Scalable Parallel Cooperative Coevolutionary PSO Algorithm for Multi-objective Optimization
Atashpendar, Arash; Dorronsoro, Bernabé; Danoy, Grégoire; Bouvry, Pascal

in Journal of Parallel & Distributed Computing (2017)

Full Text
See detailPrivate Verification of Access on Medical Data: An Initial Study
Bardini Idalino, Thaís; Pierina Brustolin Spagnuelo, Dayana; Everson Martina, Jean

in Private Verification of Access on Medical Data: An Initial Study (2017, September)

Full Text
See detailPrivate Mobile Pay-TV From Priced Oblivious Transfer
Biesmans, Wouter; Balasch, Josep; Rial Duran, Alfredo; Preneel, Bart; Verbauwhede, Ingrid

in IEEE Transactions on Information Forensics & Security (2017)

Full Text
See detailReceiver and Sender Deniable Functional Encryption
De Caro, Angelo; Iovino, Vincenzo; O'Neill, Adam

in IET Information Security (2017)

Full Text
See detailControlled Homomorphic Encryption: Definition and Construction
Desmedt, Yvo; Iovino, Vincenzo; Persiano, Giuseppe; Visconti, Ivan

in FC 2017 International Workshops - WAHC'17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography (2017)

Full Text
See detailThe Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware
Genç, Ziya Alper; Lenzini, Gabriele; Ryan, Peter

Scientific Conference (2017, November 17)

Full Text
See detailPrivacy-Preserving Verifiability: A Case for an Electronic Exam Protocol
Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele

in Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele (Eds.) Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol (2017)

Full Text
See detailFrom Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis
Huynen, Jean-Louis; Lenzini, Gabriele

in Proceedings of the 3rd International Conference on Information Systems Security and Privacy (2017)

Full Text
See detailUsing Selene to Verify your Vote in JCJ
Iovino, Vincenzo; Rial Duran, Alfredo; Roenne, Peter; Ryan, Peter

in Workshop on Advances in Secure Electronic Voting (VOTING'17) (2017, April 07)

Full Text
See detailSecurity in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals
Lenzini, Gabriele; Samir, Ouchani; Roenne, Peter; Ryan, Peter; Geng, Yong; Noh, Junghyun; Lagerwall, Jan

in Proc. of the 9th IEEE Workshop on Information Forensics and Security (2017, October 02)

Full Text
See detailOn the Relation Between SIM and IND-RoR Security Models for PAKEs
Lopez Becerra, José Miguel; Iovino, Vincenzo; Ostrev, Dimiter; Skrobot, Marjan

in Proceedings of the International Conference on Security and Cryptography (2017)

Full Text
See detailTo Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification
Pejo, Balazs; Tang, Qiang

in Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017 (2017, April 02)

Full Text
See detailIssuer-Free Oblivious Transfer with Access Control Revisited
Rial Duran, Alfredo

in Information Processing Letters (2017)

Full Text
See detailDifferentially Private Neighborhood-based Recommender Systems
Wang, Jun; Tang, Qiang

in IFIP Information Security & Privacy Conference (2017, May)

Full Text
See detailInsider Threats to Information Security, Digital Espionage, and Counter-Intelligence
You, Ilsun; Lenzini, Gabriele; De Santis, Alfredo

in IEEE Systems Journal (2017), 11(2),

Top of Page

2016

Full Text
See detailA Parallel Cooperative Coevolutionary SMPSO Algorithm for Multi-objective Optimization
Atashpendar, Arash; Dorronsoro, Bernabé; Danoy, Grégoire; Bouvry, Pascal

in IEEE International Conference on High Performance Computing Simulation (HPCS) (2016, July)

Full Text
See detailA Framework to Reason about the Legal Compliance of Security Standards
Bartolini, Cesare; Giurgiu, Andra; Lenzini, Gabriele; Robaldo, Livio

in Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN) (2016, November)

Full Text
See detailTowards legal compliance by correlating Standards and Laws with a semi-automated methodology
Bartolini, Cesare; Lenzini, Gabriele; Robaldo, Livio

in Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC) (2016, November)

Full Text
See detailUC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
Camenisch, Jan; Dubovitskaya, Maria; Rial, Alfredo

in Advances in Cryptology – CRYPTO 2016 (2016, August 14)

See detailFinancial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC
Clark, Jeremy; Sarah; Ryan, Peter; Wallach, Dan; Brenner, Michael; Rohloff, Kurt

Book published by Springer (2016)

Full Text
See detailCorrespondences between WZNW models and CFTs with W-algebra symmetry
Creutzig, Thomas; Hikida, Yasuaki; Roenne, Peter

in JHEP (2016), 02

Full Text
See detailOn the Power of Rewinding Simulators in Functional Encryption
De Caro, Angelo; Iovino, Vincenzo

in Designs, Codes and Cryptography (2016)

Full Text
See detailDeniable Functional Encryption
De caro, Angelo; Iovino, Vincenzo; O'Neill, Adam

in Public-key Cryptography - PKC 2016, 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I (2016)

Full Text
See detailPrivate Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
Delerue Arriaga, Afonso; Barbosa, Manuel; Farshim, Pooya

in Dunkelman, Orr; Sanadhya, Somitra Kumar (Eds.) Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings (2016)

Full Text
See detailUpdatable Functional Encryption
Delerue Arriaga, Afonso; Iovino, Vincenzo; Tang, Qiang

in Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers (2016)

Full Text
See detailComparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare
Ferreira, Ana; Lenzini, Gabriele

in Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP) (2016)

See detail(Universal) Unconditional Verifiability in E-Voting without Trusted Parties
Gallegos-Garcia, Gina; Iovino, Vincenzo; Roenne, Peter; Ryan, Peter

E-print/Working paper (2016)

Full Text
See detailHigh-fidelity spherical cholesteric liquid crystal Bragg reflectors generating unclonable patterns for secure authentication
Geng, Yong; Noh, Junghyun; Drevensek-Olenik, Irena; Rupp, Romano; Lenzini, Gabriele; Lagerwall, Jan

in Scientific Reports (2016), 6(26840), 1-8

Full Text
See detailOn the Possibility of Non-Interactive E-Voting in the Public-key Setting
Giustolisi, Rosario; Iovino, Vincenzo; Rønne, Peter

in Financial Cryptography and Data Security, FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers (2016)

See detailReal-World Electronic Voting: Design, Analysis and Deployment
Hao, Feng; Ryan, Peter

Book published by Auerbach Publications (2016)

Full Text
See detailSocio-Technical Aspects of Security Analysis
Huynen, Jean-Louis

Doctoral thesis (2016)

Full Text
See detailOn the power of Public-key Function-Private Functional Encryption
Iovino, Vincenzo; Tang, Qiang; Zebrowski, Karol

in 15th International Conference on Cryptology and Network Security (2016)

Full Text
See detailInformation Security as Strategic (In)effectivity
Jamroga, Wojciech; Tabatabaei, Masoud

in 12th International Workshop on Security and Trust Management (STM), 2016. (2016)

Full Text
See detailPreventing Coercion in E-Voting: Be Open and Commit
Jamroga, Wojciech; Tabatabaei, Masoud

in Proceedings of the 12th International Joint Conference on Electronic Voting (E-Vote-ID) (2016)

Full Text
See detailOn Password-Authenticated Key Exchange Security Modeling
Lancrenon, Jean

in Stajano, Frank; Mjolsnes, Stig; Jenkinson, Graeme; Thorsheim, Per (Eds.) Technology and practice of passwords: 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings (2016, March)

Full Text
See detailAnalysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems
Lenzini, Gabriele; Mauw, Sjouke; Ouchani, Samir

in Barthe, Gilles; Markatos, Evangelos (Eds.) Security and Trust Management - STM 2016 (2016)

Full Text
See detailEnergy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes
Liu, Zhe; Groszschädl, Johann; Li, Lin; Xu, Qiuliang

in Liu, Joseph K.; Steinfeld, Ron (Eds.) Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (2016, July)

Full Text
See detailEfficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes
Liu, Zhe; Seo, Hwajeong; Groszschädl, Johann; Kim, Howon

in IEEE Transactions on Information Forensics and Security (2016), 11(7), 1385-1397

Full Text
See detailProtect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations
Pejo, Balazs; Tang, Qiang; Wang, Husen

Scientific Conference (2016, June 27)

Full Text
See detailAttribute-Based Signatures with Controllable Linkability
Perez Urquidi, Jose Miguel; Lancrenon, Jean; Khader, Dalia; Chen, Liqun

in Yung, Moti; Zhang, Jianbiao; Yang, Zhen (Eds.) Trusted Systems: 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers (2016, March)

Full Text
See detailMetrics for Transparency
Pierina Brustolin Spagnuelo, Dayana; Bartolini, Cesare; Lenzini, Gabriele

in Proceedings of DPM 2016 and QASA 2016 (2016, September)

Full Text
See detailPatient-Centred Transparency Requirements for Medical Data Sharing Systems
Pierina Brustolin Spagnuelo, Dayana; Lenzini, Gabriele

in Proceedings of the 4th World Conference on Information Systems and Technologies (2016)

Full Text
See detailTransparent Medical Data Systems
Pierina Brustolin Spagnuelo, Dayana; Lenzini, Gabriele

in Journal of Medical Systems (2016)

Full Text
See detailOn the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data
Rial, Alfredo

in Abstract book of 2016 IEEE 8th International Conference on Cloud Computing Technology and Science (CloudCom) (2016, December)

Full Text
See detailPrivacy-preserving smart metering revisited
Rial, Alfredo; Danezis, George; Kohlweiss, Markulf

in International Journal of Information Security (2016)

Full Text
See detailJCJ with Improved Verifiability Guarantees
Roenne, Peter

Scientific Conference (2016)

See detailCrypto Santa
Ryan, Peter

in The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (2016)

See detailThe New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday
Ryan, Peter; Naccache, David; Quisquater, Jean-Jacques

Book published by Springer (2016)

Full Text
See detailSelene: Voting with Transparent Verifiability and Coercion-Mitigation
Ryan, Peter; Roenne, Peter; Iovino, Vincenzo

in Abstract book of 1st Workshop on Advances in Secure Electronic Voting (2016), 2015

Full Text
See detailTwo More Efficient Variants of the J-PAKE Protocol
Skrobot, Marjan; Lancrenon, Jean; Tang, Qiang

in ACNS 2016 (2016, June)

Full Text
See detailGAMES AND STRATEGIES IN ANALYSIS OF SECURITY PROPERTIES
Tabatabaei, Masoud

Doctoral thesis (2016)

Full Text
See detailExpressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt
Tabatabaei, Masoud; Jamroga, Wojciech; Ryan, Peter

in The International Workshop on AI for Privacy and Security (PrAISe), 2016. (2016)

Full Text
See detailPrivacy-preserving Friendship-based Recommender Systems
Tang, Qiang; Wang, Jun

in IEEE Transactions on Dependable and Secure Computing (2016, November)

Full Text
See detailIs a visuo-haptic differentiation of zebra mussel and quagga mussel based on a single external morphometric shell character possible?
Teubner, Diana; Wesslein, Ann-Katrin; Roenne, Peter; Veith, Michael; Frings, Christian; Paulus, Martin

in Aquatic Invasions (2016)

Full Text
See detailA Probabilistic View of Neighborhood-based Recommendation Methods
Wang, Jun; Tang, Qiang

in ICDM 2016 - IEEE International Conference on Data Mining series (ICDM) workshop CLOUDMINE (2016, December 12)

Top of Page

2015

Full Text
See detailInformation Leakage due to Revealing Randomly Selected Bits
Atashpendar, Arash; Roscoe, Bill; Ryan, Peter

in Security Protocols XXIII: Lecture Notes in Computer Science, Volume 9379, 2015 (2015, November 25)

Full Text
See detailService security and privacy as a socio-technical problem
Bella, Giampaolo; Curzon, Paul; Lenzini, Gabriele

in JOURNAL OF COMPUTER SECURITY (2015), 23(5), 563-585

Full Text
See detailA Secure Exam Protocol Without Trusted Parties
Bella, Giampaolo; Giustolisi, Rosario; Lenzini, Gabriele; Ryan, Peter

in ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 (2015)

See detail2015 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy, July 13, 2015
Bella, Giampaolo; Lenzini, Gabriele

Scientific Conference (2015, July 13)

Full Text
See detail4.2 Social Dynamics Metrics-Working Group Report
Benenson, Zinaida; Bleikertz, Sören; Foley, Simon N.; Harpes, Carlo; Kowalski, Stewart; Lenzini, Gabriele; Oliveira, Daniela; Parkin, Simon; Pfleeger, Shari Lawrence; Smith, Paul; others

in Socio-Technical Security Metrics (2015)

Full Text
See detailMaybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security
Benenson, Zinaida; Lenzini, Gabriele; Oliveira, Daniela; Parkin, Simon; Uebelacker

in Proc. of the New Security Paradigm Workshop (2015)

Full Text
See detailMaybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security
Beneson, Zinaida; Lenzini, Gabriele; Oliveira, Daniela; Parkin, Simon; Uebelacker, Sven

in Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security (2015)

Full Text
See detailKey Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes
Chenal, Massimo; Tang, Qiang

in Information Security - 18th International Conference, ISC 2015 (2015, September)

Full Text
See detailA Framework for Analyzing Verifiability in Traditional and Electronic Exams.
Dreier, Jannik; Giustolisi, Rosario; Kassem, Ali; Lafourcade, Pascal; Lenzini, Gabriele

in Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015 (2015)

Full Text
See detailFormal Security Analysis of Traditional and Electronic Exams
Dreier, Jannik; Giustosi, Rosario; Kassem, Ali; Lafourcade, Pascal; Lenzini, Gabriele; Ryan, Peter

in Communications in Computer and Information Science (2015), 554

Full Text
See detailIn Cyber-Space No One Can Hear You S·CREAM, A Root Cause Analysis for Socio-Technical Security
Ferreira, Ana; Huynen, Jean-Louis; Koenig, Vincent; Lenzini, Gabriele

in Foresti, Sara (Ed.) Security and Trust Management (2015)

Full Text
See detailDo graphical cues effectively inform users? A socio-technical security study in accessing wifi networks.
Ferreira, Ana; Huynen, Jean-Louis; Koenig, Vincent; Lenzini, Gabriele; Rivas, Salvador

in Lecture Notes in Computer Science (2015), 9190

Full Text
See detailAn Analysis of Social Engineering Principles in Effective Phishing
Ferreira, Ana; Lenzini, Gabriele

in Proc. of the 5th International Workshop on Socio-Technical Security and Trust (2015)

Full Text
See detailPrinciples of Persuasion in Social Engineering and Their Use in Phishing
Ferreira, Ana; Lenzini, Gabriele; Conventry, Lynne

in T. Tryfonas, I. Askoxylakis (Ed.) Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (2015)

Full Text
See detailOn the Possibility of Non-Interactive E-Voting in the Public-key Setting
Giustolisi, Rosario; Iovino, Vincenzo; Roenne, Peter

in IACR Cryptology ePrint Archive (2015), 2015

Full Text
See detailMarginal deformations and the Higgs phenomenon in higher spin AdS3 holography
Hikida, Yasuaki; Roenne, Peter Browne

in Journal of High Energy Physics [=JHEP] (2015), 7

See detailMergeable Functional Encryption
Iovino, Vincenzo; Żebrowski, Karol

Scientific Conference (2015, September 11)

Full Text
See detailSimulation-Based Secure Functional Encryption in the Random Oracle Model
Iovino, Vincenzo; Żebrowski, Karol

in Progress in Cryptology -- LATINCRYPT 2015 (2015)

Full Text
See detailAccumulative knowledge under bounded resources
Jamroga, Wojciech; Tabatabaei, Masoud

in Journal of Logic & Computation (2015)

Full Text
See detailStrategic Noninterference
Jamroga, Wojciech; Tabatabaei, Masoud

in ICT Systems Security and Privacy Protection (2015)

Full Text
See detailCan Transparency Enhancing Tools support patient's accessing Electronic Health Records?
Lenzini, Gabriele; Ferreira, Ana

in Advances in Intelligent Systems and Computing (2015)

Full Text
See detailSecurity analysis of socio-technical physical systems
Lenzini, Gabriele; Mauw, Sjouke; Ouchani, Samir

in Computers electrical engineering (2015)

Full Text
See detailMethods to Mitigate Risk of Composition Attack in Independent Data Publications
Li, Jiuyong; Sattar, Sarowar A.; Baig, Muzammil M.; Liu, Jixue; Tang, Qiang; Malin, Bradley

in Medical Data Privacy Handbook 2015 (2015)

Full Text
See detailEfficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks
Liu, Zhe; Seo, Hwajeong; Hu, Zhi; Huang, Xinyi; Groszschädl, Johann

in Bao, Feng; Miller, Steven; Zhou, Jianying; Ahn, Gail-Joon (Eds.) ASIACCS'15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, April 14-17, 2015, Singapore (2015, April)

Full Text
See detailEfficient Ring-LWE Encryption on 8-bit AVR Processors
Liu, Zhe; Seo, Hwajeong; Roy, Sujoy Sinha; Groszschädl, Johann; Kim, Howon; Verbauwhede, Ingrid

in Güneysu, Tim; Handschuh, Helena (Eds.) Cryptographic Hardware and Embedded Systems - CHES 2015, 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings (2015, September)

Full Text
See detailGenerating attacks in SysML activity diagrams by detecting attack surfaces
Ouchani, Samir; Lenzini, Gabriele

in Journal of Ambient Intelligence and Humanized Computing (2015), 6(3), 361-373

Full Text
See detailSecurity on medical data sharing (a literature review)
Pierina Brustolin Spagnuelo, Dayana; Lenzini, Gabriele

Report (2015)

Full Text
See detailHigher spin AdS3 holography and superstring theory
Roenne, Peter Browne; Creutzig, Thomas; Hikida, Yasuaki

Scientific Conference (2015)

Full Text
See detailEnd-to-end verifiability
Ryan, Peter; Benaloh, Josh; Rivest, Ronald; Stark, Philip; Teague, Vanessa; Vora, Poorvi

in arXiv preprint arXiv:1504.03778 (2015)

Full Text
See detailPrivacy and Security in an Age of Surveillance
Ryan, Peter; Preneel, Bart; Rogaway, Phillip; Ryan, Mark D.

Report (2015)

Full Text
See detailSelene: Voting with Transparent Verifiability and Coercion-Mitigation
Ryan, Peter; Roenne, Peter; Iovino, Vincenzo

in Abstract book of 1st Workshop on Advances in Secure Electronic Voting (2016), 2015

Full Text
See detailEnd-to-End Verifiability in Voting Systems, from Theory to Practice
Ryan, Peter; Schneider, Steve; Teague, Vanessa

in IEEE SECURITY & PRIVACY (2015), 13(3), 59-62

Full Text
See detailOn the Provable Security of the Dragonfly Protocol
Skrobot, Marjan; Lancrenon, Jean

in Lopez, Javier; Mitchell, Chris J. (Eds.) Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 (2015, September)

Full Text
See detailTowards Forward Security Properties for PEKS and IBE
Tang, Qiang

in Information Security and Privacy - 20th Australasian Conference, ACISP 2015 (2015)

See detailExtend the Concept of Public Key Encryption with Delegated Search
Tang, Qiang; Ma, Hua; Chen, Xiaofeng

in The Computer Journal (2015), 58(4), 11

Full Text
See detailPrivacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions
Tang, Qiang; Wang, Jun

in Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security (2015, September)

Full Text
See detailRecommender Systems and their Security Concerns
Wang, Jun; Tang, Qiang

Scientific Conference (2015, October)

Top of Page

2014

Full Text
See detailUnitary W-algebras and three-dimensional higher spin gravities with spin one symmetry
Afshar, Hamid; Creutzig, Thomas; Grumiller, Daniel; Hikida, Yasuaki; Roenne, Peter Browne

in Journal of High Energy Physics [=JHEP] (2014)

Full Text
See detailSPN2: Single-Sided Privacy Preserving Nearest Neighbor and its Application to Face Recognition
Aouada, Djamila; Khader, Dalia

in 11th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS'14) (2014)

Full Text
See detailA Socio-Technical Methodology for the Security and Privacy Analysis of Services
Bella, Giampaolo; Curzon, Paul; Giustolisi, Rosario; Lenzini, Gabriele

in IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden (2014)

Full Text
See detailSecure exams despite malicious management
Bella, Giampaolo; Giustolisi, Rosario; Lenzini, Gabriele

in Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014 (2014)

See detailProceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014
Bella, Giampaolo; Lenzini, Gabriele

Scientific Conference (2014)

Full Text
See detailDistributed Searchable Symmetric Encryption
Bosch; Peter, Andreas; Leenders, Bram; Lim, Hoon Wei; Tang, Qiang; Wang, Huaxiong; Hartel, Pieter; Jonker, Willem

in PST2014 International Conference on Privacy, Security and Trust (2014)

Full Text
See detailComparing variants of strategic ability: how uncertainty and memory influence general properties of games
Bulling, Nils; Jamroga, Wojciech

in proceedings of Autonomous Agents and Multi-agent Systems (2014)

Full Text
See detailComparing variants of strategic ability: how uncertainty and memory influence general properties of games
Bulling, Nils; Jamroga, Wojciech

in Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems (2014)

Full Text
See detailNew Algorithms for Secure Outsourcing of Modular Exponentiations
Chen, Xiaofeng; Li, Jin; Ma, Jianfeng; Tang, Qiang; Lou, Wenjing

in IEEE Trans. Parallel Distrib. Syst. (2014), 25(9), 2386-2396

Full Text
See detailEfficient Algorithms for Secure Outsourcing of Bilinear Pairings
Chen, Xiaofeng; Susilo, Willy; Li, Jin; Wong, Duncan; Ma, Jianfeng; Tang, Shaohua; Tang, Qiang

in Theoretical Computer Science (2014)

Full Text
See detailOn Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes
Chenal, Massimo; Tang, Qiang

in Progress in Cryptology - LATINCRYPT 2014, Florianópolis 17-19 September 2014 (2014)

Full Text
See detailHigher spin AdS$_3$ holography with extended supersymmetry
Creutzig, Thomas; Hikida, Yasuaki; Roenne, Peter Browne

in Journal of High Energy Physics [=JHEP] (2014), 1410

Full Text
See detailHigh-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit
Cui, Shujie; Liu, Zhe; Groszschädl, Johann; Xu, Qiuliang

in Huang, Xinyi; Zhou, Jianying (Eds.) Information Security Practice and Experience, 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings (2014, May)

Full Text
See detailvVote: a Verifiable Voting System
Culnane, Chris; Ryan, Peter; Schneider, Steve; Teague, Vanessa

in Jets (2014)

Full Text
See detailTrapdoor Privacy in Asymmetric Searchable Encryption Schemes
Delerue Arriaga, Afonso; Tang, Qiang; Ryan, Peter

in Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014 (2014)

Full Text
See detailOn the verifiability of (electronic) exams
Dreier, Jannik; Giustolisi, Rosario; Kassem, Ali; Lafourcade, Pascal; Lenzini, Gabriele

Report (2014)

Full Text
See detailFormal Analysis of Electronic Exams
Dreier, Jannik; Giustolisi, Rosario; Kassem, Ali; Lafourcade, Pascal; Lenzini, Gabriele; Ryan, Peter

in SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 (2014)

Full Text
See detailA Conceptual Framework to Study Socio-Technical Security
Ferreira, Ana; Huynen, Jean-Louis; Koenig, Vincent; Lenzini, Gabriele

in Lecture Notes in Computer Science (2014)

Full Text
See detailSocio-technical Security Analysis of Wireless Hotspots
Ferreira, Ana; Huynen, Jean-Louis; Koenig, Vincent; Lenzini, Gabriele

in Lecture Notes in Computer Science (2014)

Full Text
See detailEnvisioning secure and usable access control for patients
Ferreira, Ana; Lenzini, Gabriele; Santos-Pereira, Cátia; Augusto, Alexandre; Correia, Manuel

in IEEE 3rd International Conference on Serious Games and Applications in Healthcare (2014, May)

Full Text
See detailRemark!: A Secure Protocol for Remote Exams
Giustolisi, Rosario; Lenzini, Gabriele; Ryan, Peter

in Security Protocols XXII - Lecture Notes in Computer Science (2014)

Full Text
See detailHow to prove the validity of a complex ballot encryption to the voter and the public
Joaquim, Rui

in Journal of Information Security and Applications (2014)

Full Text
See detailDecentralized Traceable Attribute-Based Signatures
Khader, Dalia; El Kaafarani, Ali; Ghadafi, Essam

in LNCS (2014)

Full Text
See detailA Probabilistic Framework for Security Scenarios with Dependent Actions
Kordy, Barbara; Schweitzer, Patrick; Pouly, Marc

in The 11th International Conference on Integrated Formal Methods (iFM'14), Bertinoro, Italy (2014)

Full Text
See detailWhat Public Keys Can Do for Three-Party, Password-Authenticated Key Exchange
Lancrenon, Jean

in Sokratis; Agudo, Isaac (Eds.) Public Key Infrastructures, Services and Applications: 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers (2014, September)

Full Text
See detailNew Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers
Liu, Zhe; Groszschädl, Johann

in Pointcheval, David; Vergnaud, Damien (Eds.) Progress in Cryptology - AFRICACRYPT 2014, 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings (2014, May)

Full Text
See detailReverse Product-Scanning Multiplication and Squaring on 8-bit AVR Processors
Liu, Zhe; Seo, Hwajeong; Groszschädl, Johann; Kim, Howon

in Hui, Lucas C. K.; Qing, Sihan; Shi, Elaine; Yiu, Siu-Ming (Eds.) Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014. Proceedings (2014, December)

Full Text
See detailMoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks
Liu, Zhe; Wenger, Erich; Groszschädl, Johann

in Boureanu, Ioana; Owezarski, Philippe; Vaudenay, Serge (Eds.) Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings (2014, June)

Full Text
See detailPrivacy and Security in an Age of Surveillance
Preneel, Bart; Rogaway, Phillip; Ryan, Mark D.; Ryan, Peter

in Dagstuhl Reports (2014), 4(9), 106-123

Full Text
See detailDoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity
Ryan, Peter; Phatak, Dhananjay S.; Tang, Qiang; Smith, Warren D.; Sherman, Alan T.; Kalpakis, Kostas

in IACR Cryptology ePrint Archive (2014)

Full Text
See detailMontgomery Modular Multiplication on ARM-NEON Revisited
Seo, Hwajeong; Liu, Zhe; Groszschädl, Johann; Choi, Jongseok; Kim, Howon

in Kim, Jongsung; Lee, Jooyoung (Eds.) Information Security and Cryptology - ICISC 2014, 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers (2014, December)

Full Text
See detailImproved Modular Multiplication for Optimal Prime Fields
Seo, Hwajeong; Liu, Zhe; Nogami, Yasuyuki; Choi, Jongseok; Kim, Howon

E-print/Working paper (2014)

Full Text
See detailNothing is for Free: Security in Searching Shared & Encrypted Data
Tang, Qiang

in IEEE Transactions on Information Forensics & Security (2014)

Full Text
See detailProtecting Elliptic Curve Cryptography Against Memory Disclosure Attacks
Yang, Yang; Guan, Zhi; Liu, Zhe; Chen, Zhong

in Shi, Elaine; Yiu, S.M. (Eds.) Information and Communications Security (2014, December)

Top of Page

2013

Full Text
See detailSocio-technical formal analysis of TLS certificate validation in modern browsers
Bella, Giampaolo; Giustolisi, Rosario; Lenzini, Gabriele

in PST (2013)

Full Text
See detailA Socio-technical Understanding of TLS Certificate Validation
Bella, Giampaolo; Giustolisi, Rosario; Lenzini, Gabriele

in Trust Management VII (2013)

Full Text
See detailDEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity
Chen, Xihui; Harpes, Carlo; Lenzini, Gabriele; Martins, Miguel; Mauw, Sjouke; Pang, Jun

in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)

Full Text
See detailLocation Assurance and Privacy in GNSS Navigation
Chen, Xihui; Harpes, Carlo; Lenzini, Gabriele; Mauw, Sjouke; Pang, Jun

in ERCIM News (2013), 2013(94),

Full Text
See detailA trust framework for evaluating GNSS signal integrity
Chen, Xihui; Lenzini, Gabriele; Martins, Miguel; Mauw, Sjouke; Pang, Jun

in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)

Full Text
See detailDesign and formal analysis of a group signature based electronic toll pricing system
Chen, Xihui; Lenzini, Gabriele; Mauw, Sjouke; Pang, Jun

in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75

Full Text
See detailTwisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
Chu, Dalin; Groszschädl, Johann; Liu, Zhe; Müller, Volker; Zhang, Yang

in Chen, Kefei; Xie, Qi; Qiu, Weidong; Xu, Shouhuai; Zhao, Yunlei (Eds.) Proceedings of the first ACM Workshop on Asia Public-Key Cryptography (ASIAPKC 2013) (2013, May)

Full Text
See detailN=1 supersymmetric higher spin holography on AdS3
Creutzig, T.; Hikida, Y.; Roenne, Peter Browne

in Journal of High Energy Physics (2013), 2013(2),

Full Text
See detailThree point functions in higher spin AdS3 supergravity
Creutzig, T.; Hikida, Y.; Roenne, Peter Browne

in Journal of High Energy Physics (2013), 2013(1),

Full Text
See detailExtended higher spin holography and Grassmannian models
Creutzig, Thomas; Hikida, Yasuaki; Roenne, Peter Browne

in Journal of High Energy Physics [=JHEP] (2013)

Full Text
See detailHigher spin AdS$_3$ supergravity and its CFT dual
Creutzig, Thomas; Hikida, Yasuaki; Roenne, Peter Browne

in International Journal of Modern Physics: Conference Series (2013)

Full Text
See detailFaster Print on Demand for Prêt à Voter
Culnane, Chris; Heather, James; Joaquim, Rui; Ryan, Peter; Schneider, Steve; Teague, Vanessa

in Journal of Election Technology and Systems (2013), 2(1),

Full Text
See detailOn the Achievability of Simulation-Based Security for Functional Encryption
De caro, Angelo; Iovino, Vincenzo; Jain, Abhishek; O'Neill, Adam; Paneth, Omer; Persiano, Giuseppe

in Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II (2013)

Full Text
See detailStudies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates
Ferreira, Ana; Giustolisi, Rosario; Huynen, Jean-Louis; Koenig, Vincent; Lenzini, Gabriele

in IEEE TrustCom (2013)

Full Text
See detailOn Tools for Socio-Technical Security Analysis
Ferreira, Ana; Giustolisi, Rosario; Huynen, Jean-Louis; Lenzini, Gabriele

Scientific Conference (2013, April 12)

Full Text
See detailSocio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names
Ferreira, Ana; Huynen, Jean-Louis; Koenig, Vincent; Lenzini, Gabriele; Rivas, Salvador

in Lecture Notes in Computer Science (2013), 8203

Full Text
See detailWhat Security for Electronic Exams?
Giustolisi, Rosario; Lenzini, Gabriele; Bella, Giampaolo

in 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013 (2013)

Full Text
See detailStrategic games and truly playable effectivity functions
Goranko, Valentin; Jamroga, Wojciech; Turrini, Paolo

in Autonomous Agents & Multi-Agent Systems (2013), 26(2), 288-314

Full Text
See detailIncentives and Rationality in Security of Interaction Protocols
Jamroga, Wojciech; Melissen, Matthijs; Schnoor, Henning

in PRIMA 2013: Principles and Practice of Multi-Agent Systems. Proceedings (2013)

Full Text
See detailAccumulative Knowledge Under Bounded Resources.
Jamroga, Wojciech; Tabatabaei, Masoud

in Computational Logic in Multi-Agent Systems (2013, September 16)

Full Text
See detailStudying Boardroom E-Voting Schemes: Usability and Trust
Khader, Dalia; McCall, Roderick; Lopez Becerra, JOSE MIGUEL

Report (2013)

Full Text
See detailProving Prêt à Voter Receipt Free Using Computational Security Models
Khader, Dalia; Ryan, Peter; Tang, Qiang

in USENIX Journal of Election Technology and Systems (2013), 1(1), 62-81

See detailPassword-based Authenticated Key Establishment Protocols
Lancrenon, Jean; Khader, Dalia; Ryan, Peter; Hao, Feng

in Computer And Information Security Handbook (2013)

Full Text
See detailLow-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors
Liu, Zhe; Groszschädl, Johann; Wong, Duncan S.

in Lin, Dongdai; Xu, Shouhuai; Yung, Moti (Eds.) Information Security and Cryptology - 9th International Conference, INSCRYPT 2013, Guangzhou, China, November 27-30, 2013 (2013, November)

Full Text
See detailEfficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes
Liu, Zhe; Seo, Hwajeong; Groszschädl, Johann; Kim, Howon

in Qing, Sihan; Zhou, Jianying; Liu, Dongmei (Eds.) Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings (2013, November)

Full Text
See detailAnalysis of composite plates by a unified formulation-cell based smoothed finite element method and field consistent elements
Natarajan, S.; Ferreira, Ana; Bordas, Stéphane; Carrera, E.; Cinefra, M.

in Composite Structures (2013), 105

Full Text
See detailVerifiable postal voting
Ryan, Peter; Benaloh, Josh; Teague, Vanessa

in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2013)

Full Text
See detailEnhancements to prepare-and-measure based QKD protocols
Ryan, Peter; Christianson, Bruce

in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2013)

Full Text
See detailPrêt à Voter providing everlasting privacy
Ryan, Peter; Demirel, Denise; Henning, Maria; van de Graaf, Jeroen; Buchmann, Johannes

in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2013)

Full Text
See detailCaveat Coercitor: coercion-evidence in electronic voting
Ryan, Peter; Grewal, Gurchetan S.; Ryan, Mark D.; Bursuc, Sergiu

in 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2013)

Full Text
See detailVerifiable Voting Systems
Ryan, Peter; Peacock, Thea; Schneider, Steve; Xia, Zhe

in Computer and Information Security Handbook (2013)

Full Text
See detailGeneralized Information Theory for Hints
Ryan, Peter; Pouly, Marc; Kohlas, Juerg

in International Journal of Approximate Reasoning (2013), 54(1), 228-251

Full Text
See detailTesting Voters' Understanding of a Security Mechanism Used in Verifiable Voting
Ryan, Peter; Schneider, Steve; Xia, Zhe; Llewellyn, Morgan; Heather, James; Culnane, Chris

in 53 USENIX Journal of Election Technology and Systems (JETS) (2013), 1(1), 53-61

Full Text
See detailFaster print on demand for Prêt à Voter
Ryan, Peter; Teague, Vanessa; Schneider, Steve; Joaquim, Rui; Heather, James; Culnane, Chris

in USENIX Journal of Election Technology and Systems (JETS) (2013), 2(1),

Full Text
See detailMulti-precision Squaring for Public-Key Cryptography on Embedded Microprocessors
Seo, Hwajeong; Liu, Zhe; Choi, Jongseok; Kim, Kowon

in The 14th International Conference on Cryptology in India -- INDOCRYPT 2013 (2013), 8250

Full Text
See detailFixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication
Seo, Hwajeong; Liu, Zhe; Kim, Hyunjin; Park, Taehwan; Lee, Yeoncheol; Kim, Howon

in Sensors (2013)

See detailParallel Implementation of LEA
Seo, Hwajeong; Liu, Zhe; Park, Taehwan; Kim, Hyunjin; Lee, Yeoncheol; Choi, Jongseok; Kim, Howon

E-print/Working paper (2013)

Full Text
See detailPreventing Coercion in E-Voting: Be Open and Commit
Tabatabaei, Masoud; Jamroga, Wojciech; Ryan, Peter

Scientific Conference (2013, March 17)

Full Text
See detailSearch in Encrypted Data: Theoretical Models and Practical Applications
Tang, Qiang

in Theory and Practice of Cryptography Solutions for Secure Information Systems (2013)

Full Text
See detailTowards a privacy-preserving solution for OSNs
Tang, Qiang

in Sandhu, Ravi; Lopez, Javier; Huang, Xinyi (Eds.) Towards a privacy-preserving solution for OSNs (2013)

Full Text
See detailTowards asymmetric searchable encryption with message recovery and flexible search authorization
Tang, Qiang; Chen, Xiaofeng

in Proceeding of 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) (2013)

Full Text
See detailA Comprehensive Study of Multiple Deductions-based Algebraic Trace Driven Cache Attacks on AES
Zhao, Xinjie; Guo, Shize; Zhang, Fan; Wang, Tao; Shi, Zhijie; Liu, Zhe; Gallais, Jean-Fran\c{c}ois

in Computers & Security (2013), 39

Top of Page

2012

Full Text
See detailA Supervised Verifiable Voting Protocol for the Victorian Electoral Commission
Burton, Craig Burton; Culnane, Chris; Heather, James; Peacock, Thea; Ryan, Peter; Schneider, Steve; Teague, Vanessa; Wen, Roland; Xia, Zhe; Srinivasan, Sriramkrishnan

in EVOTE 2012 (2012)

Full Text
See detailImplementation and Validation of a Localisation Assurance Service Provider
Chen, Xihui; Harpes, Carlo; Lenzini, Gabriele; Martins, Miguel; Mauw, Sjouke; Pang, Jun

in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

Full Text
See detailA group signature based electronic toll pricing system
Chen, Xihui; Lenzini, Gabriele; Mauw, Sjouke; Pang, Jun

in Proc. 7th International Conference on Availability, Reliability and Security (2012)

See detailProceedings of the 5th Workshop on Logical Aspects of Multi-Agent Systems LAMAS'2012
Goranko, Valentin; Jamroga, Wojciech

Book published by IFAAMAS (2012)

Full Text
See detailState and Path Effectivity Models for Logics of Multi-Player Games
Goranko, Valentin; Jamroga, Wojciech

in Proceedings of AAMAS 2012 (2012)

Full Text
See detailConcepts, Agents, and Coalitions in Alternating Time
Jamroga, Wojciech

in Proceedings of ECAI 2012 (2012)

See detailLAMAS 2012 Proceedings of the 5rd Workshop on Logical Aspects of Multi-Agent Systems
Jamroga, Wojciech; Goranko, Valentin

Book published by IFAAMAS (2012)

Full Text
See detailFairness in Non-repudiation Protocols
Jamroga, Wojciech; Mauw, Sjouke; Melissen, Matthijs

in Proceedings of STM 2011 (2012)

Full Text
See detailSpecification and Verification of Multi-Agent Systems
Jamroga, Wojciech; Penczek, Wojciech

in Lectures on Logic and Computation (2012)

Full Text
See detailA Fair and Robust Voting System by Broadcast
Khader, Dalia; Smyth, Ben; Ryan, Peter; Hao, Feng

in Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) (2012)

See detailSTAST 2012 Proc. of the 2nd Int. Workshop on Socio-Technical Aspects in Security and Trust
Lenzini, Gabriele; Bella, Giampaolo

Book published by IEEE (2012)

Full Text
See detailForeword from the Programme Chairs-STAST 2012
Ryan, Peter; Coles-Kemp, Lizzie

in Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on (2012)

Full Text
See detailUsing Prêt à Voter in Victorian State Elections
Ryan, Peter; Schneider, Steve; Peacock, Thea; Heather, James; Srinivasan, Sriramkrishnan; Teague, Vanessa; Xia, Zhe; Wen, Roland; Culnane, Chris; Burton, Craig

in Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (2012)

Full Text
See detailTrustworthy agent-based recommender system in a mobile P2P environment
Sahli, N.; Lenzini, Gabriele; Eertink, H.

in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2012), 6573 LNAI

Full Text
See detailGeneration of Realistic Mobility for VANETs Using Genetic Algorithms
Seredynski, Marcin; Danoy, Grégoire; Tabatabaei, Masoud; Bouvry, Pascal; Pigné, Yoann

in Proceedings of the IEEE Congress on Evolutionary Computation (2012)

Full Text
See detailDistance-Based Rules for Weighted Judgment Aggregation (Extended Abstract)
Slavkovik, Marija; Jamroga, Wojciech

in Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, AAMAS2012 (2012)

Full Text
See detailDefending against insider threats and internal data leakage
You, Ilsun; Lenzini, Gabriele; Ogiela, Marek R.; Bertino, Elisa

in SECURITY AND COMMUNICATION NETWORKS (2012), 5(8), 831-833

Top of Page

2011

Full Text
See detailEnforcing privacy in e-commerce by balancing anonymity and trust
Bella, Giampaolo; Giustolisi, Rosario; Riccobene, Salvatore

in Computers & Security (2011), 30(8), 705-718

Full Text
See detailAlternating Epistemic Mu-Calculus
Bulling, N.; Jamroga, Wojciech

in Proceedings of IJCAI-11 (2011)

See detailSTAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and Trust
Coles-Kemp, Lizzie; Lenzini, Gabriele; Ryan, Peter; Bella, Giampaolo

Book published by IEEE (2011)

Full Text
See detailStrategic Games and Truly Playable Effectivity Functions
Goranko, V.; Jamroga, Wojciech; Turrini, Paolo

in Proceedings of AAMAS2011 (2011)

Full Text
See detailComparing Variants of Strategic Ability
Jamroga, Wojciech; Bulling, N.

in Proceedings of IJCAI-11 (2011)

Full Text
See detailDoubtful Deviations and Farsighted Play
Jamroga, Wojciech; Melissen, Matthijs

in Progress in Artificial Intelligence, Proceedings of the 15th Portuguese Conference on Artificial Intelligence (2011)

Full Text
See detailComputational Aspects of Attack-Defense Trees
Kordy, Barbara; Pouly, Marc; Schweitzer, Patrick

in Security and Intelligent Information Systems - International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers (2011)

Full Text
See detailA Modular Multi-Modal Specification of Real-Timed, End-To-End Voter-Verifiable Voting Systems
Kramer, Simon; Ryan, Peter

in 2011 International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE) (2011)

Full Text
See detailSelective location blinding using hash chains
Lenzini, Gabriele; Mauw, Sjouke; Pang, Jun

in Proc. 19th International Workshop on Security Protocols (2011)

Full Text
See detailAgents, Actions and Goals in Dynamic Environments
Novak, P.; Jamroga, Wojciech

in Proceedings of IJCAI-11 (2011)

See detailGeneralized Information Theory based on the Theory of Hints
Pouly, Marc

in Liu, Weiru (Ed.) Symbolic and Quantitative Approaches to Reasoning with Uncertainty (2011)

See detailGeneric Solution Construction in Valuation-Based Systems
Pouly, Marc

in Butz, Cory; Lingras, Pawan (Eds.) Advances in Artificial Intelligence (2011)

See detailGeneric Inference A Unifying Theory for Automated Reasoning
Pouly, Marc; Kohlas, Jürg

Book published by John Wiley & Sons (2011)

Full Text
See detailGeneric Local Computation
Pouly, Marc; Schneuwly, Cesar; Kohlas, Jürg

Report (2011)

See detailAdaptive Trust Management
Seigneur, Jean-Marc; Lenzini, Gabriele; Hulsebosch, Bob

in Serugendo, Giovanna Di Marzo; Gleizes, Marie-Pierre; Karageorgos, Anthony (Eds.) Self-Organizing Software - From Natural to Artificial Adaptation (2011)

Full Text
See detailDistance-based Judgment Aggregation of Three-valued Judgments with Weights
Slavkovik, Marija; Jamroga, Wojciech

in Proceedings of the IJCAI Workshop on Social Choice and Artificial Intelligence (2011)

Top of Page

2010

Full Text
See detailContextual biometric-based authentication for ubiquitous services
Buhan, Ileana; Lenzini, Gabriele; Radomirovic, Sasa

in Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (2010)

Full Text
See detailModel Checking Logics of Strategic Ability: Complexity
Bulling, N.; Dix, J.; Jamroga, Wojciech

in Dastani, M.; Hindriks, K.; Meyer, J.-J. (Eds.) Specification and Verification of Multi-Agent Systems (2010)

Full Text
See detailVerifying Agents with Memory Is Harder than It Seemed
Bulling, N.; Jamroga, Wojciech

in AI Communications (2010), 23

Full Text
See detailVerifying Agents with Memory Is Harder than It Seemed
Bulling, N.; Jamroga, Wojciech

in Proceedings of AAMAS2010 (2010)

Full Text
See detailReasoning about Strategies of Multi-Agent Programs
Dastani, Mehdi; Jamroga, Wojciech

in Proceedings of AAMAS2010 (2010)

Full Text
See detailStrategic Games and Truly Playable Effectivity Functions
Goranko, V.; Jamroga, Wojciech; Turrini, Paolo

in Proceedings of EUMAS2010 (2010)

Full Text
See detailComparing Variants of Strategic Ability
Jamroga, Wojciech; Bulling, N.

in Proceedings of EUMAS2010 (2010)

Full Text
See detailSecurity protocols for Secret Santa
Mauw, Sjouke; Radomirovic, Sasa; Ryan, Peter

in Proc. 18th Security Protocols Workshop (2010)

Full Text
See detailCoalition Description Logic for Individuals
Seylan, I.; Jamroga, Wojciech

in Electronic Notes in Theoretical Computer Science (2010), 262

Full Text
See detailVersatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface
Xia, Zhe; Culnane, Chris; Heather, James; Jonker, Hugo; Ryan, Peter; Schneider, Steve; Srinivasan, Sriramkrishnan

in Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (2010)

Top of Page

2009

Full Text
See detailRational Play and Rational Beliefs under Uncertainty
Bulling, N.; Jamroga, Wojciech

in Proceedings of AAMAS'09 (2009)

Full Text
See detailWhat agents can probably enforce
Bulling, N.; Jamroga, Wojciech

in Fundamenta Informaticae (2009)

Full Text
See detailEasy Yet Hard: Model Checking Strategies of Agents
Jamroga, Wojciech

in Computational Logic in Multi-Agent Systems: Proceedings of CLIMA IX (2009)

Full Text
See detailCode Patterns for Agent Oriented Programming
Novák, P.; Jamroga, Wojciech

in Proceedings of AAMAS'09 (2009)

Full Text
See detailDescription Logic for Coalitions
Seylan, I.; Jamroga, Wojciech

in Proceedings of AAMAS'09 (2009)

Top of Page

Undated

Full Text
See detailCorrespondences between WZNW models and CFTs with W-algebra symmetry
Roenne, Peter Browne; Creutzig, Thomas; Hikida, Yasuaki

E-print/Working paper (n.d.)

Top of Page