Jan C. A. van der Lubbe

According to our database1, Jan C. A. van der Lubbe authored at least 34 papers between 1979 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Multi-scale convolutional neural network for pixel-wise reconstruction of Van Gogh's drawings.
Mach. Vis. Appl., 2019

2016
Learning Algorithms for Digital Reconstruction of Van Gogh's Drawings.
Proceedings of the Digital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and Protection, 2016

2014
A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation.
Proceedings of the Computer Security - ESORICS 2013, 2013

2011
Flaws on RFID grouping-proofs. Guidelines for future sound protocols.
J. Netw. Comput. Appl., 2011

A comprehensive RFID solution to enhance inpatient medication safety.
Int. J. Medical Informatics, 2011

Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.
Eng. Appl. Artif. Intell., 2011

2010
Vulnerability Analysis of PAP for RFID Tags
CoRR, 2010

Cryptographically secure pseudo-random bit generator for RFID tags.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
Security Flaws in a Recent Ultralightweight RFID Protocol
CoRR, 2009

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks
CoRR, 2009

A Novel Approach for Noise Reduction in the Gabor Time-frequency Domain.
Proceedings of the VISAPP 2009 - Proceedings of the Fourth International Conference on Computer Vision Theory and Applications, Lisboa, Portugal, February 5-8, 2009, 2009

Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009

Weaknesses in Two Recent Lightweight RFID Authentication Protocols.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2007
Paintings and writings in the hands of scientists.
Pattern Recognit. Lett., 2007

Private Computing with Beehive Organized Agents.
Proceedings of the SECRYPT 2007, 2007

2006
Private Bidding for Mobile Agents.
Proceedings of the SECRYPT 2006, 2006

Paper Retrieval Based on Specific Paper Features: Chain and Laid Lines.
Proceedings of the Multimedia Content Representation, 2006

Feature Selection for Paintings Classification by Optimal Tree Pruning.
Proceedings of the Multimedia Content Representation, 2006

2005
Information theoretical approach to mobile code.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2001
Dating and Authentication of Rembrandt's Etchings with the Help of Computational Intelligence.
Proceedings of the International Cultural Heritage Informatics Meeting: Proceedings from ICHIM 2001. Politechnico di Milano, Milan, Italy, September 3-7, 2001, 2001

1997
Temporal Reasoning with Fuzzy Time-Objects.
Proceedings of the 4th International Workshop on Temporal Representation and Reasoning, 1997

Robust Labeling Methods for Copy Protection of Images.
Proceedings of the Storage and Retrieval for Image and Video Databases V, 1997

A Modulated Parzen-Windows Approach for Probability Density Estimation.
Proceedings of the Advances in Intelligent Data Analysis, 1997

1995
Facial feature localization and adaptation of a generic face model for model-based coding.
Signal Process. Image Commun., 1995

1993
Two-layer coding for videotelephone.
Signal Process. Image Commun., 1993

Tracking of global motion and facial expressions of a human face in image sequences.
Proceedings of the Visual Communications and Image Processing '93, 1993

1992
Transformation of a general 3D facial model to an actual scene face.
Proceedings of the 11th IAPR International Conference on Pattern Recognition, 1992

1990
Models for Reasoning with Multiple Uncertainty in Expert Systems.
Proceedings of the Uncertainty in Knowledge Bases, 1990

KEYMEX: An expert system for the design of key management schemes.
Proceedings of the Advances in Cryptology, 1990

1987
Bivariate certainty and information measures.
Inf. Sci., 1987

1984
A generalized class of certainty and information measures.
Inf. Sci., 1984

1980
The R-Norm Information Measure
Inf. Control., May, 1980

1979
Some aspects of error bounds in feature selection.
Pattern Recognit., 1979


  Loading...