


default search action
Jaap-Henk Hoepman
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j16]Frank Pallas
, Katharina Koerner, Isabel Barberá
, Jaap-Henk Hoepman
, Meiko Jensen
, Nandita Rao Narla, Nikita Samarin
, Max-Robert Ulbricht
, Isabel Wagner
, Kim Wuyts
, Christian Zimmermann
:
Privacy Engineering From Principles to Practice: A Roadmap. IEEE Secur. Priv. 22(2): 86-92 (2024) - [c59]Mahdi Akil, Leonardo A. Martucci, Jaap-Henk Hoepman:
A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs. SECRYPT 2024: 114-127 - [i36]Frank Pallas, Katharina Koerner, Isabel Barberá, Jaap-Henk Hoepman, Meiko Jensen, Nandita Rao Narla, Nikita Samarin, Max-Robert Ulbricht, Isabel Wagner
, Kim Wuyts, Christian Zimmermann:
Privacy Engineering From Principles to Practice: A Roadmap. CoRR abs/2404.03442 (2024) - [i35]Frederik J. Zuiderveen Borgesius, Hadi Asghari, Noël Bangma, Jaap-Henk Hoepman:
The GDPR's Rules on Data Breaches: Analysing Their Rationales and Effects. CoRR abs/2410.06086 (2024) - 2023
- [j15]Marloes Venema
, Greg Alpár, Jaap-Henk Hoepman:
Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice. Des. Codes Cryptogr. 91(1): 165-220 (2023) - [j14]Jaap-Henk Hoepman:
Two faces of blindness. Des. Codes Cryptogr. 91(8): 2705-2721 (2023) - [c58]Mahdi Akil, Sujash Naskar, Leonardo A. Martucci, Jaap-Henk Hoepman:
A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs. Privacy and Identity Management 2023: 192-210 - 2022
- [j13]Aslí Bay
, Zekeriya Erkin
, Jaap-Henk Hoepman, Simona Samardjiska, Jelle Vos
:
Practical Multi-Party Private Set Intersection Protocols. IEEE Trans. Inf. Forensics Secur. 17: 1-15 (2022) - [c57]Simone Fischer-Hübner, Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen:
Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning. Privacy and Identity Management 2022: 11-20 - [i34]Jaap-Henk Hoepman:
Mutual Contact Discovery. CoRR abs/2209.12003 (2022) - 2021
- [j12]Balázs Bodó
, Jaya Klara Brekke, Jaap-Henk Hoepman:
Decentralisation in the blockchain space. Internet Policy Rev. 10(2) (2021) - [j11]Balázs Bodó
, Jaya Klara Brekke, Jaap-Henk Hoepman:
Decentralisation: a multidisciplinary perspective. Internet Policy Rev. 10(2) (2021) - [i33]Jaap-Henk Hoepman:
Hansel and Gretel and the Virus: Privacy Conscious Contact Tracing. CoRR abs/2101.03241 (2021) - [i32]Jaap-Henk Hoepman:
Privacy Friendly E-Ticketing For Public Transport. CoRR abs/2101.09085 (2021) - [i31]Marloes Venema, Greg Alpár, Jaap-Henk Hoepman:
Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice. IACR Cryptol. ePrint Arch. 2021: 1172 (2021) - 2020
- [i30]Jaap-Henk Hoepman:
A Critique of the Google Apple Exposure Notification (GAEN) Framework. CoRR abs/2012.05097 (2020)
2010 – 2019
- 2019
- [i29]Rowel Gündlach, Jaap-Henk Hoepman, Remco van der Hofstad, Tommy Koens, Stijn Meijer:
Hydra: A Multiple Blockchain Protocol for Improving Transaction Throughput. CoRR abs/1910.06682 (2019) - 2018
- [c56]Michael Colesky, Julio C. Caiza
, José M. del Álamo, Jaap-Henk Hoepman, Yod Samuel Martín:
A system of privacy patterns for user control. SAC 2018: 1150-1156 - 2017
- [j10]Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast revocation of attribute-based credentials for both users and verifiers. Comput. Secur. 67: 308-323 (2017) - [c55]Jaap-Henk Hoepman:
Privacy Friendly Aggregation of Smart Meter Readings, Even When Meters Crash. SPSR-SG@CPSWeek 2017: 3-7 - [c54]Sietse Ringers, Eric R. Verheul, Jaap-Henk Hoepman:
An Efficient Self-blindable Attribute-Based Credential Scheme. Financial Cryptography 2017: 3-20 - [c53]Jeroen van Puijenbroek, Jaap-Henk Hoepman:
Privacy Impact Assessments in Practice: Outcome of a Descriptive Field Research in the Netherlands. IWPE@SP 2017: 1-8 - [i28]Sietse Ringers, Eric R. Verheul, Jaap-Henk Hoepman:
An efficient self-blindable attribute-based credential scheme. IACR Cryptol. ePrint Arch. 2017: 115 (2017) - 2016
- [c52]Eric R. Verheul, Sietse Ringers, Jaap-Henk Hoepman:
The Self-blindable U-Prove Scheme from FC'14 Is Forgeable (Short Paper). Financial Cryptography 2016: 339-345 - [c51]Michael Colesky, Jaap-Henk Hoepman, Christiaan Hillen:
A Critical Analysis of Privacy Design Strategies. IEEE Symposium on Security and Privacy Workshops 2016: 33-40 - [c50]Wouter Lueks, Maarten H. Everts, Jaap-Henk Hoepman:
Vote to Link: Recovering from Misbehaving Anonymous Users. WPES@CCS 2016: 111-122 - [e5]Jaap-Henk Hoepman, Stefan Katzenbeisser:
ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings. IFIP Advances in Information and Communication Technology 471, Springer 2016, ISBN 978-3-319-33629-9 [contents] - 2015
- [c49]Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen:
Towards Measuring Maturity of Privacy-Enhancing Technologies. APF 2015: 3-20 - [c48]Wouter Lueks, Maarten H. Everts, Jaap-Henk Hoepman:
Revocable Privacy: Principles, Use Cases, and Technologies. APF 2015: 124-143 - [c47]Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen, Stefan Schiffner:
Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies. Privacy and Identity Management 2015: 97-110 - [c46]Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. SEC 2015: 463-478 - [c45]Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers:
On Linkability and Malleability in Self-blindable Credentials. WISTP 2015: 203-218 - [c44]Jaap-Henk Hoepman:
Privately (and Unlinkably) Exchanging Messages Using a Public Bulletin Board. WPES@CCS 2015: 85-94 - [i27]George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Métayer, Rodica Tirtea, Stefan Schiffner:
Privacy and Data Protection by Design - from policy to engineering. CoRR abs/1501.03726 (2015) - [i26]Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. IACR Cryptol. ePrint Arch. 2015: 237 (2015) - [i25]Eric R. Verheul, Sietse Ringers, Jaap-Henk Hoepman:
The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable. IACR Cryptol. ePrint Arch. 2015: 725 (2015) - [i24]Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers:
On Linkability and Malleability in Self-blindable Credentials. IACR Cryptol. ePrint Arch. 2015: 842 (2015) - 2014
- [c43]Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers:
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards. CANS 2014: 270-289 - [c42]Wouter Lueks, Jaap-Henk Hoepman, Klaus Kursawe:
Forward-Secure Distributed Encryption. Privacy Enhancing Technologies 2014: 123-142 - [c41]Lejla Batina, Jens Hermans, Jaap-Henk Hoepman, Anna Krasnova:
High-Speed Dating Privacy-Preserving Attribute Matching for RFID. RFIDSec 2014: 19-35 - [c40]Jaap-Henk Hoepman:
Privacy Design Strategies - (Extended Abstract). SEC 2014: 446-459 - [e4]Marit Hansen, Jaap-Henk Hoepman, Ronald E. Leenes, Diane Whitehouse:
Privacy and Identity Management for Emerging Services and Technologies - 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers. IFIP Advances in Information and Communication Technology 421, Springer 2014, ISBN 978-3-642-55136-9 [contents] - [i23]Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers:
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards. IACR Cryptol. ePrint Arch. 2014: 684 (2014) - 2013
- [j9]Bert-Jaap Koops, Jaap-Henk Hoepman, Ronald Leenes:
Open-source intelligence and privacy by design. Comput. Law Secur. Rev. 29(6): 676-688 (2013) - [c39]Gergely Alpár, Jaap-Henk Hoepman:
A secure channel for attribute-based credentials: [short paper]. Digital Identity Management 2013: 13-18 - [c38]Maarten H. Everts, Jaap-Henk Hoepman, Johanneke Siljee:
UbiKiMa: ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography. Digital Identity Management 2013: 19-24 - [e3]Jaap-Henk Hoepman, Ingrid Verbauwhede
:
Radio Frequency Identification. Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7739, Springer 2013, ISBN 978-3-642-36139-5 [contents] - [i22]Gergely Alpár, Jaap-Henk Hoepman, Wouter Lueks:
An Attack Against Fixed Value Discrete Logarithm Representations. IACR Cryptol. ePrint Arch. 2013: 120 (2013) - 2012
- [i21]Jaap-Henk Hoepman:
Privacy Design Strategies. CoRR abs/1210.6621 (2012) - 2011
- [j8]Jaap-Henk Hoepman, Andreas Larsson, Elad Michael Schiller, Philippas Tsigas
:
Secure and self-stabilizing clock synchronization in sensor networks. Theor. Comput. Sci. 412(40): 5631-5647 (2011) - [c37]Jaap-Henk Hoepman:
In Things We Trust? Towards Trustability in the Internet of Things - (Extended Abstract). AmI Workshops 2011: 287-295 - [c36]Jaap-Henk Hoepman:
Mobile Identity Management. Communications and Multimedia Security 2011: 253 - [c35]Gergely Alpár, Jaap-Henk Hoepman:
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals. PrimeLife 2011: 261-273 - [c34]Jaap-Henk Hoepman, David Galindo
:
Non-interactive distributed encryption: a new primitive for revocable privacy. WPES 2011: 81-92 - [i20]Gergely Alpár, Jaap-Henk Hoepman, Johanneke Siljee:
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management. CoRR abs/1101.0427 (2011) - [i19]Jaap-Henk Hoepman:
In Things We Trust? Towards trustability in the Internet of Things. CoRR abs/1109.2637 (2011) - 2010
- [c33]Lejla Batina, Jaap-Henk Hoepman, Bart Jacobs, Wojciech Mostowski, Pim Vullers:
Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings. CARDIS 2010: 209-222 - [c32]Jaap-Henk Hoepman, George B. Huitema:
Privacy Enhanced Fraud Resistant Road Pricing. HCC 2010: 202-213 - [c31]Jaap-Henk Hoepman, Rieks Joosten:
Practical Schemes for Privacy and Security Enhanced RFID. WISTP 2010: 138-153 - [i18]Gerben Broenink, Jaap-Henk Hoepman, Christian van 't Hof, Rob Van Kranenburg, David Smits, Tijmen Wisman:
The Privacy Coach: Supporting customer privacy in the Internet of Things. CoRR abs/1001.4459 (2010)
2000 – 2009
- 2009
- [c30]Lukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum:
Client-Server Password Recovery. OTM Conferences (2) 2009: 861-878 - [e2]Olivier Markowitch, Angelos Bilas
, Jaap-Henk Hoepman, Chris J. Mitchell
, Jean-Jacques Quisquater:
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings. Lecture Notes in Computer Science 5746, Springer 2009, ISBN 978-3-642-03943-0 [contents] - [i17]Lukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum:
Client-Server Password Recovery (Extended Abstract). CoRR abs/0906.4668 (2009) - [i16]Jaap-Henk Hoepman, Rieks Joosten:
Practical Schemes For Privacy & Security Enhanced RFID. CoRR abs/0909.1257 (2009) - 2008
- [c29]Lukasz Chmielewski, Jaap-Henk Hoepman:
Fuzzy Private Matching (Extended Abstract). ARES 2008: 327-334 - [c28]Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia:
A Practical Attack on the MIFARE Classic. CARDIS 2008: 267-282 - [c27]Jaap-Henk Hoepman, Rieks Joosten, Johanneke Siljee:
Comparing Identity Management Frameworks in a Business Context. FIDIS 2008: 184-196 - [c26]Lukasz Chmielewski, Richard Brinkman, Jaap-Henk Hoepman, Bert Bos:
Using JASON to secure SOA. Middleware Security 2008: 13-18 - [i15]Jaap-Henk Hoepman, Bart Jacobs:
Increased security through open source. CoRR abs/0801.3924 (2008) - [i14]Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur:
Crossing Borders: Security and Privacy Issues of the European e-Passport. CoRR abs/0801.3930 (2008) - [i13]Jaap-Henk Hoepman:
Distributed Double Spending Prevention. CoRR abs/0802.0832 (2008) - [i12]Jaap-Henk Hoepman:
The Ephemeral Pairing Problem. CoRR abs/0802.0834 (2008) - [i11]Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia:
A Practical Attack on the MIFARE Classic. CoRR abs/0803.2285 (2008) - [i10]Jaap-Henk Hoepman:
Private Handshakes. CoRR abs/0804.0074 (2008) - 2007
- [j7]Jaap-Henk Hoepman, Bart Jacobs:
Increased security through open source. Commun. ACM 50(1): 79-83 (2007) - [c25]Jaap-Henk Hoepman:
Private Handshakes. ESAS 2007: 31-42 - [c24]Jaap-Henk Hoepman, Geert Kleinhuis:
Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart Card. EuroPKI 2007: 236-247 - [c23]Bert Bos, Lukasz Chmielewski, Jaap-Henk Hoepman, Thanh Son Nguyen:
Remote Management and Secure Application Development for Pervasive Home Systems Using JASON. SECPerU 2007: 7-12 - [c22]Jaap-Henk Hoepman:
Distributed Double Spending Prevention. Security Protocols Workshop 2007: 152-165 - [c21]Jaap-Henk Hoepman:
Distributed Double Spending Prevention (Transcript of Discussion). Security Protocols Workshop 2007: 166-170 - [c20]Jaap-Henk Hoepman, Andreas Larsson, Elad Michael Schiller, Philippas Tsigas:
Secure and Self-stabilizing Clock Synchronization in Sensor Networks. SSS 2007: 340-356 - [e1]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman:
From Security to Dependability, 10.09. - 15.09.2006. Dagstuhl Seminar Proceedings 06371, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - [i9]Lukasz Chmielewski, Jaap-Henk Hoepman:
Fuzzy Private Matching (Extended Abstract). CoRR abs/0710.5425 (2007) - [i8]Lukasz Chmielewski, Jaap-Henk Hoepman:
Fuzzy Private Matching (Extended Abstract). IACR Cryptol. ePrint Arch. 2007: 363 (2007) - 2006
- [c19]Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur:
Crossing Borders: Security and Privacy Issues of the European e-Passport. IWSEC 2006: 152-167 - [c18]Ricardo Corin, David Galindo, Jaap-Henk Hoepman:
Securing Data Accountability in Decentralized Systems. OTM Workshops (1) 2006: 626-635 - [c17]Jaap-Henk Hoepman, Shay Kutten, Zvi Lotker:
Efficient Distributed Weighted Matchings on Trees. SIROCCO 2006: 115-129 - [i7]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman:
06371 Executive Summary -- From Security to Dependability. From Security to Dependability 2006 - [i6]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman:
06371 Abstracts Collection -- From Security to Dependability. From Security to Dependability 2006 - 2005
- [j6]Wan J. Fokkink, Jaap-Henk Hoepman, Jun Pang:
A Note on K-State Self-stabilization in a Ring with K=N. Nord. J. Comput. 12(1): 18-26 (2005) - [c16]Flavio D. Garcia, Jaap-Henk Hoepman:
Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. ACNS 2005: 364-377 - [c15]Jaap-Henk Hoepman:
Ephemeral Pairing on Anonymous Networks. SPC 2005: 101-116 - 2004
- [c14]Jaap-Henk Hoepman:
The Ephemeral Pairing Problem. Financial Cryptography 2004: 212-226 - [c13]Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Nieuwenhuizen:
Spam Filter Analysis. SEC 2004: 395-410 - [i5]Flavio D. Garcia, Jaap-Henk Hoepman:
Spam filter analysis. CoRR cs.CR/0402046 (2004) - [i4]Jaap-Henk Hoepman:
Simple Distributed Weighted Matchings. CoRR cs.DC/0410047 (2004) - 2003
- [c12]Jaap-Henk Hoepman:
Splitters: Objects for Online Partitioning. OPODIS 2003: 47-57 - [c11]Jaap-Henk Hoepman:
Security, Fault-Tolerance and their Verification for Ambient Systems. SEC 2003: 441-446 - 2002
- [j5]Jaap-Henk Hoepman, Marina Papatriantafilou
, Philippas Tsigas
:
Self-Stabilization of Wait-Free Shared Memory Objects. J. Parallel Distributed Comput. 62(5): 818-842 (2002) - [c10]Richard Brinkman, Jaap-Henk Hoepman:
Secure Method Invocation in JASON. CARDIS 2002: 29-40 - 2001
- [j4]Jaap-Henk Hoepman:
Can an operation both update the state and return a meaningful value in the asynchronous PRAM model? Inf. Process. Lett. 79(4): 161-166 (2001) - [c9]Jaap-Henk Hoepman:
Randomised Mutual Search for k>2 Agents. DISC 2001: 180-193 - 2000
- [c8]Jaap-Henk Hoepman:
Secret Key Authentication with Software-Only Verification. Financial Cryptography 2000: 313-326
1990 – 1999
- 1999
- [j3]Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp
, Paul M. B. Vitányi:
Mutual Search. J. ACM 46(4): 517-536 (1999) - [j2]Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi:
Space-efficient Routing Tables for Almost All Networks and the Incompressibility Method. SIAM J. Comput. 28(4): 1414-1432 (1999) - [i3]Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi:
Space-Efficient Routing Tables for Almost All Networks and the Incompressibility Method. CoRR cs.DC/9903009 (1999) - [i2]Jaap-Henk Hoepman:
Self-stabilizing mutual exclusion on a ring, even if K=N. CoRR cs.DC/9909013 (1999) - [i1]Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi:
Mutual Search. CoRR cs.DS/9902005 (1999) - 1998
- [j1]Jaap-Henk Hoepman:
Self-Stabilizing Ring-Orientation Using Constant Space. Inf. Comput. 144(1): 18-39 (1998) - [c7]Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi:
Mutual Search (Extended Abstract). SODA 1998: 481-489 - 1996
- [c6]Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi:
Optimal Routing Tables. PODC 1996: 134-142 - 1995
- [c5]Harry Buhrman, Juan A. Garay, Jaap-Henk Hoepman:
Optimal Resiliency against Mobile Faults. FTCS 1995: 83-88 - [c4]Harry Buhrman, Juan A. Garay, Jaap-Henk Hoepman, Mark Moir:
Long-Lived Renaming Made Fast. PODC 1995: 194-203 - [c3]Jaap-Henk Hoepman, Marina Papatriantafilou, Philippas Tsigas:
Self-Stabilization of Wait-Free Shared Memory Objects. WDAG 1995: 273-287 - 1994
- [c2]Jaap-Henk Hoepman:
Uniform Deterministic Self-Stabilizing Ring-Orientation on Odd-Length Rings. WDAG 1994: 265-279 - 1993
- [c1]Jaap-Henk Hoepman, John Tromp:
Binary Snapshots. WDAG 1993: 18-25