Pieter Hartel
Pieter Hartel
Professor Emeritus Cyber security
Verified email at tudelft.nl - Homepage
Title
Cited by
Cited by
Year
Survey and benchmark of block ciphers for wireless sensor networks
YW Law, J Doumen, P Hartel
ACM Transactions on Sensor Networks (TOSN) 2 (1), 65-93, 2006
3612006
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
YW Law, M Palaniswami, LV Hoesel, J Doumen, P Hartel, P Havinga
ACM Transactions on Sensor Networks (TOSN) 5 (1), 1-38, 2009
3542009
Mediated ciphertext-policy attribute-based encryption and its application
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
Int. Workshop on Information Security Applications (WISA), 309-323, 2009
2982009
A Survey of Provably Secure Searchable Encryption
C Bösch, P Hartel, W Jonker, A Peter
ACM Computing Surveys (CSUR) 47 (2), Article 18, 2015
2652015
Computationally efficient searchable symmetric encryption
P Van Liesdonk, S Sedghi, J Doumen, P Hartel, W Jonker
Int. Workshop on Secure Data Management (SDM), 87-100, 2010
2482010
Through the eye of the PLC: semantic security monitoring for industrial processes
D Hadžiosmanović, R Sommer, E Zambon, PH Hartel
30th Annual Computer Security Applications Conference (ACSAC), 126-135, 2014
162*2014
Poseidon: a 2-tier anomaly-based network intrusion detection system
D Bolzoni, S Etalle, P Hartel
4th IEEE Int. Workshop on Information Assurance (IWIA), 10 pp.-156, 2006
1542006
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
L Ibraimi, Q Tang, P Hartel, W Jonker
Int. Conf. on Information Security Practice and Experience (ISPEC), 1-12, 2009
1492009
Link-layer jamming attacks on S-MAC
YW Law, P Hartel, J den Hartog, P Havinga
2nd Eu. Workshop on Wireless Sensor Networks (EWSN), 217-225, 2005
1252005
Benchmarking implementations of functional languages with ‘Pseudoknot’, a float-intensive benchmark
PH Hartel, M Feeley, M Alt, L Augustsson, P Baumann, M Beemster, ...
Journal of functional programming 6 (04), 621-655, 1996
121*1996
Fuzzy extractors for continuous distributions
I Buhan, J Doumen, P Hartel, R Veldhuis
2nd ACM Symp. on Information, computer and comms. security (AsiaCCS), 353-355, 2007
1102007
Formalizing the safety of Java, the Java virtual machine, and Java card
PH Hartel, L Moreau
ACM Computing Surveys (CSUR) 33 (4), 517-558, 2001
1092001
A classification of service discovery protocols
R Marin-Perianu, PH Hartel, J Scholten
Centre for Telematics and Information Technology, University of Twente, 2005
982005
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
University of Twente, 2009
972009
Assessing security in energy-efficient sensor networks
YW Law, S Etalle, PH Hartel
18th IFIP TC11 Int. Conf. on Information Security (SEC), 459-463, 2003
962003
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
902013
Secure audit logging with tamper-resistant hardware
CN Chong, Z Peng, PH Hartel
IFIP Int. Information Security Conference (SEC), 73-84, 2003
862003
Music2share-copyright-compliant music sharing in p2p systems
T Kalker, DHJ Epema, PH Hartel, RL Lagendijk, M Van Steen
Proceedings of the IEEE 92 (6), 961-970, 2004
852004
A log mining approach for process monitoring in SCADA
D Hadžiosmanović, D Bolzoni, PH Hartel
International Journal of Information Security 11 (4), 231-251, 2012
832012
The persuasion and security awareness experiment: reducing the success of social engineering attacks
JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
Journal of experimental criminology 11 (1), 97-115, 2015
812015
The system can't perform the operation now. Try again later.
Articles 1–20