2010 | ||
---|---|---|
52 | Gerben Broenink, Jaap-Henk Hoepman, Christian van 't Hof, Rob Van Kranenburg, David Smits, Tijmen Wisman: The Privacy Coach: Supporting customer privacy in the Internet of Things CoRR abs/1001.4459: (2010) | |
2009 | ||
51 | Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings Springer 2009 | |
50 | Lukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum: Client-Server Password Recovery. OTM Conferences (2) 2009: 861-878 | |
49 | Lukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum: Client-Server Password Recovery (Extended Abstract) CoRR abs/0906.4668: (2009) | |
48 | Jaap-Henk Hoepman, Rieks Joosten: Practical Schemes For Privacy & Security Enhanced RFID CoRR abs/0909.1257: (2009) | |
2008 | ||
47 | Lukasz Chmielewski, Jaap-Henk Hoepman: Fuzzy Private Matching (Extended Abstract). ARES 2008: 327-334 | |
46 | Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia: A Practical Attack on the MIFARE Classic. CARDIS 2008: 267-282 | |
45 | Lukasz Chmielewski, Richard Brinkman, Jaap-Henk Hoepman, Bert Bos: Using JASON to secure SOA. Middleware Security 2008: 13-18 | |
44 | Jaap-Henk Hoepman, Bart Jacobs: Increased security through open source CoRR abs/0801.3924: (2008) | |
43 | Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur: Crossing Borders: Security and Privacy Issues of the European e-Passport CoRR abs/0801.3930: (2008) | |
42 | Jaap-Henk Hoepman: Distributed Double Spending Prevention CoRR abs/0802.0832: (2008) | |
41 | Jaap-Henk Hoepman: The Ephemeral Pairing Problem CoRR abs/0802.0834: (2008) | |
40 | Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia: A Practical Attack on the MIFARE Classic CoRR abs/0803.2285: (2008) | |
39 | Jaap-Henk Hoepman: Private Handshakes CoRR abs/0804.0074: (2008) | |
2007 | ||
38 | Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: From Security to Dependability, 10.09. - 15.09.2006 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 | |
37 | Jaap-Henk Hoepman: Private Handshakes. ESAS 2007: 31-42 | |
36 | Jaap-Henk Hoepman, Geert Kleinhuis: Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart Card. EuroPKI 2007: 236-247 | |
35 | Jaap-Henk Hoepman, Andreas Larsson, Elad Michael Schiller, Philippas Tsigas: Secure and Self-stabilizing Clock Synchronization in Sensor Networks. SSS 2007: 340-356 | |
34 | Lukasz Chmielewski, Jaap-Henk Hoepman: Fuzzy Private Matching (Extended Abstract) CoRR abs/0710.5425: (2007) | |
33 | Jaap-Henk Hoepman, Bart Jacobs: Increased security through open source. Commun. ACM 50(1): 79-83 (2007) | |
2006 | ||
32 | Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Abstracts Collection -- From Security to Dependability. From Security to Dependability 2006 | |
31 | Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Executive Summary -- From Security to Dependability. From Security to Dependability 2006 | |
30 | Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur: Crossing Borders: Security and Privacy Issues of the European e-Passport. IWSEC 2006: 152-167 | |
29 | Ricardo Corin, David Galindo, Jaap-Henk Hoepman: Securing Data Accountability in Decentralized Systems. OTM Workshops (1) 2006: 626-635 | |
28 | Jaap-Henk Hoepman, Shay Kutten, Zvi Lotker: Efficient Distributed Weighted Matchings on Trees. SIROCCO 2006: 115-129 | |
2005 | ||
27 | Flavio D. Garcia, Jaap-Henk Hoepman: Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. ACNS 2005: 364-377 | |
26 | Jaap-Henk Hoepman: Ephemeral Pairing on Anonymous Networks. SPC 2005: 101-116 | |
25 | Wan Fokkink, Jaap-Henk Hoepman, Jun Pang: A Note on K-State Self-stabilization in a Ring with K=N. Nord. J. Comput. 12(1): 18-26 (2005) | |
2004 | ||
24 | Jaap-Henk Hoepman: The Ephemeral Pairing Problem. Financial Cryptography 2004: 212-226 | |
23 | Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Nieuwenhuizen: Spam Filter Analysis. SEC 2004: 395-410 | |
22 | Flavio D. Garcia, Jaap-Henk Hoepman: Spam filter analysis CoRR cs.CR/0402046: (2004) | |
21 | Jaap-Henk Hoepman: Simple Distributed Weighted Matchings CoRR cs.DC/0410047: (2004) | |
2003 | ||
20 | Jaap-Henk Hoepman: Splitters: Objects for Online Partitioning. OPODIS 2003: 47-57 | |
19 | Jaap-Henk Hoepman: Security, Fault-Tolerance and their Verification for Ambient Systems. SEC 2003: 441-446 | |
2002 | ||
18 | Richard Brinkman, Jaap-Henk Hoepman: Secure Method Invocation in JASON. CARDIS 2002: 29-40 | |
17 | Jaap-Henk Hoepman, Marina Papatriantafilou, Philippas Tsigas: Self-Stabilization of Wait-Free Shared Memory Objects. J. Parallel Distrib. Comput. 62(5): 818-842 (2002) | |
2001 | ||
16 | Jaap-Henk Hoepman: Randomised Mutual Search for k>2 Agents. DISC 2001: 180-193 | |
15 | Jaap-Henk Hoepman: Can an operation both update the state and return a meaningful value in the asynchronous PRAM model? Inf. Process. Lett. 79(4): 161-166 (2001) | |
2000 | ||
14 | Jaap-Henk Hoepman: Secret Key Authentication with Software-Only Verification. Financial Cryptography 2000: 313-326 | |
1999 | ||
13 | Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi: Space-Efficient Routing Tables for Almost All Networks and the Incompressibility Method CoRR cs.DC/9903009: (1999) | |
12 | Jaap-Henk Hoepman: Self-stabilizing mutual exclusion on a ring, even if K=N CoRR cs.DC/9909013: (1999) | |
11 | Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi: Mutual Search CoRR cs.DS/9902005: (1999) | |
10 | Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi: Mutual Search. J. ACM 46(4): 517-536 (1999) | |
9 | Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi: Space-efficient Routing Tables for Almost All Networks and the Incompressibility Method. SIAM J. Comput. 28(4): 1414-1432 (1999) | |
1998 | ||
8 | Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi: Mutual Search (Extended Abstract). SODA 1998: 481-489 | |
7 | Jaap-Henk Hoepman: Self-Stabilizing Ring-Orientation Using Constant Space. Inf. Comput. 144(1): 18-39 (1998) | |
1996 | ||
6 | Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi: Optimal Routing Tables. PODC 1996: 134-142 | |
1995 | ||
5 | Harry Buhrman, Juan A. Garay, Jaap-Henk Hoepman: Optimal Resiliency against Mobile Faults. FTCS 1995: 83-88 | |
4 | Harry Buhrman, Juan A. Garay, Jaap-Henk Hoepman, Mark Moir: Long-Lived Renaming Made Fast. PODC 1995: 194-203 | |
3 | Jaap-Henk Hoepman, Marina Papatriantafilou, Philippas Tsigas: Self-Stabilization of Wait-Free Shared Memory Objects. WDAG 1995: 273-287 | |
1994 | ||
2 | Jaap-Henk Hoepman: Uniform Deterministic Self-Stabilizing Ring-Orientation on Odd-Length Rings. WDAG 1994: 265-279 | |
1993 | ||
1 | Jaap-Henk Hoepman, John Tromp: Binary Snapshots. WDAG 1993: 18-25 |