Author Publications

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Jump to: 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 1999
Number of items: 59.

2010

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2010) Embedding renewable cryptographic keys into noisy data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262

Liesdonk, Peter van and Sedghi, Saeed and Doumen, Jeroen and Hartel, Pieter and Jonker, Willem (2010) Computationally Efficient Searchable Symmetric Encryption. In: 7th VLDB Workshop on Secure Data Management, SDM 2010, 17 Sep 2010, Singapore (pp. pp. 87-100).

2009

Buhan, I.R. and Boom, B.J. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2009) Secure pairing with biometrics. International Journal of Security and Networks, 4 (1/2). pp. 27-42. ISSN 1747-8405

Law, Y.W. and Palaniswami, M. and Hoesel, L.F.W. van and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2009) Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks, 5 (1). p. 6. ISSN 1550-4859

Sedghi, S. and Liesdonk, P. van and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2009) Adaptively Secure Computationally Efficient Searchable Symmetric Encryption. [Report]

2008

Barosso, D. and Bartle, R. and Chazeran, C. and Zwart, M. de and Doumen, J.M. and Gorniak, S. and Kaźmierczak, M. and Kaskenmaa, M. and Benavente López, D. and Martin, A. and Naumann, I. and Reynolds, R. and Richardson, J. and Rossow, C. and Rywczyoska, A. and Thumann, M. (2008) Security and privacy in massively-multiplayer online games and social and corporate virtual worlds. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, ICICS, October 20-22, 2008, Birmingham, UK (pp. pp. 294-310).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter (2008) Controlling Leakage Of Biometric Information Using Dithering. In: 16th European Signal Processing Conference, EUSIPCO, 25-29 August 2008, Lausanne, Switzerland.

Czenko, Marcin and Doumen, Jeroen and Etalle, Sandro (2008) Trust Management in P2P Systems Using Standard TuLiP. In: IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway (pp. pp. 1-16).

Czenko, Marcin and Doumen, Jeroen and Etalle, Sandro (2008) Trust Management in P2P systems using Standard TuLiP. [Report]

Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption. In: 10th international conference on information and communication security, 20-22 Oct 2008, Birmingham, UK (pp. pp. 345-360).

Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version). [Report]

Zych, Anna K. and Doumen, Jeroen M. and Jonker, Willem and Hartel, Pieter H. and Petkovic, Milan (2008) Method of Key Management. Patent.

2007

Alvisi, L. and Doumen, J.M. and Guerraoui, R. and Koldehofe, B. and Li, H. and Renesse, R. van and Tredan, G. (2007) How robust are gossip-based communication protocols? Operating Systems Review, 41 (5). pp. 14-18. ISSN 0163-5980

Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. In: First International Workshop on Security for Spontaneous Interaction, 16. September 2007, Innsbruck, Austria (pp. pp. 450-456).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Feeling Is Believing: A Secure Template Exchange Protocol. In: International Conference on Biometrics, ICB 2007, August 27-29, 2007, Seoul, Korea (pp. pp. 897-906).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) From Watermarks to Fuzzy Extractors: a Practical Construction. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Constructing practical Fuzzy Extractors using QIM. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) A unifying view on template protection schemes. In: 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands (pp. pp. 353-42).

Doumen, J.M. (2007) Non-interactive fuzzy private matching. [Report] (In Press)

Law, Y.W. and Doumen, J.M. and Palaniswami, M. (2007) Key Management Building Blocks for Wireless Sensor Networks. [Report] (In Press)

2006

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Fuzzy extractors for continuous distributions. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Fuzzy extractors for continuous distributions. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS, 20-22 March 2007, Singapore (pp. pp. 353-355).

Chong, C.N. and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Y.W. and Tokmakoff, A. (2006) LicenseScript: A Logical Language for Digital Rights Management. Annals of telecommunications special issue on Network and Information systems security, 61 (3-4). pp. 284-331. ISSN 0003-4347

Czenko, Marcin and Tran, Ha and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Hartog, Jerry den (2006) Nonmonotonic Trust Management for P2P Applications. Electronic Notes in Theoretical Computer Science (ENTCS), 157 (3). pp. 113-130. ISSN 1571-0661

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2006) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Transactions on Sensor Networks, 2 (1). pp. 65-93. ISSN 1550-4859

Zych, Anna K. and Doumen, Jeroen M. and Jonker, Willem and Hartel, Pieter and Petkovic, Milan (2006) Method of Key Management. Patent.

2005

Brinkman, R. and Schoenmakers, B. and Doumen, J. and Jonker, W. (2005) Experiments with Queries over Encrypted Data Using Secret Sharing. [Report]

Brinkman, R. and Schoenmakers, B. and Doumen, J.M. and Jonker, W. (2005) Experiments With Queries Over Encrypted Data Using Secret Sharing. In: VLDB Workshop on Secure Data Management (SDM), Trondheim, Norway (pp. pp. 33-46).

Cheng, Jieyin and Chong, Cheun Ngen and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Nikolaus, Stefan (2005) STREAMTO: Streaming Content using a Tamper-Resistant Token (Workshop paper). In: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (pp. pp. 601-612).

Chong, Cheun Ngen and Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei and Tokmakoff, Andrew (2005) LicenseScript : a logical language for digital rights management. [Report]

Czenko, Marcin and Doumen, Jeroen and Etalle, Sandro (2005) Trust in Virtual Communities. ERCIM News -- Special: Security and Trust Management, 63 . pp. 29-30.

Czenko, Marcin and Tran, Ha and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Hartog, Jerry den (2005) Nonmonotonic trust management for P2P applications. [Report]

Jonker, Willem and Brinkman, Richard and Doumen, Jeroen M. and Schoenmakers, Berry (2005) Method of and device for querying of protected structured data. Patent.

Law, Yee Wei and Doumen, Jeroen and Hartel, Pieter (2005) Benchmarking block ciphers for wireless sensor networks. [Report]

Law, Yee Wei and Hoesel, Lodewijk van and Doumen, Jeroen and Hartel, Pieter and Havinga, Paul (2005) Energy-Efficient Link-Layer Jamming Attacks against Three Wireless Sensor Network MAC Protocols. In: 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN, November 07, 2005, Alexandria, VA, USA (pp. pp. 76-88).

Law, Yee Wei and Hoesel, Lodewijk van and Doumen, Jeroen and Hartel, Pieter and Havinga, Paul (2005) Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. [Report]

Zych, Anna and Doumen, Jeroen and Hartel, Pieter and Jonker, Willem (2005) A Diffie-Hellman based key management scheme for hierarchical access control. [Report]

2004

Brinkman, R. and Doumen, J.M. and Jonker, W. (2004) Using secret sharing for searching in encrypted data. In: VLDB 2004 Workshop on Secure data management, SDM 2004, Toronto, Canada (pp. pp. 18-27).

Brinkman, R. and Feng, L. and Doumen, J. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Information systems security, 13 (3). pp. 14-21. ISSN 1065-898X

Brinkman, R. and Feng, L. and Doumen, J. and Hartel, P.H. and Jonker, W. (2004) Efficient tree search in encrypted data. [Report]

Brinkman, R. and Feng, L. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. In: Proceedings of the 2nd International Workshop on Security In Information Systems (WOSIS), 13-14 Apr 2004, Porto, Portugal (pp. pp. 126-135).

Brinkman, Richard and Doumen, Jeroen and Jonker, Willem (2004) Using secret sharing for searching in encrypted data. [Report]

Cheng, Jieyin and Chong, Cheun Ngen and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Nikolaus, Stefan (2004) STREAMTO: streaming content using a tamper-resistant token. [Report]

Chong, Cheun Ngen and Ren, Bin and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Corin, Ricardo (2004) License protection with a tamper-resistant token. In: 5th International Workshop Information Security Applications, WISA 2004, August 23-25, 2004, Jeju Island, Korea (pp. pp. 223-238).

Chong, Cheun Ngen and Ren, Bin and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Corin, Ricardo (2004) License protection with a tamper-resistant token. [Report]

Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro (2004) Analysing Password Protocol Security Against Off-line Dictionary Attacks. In: Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004). Electronic Notes in Theoretical Computer Science, 121 (4). Elsevier, pp. 47-63.

Doumen, J.M. and Brinkman, R. and Jonker, W. (2004) Searching in Encrypted Data. In: Finite Fields: Theory and Applications, 5-11 Dec 2004, Oberwolfach, Germany (pp. p. 2951).

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2004) Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract). In: IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2004, 25-27 October 2004, Fort Lauderdale, FL, USA (pp. pp. 447-456).

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2004) Benchmarking Block Ciphers for Wireless Sensor Networks. In: IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004 (pp. pp. 447-456).

Law, Yee Wei and Doumen, Jeroen and Hartel, Pieter (2004) Survey and benchmark of block ciphers for wireless sensor networks. [Report]

2003

Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro (2003) Analysing password protocol security against off-line dictionary attacks. [Report]

Doumen, J.M. (2003) Some Applications of Coding Theory in Cryptography. thesis.

Law, Y.W. and Doumen, J.M. and Hartel, P.H. (2003) EnergY-Efficient Sensor CRYptographic Module. In: Proceedings of the 14th ProRISC workshop on Circuits, Systems and Signal Processing.

Xu, Sheng-bo and Doumen, Jeroen and Tilborg, Henk van (2003) On the security of digital signature schemes based on error-correcting codes. Designs, Codes and Cryptography, 28 (2). pp. 187-199. ISSN 0925-1022

2002

Verheul, E. and Doumen, J.M. and Tilborg, H.C.A. van (2002) Sloppy Alice Attacks! Adaptive Chosen Ciphertext Attacks on the McEliece cryptosystem. In: Information, Coding and Mathematics. Kluwer Academic Publishers, Boston, Massachusetts, pp. 99-119. ISBN 9781402070792

1999

Croo de Jongh, du, M.S.L. and Doumen, J.M. and Leeuwen, van, J.M.J. (1999) Density matrix technique for ground state calculations. Computer Physics Communications, 121/12 (Sept/O). pp. 483-488. ISSN 0010-4655

This list was generated on Thu Oct 23 05:34:13 2014 CEST.