


default search action
Pieter H. Hartel
Person information
- affiliation: University of Twente, Enschede, Netherlands
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j51]Susanne Barth, Dan Ionita
, Pieter H. Hartel:
Understanding Online Privacy - A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines. ACM Comput. Surv. 55(3): 63:1-63:37 (2023) - [i12]Pieter H. Hartel, Eljo Haspels, Mark van Staalduinen, Octavio Texeira:
DarkDiff: Explainable web page similarity of TOR onion sites. CoRR abs/2308.12134 (2023) - 2021
- [j50]Susanne Barth
, Dan Ionita
, Menno D. T. de Jong
, Pieter H. Hartel
, Marianne Junger
:
Privacy Rating: A User-Centered Approach for Visualizing Data Handling Practices of Online Services. IEEE Trans. Prof. Commun. 64(4): 354-373 (2021) - [i11]Pieter H. Hartel, Rolf van Wegberg, Mark van Staalduinen:
Investigating sentence severity with judicial open data - A case study on sentencing high-tech crime in the Dutch criminal justice system. CoRR abs/2104.04486 (2021) - [i10]Pieter H. Hartel, Rolf van Wegberg:
Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases. CoRR abs/2104.06444 (2021) - 2020
- [c100]Ivan Homoliak, Dominik Breitenbacher, Ondrej Hujnak, Pieter H. Hartel, Alexander Binder
, Pawel Szalachowski:
SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. AFT 2020: 145-162 - [c99]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella
, Thomas Hupperich
, Maarten H. Everts, Reza Rafati, Willem Jonker, Pieter H. Hartel, Andreas Peter:
HeadPrint: detecting anomalous communications through header-based application fingerprinting. SAC 2020: 1696-1705 - [c98]Pieter H. Hartel
, Richard Schumi
:
Mutation Testing of Smart Contracts at Scale. TAP@STAF 2020: 23-42
2010 – 2019
- 2019
- [j49]Pieter H. Hartel
, Ivan Homoliak, Daniël Reijsbergen:
An Empirical Study Into the Success of Listed Smart Contracts in Ethereum. IEEE Access 7: 177539-177555 (2019) - [j48]Susanne Barth, Pieter H. Hartel
, Marianne Junger, Lorena Montoya
:
Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of \"Thinking Like a Thief\". IEEE Secur. Priv. 17(3): 8-16 (2019) - [j47]Susanne Barth, Menno D. T. de Jong
, Marianne Junger
, Pieter H. Hartel, Janina C. Roppelt:
Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics Informatics 41: 55-69 (2019) - [c97]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella
, Maarten H. Everts, Willem Jonker, Pieter H. Hartel, Andreas Peter:
Victim-Aware Adaptive Covert Channels. SecureComm (1) 2019: 450-471 - [i9]Pieter H. Hartel, Mark van Staalduinen:
Truffle tests for free - Replaying Ethereum smart contracts for transparency. CoRR abs/1907.09208 (2019) - [i8]Pieter H. Hartel, Ivan Homoliak, Daniël Reijsbergen:
An Empirical Study into the Success of Listed Smart Contracts in Ethereum. CoRR abs/1908.11597 (2019) - [i7]Pieter H. Hartel, Richard Schumi:
Gas limit aware mutation testing of smart contracts at scale. CoRR abs/1909.12563 (2019) - 2018
- [c96]Vincent Chia, Pieter H. Hartel, Qingze Hum, Sebastian Ma, Georgios Piliouras, Daniël Reijsbergen, Mark van Staalduinen, Pawel Szalachowski:
Rethinking Blockchain Security: Position Paper. iThings/GreenCom/CPSCom/SmartData 2018: 1273-1280 - [i6]Vincent Chia, Pieter H. Hartel, Qingze Hum, Sebastian Ma, Georgios Piliouras, Daniël Reijsbergen, Mark van Staalduinen, Pawel Szalachowski:
Rethinking Blockchain Security: Position Paper. CoRR abs/1806.04358 (2018) - 2017
- [j46]Jan-Willem Bullee
, Lorena Montoya
, Marianne Junger, Pieter H. Hartel:
Spear phishing in organisations explained. Inf. Comput. Secur. 25(5): 593-613 (2017) - [c95]Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter:
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. ACSAC 2017: 373-386 - [c94]Marianne Junger, Lorena Montoya
, Pieter H. Hartel, Maliheh Heydari:
Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe. CyberSA 2017: 1-8 - [c93]Elmer Lastdrager, Inés Carvajal Gallardo, Pieter H. Hartel, Marianne Junger:
How Effective is Anti-Phishing Training for Children? SOUPS 2017: 229-239 - 2016
- [c92]Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel:
Reliably determining data leakage in the presence of strong attackers. ACSAC 2016: 484-495 - [c91]Jan-Willem Bullee
, Lorena Montoya
, Marianne Junger, Pieter H. Hartel
:
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. SG-CRC 2016: 107-114 - 2015
- [c90]Bence Gabor Bakondi, Andreas Peter, Maarten H. Everts, Pieter H. Hartel
, Willem Jonker:
Publicly Verifiable Private Aggregation of Time-Series Data. ARES 2015: 50-59 - [c89]Jan-Willem Bullee
, Lorena Montoya
, Wolter Pieters, Marianne Junger, Pieter H. Hartel
:
Regression Nodes: Extending Attack Trees with Data from Social Sciences. STAST 2015: 17-23 - 2014
- [j45]Christoph Bösch
, Pieter H. Hartel
, Willem Jonker, Andreas Peter:
A Survey of Provably Secure Searchable Encryption. ACM Comput. Surv. 47(2): 18:1-18:51 (2014) - [j44]Zheng Gong, Pieter H. Hartel
, Svetla Nikova
, Shaohua Tang, Bo Zhu:
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks. J. Comput. Sci. Technol. 29(1): 53-68 (2014) - [c88]Dina Hadziosmanovic, Robin Sommer, Emmanuele Zambon, Pieter H. Hartel
:
Through the eye of the PLC: semantic security monitoring for industrial processes. ACSAC 2014: 126-135 - [c87]Christoph Bösch
, Andreas Peter, Pieter H. Hartel
, Willem Jonker:
SOFIR: Securely outsourced Forensic image recognition. ICASSP 2014: 2694-2698 - [c86]Christoph Bösch
, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang
, Huaxiong Wang, Pieter H. Hartel
, Willem Jonker:
Distributed Searchable Symmetric Encryption. PST 2014: 330-337 - 2013
- [c85]Lorena Montoya
, Marianne Junger, Pieter H. Hartel
:
How "Digital" is Traditional Crime? EISIC 2013: 31-37 - [c84]Arjan Jeckmans, Andreas Peter, Pieter H. Hartel
:
Efficient Privacy-Enhanced Familiarity-Based Recommender System. ESORICS 2013: 400-417 - [c83]Eleftheria Makri, Maarten H. Everts, Sebastiaan de Hoogh, Andreas Peter, Harm op den Akker, Pieter H. Hartel, Willem Jonker:
Privacy-Preserving Verification of Clinical Research. Sicherheit 2013: 481-500 - [c82]Elmer Lastdrager, Lorena Montoya
, Pieter H. Hartel
, Marianne Junger:
Applying the Lost-Letter Technique to Assess IT Risk Behaviour. STAST 2013: 2-9 - [p1]Arjan J. P. Jeckmans, Michael Beye, Zekeriya Erkin, Pieter H. Hartel, Reginald L. Lagendijk, Qiang Tang:
Privacy in Recommender Systems. Social Media Retrieval 2013: 263-281 - [e3]Eric A. M. Luiijf
, Pieter H. Hartel:
Critical Information Infrastructures Security - 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8328, Springer 2013, ISBN 978-3-319-03963-3 [contents] - 2012
- [j43]Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel
:
A log mining approach for process monitoring in SCADA. Int. J. Inf. Sec. 11(4): 231-251 (2012) - [j42]Pieter H. Hartel
, Henk L. Muller:
Simple algebraic data types for C. Softw. Pract. Exp. 42(2): 191-210 (2012) - [c81]Dina Hadziosmanovic, Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel
:
Challenges and opportunities in securing industrial control systems. COMPENG 2012: 1-6 - [c80]Arjan Jeckmans, Qiang Tang
, Pieter H. Hartel
:
Privacy-preserving collaborative filtering based on horizontally partitioned dataset. CTS 2012: 439-446 - [c79]Christoph Bösch, Qiang Tang, Pieter H. Hartel
, Willem Jonker:
Selective Document Retrieval from Encrypted Database. ISC 2012: 224-241 - 2011
- [j41]Yee Wei Law
, Giorgi Moniava, Zheng Gong, Pieter H. Hartel
, Marimuthu Palaniswami
:
KALwEN: a new practical and interoperable key management scheme for body sensor networks. Secur. Commun. Networks 4(11): 1309-1329 (2011) - [j40]Emmanuele Zambon, Sandro Etalle, Roel J. Wieringa, Pieter H. Hartel
:
Model-based qualitative risk assessment for availability of IT infrastructures. Softw. Syst. Model. 10(4): 553-580 (2011) - [c78]Luan Ibraimi, Svetla Nikova
, Pieter H. Hartel
, Willem Jonker:
Public-Key Encryption with Delegated Search. ACNS 2011: 532-549 - [c77]Arjan Jeckmans, Qiang Tang
, Pieter H. Hartel
:
Privacy-preserving profile matching using the social graph. CASoN 2011: 42-47 - [c76]Arjan Jeckmans, Qiang Tang
, Pieter H. Hartel:
Poster: privacy-preserving profile similarity computation in online social networks. CCS 2011: 793-796 - [c75]Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel
, Sandro Etalle:
MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. EC2ND 2011: 41-48 - [c74]Saeed Sedghi, Pieter H. Hartel
, Willem Jonker, Svetla Nikova:
Privacy Enhanced Access Control by Means of Policy Blinding. ISPEC 2011: 108-122 - [c73]Christoph Bösch, Richard Brinkman, Pieter H. Hartel
, Willem Jonker:
Conjunctive Wildcard Search over Encrypted Data. Secure Data Management 2011: 114-127 - [c72]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
:
Training students to steal: a practical assignment in computer security education. SIGCSE 2011: 21-26 - 2010
- [j39]Luan Ibraimi, Qiang Tang
, Pieter H. Hartel, Willem Jonker:
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. Int. J. Comput. Model. Algorithms Medicine 1(2): 1-21 (2010) - [j38]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel
, Qiang Tang
, Raymond N. J. Veldhuis:
Embedding renewable cryptographic keys into noisy data. Int. J. Inf. Sec. 9(3): 193-208 (2010) - [j37]Mohammed G. Khatib, Pieter H. Hartel
:
Optimizing MEMS-based storage devices for mobile battery-powered systems. ACM Trans. Storage 6(1): 1:1-1:37 (2010) - [j36]Mohammed G. Khatib, Pieter H. Hartel
, Hylke W. van Dijk:
Energy-Efficient Streaming Using Non-volatile Memory. J. Signal Process. Syst. 60(2): 149-168 (2010) - [c71]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
:
Two methodologies for physical penetration testing using social engineering. ACSAC 2010: 399-408 - [c70]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
:
Laptop theft: a case study on the effectiveness of security mechanisms in open organizations. CCS 2010: 666-668 - [c69]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
:
Effectiveness of Physical, Social and Digital Mechanisms against Laptop Theft in Open Organizations. GreenCom/CPSCom 2010: 727-732 - [c68]Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
:
Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain. ARSPA-WITS 2010: 112-129 - [c67]Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel
:
MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA. RAID 2010: 500-501 - [c66]Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, Pieter H. Hartel
, Willem Jonker:
Searching Keywords with Wildcards on Encrypted Data. SCN 2010: 138-153 - [c65]Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel
, Willem Jonker:
Computationally Efficient Searchable Symmetric Encryption. Secure Data Management 2010: 87-100
2000 – 2009
- 2009
- [j35]Ileana Buhan, Bas Boom, Jeroen Doumen, Pieter H. Hartel
, Raymond N. J. Veldhuis:
Secure pairing with biometrics. Int. J. Secur. Networks 4(1/2): 27-42 (2009) - [j34]Yee Wei Law
, Marimuthu Palaniswami, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel
, Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans. Sens. Networks 5(1): 6:1-6:38 (2009) - [c64]Zheng Gong, Pieter H. Hartel
, Svetla Nikova, Bo Zhu:
Towards Secure and Practical MACs for Body Sensor Networks. INDOCRYPT 2009: 182-198 - [c63]Luan Ibraimi, Qiang Tang, Pieter H. Hartel
, Willem Jonker:
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. ISPEC 2009: 1-12 - [c62]Mohammed G. Khatib, Pieter H. Hartel
:
Policies for probe-wear leveling in MEMS-based storage devices. MASCOTS 2009: 1-10 - [c61]Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel
:
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. RAID 2009: 1-20 - [c60]Luan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter H. Hartel
, Willem Jonker:
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. WISA 2009: 309-323 - [i5]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel:
Fuzzy extractors for continuous distributions. IACR Cryptol. ePrint Arch. 2009: 545 (2009) - 2008
- [j33]Raluca Marin-Perianu, Hans Scholten, Paul J. M. Havinga, Pieter H. Hartel
:
Cluster-based service discovery for heterogeneous wireless sensor networks. Int. J. Parallel Emergent Distributed Syst. 23(4): 325-346 (2008) - [c59]Mohammed G. Khatib, Pieter H. Hartel
:
Power management of MEMS-based storage devices for mobile systems. CASES 2008: 245-254 - [c58]Qiang Tang, Pieter H. Hartel
, Willem Jonker:
Inter-domain Identity-Based Proxy Re-encryption. Inscrypt 2008: 332-347 - [c57]Mohammed G. Khatib, Ethan L. Miller, Pieter H. Hartel:
Workload-based configuration of MEMS-based storage devices for mobile systems. EMSOFT 2008: 41-50 - [c56]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel:
Controlling leakage of biometric information using dithering. EUSIPCO 2008: 1-5 - [c55]Pieter H. Hartel, Leon Abelmann, Mohammed G. Khatib:
Towards Tamper-evident Storage on Patterned Media. FAST 2008: 283-296 - [c54]Pieter H. Hartel
, Theo C. Ruys, Marc C. W. Geilen
:
Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow. FMCAD 2008: 1-10 - [c53]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis:
Embedding Renewable Cryptographic Keys into Continuous Noisy Data. ICICS 2008: 294-310 - [c52]Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Towards an Information Theoretic Analysis of Searchable Encryption. ICICS 2008: 345-360 - [c51]Raluca Marin-Perianu, Johann L. Hurink
, Pieter H. Hartel
:
A Generalized Clustering Algorithm for Dynamic Wireless Sensor Networks. ISPA 2008: 863-870 - [c50]Trajce Dimkov, Qiang Tang
, Pieter H. Hartel:
On the Inability of Existing Security Models to Cope with Data Mobility in Dynamic Organizations. MODSEC@MoDELS 2008 - [c49]Luan Ibraimi, Qiang Tang, Pieter H. Hartel
, Willem Jonker:
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. Secure Data Management 2008: 185-198 - 2007
- [j32]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
:
Timed analysis of security protocols. J. Comput. Secur. 15(6): 619-645 (2007) - [c48]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel
, Raymond N. J. Veldhuis:
Fuzzy extractors for continuous distributions. AsiaCCS 2007: 353-355 - [c47]Mohammed G. Khatib, Berend-Jan van der Zwaag
, Pieter H. Hartel
, Gerard J. M. Smit:
Interposing Flash between Disk and DRAM to Save Energy for Streaming Workloads. ESTIMedia 2007: 7-12 - [c46]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis:
Feeling Is Believing: A Secure Template Exchange Protocol. ICB 2007: 897-906 - 2006
- [j31]Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law
, Andrew Tokmakoff:
LicenseScript: a logical language for digital rights management. Ann. des Télécommunications 61(3-4): 284-331 (2006) - [j30]Yee Wei Law
, Jeroen Doumen, Pieter H. Hartel
:
Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sens. Networks 2(1): 65-93 (2006) - [c45]Ileana Buhan, Asker M. Bazen, Pieter H. Hartel, Raymond N. J. Veldhuis:
A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems. ICB 2006: 728-736 - [c44]Vasughi Sundramoorthy, Pieter H. Hartel
, Hans Scholten:
On consistency maintenance in service discovery. IPDPS 2006 - [c43]Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel
, Emmanuele Zambon:
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. IWIA 2006: 144-156 - [c42]Raluca Marin-Perianu, Hans Scholten, Paul J. M. Havinga, Pieter H. Hartel
:
Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. LCN 2006: 931-938 - 2005
- [c41]Yee Wei Law, Pieter H. Hartel, Jerry den Hartog, Paul J. M. Havinga:
Link-layer jamming attacks on S-MAC. EWSN 2005: 217-225 - [c40]Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Rieks Joosten, Geert Kleinhuis:
Service Brokerage in Prolog. ICEIS (3) 2005: 409-412 - [c39]Vasughi Sundramoorthy, Pieter H. Hartel
, Jerry den Hartog, Hans Scholten, C. Tan:
Functional Principles of Registry-based Service Discovery. LCN 2005: 209-217 - [c38]Yee Wei Law
, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel
, Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. SASN 2005: 76-88 - [c37]Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus:
StreamTo: Streaming Content using a Tamper-Resistant Token. SEC 2005: 601-612 - [c36]Pieter H. Hartel
:
A Trace Semantics for Positive Core XPath. TIME 2005: 103-112 - [c35]Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel
, Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications. STM 2005: 113-130 - [i4]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed Analysis of Security Protocols. CoRR abs/cs/0503036 (2005) - [i3]Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications. CoRR abs/cs/0510061 (2005) - [i2]Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter H. Hartel:
Poseidon: a 2-tier Anomaly-based Intrusion Detection System. CoRR abs/cs/0511043 (2005) - 2004
- [j29]Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Efficient Tree Search in Encrypted Data. Inf. Secur. J. A Glob. Perspect. 13(3): 14-21 (2004) - [j28]Pieter H. Hartel
, Henk L. Muller, Hugh Glaser:
The Functional "C" experience. J. Funct. Program. 14(2): 129-135 (2004) - [j27]Ton Kalker, Dick H. J. Epema, Pieter H. Hartel
, Reginald L. Lagendijk, Maarten van Steen
:
Music2Share - Copyright-Compliant Music Sharing in P2P Systems. Proc. IEEE 92(6): 961-970 (2004) - [c34]Pieter H. Hartel, Pascal van Eck, Sandro Etalle, Roel J. Wieringa:
Modelling Mobility Aspects of Security Policies. CASSIS 2004: 172-191 - [c33]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
:
Timed model checking of security protocols. FMSE 2004: 23-32 - [c32]Yee Wei Law, Jeroen Doumen, Pieter H. Hartel:
Benchmarking block ciphers for wireless sensor networks. MASS 2004: 447-456 - [c31]Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Efficient Tree Search in Encrypted Data. WOSIS 2004: 126-135 - [c30]Raymond N. J. Veldhuis, Asker M. Bazen, Joost A. Kauffman, Pieter H. Hartel
:
Biometric verification based on grip-pattern recognition. Security, Steganography, and Watermarking of Multimedia Contents 2004: 634-641 - [c29]Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin:
License Protection with a Tamper-Resistant Token. WISA 2004: 223-237 - [i1]Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter H. Hartel:
A Trace Logic for Local Security Properties. CoRR cs.CR/0411010 (2004) - 2003
- [c28]Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Yee Wei Law:
Approximating Fair Use in LicenseScript. ICADL 2003: 432-443 - [c27]Yee Wei Law, Ricardo Corin, Sandro Etalle, Pieter H. Hartel:
A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. PWC 2003: 27-39 - [c26]Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel:
Comparing Logic-Based and XML-Based Rights Expression Languages. OTM Workshops 2003: 779-792 - [c25]Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel:
Secure Audit Logging with Tamper-Resistant Hardware. SEC 2003: 73-84 - [c24]Yee Wei Law, Sandro Etalle, Pieter H. Hartel:
Assessing Security in Energy-Efficient Sensor Networks. SEC 2003: 459-463 - [c23]Cheun Ngen Chong, Ricardo Corin, Sandro Etalle, Pieter H. Hartel
, Willem Jonker, Yee Wei Law
:
LicenseScript: a novel digital rights language and its semantics. WEDELMUSIC 2003: 122-129 - [c22]Ricardo Corin, Sandro Etalle, Pieter H. Hartel
, Antonio Durante:
A Trace Logic for Local Security Properties. SVV@ICLP 2003: 129-143 - 2002
- [c21]Pieter H. Hartel:
The State of WG 8.8. CARDIS 2002 - [c20]Erik Poll, Pieter H. Hartel, Eduard de Jong:
A Java Reference Model of Transacted Memory for Smart Cards. CARDIS 2002: 75-86 - [c19]Cheun Ngen Chong, René van Buuren, Pieter H. Hartel, Geert Kleinhuis:
Security Attributes Based Digital Rights Management. IDMS/PROMS 2002: 339-352 - [c18]Hans Scholten, Pierre G. Jansen, Ferdy Hanssen, Pieter H. Hartel
, T. Hattink, Vasughi Sundramoorthy:
Multimedia QoS in Low-Cost Home Networks. LCN 2002: 327-328 - 2001
- [j26]Josep Domingo-Ferrer, Pieter H. Hartel
:
Current directions in smart cards. Comput. Networks 36(4): 377-379 (2001) - [j25]Pieter H. Hartel, Luc Moreau
:
Formalizing the safety of Java, the Java virtual machine, and Java card. ACM Comput. Surv. 33(4): 517-558 (2001) - [c17]Neil James Henderson, Neil M. White, Pieter H. Hartel:
iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric. E-smart 2001: 124-134 - [c16]Pieter H. Hartel, Michael J. Butler, Eduard de Jong, Mark Longley:
Transacted Memory for Smart Cards. FME 2001: 478-499 - [c15]Adam Field, Pieter H. Hartel, Wim Mooij:
Personal DJ, an architecture for personalised content delivery. WWW 2001: 1-7 - 2000
- [j24]Hugh Glaser, Pieter H. Hartel
, Paul W. Garratt:
Programming by Numbers: A Programming Method for Novices. Comput. J. 43(4): 252-265 (2000) - [j23]Stephan Diehl, Pieter H. Hartel, Peter Sestoft:
Principles of abstract machines. Future Gener. Comput. Syst. 16(7) (2000) - [j22]Stephan Diehl
, Pieter H. Hartel
, Peter Sestoft:
Abstract machines for programming language implementation. Future Gener. Comput. Syst. 16(7): 739-751 (2000) - [c14]Pieter H. Hartel:
Formalising Java Safety - An overview. CARDIS 2000: 115-134 - [c13]Neil James Henderson, Pieter H. Hartel:
Pressure Sequence - A Novel Method of Protecting Smart Cards. CARDIS 2000: 241-256 - [c12]Pieter H. Hartel, Eduard de Jong:
A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations. Java Card Workshop 2000: 52-72
1990 – 1999
- 1999
- [j21]Sandro Etalle, Pieter H. Hartel, Willem G. Vree:
Declarative solutions to partitioned-grid problems. Softw. Pract. Exp. 29(13): 1173-1200 (1999) - [j20]Pieter H. Hartel
:
LETOS - a lightweight execution tool for operational semantics. Softw. Pract. Exp. 29(15): 1379-1416 (1999) - [j19]Michael J. Butler, Pieter H. Hartel:
Reasoning about Grover's quantum search algorithm using probabilistic wp. ACM Trans. Program. Lang. Syst. 21(3): 417-429 (1999) - [c11]Pieter H. Hartel, Michael J. Butler, Moshe Levy:
The Operational Semantics of a Java Secure Processor. Formal Syntax and Semantics of Java 1999: 313-352 - 1998
- [c10]Pieter H. Hartel, Jake Hill, Matt Sims:
An Operational Model of QuickPay - Extended Abstract. CARDIS 1998: 19-28 - 1997
- [b1]Pieter H. Hartel, Henk L. Muller:
Functional C. Addison-Wesley-Longman 1997, ISBN 978-0-201-41950-4, pp. I-XVI, 1-433 - [j18]Pieter H. Hartel:
FGCS special issue on smart cards. Future Gener. Comput. Syst. 13(1): 1-2 (1997) - [j17]Marjan I. Alberda, Pieter H. Hartel, Eduard K. de Jong Frz:
Using formal methods to cultivate trust in smart card operating systems. Future Gener. Comput. Syst. 13(1): 39-54 (1997) - [j16]Pieter H. Hartel:
Elementary Standard ML by Greg Michaelson, University College London Press, UK, 1995, ISBN 1-85728-398-8 PB, pp 306. Knowl. Eng. Rev. 12(1): 99-102 (1997) - [e2]Hugh Glaser, Pieter H. Hartel, Herbert Kuchen:
Programming Languages: Implementations, Logics, and Programs, 9th International Symposium, PLILP'97, Including a Special Trach on Declarative Programming Languages in Education, Southampton, UK, September 3-5, 1997, Proceedings. Lecture Notes in Computer Science 1292, Springer 1997, ISBN 3-540-63398-7 [contents] - 1996
- [j15]Pieter H. Hartel, Hugh Glaser:
The Resource Constrained Shortest Path Problem Implemented in a Lazy Functional Language. J. Funct. Program. 6(1): 29-45 (1996) - [j14]Pieter H. Hartel, Marc Feeley, Martin Helmut Alt, Lennart Augustsson, Peter Baumann, Marcel Beemster, Emmanuel Chailloux, Christine H. Flood, Wolfgang Grieskamp, John H. G. van Groningen, Kevin Hammond, Bogumil Hausman, Melody Y. Ivory, Richard E. Jones, Jasper Kamperman, Peter Lee, Xavier Leroy, Rafael Dueire Lins, Sandra Loosemore, Niklas Röjemo, Manuel Serrano, Jean-Pierre Talpin, Jon Thackray, Stephen Thomas, Pum Walters, Pierre Weis, Peter Wentworth:
Benchmarking Implementations of Functional Languages with 'Pseudoknot', a Float-Intensive Benchmark. J. Funct. Program. 6(4): 621-655 (1996) - [c9]Marjan I. Alberda, Pieter H. Hartel, Eduard K. de Jong Frz:
Using formal methods to cultivate trust in Smart Card Operating Systems. CARDIS 1996 - [c8]Hugh Glaser, Pieter H. Hartel, Eduard K. de Jong Frz:
Structuring and Visualising an IC-card Security Standard. CARDIS 1996 - [c7]Pieter H. Hartel, Jean-Jacques Quisquater:
Introduction to CARDIS 1996. CARDIS 1996 - 1995
- [j13]Pieter H. Hartel, Rutger F. H. Hofman, Koen Langendoen
, Henk L. Muller, Willem G. Vree, Louis O. Hertzberger:
A toolkit for parallel functional programming. Concurr. Pract. Exp. 7(8): 765-793 (1995) - [j12]A. Reza Haydarlou, Pieter H. Hartel:
Thunk Lifting: Reducing Heap Usage in an Implementation of a Lazy Functional Language. J. Funct. Log. Program. 1995(1) (1995) - [j11]Pieter H. Hartel
, Marinus J. Plasmeijer:
Special Issue on State-of-the-Art Applications of Pure Functional Programming Languages. J. Funct. Program. 5(3): 279-281 (1995) - [j10]Willem G. Vree, Pieter H. Hartel
:
Communication Lifting: Fixed Point Computation for Parallelism. J. Funct. Program. 5(4): 549-581 (1995) - [j9]Pieter H. Hartel
, Louis O. Hertzberger:
Paradigms and laboratories in the core computer science curriculum: an overview. ACM SIGCSE Bull. 27(4): 13-20 (1995) - [c6]Pieter H. Hartel, Bert van Es, Dick Tromp:
Basic Proof Skills of Computer Science Students. FPLE 1995: 269-287 - [c5]Hugh McEvoy, Pieter H. Hartel
:
Local Linear Logic for Locality Consciousness in Multiset Transformation. PLILP 1995: 357-379 - [e1]Pieter H. Hartel, Marinus J. Plasmeijer:
Functional Programming Languages in Education, First International Symposium, FPLE'95, Nijmegen, The Netherlands, December 4-6, 1995, Proceedings. Lecture Notes in Computer Science 1022, Springer 1995, ISBN 3-540-60675-0 [contents] - 1994
- [j8]Pieter H. Hartel
, Willem G. Vree:
Experiments wiht Destructive Updates in a Lazy Functional Language. Comput. Lang. 20(3): 177-192 (1994) - [j7]Pieter H. Hartel
, Hugh Glaser, John M. Wild:
Compilation of Functional Languages using Flow Graph Analysis. Softw. Pract. Exp. 24(2): 127-173 (1994) - 1993
- [j6]Marcel Beemster, Pieter H. Hartel
, Louis O. Hertzberger, Rutger F. H. Hofman, Koen Langendoen
, L. L. Li, R. Milikowski, Willem G. Vree, Hendrik Pieter Barendregt, J. C. Mulder:
Experience with a clustered parallel reduction machine. Future Gener. Comput. Syst. 9(3): 175-200 (1993) - [c4]Pieter H. Hartel, Willem G. Vree:
Experiments with destructive updates in a lazy functional language (extended abstract). Functional Programming 1993: 69-82 - [c3]Pieter H. Hartel, Koen Langendoen:
Benchmarking Implementations of Lazy Functional Languages. FPCA 1993: 341-349 - 1992
- [c2]Koen Langendoen
, Pieter H. Hartel:
FCG: A Code Generator for Lazy Functional Languages. CC 1992: 278-296 - 1991
- [j5]Pieter H. Hartel
:
Performance of Lazy Combinator Graph Reduction. Softw. Pract. Exp. 21(3): 299-329 (1991) - 1990
- [j4]Pieter H. Hartel:
A Comparison of Three Garbage Collection Algorithms. Struct. Program. 11(3): 117-128 (1990)
1980 – 1989
- 1988
- [j3]Pieter H. Hartel
, Arthur H. Veen:
Statistics on Graph Reduction of SASL Programs. Softw. Pract. Exp. 18(3): 239-253 (1988) - [c1]Pieter H. Hartel:
The Average Size of Ordered Binary Subgraphs. WG 1988: 327-351 - 1987
- [j2]Hendrik Pieter Barendregt, Marko C. J. D. van Eekelen, Marinus J. Plasmeijer, Pieter H. Hartel
, Louis O. Hertzberger, Willem G. Vree:
The Dutch parallel reduction machine project. Future Gener. Comput. Syst. 3(4): 261-270 (1987) - 1983
- [j1]Jan van den Bos, Marinus J. Plasmeijer, Pieter H. Hartel
:
Input-Output Tools: A Language Facility for Interactive and Real-Time Systems. IEEE Trans. Software Eng. 9(3): 247-259 (1983)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint