Jeroen Doumen
  According to our database1,
  Jeroen Doumen
  authored at least 36 papers
  between 2003 and 2017.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2017
  2014
    Proceedings of the Media Watermarking, 2014
    
  
    Proceedings of the IEEE International Conference on Consumer Electronics, 2014
    
  
  2013
    IACR Cryptol. ePrint Arch., 2013
    
  
    Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
    
  
    Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
    
  
  2012
    Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
    
  
    Proceedings of the IEEE International Conference on Consumer Electronics, 2012
    
  
  2011
    Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011
    
  
  2010
    Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010
    
  
    Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010
    
  
  2009
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
    
  
    ACM Trans. Sens. Networks, 2009
    
  
  2008
    Proceedings of the Trust Management II, 2008
    
  
    Proceedings of the Information and Communications Security, 10th International Conference, 2008
    
  
    Proceedings of the Information and Communications Security, 10th International Conference, 2008
    
  
    Proceedings of the 2008 16th European Signal Processing Conference, 2008
    
  
  2007
    ACM SIGOPS Oper. Syst. Rev., 2007
    
  
    Proceedings of the Advances in Biometrics, International Conference, 2007
    
  
    Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
    
  
  2006
    ACM Trans. Sens. Networks, 2006
    
  
    Ann. des Télécommunications, 2006
    
  
  2005
    Proceedings of the First International Workshop on Security and Trust Management, 2005
    
  
StreamTo: Streaming Content using a Tamper-Resistant Token.
  
    Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
    
  
    Proceedings of the Secure Data Management, 2005
    
  
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
    
  
    Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005
    
  
  2004
    Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004
    
  
    Proceedings of the Information Security Applications, 5th International Workshop, 2004
    
  
Efficient Tree Search in Encrypted Data.
  
    Proceedings of the Security In Information Systems, 2004
    
  
    Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004
    
  
    Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004
    
  
  2003
On the Security of Digital Signature Schemes Based on Error-Correcting Codes.
  
    Des. Codes Cryptogr., 2003