Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 270* | 2006 |
Security through aspect-oriented programming B De Win, B Vanhaute, B De Decker Advances in Network and Distributed Systems Security: IFIP TC11 WG11. 4 …, 2002 | 100 | 2002 |
A practical system for globally revoking the unlinkable pseudonyms of unknown users S Brands, L Demuynck, B De Decker Australasian Conference on Information Security and Privacy, 400-415, 2007 | 97 | 2007 |
Towards a software architecture for DRM S Michiels, K Verslype, W Joosen, B De Decker Proceedings of the 5th ACM workshop on Digital rights management, 65-74, 2005 | 76 | 2005 |
Analysis of revocation strategies for anonymous idemix credentials J Lapon, M Kohlweiss, B De Decker, V Naessens Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International …, 2011 | 52 | 2011 |
How aspect-oriented programming can help to build secure software B De Win, B Vanhaute, B De Decker INFORMATICA-LJUBLJANA- 26 (2), 141-150, 2002 | 52 | 2002 |
Building frameworks in AspectJ B Vanhaute, B De Win, B De Decker ECOOP 2001 Workshop on Advanced Separation of Concerns, Budapest 2001, 2001 | 52 | 2001 |
Privacy-preserving telemonitoring for ehealth M Layouni, K Verslype, MT Sandıkkaya, B De Decker, H Vangheluwe Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working …, 2009 | 46 | 2009 |
A SysML extension for security analysis of industrial control systems L Lemaire, J Lapon, BD Decker, V Naessens 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 …, 2014 | 45 | 2014 |
On securely scheduling a meeting T Herlea, J Claessens, B Preneel, G Neven, F Piessens, B De Decker Trusted Information: The New Decade Challenge 16, 183-198, 2001 | 38 | 2001 |
User-centric identity management using trusted modules J Vossaert, J Lapon, B De Decker, V Naessens Mathematical and Computer Modelling 57 (7-8), 1592-1605, 2013 | 37 | 2013 |
Performance analysis of accumulator-based revocation mechanisms J Lapon, M Kohlweiss, B De Decker, V Naessens Security and Privacy–Silver Linings in the Cloud: 25th IFIP TC-11 …, 2010 | 37 | 2010 |
Privacy-preserving electronic health records L Demuynck, B De Decker IFIP International Conference on Communications and Multimedia Security, 150-159, 2005 | 37 | 2005 |
Privacy-preserving public transport ticketing system M Milutinovic, K Decroix, V Naessens, B De Decker Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015 | 24 | 2015 |
Infrastructure for mobile agents Y Berbers, B De Decker, W Joosen Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems …, 1996 | 24 | 1996 |
Linking privacy solutions to developer goals K Wuyts, R Scandariato, B De Decker, W Joosen 2009 International Conference on Availability, Reliability and Security, 847-852, 2009 | 21 | 2009 |
A privacy-preserving eHealth protocol compliant with the Belgian healthcare system B De Decker, M Layouni, H Vangheluwe, K Verslype Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice …, 2008 | 21 | 2008 |
Investigating the teaching of writing techniques in a foreign language: A pedagogical issue AM Cornu, B De Decker, P Rosseel, M Vanderheiden System 18 (3), 361-372, 1990 | 19 | 1990 |
A fair anonymous submission and review system V Naessens, L Demuynck, B De Decker IFIP International Conference on Communications and Multimedia Security, 43-53, 2006 | 18 | 2006 |
Ethical aspects in eHealth–design of a privacy-friendly system M Milutinovic, B De Decker Journal of Information, Communication and Ethics in Society 14 (1), 49-69, 2016 | 17 | 2016 |