Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456 Papers by Wouter Teepe
Papers which have been subsumed by newer publications are listed, but have been greyed out.
Wouter Teepe, On BAN logic and hash functions, or: how an unjustified inference rule causes problems, in Autonomous Agents and Multi-Agent Systems, Springer, September 2008.
Wouter Teepe, On BAN logic and hash functions, or: how an unjustified inference rule causes problems, in Autonomous Agents and Multi-Agent Systems, Springer, September 2008.
Marc Hooghe en Wouter Teepe, Party Profiles on the Web, an analysis of the logfiles of non-partisan interactive political internet sites in the 2003 and 2004 election campaigns in Belgium, in New Media & Society9:6, pp. 965—985, SAGE Publications, December 2007.
Wouter Teepe, Proving Possession of Arbitrary Secrets While not Giving Them Away, New Protocols and a Proof in GNY Logic, in Synthese149:2, pp. 409—443, Knowledge, Rationality and Action pp. 155—189, Springer, March 2006.
Wouter Teepe, Integrity and Dissemination Control in Administrative Applications through Information Designators, in International Journal of Computer Systems Science & Engineering20:5, pp. 377—386, CRL Publishing, September 2005.
Wouter Teepe, Reind van de Riet and Martin Olivier, WorkFlow Analyzed for Security and Privacy in using Databases, in Journal of Computer Security11:3, pp. 353—363, IOS Press, September 2003.
Wouter Teepe, Privacy-gerichte workflowanalyse, een verkenning aan de hand van COLOR-X, Master's thesis, Rijksuniversiteit Groningen, december 1999.
Book chapters
Francien Dechesne, Jan van Eijck, Wouter Teepe and Yanjing Wang, What is Protocol Analysis?, in Discourses on Social Software, Texts in Games and Logic5, to appear, Amsterdam University Press, early 2009.
Francien Dechesne, Jan van Eijck, Wouter Teepe and Yanjing Wang, Protocol Analysis and Dynamic Epistemic Logic, in Discourses on Social Software, Texts in Games and Logic5, to appear, Amsterdam University Press, early 2009.
Wouter Teepe, Reind van de Riet and Martin Olivier, WorkFlow Analyzed for Security and Privacy in using Databases, in Data and Applications Security — Developments and Directions, pp. 271—282, Kluwer, 2001.
Wouter Teepe, Ondeugdelijke alibi's, in Moord in het Heymansgebouw, pp. 109—116, eigen beheer, november 2000.
Maurice Schellekens, Bert-Jaap Koops en Wouter Teepe, Wat niet weg is, is gezien, Een analyse van art. 54a Sr in het licht van een Notice-and-Take-Down-regime, Universiteit van Tilburg, november 2007.
Bart Jacobs en Wouter Teepe, Over vermogen en onvermogen, in Privacy & Informatie10:4, pp. 142—146, Kluwer, augustus 2007.
Wouter Teepe, Een classificatie van Persoonlijke Partijprofielen, een analyse vanuit de kennistechnologie, in Samenleving en Politiek, Stemtesten Getest, pp. 2—12, maart 2005.
Wouter Teepe en Marc Hooghe, Interactief internetgebruik in tijden van verkiezingskoorts, Een analyse van de gebruikers van "Wij kiezen partij voor u", in Samenleving en Politiek, Stemtesten Getest, pp. 73—88, maart 2005.
Wouter Teepe, BAN Logic is Not 'Sound', Constructing Epistemic Logics for Security is Difficult, in Proceedings of Formal Approaches to Multi-Agent Systems workshop (FAMAS'06), pp. 79—91, Riva del Garda, August 2006.
Marc Hooghe and Wouter Teepe, Interactive, Non-partisan Party Profile Websites during Election Campaigns, An examination of the logfiles of the 2003 and 2004 Belgian websites, in proceedings of the 2005 American Political Science Association Annual Meeting, Washington DC, September 2005.
Wouter Teepe, New Protocols for Proving Knowledge of Arbitrary Secrets While not Giving Them Away, in Proceedings of the first Knowledge and Games Workshop, pp. 99—116, Liverpool, July 2004.
Wouter Teepe, Reind van de Riet and Martin Olivier, WorkFlow Analyzed for Security and Privacy in using Databases, in Proceedings of the 14th IFIP 11.3 Working Conference on Database Security, Schoorl, The Netherlands, August 2000.
Wouter Teepe, New Protocols for Proving Knowledge of Arbitrary Secrets While not Giving Them Away, in Proceedings of the 16th Belgian-Dutch Conference on Artificial Intelligence, pp. 321—322, Groningen, October 2004.
Wouter Teepe, The Secret Prover, Proving Possession of Arbitrary Files While not Giving Them Away, in Proceedings of the 16th Belgian-Dutch Conference on Artificial Intelligence, pp. 385—386, Groningen, October 2004.
Wouter Teepe, "Wij kiezen partij voor u" Online Voting Advice, in Proceedings of the Eleventh Belgium-Netherlands Conference on Artificial Intelligence, pp. 295—296, Maastricht, November 1999.
Ronny Wichers Schreur, Peter van Rossum, Flavio Garcia, Wouter Teepe, Jaap-Henk Hoepman, Bart Jacobs, Gerhard de Koning Gans, Roel Verdult, Ruben Muijrers, Ravindra Kali en Vinesh Kali, Security Flaw in Mifare Classic / Ontmanteling contactloze chipkaart, persverklaring, 12 maart 2008.
Flavio Garcia, Ruben Muijrers, Melanie Rieback, Peter van Rossum, Wouter Teepe, Roel Verdult, Goed overleg tussen RFID security onderzoekers en Trans Link Systems op Radboud Universiteit, persverklaring, 16 januari 2008.