Jeroen Doumen

According to our database1, Jeroen Doumen authored at least 36 papers between 2003 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Improved privacy of dynamic group services.
EURASIP J. Information Security, 2017

2015
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes.
IEEE Trans. Information Theory, 2015

2014
Tuple decoders for traitor tracing schemes.
IACR Cryptology ePrint Archive, 2014

A watermarking system for adaptive streaming.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

2013
Dynamic Tardos Traitor Tracing Schemes.
IEEE Trans. Information Theory, 2013

The Holey Grail: A special score function for non-binary traitor tracing.
IACR Cryptology ePrint Archive, 2013

Optimal Suspicion Functions for Tardos Traitor Tracing Schemes.
IACR Cryptology ePrint Archive, 2013

2012
Faster batch forgery identification.
IACR Cryptology ePrint Archive, 2012

Dynamic traitor tracing for arbitrary alphabets: Divide and conquer.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Session-based watermarking in live IPTV environment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

2011
Watermarking for Adaptive Streaming Protocols.
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011

2010
Embedding renewable cryptographic keys into noisy data.
Int. J. Inf. Sec., 2010

Computationally Efficient Searchable Symmetric Encryption.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

An Evaluation Framework for Content Recommender Systems The Industry Perspective.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

2009
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
TOSN, 2009

Secure pairing with biometrics.
IJSN, 2009

Fuzzy extractors for continuous distributions.
IACR Cryptology ePrint Archive, 2009

2008
Trust Management in P2P Systems Using Standard TuLiP.
Proceedings of the Trust Management II, 2008

Towards an Information Theoretic Analysis of Searchable Encryption.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Embedding Renewable Cryptographic Keys into Continuous Noisy Data.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Controlling leakage of biometric information using dithering.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

2007
How robust are gossip-based communication protocols?
Operating Systems Review, 2007

Feeling Is Believing: A Secure Template Exchange Protocol.
Proceedings of the Advances in Biometrics, International Conference, 2007

Fuzzy extractors for continuous distributions.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Survey and benchmark of block ciphers for wireless sensor networks.
TOSN, 2006

Nonmonotonic Trust Management for P2P Applications.
Electron. Notes Theor. Comput. Sci., 2006

LicenseScript: a logical language for digital rights management.
Annales des Télécommunications, 2006

2005
Analysing Password Protocol Security Against Off-line Dictionary Attacks.
Electron. Notes Theor. Comput. Sci., 2005

StreamTo: Streaming Content using a Tamper-Resistant Token.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Experiments with Queries over Encrypted Data Using Secret Sharing.
Proceedings of the Secure Data Management, 2005

Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

2004
Efficient Tree Search in Encrypted Data.
Information Systems Security, 2004

License Protection with a Tamper-Resistant Token.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Using Secret Sharing for Searching in Encrypted Data.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Benchmarking block ciphers for wireless sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

2003
On the Security of Digital Signature Schemes Based on Error-Correcting Codes.
Des. Codes Cryptogr., 2003


  Loading...