Search the dblp DataBase
Jaap-Henk Hoepman :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Flavio D. Garcia , Jaap-Henk Hoepman Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:364-377 [Conf ] Richard Brinkman , Jaap-Henk Hoepman Secure Method Invocation in JASON. [Citation Graph (0, 0)][DBLP ] CARDIS, 2002, pp:29-40 [Conf ] Jaap-Henk Hoepman Secret Key Authentication with Software-Only Verification. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:313-326 [Conf ] Jaap-Henk Hoepman The Ephemeral Pairing Problem. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:212-226 [Conf ] Harry Buhrman , Juan A. Garay , Jaap-Henk Hoepman Optimal Resiliency against Mobile Faults. [Citation Graph (0, 0)][DBLP ] FTCS, 1995, pp:83-88 [Conf ] Jaap-Henk Hoepman , Engelbert Hubbers , Bart Jacobs , Martijn Oostdijk , Ronny Wichers Schreur Crossing Borders: Security and Privacy Issues of the European e-Passport. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:152-167 [Conf ] Jaap-Henk Hoepman Splitters: Objects for Online Partitioning. [Citation Graph (0, 0)][DBLP ] OPODIS, 2003, pp:47-57 [Conf ] Ricardo Corin , David Galindo , Jaap-Henk Hoepman Securing Data Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2006, pp:626-635 [Conf ] Harry Buhrman , Juan A. Garay , Jaap-Henk Hoepman , Mark Moir Long-Lived Renaming Made Fast. [Citation Graph (0, 0)][DBLP ] PODC, 1995, pp:194-203 [Conf ] Harry Buhrman , Jaap-Henk Hoepman , Paul M. B. Vitányi Optimal Routing Tables. [Citation Graph (0, 0)][DBLP ] PODC, 1996, pp:134-142 [Conf ] Flavio D. Garcia , Jaap-Henk Hoepman , Jeroen van Nieuwenhuizen Spam Filter Analysis. [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:395-410 [Conf ] Jaap-Henk Hoepman Security, Fault-Tolerance and their Verification for Ambient Systems. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:441-446 [Conf ] Jaap-Henk Hoepman , Shay Kutten , Zvi Lotker Efficient Distributed Weighted Matchings on Trees. [Citation Graph (0, 0)][DBLP ] SIROCCO, 2006, pp:115-129 [Conf ] Harry Buhrman , Matthew K. Franklin , Juan A. Garay , Jaap-Henk Hoepman , John Tromp , Paul M. B. Vitányi Mutual Search (Extended Abstract). [Citation Graph (0, 0)][DBLP ] SODA, 1998, pp:481-489 [Conf ] Jaap-Henk Hoepman Ephemeral Pairing on Anonymous Networks. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:101-116 [Conf ] Jaap-Henk Hoepman Randomised Mutual Search for k>2 Agents. [Citation Graph (0, 0)][DBLP ] DISC, 2001, pp:180-193 [Conf ] Jaap-Henk Hoepman Uniform Deterministic Self-Stabilizing Ring-Orientation on Odd-Length Rings. [Citation Graph (0, 0)][DBLP ] WDAG, 1994, pp:265-279 [Conf ] Jaap-Henk Hoepman , Marina Papatriantafilou , Philippas Tsigas Self-Stabilization of Wait-Free Shared Memory Objects. [Citation Graph (0, 0)][DBLP ] WDAG, 1995, pp:273-287 [Conf ] Jaap-Henk Hoepman , John Tromp Binary Snapshots. [Citation Graph (0, 0)][DBLP ] WDAG, 1993, pp:18-25 [Conf ] Jaap-Henk Hoepman , Bart Jacobs Increased security through open source. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:1, pp:79-83 [Journal ] Flavio D. Garcia , Jaap-Henk Hoepman Spam filter analysis [Citation Graph (0, 0)][DBLP ] CoRR, 2004, v:0, n:, pp:- [Journal ] Jaap-Henk Hoepman Simple Distributed Weighted Matchings [Citation Graph (0, 0)][DBLP ] CoRR, 2004, v:0, n:, pp:- [Journal ] Harry Buhrman , Jaap-Henk Hoepman , Paul M. B. Vitányi Space-Efficient Routing Tables for Almost All Networks and the Incompressibility Method [Citation Graph (0, 0)][DBLP ] CoRR, 1999, v:0, n:, pp:- [Journal ] Jaap-Henk Hoepman Self-stabilizing mutual exclusion on a ring, even if K=N [Citation Graph (0, 0)][DBLP ] CoRR, 1999, v:0, n:, pp:- [Journal ] Harry Buhrman , Matthew K. Franklin , Juan A. Garay , Jaap-Henk Hoepman , John Tromp , Paul M. B. Vitányi Mutual Search [Citation Graph (0, 0)][DBLP ] CoRR, 1999, v:0, n:, pp:- [Journal ] Jaap-Henk Hoepman Self-Stabilizing Ring-Orientation Using Constant Space. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1998, v:144, n:1, pp:18-39 [Journal ] Jaap-Henk Hoepman Can an operation both update the state and return a meaningful value in the asynchronous PRAM model? [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2001, v:79, n:4, pp:161-166 [Journal ] Harry Buhrman , Matthew K. Franklin , Juan A. Garay , Jaap-Henk Hoepman , John Tromp , Paul M. B. Vitányi Mutual Search. [Citation Graph (0, 0)][DBLP ] J. ACM, 1999, v:46, n:4, pp:517-536 [Journal ] Jaap-Henk Hoepman , Marina Papatriantafilou , Philippas Tsigas Self-Stabilization of Wait-Free Shared Memory Objects. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 2002, v:62, n:5, pp:818-842 [Journal ] Wan Fokkink , Jaap-Henk Hoepman , Jun Pang A Note on K-State Self-stabilization in a Ring with K=N. [Citation Graph (0, 0)][DBLP ] Nord. J. Comput., 2005, v:12, n:1, pp:18-26 [Journal ] Harry Buhrman , Jaap-Henk Hoepman , Paul M. B. Vitányi Space-efficient Routing Tables for Almost All Networks and the Incompressibility Method. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1999, v:28, n:4, pp:1414-1432 [Journal ] Jaap-Henk Hoepman Private Handshakes. [Citation Graph (0, 0)][DBLP ] ESAS, 2007, pp:31-42 [Conf ] Jaap-Henk Hoepman , Geert Kleinhuis Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart Card. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2007, pp:236-247 [Conf ] Jaap-Henk Hoepman , Andreas Larsson , Elad Michael Schiller , Philippas Tsigas Secure and Self-stabilizing Clock Synchronization in Sensor Networks. [Citation Graph (0, 0)][DBLP ] SSS, 2007, pp:340-356 [Conf ] Lukasz Chmielewski , Jaap-Henk Hoepman Fuzzy Private Matching (Extended Abstract) [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Fuzzy Private Matching (Extended Abstract). [Citation Graph (, )][DBLP ] A Practical Attack on the MIFARE Classic. [Citation Graph (, )][DBLP ] Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings. [Citation Graph (, )][DBLP ] 06371 Abstracts Collection -- From Security to Dependability. [Citation Graph (, )][DBLP ] 06371 Executive Summary -- From Security to Dependability. [Citation Graph (, )][DBLP ] Using JASON to secure SOA. [Citation Graph (, )][DBLP ] Client-Server Password Recovery. [Citation Graph (, )][DBLP ] Practical Schemes for Privacy and Security Enhanced RFID. [Citation Graph (, )][DBLP ] Increased security through open source [Citation Graph (, )][DBLP ] Crossing Borders: Security and Privacy Issues of the European e-Passport [Citation Graph (, )][DBLP ] Distributed Double Spending Prevention [Citation Graph (, )][DBLP ] The Ephemeral Pairing Problem [Citation Graph (, )][DBLP ] A Practical Attack on the MIFARE Classic [Citation Graph (, )][DBLP ] Private Handshakes [Citation Graph (, )][DBLP ] Client-Server Password Recovery (Extended Abstract) [Citation Graph (, )][DBLP ] Practical Schemes For Privacy & Security Enhanced RFID [Citation Graph (, )][DBLP ] The Privacy Coach: Supporting customer privacy in the Internet of Things [Citation Graph (, )][DBLP ] Search in 0.037secs, Finished in 0.039secs