Follow
Jaap-Henk Hoepman
Jaap-Henk Hoepman
Associate Professor of Computer Science, Radboud University Nijmegen and Associate Professor, IT Law
Verified email at cs.ru.nl - Homepage
Title
Cited by
Cited by
Year
Privacy design strategies
JH Hoepman
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
4592014
Privacy and data protection by design-from policy to engineering
G Danezis, J Domingo-Ferrer, M Hansen, JH Hoepman, DL Metayer, ...
arXiv preprint arXiv:1501.03726, 2015
3542015
A Practical Attack on the MIFARE Classic.
G de Koning Gans, JH Hoepman, FD Garcia
cardis 8, 267-282, 2008
2592008
Increased security through open source
JH Hoepman, B Jacobs
Communications of the ACM 50 (1), 79-83, 2007
2422007
Simple distributed weighted matchings
JH Hoepman
arXiv preprint cs/0410047, 2004
1702004
Crossing borders: Security and privacy issues of the european e-passport
JH Hoepman, E Hubbers, B Jacobs, M Oostdijk, RW Schreur
Advances in Information and Computer Security: First International Workshop …, 2006
1672006
A critical analysis of privacy design strategies
M Colesky, JH Hoepman, C Hillen
2016 IEEE security and privacy workshops (SPW), 33-40, 2016
1652016
The identity crisis. security, privacy and usability issues in identity management
G Alpár, JH Hoepman, J Siljee
arXiv preprint arXiv:1101.0427, 2011
962011
The ephemeral pairing problem
JH Hoepman
Financial Cryptography: 8th International Conference, FC 2004, Key West, FL …, 2004
912004
Spam filter analysis
FD Garcia, JH Hoepman, J van Nieuwenhuizen
Security and Protection in Information Processing Systems: IFIP 18 th World …, 2004
792004
Open-source intelligence and privacy by design
BJ Koops, JH Hoepman, R Leenes
Computer Law & Security Review 29 (6), 676-688, 2013
612013
Off-line karma: A decentralized currency for peer-to-peer and grid applications
FD Garcia, JH Hoepman
Applied Cryptography and Network Security: Third International Conference …, 2005
522005
Distributed double spending prevention
JH Hoepman
Security Protocols: 15th International Workshop, Brno, Czech Republic, April …, 2010
482010
Ephemeral Pairing on Anonymous Networks.
JH Hoepman
SPC 3450, 101-116, 2005
482005
Developing efficient blinded attribute certificates on smart cards via pairings
L Batina, JH Hoepman, B Jacobs, W Mostowski, P Vullers
Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010
462010
The privacy coach: Supporting customer privacy in the internet of things
G Broenink, JH Hoepman, C Hof, R Van Kranenburg, D Smits, T Wisman
arXiv preprint arXiv:1001.4459, 2010
452010
Optimal Resiliency Against Mobile Faults
H Buhrman, JA Garay, JH Hoepman.
Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant …, 1995
441995
Fast revocation of attribute-based credentials for both users and verifiers
W Lueks, G Alpár, JH Hoepman, P Vullers
computers & security 67, 308-323, 2017
432017
Privacy design strategies (the little blue book)
JH Hoepman
Nijmegen: Radboud University, 2018
412018
Long-lived renaming made fast
H Buhrman, JA Garay, JH Hoepman, M Moir
Proceedings of the fourteenth annual ACM symposium on Principles of …, 1995
381995
The system can't perform the operation now. Try again later.
Articles 1–20