![]() | 2010 | |
---|---|---|
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Gerben Broenink, Jaap-Henk Hoepman, Christian van 't Hof, Rob Van Kranenburg, David Smits, Tijmen Wisman: The Privacy Coach: Supporting customer privacy in the Internet of Things CoRR abs/1001.4459: (2010) |
2009 | ||
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings Springer 2009 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Lukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum: Client-Server Password Recovery. OTM Conferences (2) 2009: 861-878 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Lukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum: Client-Server Password Recovery (Extended Abstract) CoRR abs/0906.4668: (2009) |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman, Rieks Joosten: Practical Schemes For Privacy & Security Enhanced RFID CoRR abs/0909.1257: (2009) |
2008 | ||
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Lukasz Chmielewski, Jaap-Henk Hoepman: Fuzzy Private Matching (Extended Abstract). ARES 2008: 327-334 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia: A Practical Attack on the MIFARE Classic. CARDIS 2008: 267-282 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Lukasz Chmielewski, Richard Brinkman, Jaap-Henk Hoepman, Bert Bos: Using JASON to secure SOA. Middleware Security 2008: 13-18 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman, Bart Jacobs: Increased security through open source CoRR abs/0801.3924: (2008) |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur: Crossing Borders: Security and Privacy Issues of the European e-Passport CoRR abs/0801.3930: (2008) |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Distributed Double Spending Prevention CoRR abs/0802.0832: (2008) |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: The Ephemeral Pairing Problem CoRR abs/0802.0834: (2008) |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia: A Practical Attack on the MIFARE Classic CoRR abs/0803.2285: (2008) |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Private Handshakes CoRR abs/0804.0074: (2008) |
2007 | ||
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: From Security to Dependability, 10.09. - 15.09.2006 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Private Handshakes. ESAS 2007: 31-42 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman, Geert Kleinhuis: Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart Card. EuroPKI 2007: 236-247 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman, Andreas Larsson, Elad Michael Schiller, Philippas Tsigas: Secure and Self-stabilizing Clock Synchronization in Sensor Networks. SSS 2007: 340-356 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Lukasz Chmielewski, Jaap-Henk Hoepman: Fuzzy Private Matching (Extended Abstract) CoRR abs/0710.5425: (2007) |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman, Bart Jacobs: Increased security through open source. Commun. ACM 50(1): 79-83 (2007) |
2006 | ||
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Abstracts Collection -- From Security to Dependability. From Security to Dependability 2006 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Executive Summary -- From Security to Dependability. From Security to Dependability 2006 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur: Crossing Borders: Security and Privacy Issues of the European e-Passport. IWSEC 2006: 152-167 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Ricardo Corin, David Galindo, Jaap-Henk Hoepman: Securing Data Accountability in Decentralized Systems. OTM Workshops (1) 2006: 626-635 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman, Shay Kutten, Zvi Lotker: Efficient Distributed Weighted Matchings on Trees. SIROCCO 2006: 115-129 |
2005 | ||
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Flavio D. Garcia, Jaap-Henk Hoepman: Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. ACNS 2005: 364-377 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Ephemeral Pairing on Anonymous Networks. SPC 2005: 101-116 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Wan Fokkink, Jaap-Henk Hoepman, Jun Pang: A Note on K-State Self-stabilization in a Ring with K=N. Nord. J. Comput. 12(1): 18-26 (2005) |
2004 | ||
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: The Ephemeral Pairing Problem. Financial Cryptography 2004: 212-226 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Nieuwenhuizen: Spam Filter Analysis. SEC 2004: 395-410 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Flavio D. Garcia, Jaap-Henk Hoepman: Spam filter analysis CoRR cs.CR/0402046: (2004) |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Simple Distributed Weighted Matchings CoRR cs.DC/0410047: (2004) |
2003 | ||
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Splitters: Objects for Online Partitioning. OPODIS 2003: 47-57 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Security, Fault-Tolerance and their Verification for Ambient Systems. SEC 2003: 441-446 |
2002 | ||
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Richard Brinkman, Jaap-Henk Hoepman: Secure Method Invocation in JASON. CARDIS 2002: 29-40 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman, Marina Papatriantafilou, Philippas Tsigas: Self-Stabilization of Wait-Free Shared Memory Objects. J. Parallel Distrib. Comput. 62(5): 818-842 (2002) |
2001 | ||
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Randomised Mutual Search for k>2 Agents. DISC 2001: 180-193 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Can an operation both update the state and return a meaningful value in the asynchronous PRAM model? Inf. Process. Lett. 79(4): 161-166 (2001) |
2000 | ||
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Secret Key Authentication with Software-Only Verification. Financial Cryptography 2000: 313-326 |
1999 | ||
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi: Space-Efficient Routing Tables for Almost All Networks and the Incompressibility Method CoRR cs.DC/9903009: (1999) |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Self-stabilizing mutual exclusion on a ring, even if K=N CoRR cs.DC/9909013: (1999) |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi: Mutual Search CoRR cs.DS/9902005: (1999) |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi: Mutual Search. J. ACM 46(4): 517-536 (1999) |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi: Space-efficient Routing Tables for Almost All Networks and the Incompressibility Method. SIAM J. Comput. 28(4): 1414-1432 (1999) |
1998 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi: Mutual Search (Extended Abstract). SODA 1998: 481-489 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Self-Stabilizing Ring-Orientation Using Constant Space. Inf. Comput. 144(1): 18-39 (1998) |
1996 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi: Optimal Routing Tables. PODC 1996: 134-142 |
1995 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Harry Buhrman, Juan A. Garay, Jaap-Henk Hoepman: Optimal Resiliency against Mobile Faults. FTCS 1995: 83-88 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Harry Buhrman, Juan A. Garay, Jaap-Henk Hoepman, Mark Moir: Long-Lived Renaming Made Fast. PODC 1995: 194-203 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman, Marina Papatriantafilou, Philippas Tsigas: Self-Stabilization of Wait-Free Shared Memory Objects. WDAG 1995: 273-287 |
1994 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman: Uniform Deterministic Self-Stabilizing Ring-Orientation on Odd-Length Rings. WDAG 1994: 265-279 |
1993 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Jaap-Henk Hoepman, John Tromp: Binary Snapshots. WDAG 1993: 18-25 |