Wolter Pieters
Title
Cited by
Cited by
Year
Provable anonymity
FD Garcia, I Hasuo, W Pieters, P Van Rossum
Proceedings of the 2005 ACM workshop on Formal methods in security …, 2005
1052005
Explanation and trust: what to tell the user in security and AI?
W Pieters
Ethics and information technology 13 (1), 53-64, 2011
902011
The persuasion and security awareness experiment: reducing the success of social engineering attacks
JH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
Journal of experimental criminology 11 (1), 97, 2015
792015
Security implications of virtualization: A literature study
A Van Cleeff, W Pieters, RJ Wieringa
2009 International conference on computational science and engineering 3 …, 2009
742009
Portunes: representing attack scenarios spanning through the physical, digital and social domain
T Dimkov, W Pieters, P Hartel
Automated Reasoning for Security Protocol Analysis and Issues in the Theory …, 2011
652011
Two methodologies for physical penetration testing using social engineering
T Dimkov, A Van Cleeff, W Pieters, P Hartel
Proceedings of the 26th annual computer security applications conference …, 2010
622010
Electronic Voting in the Netherlands: from early Adoption to early Abolishment
B Jacobs, W Pieters
Foundations of security analysis and design V, 121-144, 2009
612009
Representing humans in system security models: An actor-network approach
W Pieters
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2011
582011
RIES-internet voting in action
E Hubbers, B Jacobs, W Pieters
29th Annual International Computer Software and Applications Conference …, 2005
572005
From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks
W van der Wagen, W Pieters
British Journal of Criminology 55 (3), 578-595, 2015
492015
Acceptance of voting technology: between confidence and trust
W Pieters
International Conference on Trust Management, 283-297, 2006
452006
Privacy and Information Technology
J van den Hoven, M Blaauw, W Pieters, M Warnier
The Stanford Encyclopedia of Philosophy (Winter 2014 Edition), 2014
442014
Receipt-freeness as a special case of anonymity in epistemic logic
HL Jonker, W Pieters
IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006
422006
The precautionary principle in a world of digital dependencies
W Pieters, A Van Cleeff
Computer 42 (6), 50-56, 2009
362009
Security policy alignment: A formal approach
W Pieters, T Dimkov, D Pavlovic
IEEE Systems Journal 7 (2), 275-287, 2012
352012
Benefits of location-based access control: A literature study
A Van Cleeff, W Pieters, R Wieringa
2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l …, 2010
352010
What proof do we prefer? Variants of verifiability in voting
W Pieters
Workshop on Electronic Voting and e-Government in the UK, 33-39, 2006
272006
Integrated safety and security risk assessment methods: a survey of key characteristics and applications
S Chockalingam, D Hadžiosmanović, W Pieters, A Teixeira, P van Gelder
International Conference on Critical Information Infrastructures Security, 50-62, 2016
262016
Statically checking confidentiality via dynamic labels
B Jacobs, W Pieters, M Warnier
Proceedings of the 2005 workshop on Issues in the theory of security, 50-56, 2005
262005
The (social) construction of information security
W Pieters
The Information Society 27 (5), 326-335, 2011
252011
The system can't perform the operation now. Try again later.
Articles 1–20