Follow
Jaap-Henk Hoepman
Jaap-Henk Hoepman
Associate Professor of Computer Science, Radboud University Nijmegen
Verified email at cs.ru.nl - Homepage
Title
Cited by
Cited by
Year
Privacy design strategies
JH Hoepman
IFIP International Information Security Conference, 446-459, 2014
5612014
Privacy and data protection by design-from policy to engineering
G Danezis, J Domingo-Ferrer, M Hansen, JH Hoepman, DL Metayer, ...
arXiv preprint arXiv:1501.03726, 2015
4212015
A practical attack on the MIFARE Classic
G de Koning Gans, JH Hoepman, FD Garcia
International Conference on Smart Card Research and Advanced Applications …, 2008
2682008
Increased security through open source
JH Hoepman, B Jacobs
Communications of the ACM 50 (1), 79-83, 2007
2482007
A critical analysis of privacy design strategies
M Colesky, JH Hoepman, C Hillen
2016 IEEE security and privacy workshops (SPW), 33-40, 2016
2042016
Simple distributed weighted matchings
JH Hoepman
arXiv preprint cs/0410047, 2004
1782004
Crossing borders: Security and privacy issues of the european e-passport
JH Hoepman, E Hubbers, B Jacobs, M Oostdijk, RW Schreur
Advances in Information and Computer Security: First International Workshop …, 2006
1662006
The identity crisis. security, privacy and usability issues in identity management
G Alpár, JH Hoepman, J Siljee
arXiv preprint arXiv:1101.0427, 2011
1212011
The ephemeral pairing problem
JH Hoepman
Financial Cryptography: 8th International Conference, FC 2004, Key West, FL …, 2004
942004
Spam filter analysis
FD Garcia, JH Hoepman, J Van Nieuwenhuizen
Security and Protection in Information Processing Systems: IFIP 18 th World …, 2004
792004
Open-source intelligence and privacy by design
BJ Koops, JH Hoepman, R Leenes
Computer Law & Security Review 29 (6), 676-688, 2013
772013
Privacy design strategies (the little blue book)
JH Hoepman
Nijmegen: Radboud University, 2018
602018
Decentralisation: A multidisciplinary perspective
B Bodó, JK Brekke, JH Hoepman
Internet Policy Review 10 (2), 1-21, 2021
582021
Distributed double spending prevention
JH Hoepman
Security Protocols: 15th International Workshop, Brno, Czech Republic, April …, 2010
532010
Off-line karma: A decentralized currency for peer-to-peer and grid applications
FD Garcia, JH Hoepman
Applied Cryptography and Network Security: Third International Conference …, 2005
532005
Practical multi-party private set intersection protocols
A Bay, Z Erkin, JH Hoepman, S Samardjiska, J Vos
IEEE Transactions on Information Forensics and Security 17, 1-15, 2021
512021
Optimal Resiliency Against Mobile Faults
H Buhrman, JA Garay, JH Hoepman.
Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant …, 1995
511995
Fast revocation of attribute-based credentials for both users and verifiers
W Lueks, G Alpár, JH Hoepman, P Vullers
Computers & Security 67, 308-323, 2017
502017
Developing efficient blinded attribute certificates on smart cards via pairings
L Batina, JH Hoepman, B Jacobs, W Mostowski, P Vullers
Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010
502010
Ephemeral pairing on anonymous networks
JH Hoepman
Security in Pervasive Computing: Second International Conference, SPC 2005 …, 2005
492005
The system can't perform the operation now. Try again later.
Articles 1–20