Jm Jan Smits
Eindhoven University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jm Jan Smits.
Telecommunications Policy | 2002
Rna Rudi Bekkers; Bart Verspagen; Jm Jan Smits
This paper investigates the role ofintellectual property rights (IPRs) in the process ofstandardization in the telecommunications industry. We take the global system for mobile communications (GSM) case as a highly relevant example, being part ofa high-tech industry in which standards play a large role. In the process ofdesigning the GSM standard, a lot ofattention has been given to IPRs, mainly to avoid a situation in which a single IPR holder could hamper or even totally block the development ofthe standard. Nevertheless, the ultimate GSM standard contains a large amount ofso-called ‘essential IPRs’, i.e., IPRs without which the implementation ofGSM products is impossible. The paper provides a general discussion ofthe development ofGSM and presents a database on the essential IPRs in the GSM standard. This database has been compiled on the basis ofinternational patent statistics, and the data that manufacturers have supplied to European Telecommunications Standards Institute, the European standardization body responsible for defining the GSM standard. We use this database to assess the dynamic IPR position offirms in the original GSM standard and its subsequent development.
Archive | 2002
Bart De Decker; Frank Piessens; Jm Jan Smits; Els Van Herreweghen
In this paper, we define a language for specifying security protocols concisely and unambiguously. We use this language to formally specify the protocol for payment transactions in Secure Electronic Transaction (SET), which has been developed by Visa and MasterCard. In our language, a protocol is specified as a collection of processes. Each process expresses the role of a participant. In the role-based specification, the components that a participant sees in a message can be stated explicitly. This is important in specifying protocols like that for the SET payment transactions because in such protocols some message components are encrypted and invisible to some participants. We simplify the SET payment transaction protocol into the exchanges of six messages. Because our future goal is to formally analyze the security properties that Meadows and Syverson discussed, we make the simplified protocol contain the parameters used in their security properties. And we also refrain from excessive simplification. For example, we use dual signature in the payment request message as it is specified in the SET specification books, while most of the other works do not use it. Our specification can serve as a starting point for a formal analysis of the protocol.
Archive | 2017
Bart De Decker; Frank Piessens; Jm Jan Smits; Els Van Herreweghen
Erratum to: B. De Decker et al. (Eds.) Advances in Network and Distributed Systems Security DOI: 10.1007/978-0-306-46958-9
Archive | 1999
Ronald de Bruin; Jm Jan Smits
Archive | 1999
Rna Rudi Bekkers; Jm Jan Smits
Archive | 2014
Rna Rudi Bekkers; L Birkman; Canoy; P. de Bas; Wolter Lemstra; Yann Ménière; I Sainz; N. van Gorp; Bart Voogt; R Zeldenrust; Zo Önder Nomaler; Justus Baron; Tim Pohlmann; Arianna Martinelli; Jm Jan Smits; A Verbeek
Archive | 1995
Jm Jan Smits; Rna Rudi Bekkers
Network Security | 2013
Bart De Decker; Frank Piessens; Jm Jan Smits; Els Van Herreweghen
Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security | 2001
Bart De Decker; Frank Piessens; Jm Jan Smits; Els Van Herreweghen
Mobiele telecommunicatie. Dossiers | 1999
Rna Rudi Bekkers; Jm Jan Smits