BibTeX records: Jeroen Doumen

download as .bib file

@article{DBLP:journals/ejisec/VeugenDEPVW17,
  author       = {Thijs Veugen and
                  Jeroen Doumen and
                  Zekeriya Erkin and
                  Gaetano Pellegrino and
                  Sicco Verwer and
                  Jos H. Weber},
  title        = {Improved privacy of dynamic group services},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {3},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0054-7},
  doi          = {10.1186/S13635-017-0054-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/VeugenDEPVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/OosterwijkSD15,
  author       = {Jan{-}Jaap Oosterwijk and
                  Boris Skoric and
                  Jeroen Doumen},
  title        = {A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing
                  Schemes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {61},
  number       = {7},
  pages        = {3882--3900},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIT.2015.2428250},
  doi          = {10.1109/TIT.2015.2428250},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/OosterwijkSD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/JarnikovHAD14,
  author       = {Dmitri Jarnikov and
                  Erik Hietbrink and
                  Mark Arana and
                  Jeroen M. Doumen},
  title        = {A watermarking system for adaptive streaming},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2014,
                  Las Vegas, NV, USA, January 10-13, 2014},
  pages        = {375--377},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCE.2014.6776048},
  doi          = {10.1109/ICCE.2014.6776048},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iccel/JarnikovHAD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mediaforensics/OosterwijkDL14,
  author       = {Jan{-}Jaap Oosterwijk and
                  Jeroen Doumen and
                  Thijs Laarhoven},
  editor       = {Adnan M. Alattar and
                  Nasir D. Memon and
                  Chad Heitzenrater},
  title        = {Tuple decoders for traitor tracing schemes},
  booktitle    = {Media Watermarking, Security, and Forensics 2014, San Francisco, CA,
                  USA, February 2, 2014, Proceedings},
  series       = {{SPIE} Proceedings},
  volume       = {9028},
  pages        = {90280C},
  publisher    = {{SPIE}},
  year         = {2014},
  url          = {https://doi.org/10.1117/12.2037659},
  doi          = {10.1117/12.2037659},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mediaforensics/OosterwijkDL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OosterwijkDL14,
  author       = {Jan{-}Jaap Oosterwijk and
                  Jeroen Doumen and
                  Thijs Laarhoven},
  title        = {Tuple decoders for traitor tracing schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OosterwijkDL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LaarhovenDRSW13,
  author       = {Thijs Laarhoven and
                  Jeroen Doumen and
                  Peter Roelse and
                  Boris Skoric and
                  Benne de Weger},
  title        = {Dynamic Tardos Traitor Tracing Schemes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {59},
  number       = {7},
  pages        = {4230--4242},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIT.2013.2251756},
  doi          = {10.1109/TIT.2013.2251756},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LaarhovenDRSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/OosterwijkSD13,
  author       = {Jan{-}Jaap Oosterwijk and
                  Boris Skoric and
                  Jeroen Doumen},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Optimal suspicion functions for tardos traitor tracing schemes},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482527},
  doi          = {10.1145/2482513.2482527},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/OosterwijkSD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SkoricOD13,
  author       = {Boris Skoric and
                  Jan{-}Jaap Oosterwijk and
                  Jeroen Doumen},
  title        = {The holey grail {A} special score function for non-binary traitor
                  tracing},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {180--185},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707815},
  doi          = {10.1109/WIFS.2013.6707815},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SkoricOD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OosterwijkSD13,
  author       = {Jan{-}Jaap Oosterwijk and
                  Boris Skoric and
                  Jeroen Doumen},
  title        = {Optimal Suspicion Functions for Tardos Traitor Tracing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OosterwijkSD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OosterwijkSD13a,
  author       = {Jan{-}Jaap Oosterwijk and
                  Boris Skoric and
                  Jeroen Doumen},
  title        = {A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OosterwijkSD13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricOD13,
  author       = {Boris Skoric and
                  Jan{-}Jaap Oosterwijk and
                  Jeroen Doumen},
  title        = {The Holey Grail: {A} special score function for non-binary traitor
                  tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/420},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SkoricOD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/JarnikovWD12,
  author       = {Dmitri Jarnikov and
                  Egbert Westerveld and
                  Jeroen M. Doumen},
  title        = {Session-based watermarking in live {IPTV} environment},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2012,
                  Las Vegas, NV, USA, January 13-16, 2012},
  pages        = {650--653},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICCE.2012.6162014},
  doi          = {10.1109/ICCE.2012.6162014},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iccel/JarnikovWD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BernsteinDLO12,
  author       = {Daniel J. Bernstein and
                  Jeroen Doumen and
                  Tanja Lange and
                  Jan{-}Jaap Oosterwijk},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Faster Batch Forgery Identification},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {454--473},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_26},
  doi          = {10.1007/978-3-642-34931-7\_26},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BernsteinDLO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LaarhovenOD12,
  author       = {Thijs Laarhoven and
                  Jan{-}Jaap Oosterwijk and
                  Jeroen Doumen},
  title        = {Dynamic traitor tracing for arbitrary alphabets: Divide and conquer},
  booktitle    = {2012 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012},
  pages        = {240--245},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WIFS.2012.6412656},
  doi          = {10.1109/WIFS.2012.6412656},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LaarhovenOD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1206-6720,
  author       = {Thijs Laarhoven and
                  Jan{-}Jaap Oosterwijk and
                  Jeroen Doumen},
  title        = {Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer},
  journal      = {CoRR},
  volume       = {abs/1206.6720},
  year         = {2012},
  url          = {http://arxiv.org/abs/1206.6720},
  eprinttype    = {arXiv},
  eprint       = {1206.6720},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1206-6720.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinDLO12,
  author       = {Daniel J. Bernstein and
                  Jeroen Doumen and
                  Tanja Lange and
                  Jan{-}Jaap Oosterwijk},
  title        = {Faster batch forgery identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {549},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/549},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinDLO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/JarnikovD11,
  author       = {Dmitri Jarnikov and
                  Jeroen Doumen},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Watermarking for Adaptive Streaming Protocols},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {101--113},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_7},
  doi          = {10.1007/978-3-642-23556-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/JarnikovD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-3597,
  author       = {Thijs Laarhoven and
                  Jeroen Doumen and
                  Peter Roelse and
                  Boris Skoric and
                  Benne de Weger},
  title        = {Dynamic Tardos Traitor Tracing Schemes},
  journal      = {CoRR},
  volume       = {abs/1111.3597},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.3597},
  eprinttype    = {arXiv},
  eprint       = {1111.3597},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-3597.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BuhanDHTV10,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Qiang Tang and
                  Raymond N. J. Veldhuis},
  title        = {Embedding renewable cryptographic keys into noisy data},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {3},
  pages        = {193--208},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0103-4},
  doi          = {10.1007/S10207-010-0103-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BuhanDHTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/CiordasD10,
  author       = {Calin Ciordas and
                  Jeroen Doumen},
  title        = {An Evaluation Framework for Content Recommender Systems The Industry
                  Perspective},
  booktitle    = {Proceedings of the 2010 {IEEE/WIC/ACM} International Conference on
                  Web Intelligence and International Conference on Intelligent Agent
                  Technology - Workshops, Toronto, Canada, August 31 - September 3,
                  2010},
  pages        = {273--277},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/WI-IAT.2010.279},
  doi          = {10.1109/WI-IAT.2010.279},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/CiordasD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/LiesdonkSDHJ10,
  author       = {Peter van Liesdonk and
                  Saeed Sedghi and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Computationally Efficient Searchable Symmetric Encryption},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {87--100},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_7},
  doi          = {10.1007/978-3-642-15546-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/LiesdonkSDHJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BuhanBDHV09,
  author       = {Ileana Buhan and
                  Bas Boom and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Raymond N. J. Veldhuis},
  title        = {Secure pairing with biometrics},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {27--42},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023424},
  doi          = {10.1504/IJSN.2009.023424},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BuhanBDHV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/LawPHDHH09,
  author       = {Yee Wei Law and
                  Marimuthu Palaniswami and
                  Lodewijk van Hoesel and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Paul J. M. Havinga},
  title        = {Energy-efficient link-layer jamming attacks against wireless sensor
                  network {MAC} protocols},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {5},
  number       = {1},
  pages        = {6:1--6:38},
  year         = {2009},
  url          = {https://doi.org/10.1145/1464420.1464426},
  doi          = {10.1145/1464420.1464426},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/LawPHDHH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuhanDH09,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel},
  title        = {Fuzzy extractors for continuous distributions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BuhanDH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/BuhanDH08,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel},
  title        = {Controlling leakage of biometric information using dithering},
  booktitle    = {2008 16th European Signal Processing Conference, {EUSIPCO} 2008, Lausanne,
                  Switzerland, August 25-29, 2008},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/document/7080711/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/BuhanDH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BuhanDHTV08,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Qiang Tang and
                  Raymond N. J. Veldhuis},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Embedding Renewable Cryptographic Keys into Continuous Noisy Data},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {294--310},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_20},
  doi          = {10.1007/978-3-540-88625-9\_20},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/BuhanDHTV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SedghiDHJ08,
  author       = {Saeed Sedghi and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Towards an Information Theoretic Analysis of Searchable Encryption},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {345--360},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_23},
  doi          = {10.1007/978-3-540-88625-9\_23},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/SedghiDHJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/CzenkoDE08,
  author       = {Marcin Czenko and
                  Jeroen Doumen and
                  Sandro Etalle},
  editor       = {Y{\"{u}}cel Karabulut and
                  John Mitchell and
                  Peter Herrmann and
                  Christian Damsgaard Jensen},
  title        = {Trust Management in {P2P} Systems Using Standard TuLiP},
  booktitle    = {Trust Management {II} - Proceedings of {IFIPTM} 2008: Joint iTrust
                  and {PST} Conferences on Privacy, Trust Management and Security, June
                  18-20, 2008, Trondheim, Norway},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {263},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09428-1\_1},
  doi          = {10.1007/978-0-387-09428-1\_1},
  timestamp    = {Fri, 09 Apr 2021 18:43:37 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/CzenkoDE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/AlvisiDGKLRT07,
  author       = {Lorenzo Alvisi and
                  Jeroen Doumen and
                  Rachid Guerraoui and
                  Boris Koldehofe and
                  Harry C. Li and
                  Robbert van Renesse and
                  Gilles Tr{\'{e}}dan},
  title        = {How robust are gossip-based communication protocols?},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {41},
  number       = {5},
  pages        = {14--18},
  year         = {2007},
  url          = {https://doi.org/10.1145/1317379.1317383},
  doi          = {10.1145/1317379.1317383},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigops/AlvisiDGKLRT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BuhanDHV07,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Raymond N. J. Veldhuis},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Fuzzy extractors for continuous distributions},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {353--355},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229325},
  doi          = {10.1145/1229285.1229325},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BuhanDHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/BuhanDHV07,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Raymond N. J. Veldhuis},
  editor       = {Seong{-}Whan Lee and
                  Stan Z. Li},
  title        = {Feeling Is Believing: {A} Secure Template Exchange Protocol},
  booktitle    = {Advances in Biometrics, International Conference, {ICB} 2007, Seoul,
                  Korea, August 27-29, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4642},
  pages        = {897--906},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74549-5\_94},
  doi          = {10.1007/978-3-540-74549-5\_94},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/BuhanDHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/ChongCDEHLT06,
  author       = {Cheun Ngen Chong and
                  Ricardo Corin and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Yee Wei Law and
                  Andrew Tokmakoff},
  title        = {LicenseScript: a logical language for digital rights management},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {61},
  number       = {3-4},
  pages        = {284--331},
  year         = {2006},
  url          = {https://doi.org/10.1007/BF03219910},
  doi          = {10.1007/BF03219910},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/ChongCDEHLT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/LawDH06,
  author       = {Yee Wei Law and
                  Jeroen Doumen and
                  Pieter H. Hartel},
  title        = {Survey and benchmark of block ciphers for wireless sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {2},
  number       = {1},
  pages        = {65--93},
  year         = {2006},
  url          = {https://doi.org/10.1145/1138127.1138130},
  doi          = {10.1145/1138127.1138130},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/LawDH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/LawHDH05,
  author       = {Yee Wei Law and
                  Lodewijk van Hoesel and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Paul J. M. Havinga},
  editor       = {Vijay Atluri and
                  Peng Ning and
                  Wenliang Du},
  title        = {Energy-efficient link-layer jamming attacks against wireless sensor
                  network {MAC} protocols},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {76--88},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102219.1102234},
  doi          = {10.1145/1102219.1102234},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/LawHDH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BrinkmanSDJ05,
  author       = {Richard Brinkman and
                  Berry Schoenmakers and
                  Jeroen Doumen and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Experiments with Queries over Encrypted Data Using Secret Sharing},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {33--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_3},
  doi          = {10.1007/11552338\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BrinkmanSDJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ChengCDEHN05,
  author       = {Jieyin Cheng and
                  Cheun Ngen Chong and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Stefan Nikolaus},
  editor       = {Ry{\^{o}}ichi Sasaki and
                  Sihan Qing and
                  Eiji Okamoto and
                  Hiroshi Yoshiura},
  title        = {StreamTo: Streaming Content using a Tamper-Resistant Token},
  booktitle    = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
                  20th International Conference on Information Security {(SEC} 2005),
                  May 30 - June 1, 2005, Chiba, Japan},
  series       = {{IFIP}},
  volume       = {181},
  pages        = {601--612},
  publisher    = {Springer},
  year         = {2005},
  timestamp    = {Fri, 19 May 2017 01:25:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ChengCDEHN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CzenkoTDEHH06,
  author       = {Marcin Czenko and
                  Ha Tran and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Jerry den Hartog},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Nonmonotonic Trust Management for {P2P} Applications},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {113--130},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.037},
  doi          = {10.1016/J.ENTCS.2005.09.037},
  timestamp    = {Fri, 20 Jan 2023 11:50:26 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CzenkoTDEHH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0510061,
  author       = {Marcin Czenko and
                  Ha Tran and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Jerry den Hartog},
  title        = {Nonmonotonic Trust Management for {P2P} Applications},
  journal      = {CoRR},
  volume       = {abs/cs/0510061},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0510061},
  eprinttype    = {arXiv},
  eprint       = {cs/0510061},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0510061.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/BrinkmanFDHJ04,
  author       = {Richard Brinkman and
                  Ling Feng and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Willem Jonker},
  title        = {Efficient Tree Search in Encrypted Data},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {3},
  pages        = {14--21},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44530.13.3.20040701/83065.3},
  doi          = {10.1201/1086/44530.13.3.20040701/83065.3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/BrinkmanFDHJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/LawDH04,
  author       = {Yee Wei Law and
                  Jeroen Doumen and
                  Pieter H. Hartel},
  title        = {Benchmarking block ciphers for wireless sensor networks},
  booktitle    = {2004 {IEEE} International Conference on Mobile Ad-hoc and Sensor Systems,
                  Fort Lauderdale, FL, USA, October 25-27, 2004},
  pages        = {447--456},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/MAHSS.2004.1392185},
  doi          = {10.1109/MAHSS.2004.1392185},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/LawDH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BrinkmanDJ04,
  author       = {Richard Brinkman and
                  Jeroen Doumen and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Using Secret Sharing for Searching in Encrypted Data},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {18--27},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_2},
  doi          = {10.1007/978-3-540-30073-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BrinkmanDJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/BrinkmanFDHJ04,
  author       = {Richard Brinkman and
                  Ling Feng and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  L. Javier Garc{\'{\i}}a{-}Villalba},
  title        = {Efficient Tree Search in Encrypted Data},
  booktitle    = {Security In Information Systems, Proceedings of the 2nd International
                  Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction
                  with {ICEIS} 2004, Porto, Portugal, April 2004},
  pages        = {126--135},
  publisher    = {{INSTICC} Press},
  year         = {2004},
  timestamp    = {Tue, 14 Sep 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sis/BrinkmanFDHJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChongRDEHC04,
  author       = {Cheun Ngen Chong and
                  Bin Ren and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Ricardo Corin},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {License Protection with a Tamper-Resistant Token},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_19},
  doi          = {10.1007/978-3-540-31815-6\_19},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChongRDEHC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CorinDE05,
  author       = {Ricardo Corin and
                  Jeroen Doumen and
                  Sandro Etalle},
  editor       = {Nadia Busi and
                  Roberto Gorrieri and
                  Fabio Martinelli},
  title        = {Analysing Password Protocol Security Against Off-line Dictionary Attacks},
  booktitle    = {Proceedings of the 2nd International Workshop on Security Issues with
                  Petri Nets and other Computational Models, WISP@ICATPN 2004, Bologna,
                  Italy, June 26, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {121},
  pages        = {47--63},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.10.007},
  doi          = {10.1016/J.ENTCS.2004.10.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/CorinDE05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuDT03,
  author       = {Sheng{-}Bo Xu and
                  Jeroen Doumen and
                  Henk C. A. van Tilborg},
  title        = {On the Security of Digital Signature Schemes Based on Error-Correcting
                  Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {28},
  number       = {2},
  pages        = {187--199},
  year         = {2003},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XuDT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics