Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Jaap-Henk Hoepman
2010 – today
- 2013
[e3]Jaap-Henk Hoepman, Ingrid Verbauwhede (Eds.): Radio Frequency Identification. Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7739, Springer 2013, ISBN 978-3-642-36139-5
[i20]Gergely Alpár, Jaap-Henk Hoepman, Wouter Lueks: An Attack Against Fixed Value Discrete Logarithm Representations. IACR Cryptology ePrint Archive 2013: 120 (2013)- 2012
[i19]- 2011
[j8]Jaap-Henk Hoepman, Andreas Larsson, Elad Michael Schiller, Philippas Tsigas: Secure and self-stabilizing clock synchronization in sensor networks. Theor. Comput. Sci. 412(40): 5631-5647 (2011)
[c38]Jaap-Henk Hoepman: In Things We Trust? Towards Trustability in the Internet of Things - (Extended Abstract). AmI Workshops 2011: 287-295
[c37]
[c36]Gergely Alpár, Jaap-Henk Hoepman: Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals. PrimeLife 2011: 261-273
[c35]Jaap-Henk Hoepman, David Galindo: Non-interactive distributed encryption: a new primitive for revocable privacy. WPES 2011: 81-92
[i18]Gergely Alpár, Jaap-Henk Hoepman, Johanneke Siljee: The Identity Crisis. Security, Privacy and Usability Issues in Identity Management. CoRR abs/1101.0427 (2011)
[i17]Jaap-Henk Hoepman: In Things We Trust? Towards trustability in the Internet of Things. CoRR abs/1109.2637 (2011)- 2010
[c34]Lejla Batina, Jaap-Henk Hoepman, Bart Jacobs, Wojciech Mostowski, Pim Vullers: Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings. CARDIS 2010: 209-222
[c33]Jaap-Henk Hoepman, George B. Huitema: Privacy Enhanced Fraud Resistant Road Pricing. HCC 2010: 202-213
[c32]Jaap-Henk Hoepman, Rieks Joosten: Practical Schemes for Privacy and Security Enhanced RFID. WISTP 2010: 138-153
[i16]Gerben Broenink, Jaap-Henk Hoepman, Christian van 't Hof, Rob Van Kranenburg, David Smits, Tijmen Wisman: The Privacy Coach: Supporting customer privacy in the Internet of Things. CoRR abs/1001.4459 (2010)
2000 – 2009
- 2009
[c31]Lukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum: Client-Server Password Recovery. OTM Conferences (2) 2009: 861-878
[e2]Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater (Eds.): Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings. Lecture Notes in Computer Science 5746, Springer 2009, ISBN 978-3-642-03943-0
[i15]Lukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum: Client-Server Password Recovery (Extended Abstract). CoRR abs/0906.4668 (2009)
[i14]Jaap-Henk Hoepman, Rieks Joosten: Practical Schemes For Privacy & Security Enhanced RFID. CoRR abs/0909.1257 (2009)- 2008
[c30]Lukasz Chmielewski, Jaap-Henk Hoepman: Fuzzy Private Matching (Extended Abstract). ARES 2008: 327-334
[c29]Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia: A Practical Attack on the MIFARE Classic. CARDIS 2008: 267-282
[c28]Jaap-Henk Hoepman, Rieks Joosten, Johanneke Siljee: Comparing Identity Management Frameworks in a Business Context. FIDIS 2008: 184-196
[c27]Lukasz Chmielewski, Richard Brinkman, Jaap-Henk Hoepman, Bert Bos: Using JASON to secure SOA. Middleware Security 2008: 13-18
[i13]
[i12]Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur: Crossing Borders: Security and Privacy Issues of the European e-Passport. CoRR abs/0801.3930 (2008)
[i11]
[i10]
[i9]Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia: A Practical Attack on the MIFARE Classic. CoRR abs/0803.2285 (2008)
[i8]- 2007
[j7]Jaap-Henk Hoepman, Bart Jacobs: Increased security through open source. Commun. ACM 50(1): 79-83 (2007)
[c26]
[c25]Jaap-Henk Hoepman, Geert Kleinhuis: Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart Card. EuroPKI 2007: 236-247
[c24]Jaap-Henk Hoepman: Distributed Double Spending Prevention. Security Protocols Workshop 2007: 152-165
[c23]Jaap-Henk Hoepman: Distributed Double Spending Prevention (Transcript of Discussion). Security Protocols Workshop 2007: 166-170
[c22]Jaap-Henk Hoepman, Andreas Larsson, Elad Michael Schiller, Philippas Tsigas: Secure and Self-stabilizing Clock Synchronization in Sensor Networks. SSS 2007: 340-356
[e1]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman (Eds.): From Security to Dependability, 10.09. - 15.09.2006. Dagstuhl Seminar Proceedings 06371, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007
[i7]Lukasz Chmielewski, Jaap-Henk Hoepman: Fuzzy Private Matching (Extended Abstract). CoRR abs/0710.5425 (2007)
[i6]Lukasz Chmielewski, Jaap-Henk Hoepman: Fuzzy Private Matching (Extended Abstract). IACR Cryptology ePrint Archive 2007: 363 (2007)- 2006
[c21]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Executive Summary -- From Security to Dependability. From Security to Dependability 2006
[c20]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Abstracts Collection -- From Security to Dependability. From Security to Dependability 2006
[c19]Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur: Crossing Borders: Security and Privacy Issues of the European e-Passport. IWSEC 2006: 152-167
[c18]Ricardo Corin, David Galindo, Jaap-Henk Hoepman: Securing Data Accountability in Decentralized Systems. OTM Workshops (1) 2006: 626-635
[c17]Jaap-Henk Hoepman, Shay Kutten, Zvi Lotker: Efficient Distributed Weighted Matchings on Trees. SIROCCO 2006: 115-129- 2005
[j6]Wan Fokkink, Jaap-Henk Hoepman, Jun Pang: A Note on K-State Self-stabilization in a Ring with K=N. Nord. J. Comput. 12(1): 18-26 (2005)
[c16]Flavio D. Garcia, Jaap-Henk Hoepman: Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. ACNS 2005: 364-377
[c15]- 2004
[c14]
[c13]Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Nieuwenhuizen: Spam Filter Analysis. SEC 2004: 395-410
[i5]
[i4]- 2003
[c12]
[c11]Jaap-Henk Hoepman: Security, Fault-Tolerance and their Verification for Ambient Systems. SEC 2003: 441-446- 2002
[j5]Jaap-Henk Hoepman, Marina Papatriantafilou, Philippas Tsigas: Self-Stabilization of Wait-Free Shared Memory Objects. J. Parallel Distrib. Comput. 62(5): 818-842 (2002)
[c10]- 2001
[j4]Jaap-Henk Hoepman: Can an operation both update the state and return a meaningful value in the asynchronous PRAM model? Inf. Process. Lett. 79(4): 161-166 (2001)
[c9]- 2000
[c8]Jaap-Henk Hoepman: Secret Key Authentication with Software-Only Verification. Financial Cryptography 2000: 313-326
1990 – 1999
- 1999
[j3]Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi: Mutual Search. J. ACM 46(4): 517-536 (1999)
[j2]Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi: Space-efficient Routing Tables for Almost All Networks and the Incompressibility Method. SIAM J. Comput. 28(4): 1414-1432 (1999)
[i3]Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi: Space-Efficient Routing Tables for Almost All Networks and the Incompressibility Method. CoRR cs.DC/9903009 (1999)
[i2]Jaap-Henk Hoepman: Self-stabilizing mutual exclusion on a ring, even if K=N. CoRR cs.DC/9909013 (1999)
[i1]Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi: Mutual Search. CoRR cs.DS/9902005 (1999)- 1998
[j1]Jaap-Henk Hoepman: Self-Stabilizing Ring-Orientation Using Constant Space. Inf. Comput. 144(1): 18-39 (1998)
[c7]Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi: Mutual Search (Extended Abstract). SODA 1998: 481-489- 1996
[c6]- 1995
[c5]Harry Buhrman, Juan A. Garay, Jaap-Henk Hoepman: Optimal Resiliency against Mobile Faults. FTCS 1995: 83-88
[c4]Harry Buhrman, Juan A. Garay, Jaap-Henk Hoepman, Mark Moir: Long-Lived Renaming Made Fast. PODC 1995: 194-203
[c3]Jaap-Henk Hoepman, Marina Papatriantafilou, Philippas Tsigas: Self-Stabilization of Wait-Free Shared Memory Objects. WDAG 1995: 273-287- 1994
[c2]Jaap-Henk Hoepman: Uniform Deterministic Self-Stabilizing Ring-Orientation on Odd-Length Rings. WDAG 1994: 265-279- 1993
[c1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:17 CEST by the dblp team



