Engelbert Hubbers

Lecturer - Radboud University

Note that the gaps in this list are due to the fact that starting from 2005 I have been on a position that doesn't involve academic research. Sometimes I am involved in a research project, but most of my time is spent on teaching.

List of Publications

2021
  1. LPO Proofs in Two Educational Contexts (), SciTePress, . [bibtex] [pdf] [doi]
2013
  1. Blackboard Security Assessment (, , and ), Technical report ICIS-R13004, Institute for Computing and Information SciencesRadboud University Nijmegen, . [bibtex] [pdf]
2008
  1. Crossing Borders: Security and Privacy Issues of the European e-Passport (, , , and ), In CoRR, volume abs/0801.3930, . [bibtex] [pdf]
  2. Description and Analysis of the RIES Internet Voting System (, , , and ), Technical report EiPSI-0801, Eindhoven Institute for the Protection of Systems and Information, . [bibtex] [pdf]
2006
  1. Crossing Borders: Security and Privacy Issues of the European e-Passport (, , , and ), In Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings (Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura, eds.), Springer, volume 4266, . [bibtex] [pdf] [doi]
  2. The KOA Remote Voting System: A Summary of Work to Date (, , , , , and ), In Trustworthy Global Computing, Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papers (Ugo Montanari, Donald Sannella, Roberto Bruni, eds.), Springer, volume 4661, . [bibtex] [pdf] [doi]
  3. Formal techniques in a remote voting system (, , , and ), In ACM SIGSOFT Softw. Eng. Notes, volume 31, . [bibtex] [pdf] [doi]
2005
  1. RIES - Internet Voting in Action (, and ), In 29th Annual International Computer Software and Applications Conference, COMPSAC 2005, Edinburgh, Scotland, UK, July 25-28, 2005. Volume 1, IEEE Computer Society, . [bibtex] [url] [doi]
2004
  1. Counting Votes with Formal Methods (, , and ), In Algebraic Methodology and Software Technology, 10th International Conference, AMAST 2004, Stirling, Scotland, UK, July 12-16, 2004, Proceedings (Charles Rattray, Savi Maharaj, Carron Shankland, eds.), Springer, volume 3116, . [bibtex] [pdf] [doi]
  2. Reasoning about Card Tears and Transactions in Java Card ( and ), In Fundamental Approaches to Software Engineering, 7th International Conference, FASE 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004 Barcelona, Spain, March 29 - april 2, 2004, Proceedings (Michel Wermelinger, Tiziana Margaria, eds.), Springer, volume 2984, . [bibtex] [pdf] [doi]
  3. Implementing a Formally Verifiable Security Protocol in Java Card (, and ), In Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers (Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann, eds.), Springer, volume 2802, . [bibtex] [pdf] [doi]
  4. Transactions and non-atomic API calls in Java Card: specification ambiguity and strange implementation behaviours ( and ), Technical report R0438, University of Nijmegen, . [bibtex] [pdf]
2003
  1. Integrating Tools for Automatic Program Verification (), In Perspectives of Systems Informatics, 5th International Andrei Ershov Memorial Conference, PSI 2003, Akademgorodok, Novosibirsk, Russia, July 9-12, 2003, Revised Papers (Manfred Broy, Alexandre V. Zamulin, eds.), Springer, volume 2890, . [bibtex] [pdf] [doi]
  2. Generating JML Specifications from UML State Diagrams ( and ), In Forum on specification and Design Languages, FDL 2003, September 23-26, 2003, Frankfurt, Germany, Proceedings, ECSI, . [bibtex] [pdf]
  3. From Finite State Machines to Provably Correct Java Card Applets (, and ), In Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece (Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis K. Katsikas, eds.), Kluwer, volume 250, . [bibtex] [pdf]
  4. Reasoning about card tears and transactions in Java Card ( and ), Technical report R0322, University of Nijmegen, . [bibtex] [pdf]
2001
  1. Triangular factorizations of special polynomial automorphisms ( and ), In J. of Algebra, volume 235, . [bibtex] [pdf]
1999
  1. Pinchuk's 2-dimensional example paired to a cubic linear 1999-dimensional map (), . [bibtex] [pdf]
1998
  1. Nilpotent Jacobians (), PhD thesis, University of Nijmegen, . [bibtex] [pdf]
  2. A conference on Polynomial Maps and the Jacobian Conjecture. (In honour of the mathematical work of Gary Meisters), (E.-M.G.M. Hubbers, ed.), . [bibtex] [pdf]
  3. Stably tame automorphisms ( and ), Technical report 9817, University of Nijmegen, . [bibtex] [url]
1997
  1. A polynomial counterexample to the Markus-Yamabe Conjecture (, , , and ), In Advances in Mathematics, volume 131, . [bibtex] [pdf]
  2. A new class of invertible polynomial maps ( and ), In J. of Algebra, volume 187, . [bibtex] [pdf]
  3. Chaotic polynomial automorphisms; counterexamples to several conjectures ( and ), In Advances in Applied Mathematics, volume 18, . [bibtex] [pdf]
  4. \({{\cal D}_{n}(A)}\) for a class of polynomial automorphisms and stably tameness ( and ), In J. of Algebra, volume 192, . [bibtex] [pdf]
  5. Pinchuk's example (), . [bibtex]
  6. Cubic Similarity in dimension five (), In A conference on Polynomial maps and the Jacobian Conjecture. (In honour of the mathematical work of Gary Meisters) (E.-M.G.M. Hubbers, ed.), . [bibtex] [pdf]
  7. Differential and difference equations and computer algebra, (E.-M.G.M. Hubbers, ed.), . [bibtex] [pdf]
1996
  1. Polynomial maps with strongly nilpotent Jacobian matrix and the Jacobian Conjecture ( and ), In Linear Algebra and its Applications, volume 247, . [bibtex] [pdf]
  2. A new class of invertible polynomial maps ( and ), Technical report 9604, University of Nijmegen, volume 187, . [bibtex] [pdf]
  3. \({{\cal D}_{n}(A)}\) for polynomial automorphisms ( and ), Technical report 9614, University of Nijmegen, volume 192, . [bibtex] [pdf]
  4. Cubic similarity in dimension five (), Technical report 9638, University of Nijmegen, . [bibtex] [pdf]
1995
  1. A polynomial counterexample to the Markus-Yamabe Conjecture (, , , and ), Technical report 9551, University of Nijmegen, . [bibtex] [pdf]
  2. Chaotic polynomial automorphisms; counterexamples to several conjectures ( and ), Technical report 9549, University of Nijmegen, volume 18, . [bibtex] [pdf]
1994
  1. The Jacobian Conjecture: Cubic homogeneous maps in dimension four (), Master's thesis, University of Nijmegen, . [bibtex] [pdf]
  2. Polynomial maps with strongly nilpotent Jacobian matrix and the Jacobian Conjecture ( and ), Technical report 94.., University of Nijmegen, volume 247, . [bibtex] [pdf]
1992
  1. Default Ionic Logic: Its syntax and semantics, part I ( and ), Master's thesis, University of Nijmegen, . [bibtex]
  2. Default Ionic Logic: Its syntax and semantics, part II ( and ), Master's thesis, University of Nijmegen, . [bibtex]
  3. Default Ionic Logic: Its syntax and semantics, part I ( and ), Technical report IR-296, Free University Amsterdam, . [bibtex]
  4. Default Ionic Logic: Its syntax and semantics, part II ( and ), Technical report IR-297, Free University Amsterdam, . [bibtex]