The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jaap-Henk Hoepman: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Flavio D. Garcia, Jaap-Henk Hoepman
    Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:364-377 [Conf]
  2. Richard Brinkman, Jaap-Henk Hoepman
    Secure Method Invocation in JASON. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2002, pp:29-40 [Conf]
  3. Jaap-Henk Hoepman
    Secret Key Authentication with Software-Only Verification. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:313-326 [Conf]
  4. Jaap-Henk Hoepman
    The Ephemeral Pairing Problem. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:212-226 [Conf]
  5. Harry Buhrman, Juan A. Garay, Jaap-Henk Hoepman
    Optimal Resiliency against Mobile Faults. [Citation Graph (0, 0)][DBLP]
    FTCS, 1995, pp:83-88 [Conf]
  6. Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur
    Crossing Borders: Security and Privacy Issues of the European e-Passport. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:152-167 [Conf]
  7. Jaap-Henk Hoepman
    Splitters: Objects for Online Partitioning. [Citation Graph (0, 0)][DBLP]
    OPODIS, 2003, pp:47-57 [Conf]
  8. Ricardo Corin, David Galindo, Jaap-Henk Hoepman
    Securing Data Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:626-635 [Conf]
  9. Harry Buhrman, Juan A. Garay, Jaap-Henk Hoepman, Mark Moir
    Long-Lived Renaming Made Fast. [Citation Graph (0, 0)][DBLP]
    PODC, 1995, pp:194-203 [Conf]
  10. Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi
    Optimal Routing Tables. [Citation Graph (0, 0)][DBLP]
    PODC, 1996, pp:134-142 [Conf]
  11. Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Nieuwenhuizen
    Spam Filter Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:395-410 [Conf]
  12. Jaap-Henk Hoepman
    Security, Fault-Tolerance and their Verification for Ambient Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:441-446 [Conf]
  13. Jaap-Henk Hoepman, Shay Kutten, Zvi Lotker
    Efficient Distributed Weighted Matchings on Trees. [Citation Graph (0, 0)][DBLP]
    SIROCCO, 2006, pp:115-129 [Conf]
  14. Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi
    Mutual Search (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    SODA, 1998, pp:481-489 [Conf]
  15. Jaap-Henk Hoepman
    Ephemeral Pairing on Anonymous Networks. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:101-116 [Conf]
  16. Jaap-Henk Hoepman
    Randomised Mutual Search for k>2 Agents. [Citation Graph (0, 0)][DBLP]
    DISC, 2001, pp:180-193 [Conf]
  17. Jaap-Henk Hoepman
    Uniform Deterministic Self-Stabilizing Ring-Orientation on Odd-Length Rings. [Citation Graph (0, 0)][DBLP]
    WDAG, 1994, pp:265-279 [Conf]
  18. Jaap-Henk Hoepman, Marina Papatriantafilou, Philippas Tsigas
    Self-Stabilization of Wait-Free Shared Memory Objects. [Citation Graph (0, 0)][DBLP]
    WDAG, 1995, pp:273-287 [Conf]
  19. Jaap-Henk Hoepman, John Tromp
    Binary Snapshots. [Citation Graph (0, 0)][DBLP]
    WDAG, 1993, pp:18-25 [Conf]
  20. Jaap-Henk Hoepman, Bart Jacobs
    Increased security through open source. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:1, pp:79-83 [Journal]
  21. Flavio D. Garcia, Jaap-Henk Hoepman
    Spam filter analysis [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  22. Jaap-Henk Hoepman
    Simple Distributed Weighted Matchings [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  23. Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi
    Space-Efficient Routing Tables for Almost All Networks and the Incompressibility Method [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  24. Jaap-Henk Hoepman
    Self-stabilizing mutual exclusion on a ring, even if K=N [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  25. Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi
    Mutual Search [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  26. Jaap-Henk Hoepman
    Self-Stabilizing Ring-Orientation Using Constant Space. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1998, v:144, n:1, pp:18-39 [Journal]
  27. Jaap-Henk Hoepman
    Can an operation both update the state and return a meaningful value in the asynchronous PRAM model? [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2001, v:79, n:4, pp:161-166 [Journal]
  28. Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi
    Mutual Search. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1999, v:46, n:4, pp:517-536 [Journal]
  29. Jaap-Henk Hoepman, Marina Papatriantafilou, Philippas Tsigas
    Self-Stabilization of Wait-Free Shared Memory Objects. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2002, v:62, n:5, pp:818-842 [Journal]
  30. Wan Fokkink, Jaap-Henk Hoepman, Jun Pang
    A Note on K-State Self-stabilization in a Ring with K=N. [Citation Graph (0, 0)][DBLP]
    Nord. J. Comput., 2005, v:12, n:1, pp:18-26 [Journal]
  31. Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi
    Space-efficient Routing Tables for Almost All Networks and the Incompressibility Method. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1999, v:28, n:4, pp:1414-1432 [Journal]
  32. Jaap-Henk Hoepman
    Private Handshakes. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:31-42 [Conf]
  33. Jaap-Henk Hoepman, Geert Kleinhuis
    Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart Card. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:236-247 [Conf]
  34. Jaap-Henk Hoepman, Andreas Larsson, Elad Michael Schiller, Philippas Tsigas
    Secure and Self-stabilizing Clock Synchronization in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SSS, 2007, pp:340-356 [Conf]
  35. Lukasz Chmielewski, Jaap-Henk Hoepman
    Fuzzy Private Matching (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  36. Fuzzy Private Matching (Extended Abstract). [Citation Graph (, )][DBLP]


  37. A Practical Attack on the MIFARE Classic. [Citation Graph (, )][DBLP]


  38. Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings. [Citation Graph (, )][DBLP]


  39. 06371 Abstracts Collection -- From Security to Dependability. [Citation Graph (, )][DBLP]


  40. 06371 Executive Summary -- From Security to Dependability. [Citation Graph (, )][DBLP]


  41. Using JASON to secure SOA. [Citation Graph (, )][DBLP]


  42. Client-Server Password Recovery. [Citation Graph (, )][DBLP]


  43. Practical Schemes for Privacy and Security Enhanced RFID. [Citation Graph (, )][DBLP]


  44. Increased security through open source [Citation Graph (, )][DBLP]


  45. Crossing Borders: Security and Privacy Issues of the European e-Passport [Citation Graph (, )][DBLP]


  46. Distributed Double Spending Prevention [Citation Graph (, )][DBLP]


  47. The Ephemeral Pairing Problem [Citation Graph (, )][DBLP]


  48. A Practical Attack on the MIFARE Classic [Citation Graph (, )][DBLP]


  49. Private Handshakes [Citation Graph (, )][DBLP]


  50. Client-Server Password Recovery (Extended Abstract) [Citation Graph (, )][DBLP]


  51. Practical Schemes For Privacy & Security Enhanced RFID [Citation Graph (, )][DBLP]


  52. The Privacy Coach: Supporting customer privacy in the Internet of Things [Citation Graph (, )][DBLP]


Search in 0.040secs, Finished in 0.042secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002