default search action
Bart De Decker
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c83]Shirin Kalantari, Pieter Philippaerts, Yana Dimova, Danny Hughes, Wouter Joosen, Bart De Decker:
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations. ESORICS (2) 2023: 318-337 - 2022
- [c82]Shirin Kalantari, Danny Hughes, Bart De Decker:
Listing the ingredients for IFTTT recipes. TrustCom 2022: 1376-1383 - 2021
- [c81]Shirin Kalantari, Andreas Put, Bart De Decker:
Trackers in Your Inbox: Criticizing Current Email Tracking Practices. APF 2021: 156-167 - [c80]Shirin Kalantari, Andreas Put, Bart De Decker:
PhD Forum: Trust Management for Context-aware Access Control Systems in IoT. WF-IoT 2021: 909-910 - 2020
- [c79]Dries Van Bael, Shirin Kalantari, Andreas Put, Bart De Decker:
A Context-Aware Break Glass Access Control System for IoT Environments. IoTSMS 2020: 1-8
2010 – 2019
- 2017
- [c78]Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens:
Security Evaluation of Cyber-Physical Systems Using Automatically Generated Attack Trees. CRITIS 2017: 225-228 - [c77]Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens:
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems. MMM-ACNS 2017: 37-49 - 2016
- [j6]Milica Milutinovic, Bart De Decker:
Ethical aspects in eHealth - design of a privacy-friendly system. J. Inf. Commun. Ethics Soc. 14(1): 49-69 (2016) - [j5]Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens:
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices. Secur. Commun. Networks 9(2): 106-117 (2016) - [c76]Andreas Put, Bart De Decker:
Attribute-Based Privacy-Friendly Access Control with Context. ICETE (Selected Papers) 2016: 291-315 - [c75]Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens:
An Assessment of Security Analysis Tools for Cyber-Physical Systems. RISK 2016: 66-81 - [c74]Andreas Put, Bart De Decker:
PACCo: Privacy-friendly Access Control with Context. SECRYPT 2016: 159-170 - 2015
- [j4]Milica Milutinovic, Andreas Put, Bart De Decker:
An Efficient, Anonymous and Unlinkable Incentives Scheme. Int. J. Inf. Secur. Priv. 9(3): 1-20 (2015) - [c73]Koen Decroix, Jorn Lapon, Laurens Lemaire, Bart De Decker, Vincent Naessens:
Formal Reasoning About Privacy and Trust in Loyalty Systems. BIS (Workshops) 2015: 211-223 - [c72]Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker:
Privacy-Preserving Public Transport Ticketing System. DBSec 2015: 135-150 - [c71]Milica Milutinovic, Italo Dacosta, Andreas Put, Bart De Decker:
uCentive: An Efficient, Anonymous and Unlinkable Incentives Scheme. TrustCom/BigDataSE/ISPA (1) 2015: 588-595 - 2014
- [c70]Italo Dacosta, Andreas Put, Bart De Decker:
EmailCloak: A Practical and Flexible Approach to Improve Email Privacy. ARES 2014: 242-250 - [c69]Faysal Boukayoua, Jorn Lapon, Bart De Decker, Vincent Naessens:
Secure Storage on Android with Context-Aware Access Control. Communications and Multimedia Security 2014: 46-59 - [c68]Laurens Lemaire, Jorn Lapon, Bart De Decker, Vincent Naessens:
A SysML Extension for Security Analysis of Industrial Control Systems. ICS-CSR 2014 - [c67]Faysal Boukayoua, Bart De Decker, Vincent Naessens:
A keyboard that manages your passwords in Android. PRISMS 2014: 1-4 - [c66]Andreas Put, Italo Dacosta, Milica Milutinovic, Bart De Decker:
PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications. SEC 2014: 403-416 - [c65]Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens:
Trusted Computing to Increase Security and Privacy in eID Authentication. SEC 2014: 485-492 - [c64]Andreas Put, Italo Dacosta, Milica Milutinovic, Bart De Decker, Stefaan Seys, Faysal Boukayoua, Vincent Naessens, Kris Vanhecke, Toon De Pessemier, Luc Martens:
inShopnito: An Advanced yet Privacy-Friendly Mobile Shopping Application. SERVICES 2014: 129-136 - [e6]Bart De Decker, André Zúquete:
Communications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings. Lecture Notes in Computer Science 8735, Springer 2014, ISBN 978-3-662-44884-7 [contents] - 2013
- [j3]Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens:
User-centric identity management using trusted modules. Math. Comput. Model. 57(7-8): 1592-1605 (2013) - [c63]Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens:
Client-Side Biometric Verification Based on Trusted Computing. Communications and Multimedia Security 2013: 34-49 - [c62]Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens:
A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services. ESSoS 2013: 155-170 - [c61]Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens:
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services. ICISS 2013: 106-120 - [c60]Milica Milutinovic, Italo Dacosta, Andreas Put, Bart De Decker:
An Advanced, Privacy-Friendly Loyalty System. Privacy and Identity Management 2013: 128-138 - [e5]Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer:
Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings. Lecture Notes in Computer Science 8099, Springer 2013, ISBN 978-3-642-40778-9 [contents] - 2012
- [c59]Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer:
Data-Minimizing Authentication Goes Mobile. Communications and Multimedia Security 2012: 55-71 - [c58]Milica Milutinovic, Vincent Naessens, Bart De Decker:
Privacy-Preserving Scheduling Mechanism for eHealth Systems. Communications and Multimedia Security 2012: 198-200 - [c57]Faysal Boukayoua, Jan Vossaert, Bart De Decker, Vincent Naessens:
Claim-Based versus Network-Based Identity Management: A Hybrid Approach. MobiSec 2012: 38-50 - [c56]Ella Kolkowska, Bart De Decker:
Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation. SEC 2012: 339-351 - [c55]Milica Milutinovic, Vincent Naessens, Bart De Decker:
Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System. SEC 2012: 555-560 - [e4]Bart De Decker, David W. Chadwick:
Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Lecture Notes in Computer Science 7394, Springer 2012, ISBN 978-3-642-32804-6 [contents] - 2011
- [c54]Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens:
Analysis of Revocation Strategies for Anonymous Idemix Credentials. Communications and Multimedia Security 2011: 3-17 - [c53]Koen Decroix, Milica Milutinovic, Bart De Decker, Vincent Naessens:
A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning. Communications and Multimedia Security 2011: 163-170 - [c52]Milica Milutinovic, Roel Peeters, Bart De Decker:
Secure Negotiation for Manual Authentication Protocols. Communications and Multimedia Security 2011: 214-221 - [c51]Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker:
Commercial Home Assistance (eHealth) Services. iNetSeC 2011: 28-42 - [c50]Faysal Boukayoua, Jan Vossaert, Bart De Decker, Vincent Naessens:
Using a Smartphone to Access Personalized Web Services on a Workstation. PrimeLife 2011: 144-156 - [c49]Koen Decroix, Bart De Decker, Vincent Naessens:
Designing Privacy-Enhancing Mobile Applications. PrimeLife 2011: 157-170 - [c48]Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker:
Privacy Preserving Mechanisms for a Pervasive eHealth System. PrimeLife 2011: 221-231 - [e3]Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl:
Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings. Lecture Notes in Computer Science 7025, Springer 2011, ISBN 978-3-642-24711-8 [contents] - 2010
- [j2]Jorn Lapon, Vincent Naessens, Bram Verdegem, Pieter Verhaeghe, Bart De Decker:
Building advanced applications with the Belgian eID. Secur. Commun. Networks 3(5): 439-451 (2010) - [c47]Girma Nigusse, Bart De Decker:
conf/cse/NigusseDN09 conf/dbsec/VerslypeDNNLV08 Girma Nigusse = Girma Enideg Nigusse Privacy Codes of Practice for the Social Web: The Analysis of Existing Privacy Codes and Emerging Social-Centric Privacy Risks. AAAI Spring Symposium: Intelligent Information Privacy Management 2010 - [c46]Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens, Bart De Decker:
PriMan : A Privacy-Preserving Identity Framework. DBSec 2010: 327-334 - [c45]Mehmet Tahir Sandikkaya, Bart De Decker, Vincent Naessens:
Privacy in Commercial Medical Storage Systems. eHealth 2010: 247-258 - [c44]Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens:
User-Centric Identity Management Using Trusted Modules. EuroPKI 2010: 155-170 - [c43]Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens:
Personalized Mobile Services with Lightweight Security in a Sports Association. MobiSec 2010: 3-14 - [c42]Pieter Verhaeghe, Kristof Verslype, Jorn Lapon, Vincent Naessens, Bart De Decker:
A Mobile and Reliable Anonymous ePoll Infrastructure. MobiSec 2010: 41-52 - [c41]Jan Vossaert, Pieter Verhaeghe, Bart De Decker, Vincent Naessens:
A Smart Card Based Solution for User-Centric Identity Management. PrimeLife 2010: 164-177 - [c40]Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens:
Performance Analysis of Accumulator-Based Revocation Mechanisms. SEC 2010: 289-301 - [e2]Bart De Decker, Ingrid Schaumüller-Bichl:
Communications and Multimedia Security, 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings. Lecture Notes in Computer Science 6109, Springer 2010, ISBN 978-3-642-13240-7 [contents]
2000 – 2009
- 2009
- [c39]Kim Wuyts, Riccardo Scandariato, Bart De Decker, Wouter Joosen:
Linking Privacy Solutions to Developer Goals. ARES 2009: 847-852 - [c38]Girma Nigusse, Bart De Decker, Vincent Naessens:
Specification of Fair Data Practice Principles Using Privacy Policy Languages. CSE (3) 2009: 430-437 - [c37]Mohamed Layouni, Kristof Verslype, Mehmet Tahir Sandikkaya, Bart De Decker, Hans Vangheluwe:
Privacy-Preserving Telemonitoring for eHealth. DBSec 2009: 95-110 - [c36]Prasit Bikash Chanda, Vincent Naessens, Bart De Decker:
Anonymous, Yet Trustworthy Auctions. I3E 2009: 225-239 - [c35]Kristof Verslype, Bart De Decker:
Flexible and Time-Based Anonymous Access Restrictions. ICETE (Selected Papers) 2009: 237-250 - [c34]Vincent Naessens, Mehmet Tahir Sandikkaya, Jorn Lapon, Kristof Verslype, Pieter Verhaeghe, Girma Nigusse, Bart De Decker:
Privacy Policies, Tools and Mechanisms of the Future. iNetSeC 2009: 125-138 - [c33]Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vincent Naessens, Bart De Decker:
Extending the Belgian eID Technology with Mobile Security Functionality. MobiSec 2009: 97-109 - [c32]Pieter Verhaeghe, Jorn Lapon, Bart De Decker, Vincent Naessens, Kristof Verslype:
Security and Privacy Improvements for the Belgian eID Technology. SEC 2009: 237-247 - [c31]Kristof Verslype, Bart De Decker:
Service and Timeframe Dependent Unlinkable One-time Pseudonyms. SECRYPT 2009: 13-20 - 2008
- [c30]Kristof Verslype, Bart De Decker, Vincent Naessens, Girma Nigusse, Jorn Lapon, Pieter Verhaeghe:
A Privacy-Preserving Ticketing System. DBSec 2008: 97-112 - [c29]Bart De Decker, Mohamed Layouni, Hans Vangheluwe, Kristof Verslype:
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System. EuroPKI 2008: 118-133 - [c28]Kristof Verslype, Bart De Decker:
Ubiquitous Privacy-Preserving Identity Managment. SEC 2008: 589-603 - 2007
- [c27]Stefan Brands, Liesje Demuynck, Bart De Decker:
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. ACISP 2007: 400-415 - [c26]Liesje Demuynck, Bart De Decker, Wouter Joosen:
A Credential-Based System for the Anonymous Delegation of Rights. SEC 2007: 169-180 - [c25]Steven Gevers, Kristof Verslype, Bart De Decker:
Enhancing privacy in identity management systems. WPES 2007: 60-63 - 2006
- [c24]Vincent Naessens, Liesje Demuynck, Bart De Decker:
A Fair Anonymous Submission and Review System. Communications and Multimedia Security 2006: 43-53 - [c23]Kristof Verslype, Bart De Decker:
A Flexible and Open DRM Framework. Communications and Multimedia Security 2006: 173-184 - [c22]Steven Gevers, Bart De Decker:
Privacy Friendly Information Disclosure. OTM Workshops (1) 2006: 636-646 - [c21]Vincent Naessens, Bart De Decker:
A Methodology for Designing Controlled Anonymous Applications. SEC 2006: 111-122 - 2005
- [c20]Liesje Demuynck, Bart De Decker:
Privacy-Preserving Electronic Health Records. Communications and Multimedia Security 2005: 150-159 - [c19]Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen:
Assessment of Palm OS Susceptibility to Malicious Code Threats. Communications and Multimedia Security 2005: 240-249 - [c18]Sam Michiels, Kristof Verslype, Wouter Joosen, Bart De Decker:
Towards a software architecture for DRM. Digital Rights Management Workshop 2005: 65-74 - [c17]Vincent Naessens, Bart De Decker, Liesje Demuynck:
Accountable Anonymous E-Mail. SEC 2005: 3-18 - 2003
- [c16]Bart De Decker, Gregory Neven, Frank Piessens:
Secure Vickrey Auctions without a Trusted Third Party. SEC 2003: 337-348 - 2002
- [j1]Bart De Win, Bart Vanhaute, Bart De Decker:
How aspect-oriented programming can help to build secure software. Informatica (Slovenia) 26(2) (2002) - 2001
- [c15]Bart De Decker, Gregory Neven, Frank Piessens, Erik Van Hoeymissen:
Second Price Auctions - A Case Study of Secure Distributed Computating. DAIS 2001: 217-228 - [c14]Vincent Naessens, Bart Vanhaute, Bart De Decker:
Securing RMI Communication. Network Security 2001: 93-105 - [c13]Bart De Win, Bart Vanhaute, Bart De Decker:
Security Through Aspect-Oriented Programming. Network Security 2001: 125-138 - [c12]T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker:
On Securely Scheduling a Meeting. SEC 2001: 183-198 - [c11]Frank Piessens, Bart De Decker, Bart De Win:
Developing secure software. A survey and classification of common software vulnerabilities. IICIS 2001: 27-40 - [e1]Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen:
Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium. IFIP Conference Proceedings 206, Kluwer 2001, ISBN 0-7923-7558-0 [contents] - 2000
- [c10]Bart De Decker, Frank Piessens, Erik Van Hoeymissen, Gregory Neven:
Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations. MATA 2000: 219-232 - [c9]Gregory Neven, Frank Piessens, Bart De Decker:
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. SEC 2000: 361-370 - [c8]Bart De Win, Jan Van den Bergh, Frank Matthijs, Bart De Decker, Wouter Joosen:
A Security Architecture for Electronic Commerce Applications. SEC 2000: 491-500
1990 – 1999
- 1997
- [c7]Bart De Decker:
Introduction to Computer Security. State of the Art in Applied Cryptography 1997: 377-393 - [c6]Yolande Berbers, Bart De Decker, Wouter Joosen, Frank Matthijs, Bert Robben:
Management of Events in a multi-agent system. PDPTA 1997: 1141-1150 - 1996
- [c5]Philip Vanneste, Bart De Decker, Marcin Chrzanowski, Ken Warkentyne:
Panel Discussion: The Use of Internet in Education. CALISCE 1996: 39-41 - [c4]Philip Vanneste, Koen Bertels, Bart De Decker:
CAMUS: A Cognitive Model for Reverse Engineering-Bases Program Analysis. PPIG 1996: 14 - [c3]Yolande Berbers, Bart De Decker, Wouter Joosen:
Infrastructure for mobile agents. ACM SIGOPS European Workshop 1996: 173-180 - 1993
- [c2]Frank Piessens, Bart De Decker, Phil Janson:
Interconnecting domains with heterogeneous key distribution and authentication protocols. S&P 1993: 66-79 - 1991
- [c1]Bart De Decker:
Unix Security & Kerberos. Computer Security and Industrial Cryptography 1991: 257-274
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint