Search

Your search keyword '"Hoepman, Jaap-henk"' showing total 440 results

Search Constraints

Start Over You searched for: Author "Hoepman, Jaap-henk" Remove constraint Author: "Hoepman, Jaap-henk"
440 results on '"Hoepman, Jaap-henk"'

Search Results

1. The GDPR's Rules on Data Breaches: Analysing Their Rationales and Effects

2. Privacy Engineering From Principles to Practice: A Roadmap

3. A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs

4. Mutual Contact Discovery

6. Privacy Friendly E-Ticketing For Public Transport

7. Hansel and Gretel and the Virus: Privacy Conscious Contact Tracing

8. Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning

9. A Critique of the Google Apple Exposure Notification (GAEN) Framework

11. Hydra: A Multiple Blockchain Protocol for Improving Transaction Throughput

13. A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs

14. Privacy and Data Protection by Design - from policy to engineering

15. Privacy Engineering From Principles to Practice: A Roadmap

16. Privacy Design Strategies

18. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

19. The Privacy Coach: Supporting customer privacy in the Internet of Things

20. Practical Schemes For Privacy & Security Enhanced RFID

21. Client-Server Password Recovery (Extended Abstract)

22. Private Handshakes

23. A Practical Attack on the MIFARE Classic

24. Distributed Double Spending Prevention

25. The Ephemeral Pairing Problem

26. Crossing Borders: Security and Privacy Issues of the European e-Passport

27. Increased security through open source

28. Fuzzy Private Matching (Extended Abstract)

29. The Self-blindable U-Prove Scheme from FC’14 Is Forgeable (Short Paper)

30. An Efficient Self-blindable Attribute-Based Credential Scheme

31. Simple Distributed Weighted Matchings

32. Spam filter analysis

33. Self-stabilizing mutual exclusion on a ring, even if K=N

34. Space-Efficient Routing Tables for Almost All Networks and the Incompressibility Method

35. Mutual Search

37. Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies

38. Revocable Privacy: Principles, Use Cases, and Technologies

39. Towards Measuring Maturity of Privacy-Enhancing Technologies

42. Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers

43. On Linkability and Malleability in Self-blindable Credentials

44. Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice

45. Non-Interactive Privacy-Preserving Sybil-Free Authentication Scheme in VANETs

47. High-Speed Dating Privacy-Preserving Attribute Matching for RFID

48. Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards

49. Forward-Secure Distributed Encryption

Catalog

Books, media, physical & digital resources