Wouter Teepe
University of Groningen
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Wouter Teepe.
Journal of Computer Security | 2003
Wouter Teepe; Reind P. van de Riet; Martin S. Olivier
When companies interchange information about individuals, privacy is at stake. On the basis of the purpose of the information interchange, rules can be designed for an agent (Alter-ego) to determine whether the requested information can be provided. This purpose can be derived from a WorkFlow specification according to which employees (agents) of one company are executing their tasks. Direct information flow as well as information which might flow through private and covert channels is considered.
Autonomous Agents and Multi-Agent Systems | 2009
Wouter Teepe
BAN logic, an epistemic logic for analyzing security protocols, contains an unjustifiable inference rule. The inference rule assumes that possession of H(X) (i.e., the cryptographic hash value of X) counts as a proof of possession of X, which is not the case. As a result, BAN logic exhibits a problematic property, which is similar to unsoundness, but not strictly equivalent to it. We will call this property ‘unsoundness’ (with quotes). The property is demonstrated using a specially crafted protocol, the two parrots protocol. The ‘unsoundness’ is proven using the partial semantics which is given for BAN logic. Because of the questionable character of the semantics of BAN logic, we also provide an alternative proof of ‘unsoundness’ which we consider more important.
Synthese | 2006
Wouter Teepe
This paper introduces and describes new protocols for proving knowledge of secrets without giving them away: if the verifier does not know the secret, he does not learn it. This can all be done while only using one-way hash functions. If also the use of encryption is allowed, these goals can be reached in a more efficient way. We extend and use the GNY authentication logic to prove correctness of these protocols.
New Media & Society | 2007
Marc Hooghe; Wouter Teepe
Archive | 2008
Ronny Wichers Schreur; Peter van Rossum; Flavio D. Garcia; Wouter Teepe; Bart Jacobs; Gerhard de Koning Gans; Roel Verdult; Ruben Muijrers; Ravindra Kali; Vinesh Kali
Archive | 2005
Wouter Teepe
Computer Systems: Science & Engineering | 2005
Wouter Teepe
Siam Journal on Control and Optimization | 2009
Francien Dechesne; van Jan Eijck; Wouter Teepe; Yanjing Wang
Discourses on Social Software | 2009
F Francien Dechesne; J van Eijck; Wouter Teepe; Yanjing Wang
Archive | 2005
Wouter Teepe