Jaap-Henk Hoepman
Jaap-Henk Hoepman
Associate Professor of Computer Science, Radboud University Nijmegen and Associate Professor, IT Law
Verified email at - Homepage
Cited by
Cited by
Privacy design strategies
JH Hoepman
IFIP International Information Security Conference, 446-459, 2014
Privacy and data protection by design-from policy to engineering
G Danezis, J Domingo-Ferrer, M Hansen, JH Hoepman, DL Metayer, ...
arXiv preprint arXiv:1501.03726, 2015
A practical attack on the MIFARE Classic
G de Koning Gans, JH Hoepman, FD Garcia
Smart Card Research and Advanced Applications: 8th IFIP WG 8.8/11.2 …, 2008
Increased security through open source
JH Hoepman, B Jacobs
Communications of the ACM 50 (1), 79-83, 2007
A critical analysis of privacy design strategies
M Colesky, JH Hoepman, C Hillen
2016 IEEE security and privacy workshops (SPW), 33-40, 2016
Simple distributed weighted matchings
JH Hoepman
arXiv preprint cs/0410047, 2004
Crossing borders: Security and privacy issues of the european e-passport
JH Hoepman, E Hubbers, B Jacobs, M Oostdijk, RW Schreur
Advances in Information and Computer Security: First International Workshop …, 2006
The identity crisis. security, privacy and usability issues in identity management
G Alpár, JH Hoepman, J Siljee
arXiv preprint arXiv:1101.0427, 2011
The ephemeral pairing problem
JH Hoepman
Financial Cryptography: 8th International Conference, FC 2004, Key West, FL …, 2004
Spam filter analysis
FD Garcia, JH Hoepman, J Van Nieuwenhuizen
Security and Protection in Information Processing Systems: IFIP 18 th World …, 2004
Open-source intelligence and privacy by design
BJ Koops, JH Hoepman, R Leenes
Computer Law & Security Review 29 (6), 676-688, 2013
Privacy design strategies (the little blue book)
JH Hoepman
Nijmegen: Radboud University, 2018
Off-line karma: A decentralized currency for peer-to-peer and grid applications
FD Garcia, JH Hoepman
Applied Cryptography and Network Security: Third International Conference …, 2005
Distributed double spending prevention
JH Hoepman
Security Protocols: 15th International Workshop, Brno, Czech Republic, April …, 2010
Developing efficient blinded attribute certificates on smart cards via pairings
L Batina, JH Hoepman, B Jacobs, W Mostowski, P Vullers
Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010
Optimal Resiliency Against Mobile Faults
H Buhrman, JA Garay, JH Hoepman.
Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant …, 1995
Ephemeral pairing on anonymous networks
JH Hoepman
Security in Pervasive Computing: Second International Conference, SPC 2005 …, 2005
Fast revocation of attribute-based credentials for both users and verifiers
W Lueks, G Alpár, JH Hoepman, P Vullers
Computers & Security 67, 308-323, 2017
Decentralisation: A multidisciplinary perspective
B Bodó, JK Brekke, JH Hoepman
Internet Policy Review 10 (2), 1-21, 2021
The privacy coach: Supporting customer privacy in the internet of things
G Broenink, JH Hoepman, C Hof, R Van Kranenburg, D Smits, T Wisman
arXiv preprint arXiv:1001.4459, 2010
The system can't perform the operation now. Try again later.
Articles 1–20