Radboud Repository
Radboud Repository
→
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search
All of Radboud repository
Collections Radboud University
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
Date issued
Document type
Journal
Fulltext in item
Department
Fulltext must be present
Contains
Equals
ID
Not Contains
Not Equals
Not ID
is greater than or equals
is less than or equals
Must be present
Title
Author
Subject
Date issued
Document type
Journal
Fulltext in item
Department
Fulltext must be present
Contains
Equals
ID
Not Contains
Not Equals
Not ID
is greater than or equals
is less than or equals
Must be present
Title
Author
Subject
Date issued
Document type
Journal
Fulltext in item
Department
Fulltext must be present
Contains
Equals
ID
Not Contains
Not Equals
Not ID
is greater than or equals
is less than or equals
Must be present
Title
Author
Subject
Date issued
Document type
Journal
Fulltext in item
Department
Fulltext must be present
Contains
Equals
ID
Not Contains
Not Equals
Not ID
is greater than or equals
is less than or equals
Must be present
New Filters:
Title
Author
Subject
Date issued
Document type
Journal
Fulltext in item
Department
Fulltext must be present
Contains
Equals
ID
Not Contains
Not Equals
Not ID
is greater than or equals
is less than or equals
Must be present
Showing 36 out of a total of 36 results.
(0.034 seconds)
Now showing items 1-36 of 36
1
Export Results
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
50
100
150
200
Learning as a Machine: Crossovers between Humans and Machines
Hildebrandt, M.
2017, Article / Letter to editor (Journal of Learning Analytics, vol. 4, iss. 1, (2017), pp. 6-23)
Formal modelling and analysis of receipt-free auction protocols in applied pi
Dong, N.
;
Jonker, H.L.
;
Pang, J.
2017, Article / Letter to editor (Computers & Security, vol. 65, (2017), pp. 405-432)
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics
Verbeek, F.
;
Yaghini, P.M.
;
Eghbal, A.
;
Bagherzadeh, N.
2017, Article / Letter to editor (IEEE Transactions on Computers, vol. 66, iss. 2, (2017), pp. 272-284)
Combine and conquer: Relating BIP and Reo
Dokter, K.
;
Jongmans, S.-S.
;
Arbab, F.
;
Bliudze, S.
2017, Article / Letter to editor (Journal of Logical and Algebraic Methods in Programming, vol. 86, iss. 1, (2017), pp. 134-156)
A Recipe for State-and-Effect Triangles
Jacobs, B.
2017, Article / Letter to editor (Logical Methods in Computer Science, vol. 13, iss. 2, (2017), pp. 1-26)
Interacting Hopf algebras
Bonchi, F.
;
Sobocinski, P.
;
Zanasi, F.
2017, Article / Letter to editor (Journal of Pure and Applied Algebra, vol. 221, iss. 1, (2017), pp. 144-184)
The Virtuality of Territorial Borders
Hildebrandt, M.
2017, Article / Letter to editor (Utrecht Law Review, vol. 13, iss. 2, (2017), pp. 14-27)
Hyper Normalisation and Conditioning for Discrete Probability Distributions
Jacobs, B.
2017, Article / Letter to editor (Logical Methods in Computer Science, vol. 13, iss. 3, (2017), pp. 1-29)
Saved by Design? The Case of Legal Protection by Design
Hildebrandt, M.
2017, Article / Letter to editor (Nanoethics, vol. 11, iss. 3, (2017), pp. 307-311)
Symmetrische cryptografie 2.0
Daemen, J.
2017, Article / Letter to editor (Nieuw Archief voor Wiskunde, vol. 18(5), iss. 3, (2017), pp. 161-167)
Wat weet mijn auto nog meer? Juridische bescherming by design in tijden van het Internet van de Dingen
Hildebrandt, M.
2017, Article / Letter to editor (Ars Aequi, vol. 2, iss. Februari, (2017), pp. 97-102)
New techniques for trail bounds and application to differential trails in Keccak
Mella, S.
;
Daemen, J.J.C.
;
Assche, G. Van
2017, Article / Letter to editor (IACR Transactions on Symmetric Cryptology, vol. 2017, iss. 1, (2017), pp. 329-357)
Towards Practical, Precise and Parametric Energy Analysis of IT Controlled Systems
Gastel, B. van
;
Eekelen, M.C.J.D. van
2017, Article / Letter to editor (Electronic Proceedings in Theoretical Computer Science, vol. 248, (2017), pp. 24-37)
Shorter Linear Straight-Line Programs for MDS Matrices
Kranz, T.
;
Leander, G.
;
Stoffelen, K.
;
Wiemer, F.
2017, Article / Letter to editor (IACR Transactions on Symmetric Cryptology, vol. 2017, iss. 4, (2017), pp. 188-211)
On Exploring Research Methods for Business Information Security Alignment and Artefact Engineering
Bobbert, Y.
2017, Article / Letter to editor (International Journal of IT/Business Alignment and Governance (Ijitbag), vol. 8, iss. 2, (2017), pp. 28-41)
Fast revocation of attribute-based credentials for both users and verifiers
Lueks, W.
;
Alpár, G.
;
Hoepman, J.-H.
;
Vullers, P.
2017, Article / Letter to editor (Computers & Security, vol. 67, iss. June, (2017), pp. 308-323)
De vergoedbare schade bij de onrechtmatige verwerking van persoonsgegevens
Walree, T.F.
2017, Article / Letter to editor (Weekblad voor Privaatrecht, Notariaat en Registratie, vol. 148, iss. 7172, (2017), pp. 921-930)
Sustainability of bitcoin and blockchains
Vranken, H.P.E.
2017, Article / Letter to editor (Current Opinion in Environmental Sustainability, vol. 28, iss. Supplement C, (2017), pp. 1-9)
Constraint automata with memory cells and their composition
Jongmans, S.S.T.Q.
;
Kappé, T.
;
Arbab, F.
2017, Article / Letter to editor (Science of Computer Programming, vol. 146, (2017), pp. 50-86)
Quantum effect logic in cognition
Jacobs, B.
2017, Article / Letter to editor (Journal of Mathematical Psychology, vol. 81, iss. December, (2017), pp. 1-10)
Games for Bisimulation and Abstraction
de Frutos Escrig, D.
;
Keiren, J.J.A.
;
Willemse, T.A.C.
2017, Article / Letter to editor (Logical Methods in Computer Science, vol. 13, iss. 4, (2017), pp. 1-40)
Corrections to “A Menagerie of Timed Automata”
Keiren, J.J.A.
;
Fontana, P.
;
Cleaveland, R.
2017, Article / Letter to editor (ACM Computing Surveys, vol. 50, iss. 3, (2017), pp. 1-8)
An O(mlog n) Algorithm for Computing Stuttering Equivalence and Branching Bisimulation
Groote, J.F.
;
Jansen, D.N.
;
Keiren, J.J.A.
;
Wijs, A.J.
2017, Article / Letter to editor (ACM Transactions on Computational Logic, vol. 18, iss. 2, (2017), pp. 1-34)
Statman's Hierarchy Theorem
Westerbaan, B.
;
Westerbaan, Bas
;
Kuyper, R.
;
Tankink, C.
;
Viehoff, R.
;
Barendregt, H.
2017, Article / Letter to editor (Logical Methods in Computer Science, vol. 13, iss. 4, (2017), pp. 1-39)
CUBE ATTACK ON PRIMATES
Lukas, Kay
;
Daemen, J.
2017, Article / Letter to editor (Proceedings of the Romanian Academy Series A-Mathematics Physics Technical Sciences Information Science, vol. 18, (2017), pp. 293-305)
Completing the Complete ECC Formulae with Countermeasures
Chmielewski, Ł.
;
Massolino, P.
;
Vliegen, J.
;
Batina, L.
;
Mentens, N.
2017, Article / Letter to editor (Journal of Low Power Electronics and Applications, vol. 7, iss. 1, (2017), pp. 1-13)
Foundations of Secure Scaling: Report from Dagstuhl Seminar 16342
Batina, L.
;
Bhunia, S.
;
Schaumont, P.
2017, Article / Letter to editor (Dagstuhl Reports, vol. 6, iss. 8, (2017), pp. 65-90)
The representation of street art on Flickr. Studying reception with visual content analysis
Philipps, Axel
;
Zerr, Sergej
;
Herder, Eelco
2017, Article / Letter to editor (Visual Studies, vol. 32, iss. 4, (2017), pp. 382-393)
Law as an affordance: The Devil Is in the Vanishing Point(s)
Hildebrandt, M.
2017, Article / Letter to editor (Critical Analysis of Law, vol. 4, iss. 1, (2017), pp. 116-128)
Polymorphic Encryption and Pseudonymisation in Identity Management and Medical Research
Verheul, E.R.
;
Jacobs, B.
2017, Article / Letter to editor (Nieuw Archief voor Wiskunde, vol. 18, iss. 3, (2017), pp. 168-172)
Wiskunde in de cryptografie (Redactioneel)
Mennink, B.
;
Stevens, M
2017, Article / Letter to editor (Nieuw Archief voor Wiskunde, vol. 18, iss. 3, (2017), pp. 155)
De verjaardagsparadox in de cryptografie
Mennink, B.J.M.
2017, Article / Letter to editor (Nieuw Archief voor Wiskunde, vol. 18, iss. 3, (2017), pp. 190-194)
Efficient Length Doubling from Tweakable Block Ciphers
Chen, Y.L.
;
Luykx, A.
;
Mennink, B.J.M.
;
Preneel, B.
2017, Article / Letter to editor (IACR Transactions on Symmetric Cryptology, vol. 2017, iss. 3, (2017), pp. 253-270)
Optimal PRFs from Blockcipher Designs
Mennink, B.J.M.
;
Neves, S.
2017, Article / Letter to editor (IACR Transactions on Symmetric Cryptology, vol. 2017, iss. 3, (2017), pp. 228-252)
Understanding RUP Integrity of COLM
Datta, N.
;
Luykx, A.
;
Mennink, B.
;
Nandi, M.
2017, Article / Letter to editor (IACR Transactions on Symmetric Cryptology, vol. 2017, iss. 2, (2017), pp. 143-161)
A Survey of Authentication and Communications Security in Online Banking
Kiljan, S.
;
Simoens, K.
;
Cock, D.D.
;
Eekelen, M.C.J.D. van
;
Vranken, H.P.E.
2017, Article / Letter to editor (ACM Computing Surveys, vol. 49, iss. 4, (2017), pp. 1-35, article 61)
Now showing items 1-36 of 36
1
Export Results
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
50
100
150
200
Explore
Author
Hildebrandt, M. (5)
Mennink, B. (5)
Jacobs, B.P.F. (4)
... View More
Document type
Article / Letter to editor (36)
Date Issued
2017 (36)
Journal
IACR Transactions on Symmetric Cryptology (5)
Logical Methods in Computer Science (4)
Nieuw Archief voor Wiskunde (4)
... View More
Departments
Digital Security (36)
Security of Systems (5)
Intelligent Systems (1)
... View More
Browse
All of Repository
Collections
Departments
Date Issued
Authors
Titles
Document type