Sjouke Mauw

Sjouke Mauw

Professor in Computer Science

Forschungsthemen Security and Trust of Software Systems
Fakultät oder Zentrum Fakultät für Naturwissenschaften, Technologie und Kommunikation
Forschungseinheit CSC
Postadresse Université du Luxembourg
Maison du Nombre
6, Avenue de la Fonte
L-4364 Esch-sur-Alzette
Büroadresse MNO, E03 0325-020
E-Mail
Telefon (+352) 46 66 44 5480
Fax (+352) 46 66 44 35480
Video Prof. Sjouke Mauw (SnT)
Prof. Sjouke Mauw (SnT)
 
Prof. Sjouke Mauw (SnT)

Since January 2007 I am full professor in "Security and Trust of Software Systems" at the University of Luxembourg in the Computer Science and Communications Research Unit.

Until 2007, I was associate professor (UHD) in computer science at the Formal Methods group of the Eindhoven University of Technology.

Topics of research

  •  Security protocols
  •  Security assessment
  •  Privacy
  •  Attack trees
  •  Digital Rights Management
  •  Mobile ad-hoc and sensor networks
  •  RFID's

For more Information see here.

Last updated on: Mittwoch, den 14. Oktober 2015

powered by
orbilu.uni.lu

2016

Full Text
See detailBridging two worlds: Reconciling practical risk assessment methodologies with theory of attack trees
Gadyatskaya, Olga; Harpes, Carlo; Mauw, Sjouke; Muller, Cedric; Muller, Steve

in Proc. of GraMSec (2016)

Full Text
See detailAttack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0
Gadyatskaya, Olga; Jhawar, Ravi; Kordy, Piotr; Lounis, Karim; Mauw, Sjouke; Trujillo Rasua, Rolando

in Quantitative Evaluation of Systems - 13th International Conference (2016)

See detailProceedings of the 10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016)
Habib, Sheikh Mahbub; Vassileva, Julita; Mauw, Sjouke; Mühlhäuser, Max

Book published by Springer (2016)

Full Text
See detailA Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

in 12th International Workshop on Security and Trust Management (2016)

Full Text
See detailAnalysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems
Lenzini, Gabriele; Mauw, Sjouke; Ouchani, Samir

in Barthe, Gilles; Markatos, Evangelos (Eds.) Security and Trust Management - STM 2016 (2016)

Full Text
See detailOptimality Results on the Security of Lookup-Based Protocols
Mauw, Sjouke; Toro Pozo, Jorge Luis; Trujillo Rasua, Rolando

in Hancke, Gerard P.; Markantonakis, Konstantinos (Eds.) Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (2016, December)

Full Text
See detailA class of precomputation-based distance-bounding protocols
Mauw, Sjouke; Toro Pozo, Jorge Luis; Trujillo Rasua, Rolando

Presentation (2016, March 16)

Full Text
See detailA Class of Precomputation-based Distance-bounding Protocols
Mauw, Sjouke; Toro Pozo, Jorge Luis; Trujillo Rasua, Rolando

in 1st IEEE European Symposium on SECURITY and PRIVACY (2016)

Full Text
See detailCounteracting active attacks in social network graphs
Mauw, Sjouke; Trujillo Rasua, Rolando; Xuan, Bochuan

in Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (2016)

Top of Page

2015

Full Text
See detailComparing distance bounding protocols: A critical mission supported by decision theory
Avoine, Gildas; Mauw, Sjouke; Trujillo Rasua, Rolando

in Computer Communications (2015), 67

Full Text
See detailFP-Block: Usable Web Privacy by Controlling Browser Fingerprinting
Ferreira Torres, Christof; Jonker, Hugo; Mauw, Sjouke

in Pernul, Günther; Y A Ryan, Peter; Weippl, Edgar (Eds.) Computer Security -- ESORICS 2015 (2015)

Full Text
See detailAttack Trees with Sequential Conjunction
Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirovic, Sasa; Trujillo Rasua, Rolando

in Federrath, Hannes; Gollmann, Dieter (Eds.) ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015 (2015)

Full Text
See detailLocation-private interstellar communication
Jonker, Hugo; Mauw, Sjouke; Radomirovic, Sasa

in 23rd Security Protocols Workshop (2015)

Full Text
See detailSecurity analysis of socio-technical physical systems
Lenzini, Gabriele; Mauw, Sjouke; Ouchani, Samir

in Computers electrical engineering (2015)

Full Text
See detailLocation-private interstellar communication (Transcript of Discussion)
Mauw, Sjouke

in Proc.\ 23rd Security Protocols Workshop (2015)

Full Text
See detailPUF-based authentication protocol to address ticket-switching of RFID-tagged items
Mauw, Sjouke; Piramuthu, S.

in Proc. 8th Workshop on Security and Trust Management, Pisa, Italy, September 13-14 2012 (2015)

Full Text
See detailGeneralizing multi-party contract signing
Mauw, Sjouke; Radomirovic, Sasa

in Proc. 4th Conference on Principles of Security and Trust (POST'15) (2015)

See detailProceedings 4th International Workshop on Engineering Safety and Security Systems
Pang, Jun; Liu, Yang; Mauw, Sjouke

Book published by EPTCS - 184 (2015)

Top of Page

2014

See detailProceedings First International Workshop on Graphical Models for Security, GraMSec 2014
Kordy, Barbara; Mauw, Sjouke; Pieters, Pieters

in First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014 (2014)

Full Text
See detailA symbolic algorithm for the analysis of robust timed automata
Kordy, Piotr; Langerak, Rom; Mauw, Sjouke; Polderman, Jan

in 19th International Symposium on Formal Methods (FM'14), 12-16 May 2014 (2014, May)

See detailProceedings of the 10th International Workshop on Security and Trust Management (STM 2014)
Mauw, Sjouke; Jensen, Christian Damsgaard

Book published by Springer (2014)

See detailInformaticaonderwijs aan Nederlandse Universiteiten in 2013 - State of the Art
Paredaens, Jan; Bijlsma, Lex; Boot, Peter; De Bosschere, Koen; van den Herik, Jaap; Mauw, Sjouke; Mullender, Sape; Preneel, Bart; Van Petegem, Wim; Verbij, Ruud

Report (2014)

Full Text
See detailOn Robustness of Trust Systems
Zhang, Jie; Yang, Liu; Mauw, Sjouke; Muller, Tim

in 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014 (2014)

Full Text
See detailOn Robustness of Trust Systems
Zhang, Jie; Yang, Liu; Mauw, Sjouke; Muller, Tim

in 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014 (2014)

Top of Page

2013

Full Text
See detailDEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity
Chen, Xihui; Harpes, Carlo; Lenzini, Gabriele; Martins, Miguel; Mauw, Sjouke; Pang, Jun

in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)

Full Text
See detailLocation Assurance and Privacy in GNSS Navigation
Chen, Xihui; Harpes, Carlo; Lenzini, Gabriele; Mauw, Sjouke; Pang, Jun

in ERCIM News (2013), 2013(94),

Full Text
See detailA trust framework for evaluating GNSS signal integrity
Chen, Xihui; Lenzini, Gabriele; Martins, Miguel; Mauw, Sjouke; Pang, Jun

in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)

Full Text
See detailDesign and formal analysis of a group signature based electronic toll pricing system
Chen, Xihui; Lenzini, Gabriele; Mauw, Sjouke; Pang, Jun

in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75

Full Text
See detailPrivacy and verifiability in voting systems: Methods, developments and trends
Jonker, Hugo; Mauw, Sjouke; Pang, Jun

in Computer Science Review (2013)

Full Text
See detailADTool: Security Analysis with Attack-Defense Trees (Tool Demonstration Paper)
Kordy, Barbara; Kordy, Piotr; Mauw, Sjouke; Schweitzer, Patrick

in 10th International Conference on Quantitative Evaluation of SysTems (2013)

Full Text
See detailMessage from ESSS 2013 Workshop Co-chairs
Pang, Jun; Liu, Yang; Mauw, Sjouke

in 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (2013)

Top of Page

2012

Full Text
See detailImplementation and Validation of a Localisation Assurance Service Provider
Chen, Xihui; Harpes, Carlo; Lenzini, Gabriele; Martins, Miguel; Mauw, Sjouke; Pang, Jun

in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

Full Text
See detailA group signature based electronic toll pricing system
Chen, Xihui; Lenzini, Gabriele; Mauw, Sjouke; Pang, Jun

in Proc. 7th International Conference on Availability, Reliability and Security (2012)

See detailOperational semantics and verification of security protocols
Cremers, Cas; Mauw, Sjouke

Book published by Springer-Verlag (2012)

Full Text
See detailFairness in Non-repudiation Protocols
Jamroga, Wojciech; Mauw, Sjouke; Melissen, Matthijs

in Proceedings of STM 2011 (2012)

Full Text
See detailLocation-Based Services: Privacy, Security and Assurance
Jonker, Hugo; Mauw, Sjouke; Pang, Jun

in Digital Enlightenment Yearbook 2012 (2012)

Full Text
See detailAttack-Defense Trees
Kordy, Barbara; Mauw, Sjouke; Radomirovic, Sasa; Schweitzer, Patrick

in Journal of Logic & Computation (2012)

Full Text
See detailQuantitative Questions on Attack-Defense Trees
Kordy, Barbara; Mauw, Sjouke; Schweitzer, Patrick

in Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers (2012)

Full Text
See detailQuantitative Questions on Attack-Defense Trees
Kordy, Barbara; Mauw, Sjouke; Schweitzer, Patrick

Report (2012)

Full Text
See detailComparative analysis of clustering protocols with probabilistic model checking
Li, Qian; Schaffer, Peter; Pang, Jun; Mauw, Sjouke

in Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (2012)

Full Text
See detailDetecting meaconing attacks by analysing the clock bias of GNSS receivers
Marnach, Daniel; Mauw, Sjouke; Martins, Miguel; Harpes, Carlo

in European Navigation Conference (ENC 2012) (2012)

Full Text
See detailInput online review data and related bias in recommender systems
Piramuthu, Selwyn; Kapoor, Gaurav; Zhou, Wei; Mauw, Sjouke

in Decision Support Systems (2012), 53(3), 418-424

Full Text
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie; Zhang, Chenyi; Pang, Jun; Alcalde, Baptiste; Mauw, Sjouke

in Journal of Computer Security (2012), 20(4), 437-459

Full Text
See detailProbabilistic model checking of the PDGF signaling pathway
Yuan, Qixia; Trairatphisan, Panuwat; Pang, Jun; Mauw, Sjouke; Wiesinger, Monique; Sauter, Thomas

in Transactions on Computational Systems Biology (2012), XIV

Full Text
See detailGame-based verification of contract signing protocols with minimal messages
Zhang, Ying; Zhang, Chenyi; Pang, Jun; Mauw, Sjouke

in Innovations in Systems and Software Engineering (2012), 8

Top of Page

2011

Full Text
See detailSelective location blinding using hash chains
Lenzini, Gabriele; Mauw, Sjouke; Pang, Jun

in Proc. 19th International Workshop on Security Protocols (2011)

Full Text
See detailSelective location blinding using hash chains (transcript of discussion)
Mauw, Sjouke

in In B. Christianson et al., editor, Proc. 19th Security Protocols Workshop (2011), 7114

Full Text
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie; Zhang, Chenyi; Pang, Jun; Alcalde, Baptiste; Mauw, Sjouke

in Proc. 6th International Workshop on Security and Trust Management (2011)

Full Text
See detailmCarve: Carving attributed dump sets
van Deursen, Ton; Mauw, Sjouke; Radomirovic, Sasa

in Abstract book of 20th USENIX Security Symposium (2011)

Full Text
See detailA study of the PDGF signaling pathway with PRISM
Yuan, Qixia; Pang, Jun; Mauw, Sjouke; Trairatphisan, Panuwat; Wiesinger, Monique; Sauter, Thomas

in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67

Top of Page

2010

Full Text
See detailFair Exchange
Dashti, M. Torabi; Mauw, Sjouke

in Rosenberg, G. (Ed.) Handbook of Financial Cryptography and Security (2010)

Full Text
See detailAttack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
Kordy, Barbara; Mauw, Sjouke; Melissen, Matthijs; Schweitzer, Patrick

in Proceedings of GameSec 2010 (2010)

Full Text
See detailFoundations of Attack-Defense Trees
Kordy, Barbara; Mauw, Sjouke; Radomirovic, Sasa; Schweitzer, Patrick

in Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (2010)

Full Text
See detailSecurity protocols for Secret Santa
Mauw, Sjouke; Radomirovic, Sasa; Ryan, Peter

in Proc. 18th Security Protocols Workshop (2010)

Full Text
See detailGame-based verification of multi-party contract signing protocols
Zhang, Ying; Zhang, Chenyi; Pang, Jun; Mauw, Sjouke

in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)

Top of Page

2009

Full Text
See detailTowards a Decision Model Based on Trust and Security Risk Management
Alcalde, Baptiste; Dubois, E.; Mauw, Sjouke; Mayer, N.; Radomirovic, Sasa

in Proc. 7th Australasian Information Security Conference - AISC'09 (2009)

Full Text
See detailTowards a decision model based on trust and security risk management. In Ljiljana Brankovic and Willy Susilo
Alcalde, Baptiste; Dubois, Eric; Mauw, Sjouke; Mayer, N.; Radomirovic, Sasa

in Seventh Australasian Information Security Conference (AISC 2009) (2009)

Full Text
See detailAn algebra for trust dilution and trust fusion
Alcalde, Baptiste; Mauw, Sjouke

in Proc. 7th Workshop on Formal Aspects in Security and Trust (2009)

Full Text
See detailDiscovering the core security requirements of DRM systems by means of objective trees
Jonker, Hugo; Mauw, Sjouke

in Handbook of Research on Secure Multimedia Distribution (2009)

Full Text
See detailA formal framework for quantifying voter-controlled privacy
Jonker, Hugo; Mauw, Sjouke; Pang, Jun

in Journal of Algorithms in Cognition, Informatics and Logic (2009)

Full Text
See detailMeasuring voter-controlled privacy
Jonker, Hugo; Mauw, Sjouke; Pang, Jun

in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)

Full Text
See detailMinimal message complexity of asynchronous multi-party contract signing
Mauw, Sjouke; Radomirovic, Sasa; Dashti, M. Torabi

in Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09) (2009)

Full Text
See detailSecure ownership and ownership transfer in RFID systems
van Deursen, Ton; Mauw, Sjouke; Radomirovic, Sasa; Vullers, Pim

in Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (2009)

Top of Page

2008

Full Text
See detailA framework for compositional verification of security protocols
Andova, S.; Cremers, C. J. F.; Gjøsteen, K.; Mauw, Sjouke; Mjølsnes, S. F.; Radomirovic, Sasa

in Information & Computation (2008), 206(2-4), 425-459

Full Text
See detailRights Management for Role-Based Access Control
Bouwman, B.; Mauw, Sjouke; Petkovic, M.

in Fifth Annual IEEE Consumer Communications & Networking Conference 2008 (CCNC'08) (2008)

Full Text
See detailChosen-name attacks: An overlooked class of type-flaw attacks
Ceelen, Pieter; Mauw, Sjouke; Radomirovic, Sasa

in Electronic Notes in Theoretical Computer Science (2008), 197(2), 31-43

See detailSpecial issue on Security and Trust
Mauw, Sjouke; Massacci, F.; Piessens, F.

in Science of Computer Programming (2008), 74(1-2), 164

Full Text
See detailPublic Key Infrastructure
Mjølsnes, Stig Fr.; Mauw, Sjouke; Katsikas, Sokratis K.

Book published by Springer (2008)

Full Text
See detailUntraceability of RFID Protocols
van Deursen, Ton; Mauw, Sjouke; Radomirovic, Sasa

in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (2008)

Top of Page

2007

Full Text
See detailA Certified Email Protocol Using Key Chains
Cederquist, J.; Dashti, M. Torabi; Mauw, Sjouke

in Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01 (AINAW'07) (2007)

Full Text
See detailData anonymity in the FOO voting scheme
Mauw, Sjouke; Verschuren, J. H. S.; Vink, E. P. De

in Electronic Notes in Theoretical Computer Science (2007), 168

Top of Page

2006

Full Text
See detailInjective Synchronisation: an extension of the authentication hierarchy
Cremers, C. J. F.; Mauw, Sjouke; Vink, E. P. De

in Theoretical Computer Science (2006), 367(1-2), 139-161

Top of Page

1999

Full Text
See detailOperational semantics for MSC'96
Mauw, Sjouke; Reniers, M. A.

in Computer Networks & ISDN Systems (1999), 31(17), 1785-1799

Top of Page

1996

Full Text
See detailDesign and analysis of dynamic leader election protocols in broadcast networks
Brunekreef, J. J.; Katoen, J.-P.; Koymans, R.; Mauw, Sjouke

in Distributed Computing (1996), 9(4), 157-171

Top of Page

1990

Full Text
See detailA process specification formalism
Mauw, Sjouke; Veltink, G. J.

in Fundamenta Informaticae (1990), XIII

Top of Page