Search

Your search keyword '"Hoepman, Jaap-Henk"' showing total 439 results

Search Constraints

Start Over You searched for: Author "Hoepman, Jaap-Henk" Remove constraint Author: "Hoepman, Jaap-Henk"
439 results on '"Hoepman, Jaap-Henk"'

Search Results

1. The GDPR's Rules on Data Breaches: Analysing Their Rationales and Effects

2. Privacy Engineering From Principles to Practice: A Roadmap

3. Mutual Contact Discovery

4. A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs

6. Privacy Friendly E-Ticketing For Public Transport

7. Hansel and Gretel and the Virus: Privacy Conscious Contact Tracing

8. A Critique of the Google Apple Exposure Notification (GAEN) Framework

9. Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning

10. Hydra: A Multiple Blockchain Protocol for Improving Transaction Throughput

13. Privacy and Data Protection by Design - from policy to engineering

14. Privacy Engineering From Principles to Practice: A Roadmap

15. A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs

16. Privacy Design Strategies

18. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

19. The Privacy Coach: Supporting customer privacy in the Internet of Things

20. Practical Schemes For Privacy & Security Enhanced RFID

21. Client-Server Password Recovery (Extended Abstract)

22. Private Handshakes

23. A Practical Attack on the MIFARE Classic

24. Distributed Double Spending Prevention

25. The Ephemeral Pairing Problem

26. Crossing Borders: Security and Privacy Issues of the European e-Passport

27. Increased security through open source

28. Fuzzy Private Matching (Extended Abstract)

29. Simple Distributed Weighted Matchings

30. Spam filter analysis

31. Self-stabilizing mutual exclusion on a ring, even if K=N

32. Space-Efficient Routing Tables for Almost All Networks and the Incompressibility Method

33. Mutual Search

34. The Self-blindable U-Prove Scheme from FC’14 Is Forgeable (Short Paper)

35. An Efficient Self-blindable Attribute-Based Credential Scheme

39. Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies

40. Revocable Privacy: Principles, Use Cases, and Technologies

41. Towards Measuring Maturity of Privacy-Enhancing Technologies

42. Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers

43. On Linkability and Malleability in Self-blindable Credentials

45. Non-Interactive Privacy-Preserving Sybil-Free Authentication Scheme in VANETs

47. High-Speed Dating Privacy-Preserving Attribute Matching for RFID

48. Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards

49. Forward-Secure Distributed Encryption

Catalog

Books, media, physical & digital resources