Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Joeri de Ruiter"'
Publikováno v:
Cryptologia. 46:347-379
We present and analyze User Discovery with Minimal information disclosure (UDM), a new protocol for user discovery in anonymous communication systems that minimizes the information disclosed to the...
Autor:
Joeri de Ruiter, Caspar Schutijser
Publikováno v:
Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies.
Regularly, new architectures are proposed to address shortcomings in the current internet. It is not always trivial to evaluate how these proposals would perform in practice. This situation is improved significantly with the introduction of the P4 pr
Autor:
Joeri de Ruiter, Adrian Perrig, Francois Wirz, Caspar Schutijser, Supraja Sridhara, Markus Legner
Publikováno v:
TAURIN@SIGCOMM
Next-generation Internet architectures are being designed and deployed to overcome limitations of today's Internet. One such architecture with an increasing production deployment is SCION [23], which also includes a transition mechanism to support an
Autor:
Mattijs Jonker, Aiko Pras, Cees de Laat, Fernando A. Kuipers, Anna Sperotto, Cristian Hesselman, Giovane C. M. Moura, Janet Hui Xue, Paola Grosso, Joeri de Ruiter, Ralph Holz, Roland van Rijswijk-Deij
Publikováno v:
Journal of Network and Systems Management, 28
Journal of network and systems management, 28(4), 882-922. Springer
Europe PubMed Central
Journal of Network and Systems Management
Journal of Network and Systems Management, 28(4). Springer New York
Journal of network and systems management, 28(4), 882-922. Springer
Europe PubMed Central
Journal of Network and Systems Management
Journal of Network and Systems Management, 28(4). Springer New York
Policy makers in regions such as Europe are increasingly concerned about the trustworthiness and sovereignty of the foundations of their digital economy, because it often depends on systems operated or manufactured elsewhere. To help curb this proble
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ee94e73e9c7ef451c97b7b98e64ba36b
http://resolver.tudelft.nl/uuid:857aaf11-1aff-431d-aeff-f5d33ffd0e63
http://resolver.tudelft.nl/uuid:857aaf11-1aff-431d-aeff-f5d33ffd0e63
Publikováno v:
Computer Security ISBN: 9783319990729
ESORICS (1)
ESORICS (1)
We show how state machine learning can be extended to handle time out behaviour and unreliable communication mediums. This enables us to carry out the first fully automated analysis of 802.11 4-Way Handshake implementations. We develop a tool that us
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::71d05b9dcdd7b9c33cdeb2f5b2cc48e6
https://doi.org/10.1007/978-3-319-99073-6_16
https://doi.org/10.1007/978-3-319-99073-6_16
Publikováno v:
ACSAC
ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04-08, 2017. Proceedings, 327-338. New York : ACM
STARTPAGE=327;ENDPAGE=338;TITLE=ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04-08, 2017. Proceedings
ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04-08, 2017. Proceedings, pp. 327-338
ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04-08, 2017. Proceedings, 327-338. New York : ACM
STARTPAGE=327;ENDPAGE=338;TITLE=ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04-08, 2017. Proceedings
ACSAC 2017: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA — December 04-08, 2017. Proceedings, pp. 327-338
This paper presents a new Key Management and Distribution Scheme for use in the European Rail Traffic Management System (ERTMS). Its aim is to simplify key management and improve cross-border operations through hierarchical partitioning. The current
Autor:
Anna Krasnova, Joeri de Ruiter, David Chaum, Debajyoti Das, Aniket Kate, Farid Javani, Alan T. Sherman
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783319612034
ACNS
ACNS
We introduce cMix, a new approach to anonymous communications. Through a precomputation, the core cMix protocol eliminates all expensive real-time public-key operations—at the senders, recipients and mixnodes—thereby decreasing real-time cryptogr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c188cada468161149755f5b16f9a786d
https://doi.org/10.1007/978-3-319-61204-1_28
https://doi.org/10.1007/978-3-319-61204-1_28
Publikováno v:
Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification ISBN: 9783319339504
RSSRail
RSSRail
This paper presents a formal analysis of the train to trackside communication protocols used in the European Railway Traffic Management System (ERTMS) standard, and in particular the EuroRadio protocol. This protocol is used to secure important comma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9ba8a5a11ca067f8edc7e99f25b25002
https://doi.org/10.1007/978-3-319-33951-1_4
https://doi.org/10.1007/978-3-319-33951-1_4
Autor:
Joeri de Ruiter
Publikováno v:
Secure IT Systems ISBN: 9783319475592
NordSec
NordSec
State machine inference is a powerful black-box analysis technique that can be used to learn a state machine implemented in a system, i.e. by only exchanging valid messages with the implementation a state machine can be extracted. In this paper we pe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::baf2f791ef271326ed7f5d1fd60d4de1
https://doi.org/10.1007/978-3-319-47560-8_11
https://doi.org/10.1007/978-3-319-47560-8_11
Publikováno v:
ICSTW 2013 : IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops : proceedings, pp. 461-468
ICSTW 2013 : IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops : proceedings, 461-468. Los Alamitos : IEEE
STARTPAGE=461;ENDPAGE=468;TITLE=ICSTW 2013 : IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops : proceedings
ICST Workshops
ICSTW 2013 : IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops : proceedings, 461-468. Los Alamitos : IEEE
STARTPAGE=461;ENDPAGE=468;TITLE=ICSTW 2013 : IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops : proceedings
ICST Workshops
Learning techniques allow the automatic inference of the behaviour of a system as a finite state machine. We demonstrate that learning techniques can be used to extract such formal models from software on banking smartcards which - as most bank cards
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bc36cd4125096455271fdd89fd705d3d
https://hdl.handle.net/2066/117003
https://hdl.handle.net/2066/117003