Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wouter Teepe is active.

Publication


Featured researches published by Wouter Teepe.


Journal of Computer Security | 2003

Workflow analyzed for security and privacy in using databases

Wouter Teepe; Reind P. van de Riet; Martin S. Olivier

When companies interchange information about individuals, privacy is at stake. On the basis of the purpose of the information interchange, rules can be designed for an agent (Alter-ego) to determine whether the requested information can be provided. This purpose can be derived from a WorkFlow specification according to which employees (agents) of one company are executing their tasks. Direct information flow as well as information which might flow through private and covert channels is considered.


Autonomous Agents and Multi-Agent Systems | 2009

On BAN logic and hash functions or: how an unjustified inference rule causes problems

Wouter Teepe

BAN logic, an epistemic logic for analyzing security protocols, contains an unjustifiable inference rule. The inference rule assumes that possession of H(X) (i.e., the cryptographic hash value of X) counts as a proof of possession of X, which is not the case. As a result, BAN logic exhibits a problematic property, which is similar to unsoundness, but not strictly equivalent to it. We will call this property ‘unsoundness’ (with quotes). The property is demonstrated using a specially crafted protocol, the two parrots protocol. The ‘unsoundness’ is proven using the partial semantics which is given for BAN logic. Because of the questionable character of the semantics of BAN logic, we also provide an alternative proof of ‘unsoundness’ which we consider more important.


Synthese | 2006

Proving Possession of Arbitrary Secrets While not Giving Them Away. New Protocols and a Proof in GNY Logic.

Wouter Teepe

This paper introduces and describes new protocols for proving knowledge of secrets without giving them away: if the verifier does not know the secret, he does not learn it. This can all be done while only using one-way hash functions. If also the use of encryption is allowed, these goals can be reached in a more efficient way. We extend and use the GNY authentication logic to prove correctness of these protocols.


New Media & Society | 2007

Party profiles on the web: an analysis of the logfiles of non-partisan interactive political internet sites in the 2003 and 2004 election campaigns in Belgium:

Marc Hooghe; Wouter Teepe


Archive | 2008

Security Flaw in MIFARE Classic

Ronny Wichers Schreur; Peter van Rossum; Flavio D. Garcia; Wouter Teepe; Bart Jacobs; Gerhard de Koning Gans; Roel Verdult; Ruben Muijrers; Ravindra Kali; Vinesh Kali


Archive | 2005

New Protocols for Proving Knowledge of Arbitrary Secrets While not Giving Them Away

Wouter Teepe


Computer Systems: Science & Engineering | 2005

Integrity and dissemination control in administrative applications through information designators

Wouter Teepe


Siam Journal on Control and Optimization | 2009

What is Protocol Analysis

Francien Dechesne; van Jan Eijck; Wouter Teepe; Yanjing Wang


Discourses on Social Software | 2009

Dynamic epistemic logic for protocol analysis

F Francien Dechesne; J van Eijck; Wouter Teepe; Yanjing Wang


Archive | 2005

The Secret Prover

Wouter Teepe

Collaboration


Dive into the Wouter Teepe's collaboration.

Top Co-Authors

Avatar

Bart Jacobs

Radboud University Nijmegen

View shared research outputs
Top Co-Authors

Avatar

Marc Hooghe

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eric R. Verheul

Radboud University Nijmegen

View shared research outputs
Top Co-Authors

Avatar

Francien Dechesne

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Peter van Rossum

Radboud University Nijmegen

View shared research outputs
Researchain Logo
Decentralizing Knowledge