default search action
Joeri de Ruiter
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j2]David Chaum, Mario Yaksetig, Alan T. Sherman, Joeri de Ruiter:
UDM: Private user discovery with minimal information disclosure. Cryptologia 46(4): 347-379 (2022) - 2021
- [c28]Joeri de Ruiter, Caspar Schutijser:
Next-generation internet at terabit speed: SCION in P4. CoNEXT 2021: 119-125 - [c27]Paola Grosso, Cristian Hesselman, Luuk Hendriks, Joseph Hill, Stavros Konstantaras, Ronald van der Pol, Victor Reijs, Joeri de Ruiter, Caspar Schutijser:
A National Programmable Infrastructure to Experiment with Next-Generation Networks. IM 2021: 778-782 - [c26]Supraja Sridhara, François Wirz, Joeri de Ruiter, Caspar Schutijser, Markus Legner, Adrian Perrig:
Global Distributed Secure Mapping of Network Addresses. TAURIN@SIGCOMM 2021: 1-7 - 2020
- [j1]Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C. M. Moura, Aiko Pras, Cees de Laat:
A Responsible Internet to Increase Trust in the Digital World. J. Netw. Syst. Manag. 28(4): 882-922 (2020) - [c25]Paul Fiterau-Brostean, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas, Juraj Somorovsky:
Analysis of DTLS Implementations Using Protocol State Fuzzing. USENIX Security Symposium 2020: 2523-2540
2010 – 2019
- 2019
- [i5]Abdullah Rasool, Greg Alpár, Joeri de Ruiter:
State machine inference of QUIC. CoRR abs/1903.04384 (2019) - 2018
- [c24]Chris McMahon Stone, Tom Chothia, Joeri de Ruiter:
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake. ESORICS (1) 2018: 325-345 - [c23]Lesly-Ann Daniel, Erik Poll, Joeri de Ruiter:
Inferring OpenVPN State Machines Using Protocol State Fuzzing. EuroS&P Workshops 2018: 11-19 - [c22]Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren:
Is Java Card Ready for Hash-Based Signatures? IWSEC 2018: 127-142 - [c21]Tom Chothia, Joeri de Ruiter, Ben Smyth:
Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. USENIX Security Symposium 2018: 1563-1580 - [i4]Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren:
Is Java Card ready for hash-based signatures? IACR Cryptol. ePrint Arch. 2018: 611 (2018) - 2017
- [c20]David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations. ACNS 2017: 557-578 - [c19]Richard James Thomas, Mihai Ordean, Tom Chothia, Joeri de Ruiter:
TRAKS: A Universal Key Management Scheme for ERTMS. ACSAC 2017: 327-338 - [c18]Tom Chothia, Mihai Ordean, Joeri de Ruiter, Richard James Thomas:
An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols. AsiaCCS 2017: 743-756 - [c17]Paul Fiterau-Brostean, Toon Lenaerts, Erik Poll, Joeri de Ruiter, Frits W. Vaandrager, Patrick Verleg:
Model learning and model checking of SSH implementations. SPIN 2017: 142-151 - 2016
- [c16]Joeri de Ruiter:
A Tale of the OpenSSL State Machine: A Large-Scale Black-Box Analysis. NordSec 2016: 169-184 - [c15]Joeri de Ruiter, Richard James Thomas, Tom Chothia:
A Formal Security Analysis of ERTMS Train to Trackside Protocols. RSSRail 2016: 53-68 - [c14]Tom Chothia, Joeri de Ruiter:
Learning From Others' Mistakes: Penetration Testing IoT Devices in the Classroom. ASE @ USENIX Security Symposium 2016 - [i3]David Chaum, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Anonymization byHigh-Performance Scalable Mixing. IACR Cryptol. ePrint Arch. 2016: 8 (2016) - [i2]Eric R. Verheul, Bart Jacobs, Carlo Meijer, Mireille Hildebrandt, Joeri de Ruiter:
Polymorphic Encryption and Pseudonymisation for Personalised Healthcare. IACR Cryptol. ePrint Arch. 2016: 411 (2016) - 2015
- [c13]Fabian van den Broek, Roel Verdult, Joeri de Ruiter:
Defeating IMSI Catchers. CCS 2015: 340-351 - [c12]Tom Chothia, Flavio D. Garcia, Joeri de Ruiter, Jordi van den Breekel, Matthew Thompson:
Relay Cost Bounding for Contactless EMV Payments. Financial Cryptography 2015: 189-206 - [c11]René Habraken, Peter Dolron, Erik Poll, Joeri de Ruiter:
An RFID Skimming Gate Using Higher Harmonics. RFIDSec 2015: 122-137 - [c10]Erik Poll, Joeri de Ruiter, Aleksy Schubert:
Protocol State Machines and Session Languages: Specification, implementation, and Security Flaws. IEEE Symposium on Security and Privacy Workshops 2015: 125-133 - [c9]Joeri de Ruiter, Erik Poll:
Protocol State Fuzzing of TLS Implementations. USENIX Security Symposium 2015: 193-206 - 2014
- [c8]Tim Cooijmans, Joeri de Ruiter, Erik Poll:
Analysis of Secure Key Storage Solutions on Android. SPSM@CCS 2014: 11-20 - [c7]Georg Chalupar, Stefan Peherstorfer, Erik Poll, Joeri de Ruiter:
Automated Reverse Engineering using Lego®. WOOT 2014 - [i1]Joeri de Ruiter:
Automated algebraic analysis of structure-preserving signature schemes. IACR Cryptol. ePrint Arch. 2014: 590 (2014) - 2013
- [c6]Fides Aarts, Joeri de Ruiter, Erik Poll:
Formal Models of Bank Cards for Free. ICST Workshops 2013: 461-468 - [c5]Erik Poll, Joeri de Ruiter:
The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions. IDMAN 2013: 107-120 - 2012
- [c4]Gerhard de Koning Gans, Joeri de Ruiter:
The SmartLogic Tool: Analysing and Testing Smart Card Protocols. ICST 2012: 864-871 - [c3]David M. Williams, Joeri de Ruiter, Wan J. Fokkink:
Model Checking under Fairness in ProB and Its Application to Fair Exchange Protocols. ICTAC 2012: 168-182 - [c2]Arjan Blom, Gerhard de Koning Gans, Erik Poll, Joeri de Ruiter, Roel Verdult:
Designed to Fail: A USB-Connected Reader for Online Banking. NordSec 2012: 1-16 - 2011
- [c1]Joeri de Ruiter, Erik Poll:
Formal Analysis of the EMV Protocol Suite. TOSCA 2011: 113-129
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-07 22:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint