Jaap-Henk Hoepman
Jaap-Henk Hoepman
Associate Professor of Computer Science, Radboud University Nijmegen and Associate Professor, IT Law
Verified email at cs.ru.nl - Homepage
TitleCited byYear
Privacy design strategies
JH Hoepman
IFIP International Information Security Conference, 446-459, 2014
2252014
A practical attack on the MIFARE Classic
G de Koning Gans, JH Hoepman, FD Garcia
International Conference on Smart Card Research and Advanced Applications …, 2008
2142008
Increased security through open source
JH Hoepman, B Jacobs
arXiv preprint arXiv:0801.3924, 2008
1862008
Privacy and data protection by design-from policy to engineering
G Danezis, J Domingo-Ferrer, M Hansen, JH Hoepman, DL Metayer, ...
arXiv preprint arXiv:1501.03726, 2015
1762015
Simple distributed weighted matchings
JH Hoepman
arXiv preprint cs/0410047, 2004
1562004
Crossing borders: Security and privacy issues of the european e-passport
JH Hoepman, E Hubbers, B Jacobs, M Oostdijk, RW Schreur
International Workshop on Security, 152-167, 2006
1462006
The ephemeral pairing problem
JH Hoepman
International Conference on Financial Cryptography, 212-226, 2004
782004
The identity crisis. security, privacy and usability issues in identity management
G Alpár, JH Hoepman, J Siljee
arXiv preprint arXiv:1101.0427, 2011
762011
Spam filter analysis
FD Garcia, JH Hoepman, J Van Nieuwenhuizen
IFIP International Information Security Conference, 395-410, 2004
722004
A critical analysis of privacy design strategies
M Colesky, JH Hoepman, C Hillen
2016 IEEE Security and Privacy Workshops (SPW), 33-40, 2016
622016
Developing efficient blinded attribute certificates on smart cards via pairings
L Batina, JH Hoepman, B Jacobs, W Mostowski, P Vullers
International Conference on Smart Card Research and Advanced Applications …, 2010
452010
Off-line karma: A decentralized currency for peer-to-peer and grid applications
FD Garcia, JH Hoepman
International Conference on Applied Cryptography and Network Security, 364-377, 2005
442005
Ephemeral pairing on anonymous networks
JH Hoepman
International Conference on Security in Pervasive Computing, 101-116, 2005
442005
Long-lived renaming made fast
H Buhrman, JA Garay, JH Hoepman, M Moir
PODC, 194-203, 1995
351995
Uniform deterministic self-stabilizing ring-orientation on odd-length rings
JH Hoepman
International Workshop on Distributed Algorithms, 265-279, 1994
341994
Fast revocation of attribute-based credentials for both users and verifiers
W Lueks, G Alpár, JH Hoepman, P Vullers
Computers & Security 67, 308-323, 2017
332017
Open-source intelligence and privacy by design
BJ Koops, JH Hoepman, R Leenes
Computer Law & Security Review 29 (6), 676-688, 2013
312013
Secure and self-stabilizing clock synchronization in sensor networks
JH Hoepman, A Larsson, EM Schiller, P Tsigas
Symposium on Self-Stabilizing Systems, 340-356, 2007
29*2007
Optimal Resiliency Against Mobile Faults
H Buhrman, JA Garay, JH Hoepman.
Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant …, 1995
291995
The privacy coach: Supporting customer privacy in the internet of things
G Broenink, JH Hoepman, C Hof, R Van Kranenburg, D Smits, T Wisman
arXiv preprint arXiv:1001.4459, 2010
282010
The system can't perform the operation now. Try again later.
Articles 1–20