Jaap-Henk Hoepman

Orcid: 0000-0003-4234-1578

According to our database1, Jaap-Henk Hoepman authored at least 89 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy Engineering From Principles to Practice: A Roadmap.
IEEE Secur. Priv., 2024

2023
Two faces of blindness.
Des. Codes Cryptogr., August, 2023

Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice.
Des. Codes Cryptogr., 2023

2022
Practical Multi-Party Private Set Intersection Protocols.
IEEE Trans. Inf. Forensics Secur., 2022

Mutual Contact Discovery.
CoRR, 2022

Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning.
Proceedings of the Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30, 2022

2021
Decentralisation: a multidisciplinary perspective.
Internet Policy Rev., 2021

Decentralisation in the blockchain space.
Internet Policy Rev., 2021

Privacy Friendly E-Ticketing For Public Transport.
CoRR, 2021

Hansel and Gretel and the Virus: Privacy Conscious Contact Tracing.
CoRR, 2021

2020
A Critique of the Google Apple Exposure Notification (GAEN) Framework.
CoRR, 2020

2019
Hydra: A Multiple Blockchain Protocol for Improving Transaction Throughput.
CoRR, 2019

2018
A system of privacy patterns for user control.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

2017
An efficient self-blindable attribute-based credential scheme.
IACR Cryptol. ePrint Arch., 2017

Privacy Impact Assessments in Practice: Outcome of a Descriptive Field Research in the Netherlands.
Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th IEEE Symposium on Security and Privacy, 2017

Privacy Friendly Aggregation of Smart Meter Readings, Even When Meters Crash.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

2016
Vote to Link: Recovering from Misbehaving Anonymous Users.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

A Critical Analysis of Privacy Design Strategies.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

The Self-blindable U-Prove Scheme from FC'14 Is Forgeable (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

2015
The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable.
IACR Cryptol. ePrint Arch., 2015

Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers.
IACR Cryptol. ePrint Arch., 2015

On Linkability and Malleability in Self-blindable Credentials.
IACR Cryptol. ePrint Arch., 2015

Privacy and Data Protection by Design - from policy to engineering.
CoRR, 2015

Privately (and Unlinkably) Exchanging Messages Using a Public Bulletin Board.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Revocable Privacy: Principles, Use Cases, and Technologies.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

Towards Measuring Maturity of Privacy-Enhancing Technologies.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

2014
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards.
IACR Cryptol. ePrint Arch., 2014

Privacy Design Strategies - (Extended Abstract).
Proceedings of the ICT Systems Security and Privacy Protection, 2014

High-Speed Dating Privacy-Preserving Attribute Matching for RFID.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

Forward-Secure Distributed Encryption.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

2013
An Attack Against Fixed Value Discrete Logarithm Representations.
IACR Cryptol. ePrint Arch., 2013

Open-source intelligence and privacy by design.
Comput. Law Secur. Rev., 2013

UbiKiMa: ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography.
Proceedings of the DIM'13, 2013

A secure channel for attribute-based credentials: [short paper].
Proceedings of the DIM'13, 2013

2012
Privacy Design Strategies
CoRR, 2012

2011
Secure and self-stabilizing clock synchronization in sensor networks.
Theor. Comput. Sci., 2011

In Things We Trust? Towards trustability in the Internet of Things
CoRR, 2011

The Identity Crisis. Security, Privacy and Usability Issues in Identity Management
CoRR, 2011

Non-interactive distributed encryption: a new primitive for revocable privacy.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals.
Proceedings of the Privacy and Identity Management for Life, 2011

Mobile Identity Management.
Proceedings of the Communications and Multimedia Security, 2011

In Things We Trust? Towards Trustability in the Internet of Things - (Extended Abstract).
Proceedings of the Constructing Ambient Intelligence, 2011

2010
The Privacy Coach: Supporting customer privacy in the Internet of Things
CoRR, 2010

Practical Schemes for Privacy and Security Enhanced RFID.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Privacy Enhanced Fraud Resistant Road Pricing.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
Practical Schemes For Privacy & Security Enhanced RFID
CoRR, 2009

Client-Server Password Recovery (Extended Abstract)
CoRR, 2009

Client-Server Password Recovery.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

2008
Using JASON to secure SOA.
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, 2008

Comparing Identity Management Frameworks in a Business Context.
Proceedings of the Future of Identity in the Information Society, 2008

A Practical Attack on the MIFARE Classic.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Fuzzy Private Matching (Extended Abstract).
IACR Cryptol. ePrint Arch., 2007

Increased security through open source.
Commun. ACM, 2007

Distributed Double Spending Prevention (Transcript of Discussion).
Proceedings of the Security Protocols, 2007

Distributed Double Spending Prevention.
Proceedings of the Security Protocols, 2007

Remote Management and Secure Application Development for Pervasive Home Systems Using JASON.
Proceedings of the Third International Workshop on Security, 2007

Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart Card.
Proceedings of the Public Key Infrastructure, 2007

Private Handshakes.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

2006
Efficient Distributed Weighted Matchings on Trees.
Proceedings of the Structural Information and Communication Complexity, 2006

Securing Data Accountability in Decentralized Systems.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Crossing Borders: Security and Privacy Issues of the European e-Passport.
Proceedings of the Advances in Information and Computer Security, 2006

06371 Abstracts Collection -- From Security to Dependability.
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006

06371 Executive Summary -- From Security to Dependability.
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006

2005
A Note on K-State Self-stabilization in a Ring with K=N.
Nord. J. Comput., 2005

Ephemeral Pairing on Anonymous Networks.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Simple Distributed Weighted Matchings
CoRR, 2004

Spam filter analysis
CoRR, 2004

Spam Filter Analysis.
Proceedings of the Security and Protection in Information Processing Systems, 2004

The Ephemeral Pairing Problem.
Proceedings of the Financial Cryptography, 2004

2003
Security, Fault-Tolerance and their Verification for Ambient Systems.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Splitters: Objects for Online Partitioning.
Proceedings of the Principles of Distributed Systems, 7th International Conference, 2003

2002
Self-Stabilization of Wait-Free Shared Memory Objects.
J. Parallel Distributed Comput., 2002

Secure Method Invocation in JASON.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

2001
Can an operation both update the state and return a meaningful value in the asynchronous PRAM model?
Inf. Process. Lett., 2001

Randomised Mutual Search for k>2 Agents.
Proceedings of the Distributed Computing, 15th International Conference, 2001

2000
Secret Key Authentication with Software-Only Verification.
Proceedings of the Financial Cryptography, 2000

1999
Space-efficient Routing Tables for Almost All Networks and the Incompressibility Method.
SIAM J. Comput., 1999

Mutual Search.
J. ACM, 1999

Self-stabilizing mutual exclusion on a ring, even if K=N
CoRR, 1999

1998
Self-Stabilizing Ring-Orientation Using Constant Space.
Inf. Comput., 1998

Mutual Search (Extended Abstract).
Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, 1998

1996
Optimal Routing Tables.
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

1995
Long-Lived Renaming Made Fast.
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

Optimal Resiliency against Mobile Faults.
Proceedings of the Digest of Papers: FTCS-25, 1995

1994
Uniform Deterministic Self-Stabilizing Ring-Orientation on Odd-Length Rings.
Proceedings of the Distributed Algorithms, 8th International Workshop, 1994

1993
Binary Snapshots.
Proceedings of the Distributed Algorithms, 7th International Workshop, 1993


  Loading...