| 2009 |
| 19 | EE | Yee Wei Law,
Marimuthu Palaniswami,
Lodewijk van Hoesel,
Jeroen Doumen,
Pieter H. Hartel,
Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
TOSN 5(1): (2009) |
| 2008 |
| 18 | EE | Ileana Buhan,
Jeroen Doumen,
Pieter H. Hartel,
Qiang Tang,
Raymond N. J. Veldhuis:
Embedding Renewable Cryptographic Keys into Continuous Noisy Data.
ICICS 2008: 294-310 |
| 17 | EE | Saeed Sedghi,
Jeroen Doumen,
Pieter H. Hartel,
Willem Jonker:
Towards an Information Theoretic Analysis of Searchable Encryption.
ICICS 2008: 345-360 |
| 2007 |
| 16 | EE | Ileana Buhan,
Jeroen Doumen,
Pieter H. Hartel,
Raymond N. J. Veldhuis:
Fuzzy extractors for continuous distributions.
ASIACCS 2007: 353-355 |
| 15 | EE | Ileana Buhan,
Jeroen Doumen,
Pieter H. Hartel,
Raymond N. J. Veldhuis:
Feeling Is Believing: A Secure Template Exchange Protocol.
ICB 2007: 897-906 |
| 14 | EE | Lorenzo Alvisi,
Jeroen Doumen,
Rachid Guerraoui,
Boris Koldehofe,
Harry C. Li,
Robbert van Renesse,
Gilles Trédan:
How robust are gossip-based communication protocols?
Operating Systems Review 41(5): 14-18 (2007) |
| 2006 |
| 13 | | Cheun Ngen Chong,
Ricardo Corin,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Yee Wei Law,
Andrew Tokmakoff:
LicenseScript: a logical language for digital rights management.
Annales des Télécommunications 61(3-4): 284-331 (2006) |
| 12 | EE | Marcin Czenko,
Ha Tran,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications.
Electr. Notes Theor. Comput. Sci. 157(3): 113-130 (2006) |
| 11 | EE | Yee Wei Law,
Jeroen Doumen,
Pieter H. Hartel:
Survey and benchmark of block ciphers for wireless sensor networks.
TOSN 2(1): 65-93 (2006) |
| 2005 |
| 10 | EE | Yee Wei Law,
Lodewijk van Hoesel,
Jeroen Doumen,
Pieter H. Hartel,
Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
SASN 2005: 76-88 |
| 9 | | Jieyin Cheng,
Cheun Ngen Chong,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Stefan Nikolaus:
StreamTo: Streaming Content using a Tamper-Resistant Token.
SEC 2005: 601-612 |
| 8 | EE | Richard Brinkman,
Berry Schoenmakers,
Jeroen Doumen,
Willem Jonker:
Experiments with Queries over Encrypted Data Using Secret Sharing.
Secure Data Management 2005: 33-46 |
| 7 | EE | Marcin Czenko,
Ha Tran,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications
CoRR abs/cs/0510061: (2005) |
| 6 | EE | Ricardo Corin,
Jeroen Doumen,
Sandro Etalle:
Analysing Password Protocol Security Against Off-line Dictionary Attacks.
Electr. Notes Theor. Comput. Sci. 121: 47-63 (2005) |
| 2004 |
| 5 | EE | Richard Brinkman,
Jeroen Doumen,
Willem Jonker:
Using Secret Sharing for Searching in Encrypted Data.
Secure Data Management 2004: 18-27 |
| 4 | EE | Cheun Ngen Chong,
Bin Ren,
Jeroen Doumen,
Sandro Etalle,
Pieter H. Hartel,
Ricardo Corin:
License Protection with a Tamper-Resistant Token.
WISA 2004: 223-237 |
| 3 | | Richard Brinkman,
Ling Feng,
Jeroen Doumen,
Pieter H. Hartel,
Willem Jonker:
Efficient Tree Search in Encrypted Data.
WOSIS 2004: 126-135 |
| 2 | EE | Richard Brinkman,
Ling Feng,
Jeroen Doumen,
Pieter H. Hartel,
Willem Jonker:
Efficient Tree Search in Encrypted Data.
Information Systems Security 13(3): 14-21 (2004) |
| 2003 |
| 1 | | Sheng-Bo Xu,
Jeroen Doumen,
Henk C. A. van Tilborg:
On the Security of Digital Signature Schemes Based on Error-Correcting Codes.
Des. Codes Cryptography 28(2): 187-199 (2003) |