Jeroen Doumen
Jeroen Doumen
SandGrain B.V.
Vahvistettu sähköpostiosoite verkkotunnuksessa doumen.nl
Nimike
Viittaukset
Viittaukset
Vuosi
Survey and benchmark of block ciphers for wireless sensor networks
YW Law, J Doumen, P Hartel
ACM Transactions on Sensor Networks (TOSN) 2 (1), 65-93, 2006
3802006
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
YW Law, M Palaniswami, LV Hoesel, J Doumen, P Hartel, P Havinga
ACM Transactions on Sensor Networks (TOSN) 5 (1), 6, 2009
3682009
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
YW Law, L Van Hoesel, J Doumen, P Hartel, P Havinga
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor …, 2005
368*2005
Computationally efficient searchable symmetric encryption
P Van Liesdonk, S Sedghi, J Doumen, P Hartel, W Jonker
Workshop on Secure Data Management, 87-100, 2010
2642010
Fuzzy extractors for continuous distributions
I Buhan, J Doumen, P Hartel, R Veldhuis
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1132007
Analysing password protocol security against off-line dictionary attacks
R Corin, J Doumen, S Etalle
Electronic Notes in Theoretical Computer Science 121, 47-63, 2005
842005
Benchmarking block ciphers for wireless sensor networks
YW Law, J Doumen, P Hartel
2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE …, 2004
712004
Using secret sharing for searching in encrypted data
R Brinkman, J Doumen, W Jonker
Workshop on Secure Data Management, 18-27, 2004
712004
How robust are gossip-based communication protocols?
L Alvisi, J Doumen, R Guerraoui, B Koldehofe, H Li, R Van Renesse, ...
ACM SIGOPS Operating Systems Review 41 (5), 14-18, 2007
562007
Efficient tree search in encrypted data
R Brinkman, L Feng, J Doumen, PH Hartel, W Jonker
Information systems security 13 (3), 14-21, 2004
472004
Pseudorandom sequences from elliptic curves
PHT Beelen, JM Doumen
Finite Fields with Applications to Coding Theory, Cryptography and Related …, 2002
442002
Constructing practical fuzzy extractors using qim
I Buhan, J Doumen, P Hartel, R Veldhuis
Centre for Telematics and Information Technology, University of Twente …, 2007
422007
Dynamic Tardos traitor tracing schemes
T Laarhoven, J Doumen, P Roelse, B Škorić, B de Weger
IEEE Transactions on Information Theory 59 (7), 4230-4242, 2013
342013
Secure ad-hoc pairing with biometrics: SAfE
I Buhan, J Doumen, P Hartel, R Veldhuis
Proc. IWSSI, 450-456, 2007
332007
Nonmonotonic trust management for P2P applications
M Czenko, H Tran, J Doumen, S Etalle, P Hartel, J den Hartog
Electronic Notes in Theoretical Computer Science 157 (3), 113-130, 2006
332006
Method and system for providing content to a recipient device
D Jarnikov, JM Doumen
US Patent 10,241,720, 2019
242019
Method and system for providing content to a recipient device
D Jarnikov, JM Doumen
US Patent 10,241,720, 2019
242019
A capacity-achieving simple decoder for bias-based traitor tracing schemes
JJ Oosterwijk, B Škorić, J Doumen
IEEE Transactions on Information Theory 61 (7), 3882-3900, 2015
242015
Faster batch forgery identification
DJ Bernstein, J Doumen, T Lange, JJ Oosterwijk
International Conference on Cryptology in India, 454-473, 2012
242012
Secure pairing with biometrics
I Buhan, B Boom, J Doumen, PH Hartel, RNJ Veldhuis
International Journal of Security and Networks 4 (1-2), 27-42, 2009
242009
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20