Jaap-Henk Hoepman
Jaap-Henk Hoepman
Associate Professor of Computer Science, Radboud University Nijmegen and Associate Professor, IT Law
Verified email at cs.ru.nl - Homepage
Title
Cited by
Cited by
Year
Privacy design strategies
JH Hoepman
IFIP International Information Security Conference, 446-459, 2014
2782014
Privacy and data protection by design-from policy to engineering
G Danezis, J Domingo-Ferrer, M Hansen, JH Hoepman, DL Metayer, ...
arXiv preprint arXiv:1501.03726, 2015
2292015
A practical attack on the MIFARE Classic
G de Koning Gans, JH Hoepman, FD Garcia
International Conference on Smart Card Research and Advanced Applications …, 2008
2252008
Increased security through open source
JH Hoepman, B Jacobs
Communications of the ACM 50 (1), 79-83, 2007
2022007
Crossing borders: Security and privacy issues of the european e-passport
JH Hoepman, E Hubbers, B Jacobs, M Oostdijk, RW Schreur
International Workshop on Security, 152-167, 2006
1572006
Simple distributed weighted matchings
JH Hoepman
arXiv preprint cs/0410047, 2004
1522004
A critical analysis of privacy design strategies
M Colesky, JH Hoepman, C Hillen
2016 IEEE Security and Privacy Workshops (SPW), 33-40, 2016
842016
The ephemeral pairing problem
JH Hoepman
International Conference on Financial Cryptography, 212-226, 2004
842004
The identity crisis. security, privacy and usability issues in identity management
G Alpár, JH Hoepman, J Siljee
arXiv preprint arXiv:1101.0427, 2011
792011
Spam filter analysis
FD Garcia, JH Hoepman, J Van Nieuwenhuizen
IFIP International Information Security Conference, 395-410, 2004
722004
Ephemeral pairing on anonymous networks
JH Hoepman
International Conference on Security in Pervasive Computing, 101-116, 2005
482005
Off-line karma: A decentralized currency for peer-to-peer and grid applications
FD Garcia, JH Hoepman
International Conference on Applied Cryptography and Network Security, 364-377, 2005
472005
Developing efficient blinded attribute certificates on smart cards via pairings
L Batina, JH Hoepman, B Jacobs, W Mostowski, P Vullers
International Conference on Smart Card Research and Advanced Applications …, 2010
402010
Open-source intelligence and privacy by design
BJ Koops, JH Hoepman, R Leenes
Computer Law & Security Review 29 (6), 676-688, 2013
392013
Fast revocation of attribute-based credentials for both users and verifiers
W Lueks, G Alpár, JH Hoepman, P Vullers
Computers & Security 67, 308-323, 2017
372017
Long-lived renaming made fast
H Buhrman, JA Garay, JH Hoepman, M Moir
Proceedings of the fourteenth annual ACM symposium on Principles of …, 1995
371995
The privacy coach: Supporting customer privacy in the internet of things
G Broenink, JH Hoepman, C Hof, R Van Kranenburg, D Smits, T Wisman
arXiv preprint arXiv:1001.4459, 2010
322010
Uniform deterministic self-stabilizing ring-orientation on odd-length rings
JH Hoepman
International Workshop on Distributed Algorithms, 265-279, 1994
321994
Distributed double spending prevention
JH Hoepman
International Workshop on Security Protocols, 152-165, 2007
312007
Optimal Resiliency Against Mobile Faults
H Buhrman, JA Garay, JH Hoepman.
Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant …, 1995
311995
The system can't perform the operation now. Try again later.
Articles 1–20