Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jeroen Doumen
@article{DBLP:journals/ejisec/VeugenDEPVW17, author = {Thijs Veugen and Jeroen Doumen and Zekeriya Erkin and Gaetano Pellegrino and Sicco Verwer and Jos H. Weber}, title = {Improved privacy of dynamic group services}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {3}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0054-7}, doi = {10.1186/S13635-017-0054-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/VeugenDEPVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/OosterwijkSD15, author = {Jan{-}Jaap Oosterwijk and Boris Skoric and Jeroen Doumen}, title = {A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {61}, number = {7}, pages = {3882--3900}, year = {2015}, url = {https://doi.org/10.1109/TIT.2015.2428250}, doi = {10.1109/TIT.2015.2428250}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/OosterwijkSD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccel/JarnikovHAD14, author = {Dmitri Jarnikov and Erik Hietbrink and Mark Arana and Jeroen M. Doumen}, title = {A watermarking system for adaptive streaming}, booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2014, Las Vegas, NV, USA, January 10-13, 2014}, pages = {375--377}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICCE.2014.6776048}, doi = {10.1109/ICCE.2014.6776048}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iccel/JarnikovHAD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mediaforensics/OosterwijkDL14, author = {Jan{-}Jaap Oosterwijk and Jeroen Doumen and Thijs Laarhoven}, editor = {Adnan M. Alattar and Nasir D. Memon and Chad Heitzenrater}, title = {Tuple decoders for traitor tracing schemes}, booktitle = {Media Watermarking, Security, and Forensics 2014, San Francisco, CA, USA, February 2, 2014, Proceedings}, series = {{SPIE} Proceedings}, volume = {9028}, pages = {90280C}, publisher = {{SPIE}}, year = {2014}, url = {https://doi.org/10.1117/12.2037659}, doi = {10.1117/12.2037659}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mediaforensics/OosterwijkDL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OosterwijkDL14, author = {Jan{-}Jaap Oosterwijk and Jeroen Doumen and Thijs Laarhoven}, title = {Tuple decoders for traitor tracing schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2014}, url = {http://eprint.iacr.org/2014/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OosterwijkDL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LaarhovenDRSW13, author = {Thijs Laarhoven and Jeroen Doumen and Peter Roelse and Boris Skoric and Benne de Weger}, title = {Dynamic Tardos Traitor Tracing Schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {59}, number = {7}, pages = {4230--4242}, year = {2013}, url = {https://doi.org/10.1109/TIT.2013.2251756}, doi = {10.1109/TIT.2013.2251756}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LaarhovenDRSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/OosterwijkSD13, author = {Jan{-}Jaap Oosterwijk and Boris Skoric and Jeroen Doumen}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Optimal suspicion functions for tardos traitor tracing schemes}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {19--28}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482527}, doi = {10.1145/2482513.2482527}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/OosterwijkSD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/SkoricOD13, author = {Boris Skoric and Jan{-}Jaap Oosterwijk and Jeroen Doumen}, title = {The holey grail {A} special score function for non-binary traitor tracing}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {180--185}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707815}, doi = {10.1109/WIFS.2013.6707815}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/SkoricOD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OosterwijkSD13, author = {Jan{-}Jaap Oosterwijk and Boris Skoric and Jeroen Doumen}, title = {Optimal Suspicion Functions for Tardos Traitor Tracing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2013}, url = {http://eprint.iacr.org/2013/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OosterwijkSD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OosterwijkSD13a, author = {Jan{-}Jaap Oosterwijk and Boris Skoric and Jeroen Doumen}, title = {A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2013}, url = {http://eprint.iacr.org/2013/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OosterwijkSD13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SkoricOD13, author = {Boris Skoric and Jan{-}Jaap Oosterwijk and Jeroen Doumen}, title = {The Holey Grail: {A} special score function for non-binary traitor tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2013}, url = {http://eprint.iacr.org/2013/420}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SkoricOD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccel/JarnikovWD12, author = {Dmitri Jarnikov and Egbert Westerveld and Jeroen M. Doumen}, title = {Session-based watermarking in live {IPTV} environment}, booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2012, Las Vegas, NV, USA, January 13-16, 2012}, pages = {650--653}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICCE.2012.6162014}, doi = {10.1109/ICCE.2012.6162014}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iccel/JarnikovWD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BernsteinDLO12, author = {Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan{-}Jaap Oosterwijk}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Faster Batch Forgery Identification}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {454--473}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_26}, doi = {10.1007/978-3-642-34931-7\_26}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BernsteinDLO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/LaarhovenOD12, author = {Thijs Laarhoven and Jan{-}Jaap Oosterwijk and Jeroen Doumen}, title = {Dynamic traitor tracing for arbitrary alphabets: Divide and conquer}, booktitle = {2012 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012}, pages = {240--245}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/WIFS.2012.6412656}, doi = {10.1109/WIFS.2012.6412656}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/LaarhovenOD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1206-6720, author = {Thijs Laarhoven and Jan{-}Jaap Oosterwijk and Jeroen Doumen}, title = {Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer}, journal = {CoRR}, volume = {abs/1206.6720}, year = {2012}, url = {http://arxiv.org/abs/1206.6720}, eprinttype = {arXiv}, eprint = {1206.6720}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1206-6720.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinDLO12, author = {Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan{-}Jaap Oosterwijk}, title = {Faster batch forgery identification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {549}, year = {2012}, url = {http://eprint.iacr.org/2012/549}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinDLO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/JarnikovD11, author = {Dmitri Jarnikov and Jeroen Doumen}, editor = {Willem Jonker and Milan Petkovic}, title = {Watermarking for Adaptive Streaming Protocols}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {101--113}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_7}, doi = {10.1007/978-3-642-23556-6\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/JarnikovD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-3597, author = {Thijs Laarhoven and Jeroen Doumen and Peter Roelse and Boris Skoric and Benne de Weger}, title = {Dynamic Tardos Traitor Tracing Schemes}, journal = {CoRR}, volume = {abs/1111.3597}, year = {2011}, url = {http://arxiv.org/abs/1111.3597}, eprinttype = {arXiv}, eprint = {1111.3597}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-3597.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BuhanDHTV10, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel and Qiang Tang and Raymond N. J. Veldhuis}, title = {Embedding renewable cryptographic keys into noisy data}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {3}, pages = {193--208}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0103-4}, doi = {10.1007/S10207-010-0103-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BuhanDHTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/CiordasD10, author = {Calin Ciordas and Jeroen Doumen}, title = {An Evaluation Framework for Content Recommender Systems The Industry Perspective}, booktitle = {Proceedings of the 2010 {IEEE/WIC/ACM} International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31 - September 3, 2010}, pages = {273--277}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/WI-IAT.2010.279}, doi = {10.1109/WI-IAT.2010.279}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/CiordasD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/LiesdonkSDHJ10, author = {Peter van Liesdonk and Saeed Sedghi and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Computationally Efficient Searchable Symmetric Encryption}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {87--100}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_7}, doi = {10.1007/978-3-642-15546-8\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/LiesdonkSDHJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BuhanBDHV09, author = {Ileana Buhan and Bas Boom and Jeroen Doumen and Pieter H. Hartel and Raymond N. J. Veldhuis}, title = {Secure pairing with biometrics}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {27--42}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023424}, doi = {10.1504/IJSN.2009.023424}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BuhanBDHV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/LawPHDHH09, author = {Yee Wei Law and Marimuthu Palaniswami and Lodewijk van Hoesel and Jeroen Doumen and Pieter H. Hartel and Paul J. M. Havinga}, title = {Energy-efficient link-layer jamming attacks against wireless sensor network {MAC} protocols}, journal = {{ACM} Trans. Sens. Networks}, volume = {5}, number = {1}, pages = {6:1--6:38}, year = {2009}, url = {https://doi.org/10.1145/1464420.1464426}, doi = {10.1145/1464420.1464426}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/LawPHDHH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuhanDH09, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel}, title = {Fuzzy extractors for continuous distributions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2009}, url = {http://eprint.iacr.org/2009/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BuhanDH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/BuhanDH08, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel}, title = {Controlling leakage of biometric information using dithering}, booktitle = {2008 16th European Signal Processing Conference, {EUSIPCO} 2008, Lausanne, Switzerland, August 25-29, 2008}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://ieeexplore.ieee.org/document/7080711/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/BuhanDH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/BuhanDHTV08, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel and Qiang Tang and Raymond N. J. Veldhuis}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Embedding Renewable Cryptographic Keys into Continuous Noisy Data}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {294--310}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_20}, doi = {10.1007/978-3-540-88625-9\_20}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/BuhanDHTV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SedghiDHJ08, author = {Saeed Sedghi and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Towards an Information Theoretic Analysis of Searchable Encryption}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {345--360}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_23}, doi = {10.1007/978-3-540-88625-9\_23}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/SedghiDHJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/CzenkoDE08, author = {Marcin Czenko and Jeroen Doumen and Sandro Etalle}, editor = {Y{\"{u}}cel Karabulut and John Mitchell and Peter Herrmann and Christian Damsgaard Jensen}, title = {Trust Management in {P2P} Systems Using Standard TuLiP}, booktitle = {Trust Management {II} - Proceedings of {IFIPTM} 2008: Joint iTrust and {PST} Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {263}, pages = {1--16}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09428-1\_1}, doi = {10.1007/978-0-387-09428-1\_1}, timestamp = {Fri, 09 Apr 2021 18:43:37 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/CzenkoDE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/AlvisiDGKLRT07, author = {Lorenzo Alvisi and Jeroen Doumen and Rachid Guerraoui and Boris Koldehofe and Harry C. Li and Robbert van Renesse and Gilles Tr{\'{e}}dan}, title = {How robust are gossip-based communication protocols?}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {41}, number = {5}, pages = {14--18}, year = {2007}, url = {https://doi.org/10.1145/1317379.1317383}, doi = {10.1145/1317379.1317383}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigops/AlvisiDGKLRT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BuhanDHV07, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel and Raymond N. J. Veldhuis}, editor = {Feng Bao and Steven Miller}, title = {Fuzzy extractors for continuous distributions}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {353--355}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229325}, doi = {10.1145/1229285.1229325}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BuhanDHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/BuhanDHV07, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel and Raymond N. J. Veldhuis}, editor = {Seong{-}Whan Lee and Stan Z. Li}, title = {Feeling Is Believing: {A} Secure Template Exchange Protocol}, booktitle = {Advances in Biometrics, International Conference, {ICB} 2007, Seoul, Korea, August 27-29, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4642}, pages = {897--906}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74549-5\_94}, doi = {10.1007/978-3-540-74549-5\_94}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/icb/BuhanDHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/ChongCDEHLT06, author = {Cheun Ngen Chong and Ricardo Corin and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Yee Wei Law and Andrew Tokmakoff}, title = {LicenseScript: a logical language for digital rights management}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {61}, number = {3-4}, pages = {284--331}, year = {2006}, url = {https://doi.org/10.1007/BF03219910}, doi = {10.1007/BF03219910}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/ChongCDEHLT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/LawDH06, author = {Yee Wei Law and Jeroen Doumen and Pieter H. Hartel}, title = {Survey and benchmark of block ciphers for wireless sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {2}, number = {1}, pages = {65--93}, year = {2006}, url = {https://doi.org/10.1145/1138127.1138130}, doi = {10.1145/1138127.1138130}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/LawDH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/LawHDH05, author = {Yee Wei Law and Lodewijk van Hoesel and Jeroen Doumen and Pieter H. Hartel and Paul J. M. Havinga}, editor = {Vijay Atluri and Peng Ning and Wenliang Du}, title = {Energy-efficient link-layer jamming attacks against wireless sensor network {MAC} protocols}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {76--88}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102219.1102234}, doi = {10.1145/1102219.1102234}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/LawHDH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BrinkmanSDJ05, author = {Richard Brinkman and Berry Schoenmakers and Jeroen Doumen and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Experiments with Queries over Encrypted Data Using Secret Sharing}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {33--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_3}, doi = {10.1007/11552338\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BrinkmanSDJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ChengCDEHN05, author = {Jieyin Cheng and Cheun Ngen Chong and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Stefan Nikolaus}, editor = {Ry{\^{o}}ichi Sasaki and Sihan Qing and Eiji Okamoto and Hiroshi Yoshiura}, title = {StreamTo: Streaming Content using a Tamper-Resistant Token}, booktitle = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11} 20th International Conference on Information Security {(SEC} 2005), May 30 - June 1, 2005, Chiba, Japan}, series = {{IFIP}}, volume = {181}, pages = {601--612}, publisher = {Springer}, year = {2005}, timestamp = {Fri, 19 May 2017 01:25:10 +0200}, biburl = {https://dblp.org/rec/conf/sec/ChengCDEHN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CzenkoTDEHH06, author = {Marcin Czenko and Ha Tran and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Jerry den Hartog}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Nonmonotonic Trust Management for {P2P} Applications}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {113--130}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.037}, doi = {10.1016/J.ENTCS.2005.09.037}, timestamp = {Fri, 20 Jan 2023 11:50:26 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CzenkoTDEHH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0510061, author = {Marcin Czenko and Ha Tran and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Jerry den Hartog}, title = {Nonmonotonic Trust Management for {P2P} Applications}, journal = {CoRR}, volume = {abs/cs/0510061}, year = {2005}, url = {http://arxiv.org/abs/cs/0510061}, eprinttype = {arXiv}, eprint = {cs/0510061}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0510061.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BrinkmanFDHJ04, author = {Richard Brinkman and Ling Feng and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, title = {Efficient Tree Search in Encrypted Data}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {3}, pages = {14--21}, year = {2004}, url = {https://doi.org/10.1201/1086/44530.13.3.20040701/83065.3}, doi = {10.1201/1086/44530.13.3.20040701/83065.3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/BrinkmanFDHJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/LawDH04, author = {Yee Wei Law and Jeroen Doumen and Pieter H. Hartel}, title = {Benchmarking block ciphers for wireless sensor networks}, booktitle = {2004 {IEEE} International Conference on Mobile Ad-hoc and Sensor Systems, Fort Lauderdale, FL, USA, October 25-27, 2004}, pages = {447--456}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/MAHSS.2004.1392185}, doi = {10.1109/MAHSS.2004.1392185}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/LawDH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BrinkmanDJ04, author = {Richard Brinkman and Jeroen Doumen and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Using Secret Sharing for Searching in Encrypted Data}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {18--27}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_2}, doi = {10.1007/978-3-540-30073-1\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BrinkmanDJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/BrinkmanFDHJ04, author = {Richard Brinkman and Ling Feng and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and L. Javier Garc{\'{\i}}a{-}Villalba}, title = {Efficient Tree Search in Encrypted Data}, booktitle = {Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction with {ICEIS} 2004, Porto, Portugal, April 2004}, pages = {126--135}, publisher = {{INSTICC} Press}, year = {2004}, timestamp = {Tue, 14 Sep 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sis/BrinkmanFDHJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChongRDEHC04, author = {Cheun Ngen Chong and Bin Ren and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Ricardo Corin}, editor = {Chae Hoon Lim and Moti Yung}, title = {License Protection with a Tamper-Resistant Token}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {223--237}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_19}, doi = {10.1007/978-3-540-31815-6\_19}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChongRDEHC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CorinDE05, author = {Ricardo Corin and Jeroen Doumen and Sandro Etalle}, editor = {Nadia Busi and Roberto Gorrieri and Fabio Martinelli}, title = {Analysing Password Protocol Security Against Off-line Dictionary Attacks}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, WISP@ICATPN 2004, Bologna, Italy, June 26, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {121}, pages = {47--63}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.10.007}, doi = {10.1016/J.ENTCS.2004.10.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/CorinDE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuDT03, author = {Sheng{-}Bo Xu and Jeroen Doumen and Henk C. A. van Tilborg}, title = {On the Security of Digital Signature Schemes Based on Error-Correcting Codes}, journal = {Des. Codes Cryptogr.}, volume = {28}, number = {2}, pages = {187--199}, year = {2003}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XuDT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.