default search action
Jeroen Doumen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2017
- [j11]Thijs Veugen, Jeroen Doumen, Zekeriya Erkin, Gaetano Pellegrino, Sicco Verwer, Jos H. Weber:
Improved privacy of dynamic group services. EURASIP J. Inf. Secur. 2017: 3 (2017) - 2015
- [j10]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes. IEEE Trans. Inf. Theory 61(7): 3882-3900 (2015) - 2013
- [j9]Thijs Laarhoven, Jeroen Doumen, Peter Roelse, Boris Skoric, Benne de Weger:
Dynamic Tardos Traitor Tracing Schemes. IEEE Trans. Inf. Theory 59(7): 4230-4242 (2013) - 2010
- [j8]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis:
Embedding renewable cryptographic keys into noisy data. Int. J. Inf. Sec. 9(3): 193-208 (2010) - 2009
- [j7]Ileana Buhan, Bas Boom, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis:
Secure pairing with biometrics. Int. J. Secur. Networks 4(1/2): 27-42 (2009) - [j6]Yee Wei Law, Marimuthu Palaniswami, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans. Sens. Networks 5(1): 6:1-6:38 (2009) - 2007
- [j5]Lorenzo Alvisi, Jeroen Doumen, Rachid Guerraoui, Boris Koldehofe, Harry C. Li, Robbert van Renesse, Gilles Trédan:
How robust are gossip-based communication protocols? ACM SIGOPS Oper. Syst. Rev. 41(5): 14-18 (2007) - 2006
- [j4]Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, Andrew Tokmakoff:
LicenseScript: a logical language for digital rights management. Ann. des Télécommunications 61(3-4): 284-331 (2006) - [j3]Yee Wei Law, Jeroen Doumen, Pieter H. Hartel:
Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sens. Networks 2(1): 65-93 (2006) - 2004
- [j2]Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Efficient Tree Search in Encrypted Data. Inf. Secur. J. A Glob. Perspect. 13(3): 14-21 (2004) - 2003
- [j1]Sheng-Bo Xu, Jeroen Doumen, Henk C. A. van Tilborg:
On the Security of Digital Signature Schemes Based on Error-Correcting Codes. Des. Codes Cryptogr. 28(2): 187-199 (2003)
Conference and Workshop Papers
- 2014
- [c25]Dmitri Jarnikov, Erik Hietbrink, Mark Arana, Jeroen M. Doumen:
A watermarking system for adaptive streaming. ICCE 2014: 375-377 - [c24]Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven:
Tuple decoders for traitor tracing schemes. Media Watermarking, Security, and Forensics 2014: 90280C - 2013
- [c23]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
Optimal suspicion functions for tardos traitor tracing schemes. IH&MMSec 2013: 19-28 - [c22]Boris Skoric, Jan-Jaap Oosterwijk, Jeroen Doumen:
The holey grail A special score function for non-binary traitor tracing. WIFS 2013: 180-185 - 2012
- [c21]Dmitri Jarnikov, Egbert Westerveld, Jeroen M. Doumen:
Session-based watermarking in live IPTV environment. ICCE 2012: 650-653 - [c20]Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk:
Faster Batch Forgery Identification. INDOCRYPT 2012: 454-473 - [c19]Thijs Laarhoven, Jan-Jaap Oosterwijk, Jeroen Doumen:
Dynamic traitor tracing for arbitrary alphabets: Divide and conquer. WIFS 2012: 240-245 - 2011
- [c18]Dmitri Jarnikov, Jeroen Doumen:
Watermarking for Adaptive Streaming Protocols. Secure Data Management 2011: 101-113 - 2010
- [c17]Calin Ciordas, Jeroen Doumen:
An Evaluation Framework for Content Recommender Systems The Industry Perspective. Web Intelligence/IAT Workshops 2010: 273-277 - [c16]Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Computationally Efficient Searchable Symmetric Encryption. Secure Data Management 2010: 87-100 - 2008
- [c15]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel:
Controlling leakage of biometric information using dithering. EUSIPCO 2008: 1-5 - [c14]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis:
Embedding Renewable Cryptographic Keys into Continuous Noisy Data. ICICS 2008: 294-310 - [c13]Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Towards an Information Theoretic Analysis of Searchable Encryption. ICICS 2008: 345-360 - [c12]Marcin Czenko, Jeroen Doumen, Sandro Etalle:
Trust Management in P2P Systems Using Standard TuLiP. IFIPTM 2008: 1-16 - 2007
- [c11]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis:
Fuzzy extractors for continuous distributions. AsiaCCS 2007: 353-355 - [c10]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis:
Feeling Is Believing: A Secure Template Exchange Protocol. ICB 2007: 897-906 - 2005
- [c9]Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. SASN 2005: 76-88 - [c8]Richard Brinkman, Berry Schoenmakers, Jeroen Doumen, Willem Jonker:
Experiments with Queries over Encrypted Data Using Secret Sharing. Secure Data Management 2005: 33-46 - [c7]Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus:
StreamTo: Streaming Content using a Tamper-Resistant Token. SEC 2005: 601-612 - [c6]Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications. STM 2005: 113-130 - 2004
- [c5]Yee Wei Law, Jeroen Doumen, Pieter H. Hartel:
Benchmarking block ciphers for wireless sensor networks. MASS 2004: 447-456 - [c4]Richard Brinkman, Jeroen Doumen, Willem Jonker:
Using Secret Sharing for Searching in Encrypted Data. Secure Data Management 2004: 18-27 - [c3]Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Efficient Tree Search in Encrypted Data. WOSIS 2004: 126-135 - [c2]Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin:
License Protection with a Tamper-Resistant Token. WISA 2004: 223-237 - [c1]Ricardo Corin, Jeroen Doumen, Sandro Etalle:
Analysing Password Protocol Security Against Off-line Dictionary Attacks. WISP@ICATPN 2004: 47-63
Informal and Other Publications
- 2014
- [i9]Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven:
Tuple decoders for traitor tracing schemes. IACR Cryptol. ePrint Arch. 2014: 166 (2014) - 2013
- [i8]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
Optimal Suspicion Functions for Tardos Traitor Tracing Schemes. IACR Cryptol. ePrint Arch. 2013: 154 (2013) - [i7]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes. IACR Cryptol. ePrint Arch. 2013: 389 (2013) - [i6]Boris Skoric, Jan-Jaap Oosterwijk, Jeroen Doumen:
The Holey Grail: A special score function for non-binary traitor tracing. IACR Cryptol. ePrint Arch. 2013: 420 (2013) - 2012
- [i5]Thijs Laarhoven, Jan-Jaap Oosterwijk, Jeroen Doumen:
Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer. CoRR abs/1206.6720 (2012) - [i4]Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk:
Faster batch forgery identification. IACR Cryptol. ePrint Arch. 2012: 549 (2012) - 2011
- [i3]Thijs Laarhoven, Jeroen Doumen, Peter Roelse, Boris Skoric, Benne de Weger:
Dynamic Tardos Traitor Tracing Schemes. CoRR abs/1111.3597 (2011) - 2009
- [i2]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel:
Fuzzy extractors for continuous distributions. IACR Cryptol. ePrint Arch. 2009: 545 (2009) - 2005
- [i1]Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications. CoRR abs/cs/0510061 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint