2008 |
6 | EE | Lukasz Chmielewski,
Richard Brinkman,
Jaap-Henk Hoepman,
Bert Bos:
Using JASON to secure SOA.
Middleware Security 2008: 13-18 |
2005 |
5 | EE | Richard Brinkman,
Berry Schoenmakers,
Jeroen Doumen,
Willem Jonker:
Experiments with Queries over Encrypted Data Using Secret Sharing.
Secure Data Management 2005: 33-46 |
2004 |
4 | EE | Richard Brinkman,
Jeroen Doumen,
Willem Jonker:
Using Secret Sharing for Searching in Encrypted Data.
Secure Data Management 2004: 18-27 |
3 | | Richard Brinkman,
Ling Feng,
Jeroen Doumen,
Pieter H. Hartel,
Willem Jonker:
Efficient Tree Search in Encrypted Data.
WOSIS 2004: 126-135 |
2 | EE | Richard Brinkman,
Ling Feng,
Jeroen Doumen,
Pieter H. Hartel,
Willem Jonker:
Efficient Tree Search in Encrypted Data.
Information Systems Security 13(3): 14-21 (2004) |
2002 |
1 | EE | Richard Brinkman,
Jaap-Henk Hoepman:
Secure Method Invocation in JASON.
CARDIS 2002: 29-40 |