Follow
Katrin (Hoeper) Reitsma
Katrin (Hoeper) Reitsma
Security Solutions Manager, Motorola Solutions
Verified email at motorolasolutions.com
Title
Cited by
Cited by
Year
Dynamic cryptographic subscriber-device identity binding for subscriber mobility
MF Nakhjiri, K Hoeper, A Medvinsky
US Patent 8,555,361, 2013
692013
Bootstrapping security in mobile ad hoc networks using identity-based schemes with key revocation
K Hoeper, G Gong
Centre for Applied Cryptographic Research (CACR) at the University of …, 2006
682006
Key revocation for identity-based schemes in mobile ad hoc networks
K Hoeper, G Gong
Ad-Hoc, Mobile, and Wireless Networks: 5th International Conference, ADHOC …, 2006
532006
Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors
K Gudeth, M Pirretti, K Hoeper, R Buskey
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones …, 2011
412011
Models of authentication in ad hoc networks and their related network properties
K Hoeper, G Gong
International Association for Cryptologic Research, 2004
362004
Where EAP security claims fail
K Hoeper, L Chen
The fourth international conference on heterogeneous networking for quality …, 2007
332007
Pre-authentication and authentication models in ad hoc networks
K Hoeper, G Gong
Wireless Network Security, 65-82, 2007
272007
Bootstrapping security in mobile ad hoc networks using identity-based schemes
K Hoeper, G Gong
Security in Distributed and Networking Systems, 313-337, 2007
212007
Identity-based key exchange protocols for ad hoc networks
K Hoeper, G Gong
Proceedings of the Canadian Workshop on Information Theory (CWIT’05), 127-130, 2005
212005
Distribution of EAP-based keys for handover and re-authentication
K Hoeper, M Nakhjiri, Y Ohba
202010
Recommendation for EAP Methods Used in Wireless Network Access Authentication
K Hoeper, L Chen
NIST Special Publication 800, 120, 2009
192009
Channel binding support for eap methods
C Clancy, K Hoeper
draft-clancy-emu-chbind-04 (work in progress), 2008
152008
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
K Hoeper, G Gong
International Journal of Security and Networks 2 (3-4), 239-250, 2007
142007
Using the EAP framework for fast media independent handover authentication
A Izquierdo, N Golmie, K Hoeper, L Chen
4th International ICST Conference on Wireless Internet, 2010
122010
Authentication and key exchange in mobile ad hoc networks
K Hoeper
University of Waterloo, 2007
122007
An inconvenient truth about tunneled authentications
K Hoeper, L Chen
IEEE Local Computer Network Conference, 416-423, 2010
112010
Monitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks: Design and Security Analysis/Katrin Hoeper, Guang Gong
K Hoeper
Security and Privacy for Emerging Areas in Communication Networks. Waterloo …, 2009
92009
Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks
K Hoeper, G Gong
First International Conference on Security and Privacy for Emerging Areas in …, 2005
92005
Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation/Katrin Hoeper, Guang Gong
K Hoeper
Security and Privacy for Emerging Areas in Communication Networks …, 2006
62006
Efficient key exchange protocols for wireless networks and mobile devices
K Hoeper, G Gong
Cace. uwaterloo. ca, 1-18, 2005
62005
The system can't perform the operation now. Try again later.
Articles 1–20