Follow
Pieter Hartel
Pieter Hartel
Professor Emeritus Cyber security
Verified email at tudelft.nl - Homepage
Title
Cited by
Cited by
Year
A Survey of Provably Secure Searchable Encryption
C Bösch, P Hartel, W Jonker, A Peter
ACM Computing Surveys (CSUR) 47 (2), Article 18, 2015
4372015
Survey and benchmark of block ciphers for wireless sensor networks
YW Law, J Doumen, P Hartel
ACM Transactions on Sensor Networks (TOSN) 2 (1), 65-93, 2006
4142006
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
YW Law, M Palaniswami, LV Hoesel, J Doumen, P Hartel, P Havinga
ACM Transactions on Sensor Networks (TOSN) 5 (1), 1-38, 2009
4092009
Mediated ciphertext-policy attribute-based encryption and its application
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
Int. Workshop on Information Security Applications (WISA), 309-323, 2009
3402009
Computationally efficient searchable symmetric encryption
P Van Liesdonk, S Sedghi, J Doumen, P Hartel, W Jonker
Int. Workshop on Secure Data Management (SDM), 87-100, 2010
3192010
Through the eye of the PLC: semantic security monitoring for industrial processes
D Hadžiosmanović, R Sommer, E Zambon, PH Hartel
30th Annual Computer Security Applications Conference (ACSAC), 126-135, 2014
3092014
Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources
S Barth, MDT de Jong, M Junger, PH Hartel, JC Roppelt
Telematics and Informatics 41, 55-69, 2019
2972019
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
2022013
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
L Ibraimi, Q Tang, P Hartel, W Jonker
Int. Conf. on Information Security Practice and Experience (ISPEC), 1-12, 2009
1852009
Poseidon: a 2-tier anomaly-based network intrusion detection system
D Bolzoni, S Etalle, P Hartel
4th IEEE Int. Workshop on Information Assurance (IWIA), 10 pp.-156, 2006
1812006
The persuasion and security awareness experiment: reducing the success of social engineering attacks
JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
Journal of experimental criminology 11, 97-115, 2015
1592015
Link-layer jamming attacks on S-MAC
YW Law, P Hartel, J den Hartog, P Havinga
2nd Eu. Workshop on Wireless Sensor Networks (EWSN), 217-225, 2005
1362005
Fuzzy extractors for continuous distributions
I Buhan, J Doumen, P Hartel, R Veldhuis
2nd ACM Symp. on Information, computer and comms. security (AsiaCCS), 353-355, 2007
1292007
How effective is anti-phishing training for children?
E Lastdrager, IC Gallardo, P Hartel, M Junger
Thirteenth Symposium on Usable Privacy and Security (SOUPS), 229-239, 2017
1282017
Benchmarking implementations of functional languages with ‘Pseudoknot’, a float-intensive benchmark
PH Hartel, M Feeley, M Alt, L Augustsson, P Baumann, M Beemster, ...
Journal of functional programming 6 (4), 621-655, 1996
128*1996
Formalizing the safety of Java, the Java virtual machine, and Java card
PH Hartel, L Moreau
ACM Computing Surveys (CSUR) 33 (4), 517-558, 2001
1172001
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
University of Twente, 2009
1162009
A classification of service discovery protocols
RS Marin-Perianu, PH Hartel, J Scholten
Centre for Telematics and Information Technology University of Twente, 2005
1062005
Abstract machines for programming language implementation
S Diehl, P Hartel, P Sestoft
Future Generation Computer Systems 16 (7), 739-751, 2000
1062000
A log mining approach for process monitoring in SCADA
D Hadžiosmanović, D Bolzoni, PH Hartel
International Journal of Information Security 11, 231-251, 2012
1052012
The system can't perform the operation now. Try again later.
Articles 1–20