2009 |
19 | EE | Yee Wei Law,
Marimuthu Palaniswami,
Lodewijk van Hoesel,
Jeroen Doumen,
Pieter H. Hartel,
Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
TOSN 5(1): (2009) |
2008 |
18 | EE | Ileana Buhan,
Jeroen Doumen,
Pieter H. Hartel,
Qiang Tang,
Raymond N. J. Veldhuis:
Embedding Renewable Cryptographic Keys into Continuous Noisy Data.
ICICS 2008: 294-310 |
17 | EE | Saeed Sedghi,
Jeroen Doumen,
Pieter H. Hartel,
Willem Jonker:
Towards an Information Theoretic Analysis of Searchable Encryption.
ICICS 2008: 345-360 |
2007 |
16 | EE | Ileana Buhan,
Jeroen Doumen,
Pieter H. Hartel,
Raymond N. J. Veldhuis:
Fuzzy extractors for continuous distributions.
ASIACCS 2007: 353-355 |
15 | EE | Ileana Buhan,
Jeroen Doumen,
Pieter H. Hartel,
Raymond N. J. Veldhuis:
Feeling Is Believing: A Secure Template Exchange Protocol.
ICB 2007: 897-906 |
14 | EE | Lorenzo Alvisi,
Jeroen Doumen,
Rachid Guerraoui,
Boris Koldehofe,
Harry C. Li,
Robbert van Renesse,
Gilles Trédan:
How robust are gossip-based communication protocols?
Operating Systems Review 41(5): 14-18 (2007) |
2006 |
13 | | Cheun Ngen Chong,
Ricardo Corin,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Yee Wei Law,
Andrew Tokmakoff:
LicenseScript: a logical language for digital rights management.
Annales des Télécommunications 61(3-4): 284-331 (2006) |
12 | EE | Marcin Czenko,
Ha Tran,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications.
Electr. Notes Theor. Comput. Sci. 157(3): 113-130 (2006) |
11 | EE | Yee Wei Law,
Jeroen Doumen,
Pieter H. Hartel:
Survey and benchmark of block ciphers for wireless sensor networks.
TOSN 2(1): 65-93 (2006) |
2005 |
10 | EE | Yee Wei Law,
Lodewijk van Hoesel,
Jeroen Doumen,
Pieter H. Hartel,
Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
SASN 2005: 76-88 |
9 | | Jieyin Cheng,
Cheun Ngen Chong,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Stefan Nikolaus:
StreamTo: Streaming Content using a Tamper-Resistant Token.
SEC 2005: 601-612 |
8 | EE | Richard Brinkman,
Berry Schoenmakers,
Jeroen Doumen,
Willem Jonker:
Experiments with Queries over Encrypted Data Using Secret Sharing.
Secure Data Management 2005: 33-46 |
7 | EE | Marcin Czenko,
Ha Tran,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications
CoRR abs/cs/0510061: (2005) |
6 | EE | Ricardo Corin,
Jeroen Doumen,
Sandro Etalle:
Analysing Password Protocol Security Against Off-line Dictionary Attacks.
Electr. Notes Theor. Comput. Sci. 121: 47-63 (2005) |
2004 |
5 | EE | Richard Brinkman,
Jeroen Doumen,
Willem Jonker:
Using Secret Sharing for Searching in Encrypted Data.
Secure Data Management 2004: 18-27 |
4 | EE | Cheun Ngen Chong,
Bin Ren,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Ricardo Corin:
License Protection with a Tamper-Resistant Token.
WISA 2004: 223-237 |
3 | | Richard Brinkman,
Ling Feng,
Jeroen Doumen,
Pieter H. Hartel,
Willem Jonker:
Efficient Tree Search in Encrypted Data.
WOSIS 2004: 126-135 |
2 | EE | Richard Brinkman,
Ling Feng,
Jeroen Doumen,
Pieter H. Hartel,
Willem Jonker:
Efficient Tree Search in Encrypted Data.
Information Systems Security 13(3): 14-21 (2004) |
2003 |
1 | | Sheng-Bo Xu,
Jeroen Doumen,
Henk C. A. van Tilborg:
On the Security of Digital Signature Schemes Based on Error-Correcting Codes.
Des. Codes Cryptography 28(2): 187-199 (2003) |