Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Joeri de
    Last name: Ruiter
    DBLP: 24/10823
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 23 of 23  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Tom Chothia, Mihai Ordean, Joeri de Ruiter, Richard J. Thomas.
    An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols.
    Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017 2017 (0) 2017
    Conference paper
    David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman.
    cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations.
    Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Paul Fiterau-Brostean, Toon Lenaerts, Erik Poll, Joeri de Ruiter, Frits W. Vaandrager, Patrick Verleg.
    Model learning and model checking of SSH implementations.
    Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, Santa Barbara, CA, USA, July 10-14, 2017 2017 (0) 2017
    Conference paper
    Richard J. Thomas, Mihai Ordean, Tom Chothia, Joeri de Ruiter.
    TRAKS: A Universal Key Management Scheme for ERTMS.
    Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017 2017 (0) 2017
    Journal article
    David Chaum, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman.
    cMix: Anonymization byHigh-Performance Scalable Mixing.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Joeri de Ruiter, Richard J. Thomas, Tom Chothia.
    A Formal Security Analysis of ERTMS Train to Trackside Protocols.
    Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification - First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Tom Chothia, Joeri de Ruiter.
    Learning From Others' Mistakes: Penetration Testing IoT Devices in the Classroom.
    2016 USENIX Workshop on Advances in Security Education (ASE 16), Austin, TX, August 9, 2016. 2016 (0) 2016
    Conference paper
    Joeri de Ruiter.
    A Tale of the OpenSSL State Machine: A Large-Scale Black-Box Analysis.
    Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Eric R. Verheul, Bart Jacobs 0001, Carlo Meijer, Mireille Hildebrandt, Joeri de Ruiter.
    Polymorphic Encryption and Pseudonymisation for Personalised Healthcare.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Tom Chothia, Flavio D. Garcia, Joeri de Ruiter, Jordi van den Breekel, Matthew Thompson.
    Relay Cost Bounding for Contactless EMV Payments.
    Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Erik Poll, Joeri de Ruiter, Aleksy Schubert.
    Protocol State Machines and Session Languages: Specification, implementation, and Security Flaws.
    2015 IEEE Symposium on Security and Privacy Workshops, SPW 2015, San Jose, CA, USA, May 21-22, 2015 2015 (0) 2015
    Conference paper
    Joeri de Ruiter, Erik Poll.
    Protocol State Fuzzing of TLS Implementations.
    24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015. 2015 (0) 2015
    Conference paper
    René Habraken, Peter Dolron, Erik Poll, Joeri de Ruiter.
    An RFID Skimming Gate Using Higher Harmonics.
    Radio Frequency Identification. Security and Privacy Issues - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Fabian van den Broek, Roel Verdult, Joeri de Ruiter.
    Defeating IMSI Catchers.
    Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-6, 2015 2015 (0) 2015
    Conference paper
    Joeri de Ruiter.
    Automated algebraic analysis of structure-preserving signature schemes.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Georg Chalupar, Stefan Peherstorfer, Erik Poll, Joeri de Ruiter.
    Automated Reverse Engineering using Lego®
    8th USENIX Workshop on Offensive Technologies, WOOT '14, San Diego, CA, USA, August 19, 2014. 2014 (0) 2014
    Conference paper
    Tim Cooijmans, Joeri de Ruiter, Erik Poll.
    Analysis of Secure Key Storage Solutions on Android.
    Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014 2014 (0) 2014
    Conference paper
    Erik Poll, Joeri de Ruiter.
    The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions.
    Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Fides Aarts, Joeri de Ruiter, Erik Poll.
    Formal Models of Bank Cards for Free.
    Sixth IEEE International Conference on Software Testing, Verification and Validation, ICST 2013 Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013 2013 (0) 2013
    Conference paper
    Gerhard de Koning Gans, Joeri de Ruiter.
    The SmartLogic Tool: Analysing and Testing Smart Card Protocols.
    Fifth IEEE International Conference on Software Testing, Verification and Validation, ICST 2012, Montreal, QC, Canada, April 17-21, 2012 2012 (0) 2012
    Conference paper
    David M. Williams, Joeri de Ruiter, Wan Fokkink.
    Model Checking under Fairness in ProB and Its Application to Fair Exchange Protocols.
    Theoretical Aspects of Computing - ICTAC 2012 - 9th International Colloquium, Bangalore, India, September 24-27, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Arjan Blom, Gerhard de Koning Gans, Erik Poll, Joeri de Ruiter, Roel Verdult.
    Designed to Fail: A USB-Connected Reader for Online Banking.
    Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Joeri de Ruiter, Erik Poll.
    Formal Analysis of the EMV Protocol Suite.
    Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers 2012 (0) 2011
    Show item 1 to 23 of 23  

    Your query returned 23 matches in the database.