Follow
Bart De Decker
Bart De Decker
Professor of Computer Science, KU Leuven
Verified email at cs.kuleuven.be
Title
Cited by
Cited by
Year
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
214*2006
Security through aspect-oriented programming
B De Win, B Vanhaute, B De Decker
Advances in Network and Distributed Systems Security: IFIP TC11 WG11. 4 …, 2002
992002
A practical system for globally revoking the unlinkable pseudonyms of unknown users
S Brands, L Demuynck, B De Decker
Australasian Conference on Information Security and Privacy, 400-415, 2007
922007
Towards a software architecture for DRM
S Michiels, K Verslype, W Joosen, B De Decker
Proceedings of the 5th ACM workshop on Digital rights management, 65-74, 2005
782005
How aspect-oriented programming can help to build secure software
B De Win, B Vanhaute, B De Decker
INFORMATICA-LJUBLJANA- 26 (2), 141-150, 2002
522002
Analysis of revocation strategies for anonymous idemix credentials
J Lapon, M Kohlweiss, B De Decker, V Naessens
Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International …, 2011
502011
Building frameworks in AspectJ
B Vanhaute, B De Win, B De Decker
ECOOP 2001 Workshop on Advanced Separation of Concerns, Budapest 2001, 2001
502001
Privacy-preserving telemonitoring for ehealth
M Layouni, K Verslype, MT Sandıkkaya, B De Decker, H Vangheluwe
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working …, 2009
452009
A SysML extension for security analysis of industrial control systems
L Lemaire, J Lapon, BD Decker, V Naessens
2nd International Symposium for ICS & SCADA Cyber Security Research 2014 …, 2014
412014
Privacy-preserving electronic health records
L Demuynck, B De Decker
IFIP International Conference on Communications and Multimedia Security, 150-159, 2005
382005
On securely scheduling a meeting
T Herlea, J Claessens, B Preneel, G Neven, F Piessens, B De Decker
Trusted Information: The New Decade Challenge 16, 183-198, 2001
352001
User-centric identity management using trusted modules
J Vossaert, J Lapon, B De Decker, V Naessens
Mathematical and Computer Modelling 57 (7-8), 1592-1605, 2013
342013
Performance analysis of accumulator-based revocation mechanisms
J Lapon, M Kohlweiss, B De Decker, V Naessens
Security and Privacy–Silver Linings in the Cloud: 25th IFIP TC-11 …, 2010
342010
Linking privacy solutions to developer goals
K Wuyts, R Scandariato, B De Decker, W Joosen
2009 International Conference on Availability, Reliability and Security, 847-852, 2009
222009
Infrastructure for mobile agents
Y Berbers, B De Decker, W Joosen
Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems …, 1996
221996
A privacy-preserving eHealth protocol compliant with the Belgian healthcare system
B De Decker, M Layouni, H Vangheluwe, K Verslype
Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice …, 2008
212008
Privacy-preserving public transport ticketing system
M Milutinovic, K Decroix, V Naessens, B De Decker
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015
202015
Privacy-preserving public transport ticketing system
M Milutinovic, K Decroix, V Naessens, B De Decker
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015
202015
A fair anonymous submission and review system
V Naessens, L Demuynck, B De Decker
IFIP International Conference on Communications and Multimedia Security, 43-53, 2006
192006
Investigating the teaching of writing techniques in a foreign language: A pedagogical issue
AM Cornu, B De Decker, P Rosseel, M Vanderheiden
System 18 (3), 361-372, 1990
191990
The system can't perform the operation now. Try again later.
Articles 1–20