Publications
| Contents: | | | |||||
| | |
Journals
-
W. Lueks, G. Alpár, J.-H. Hoepman, and P. Vullers.
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. Computers & Security, 2017. -
J.-H. Hoepman, B.-J. Koops, and W. Lueks.
Anoniem misdaad melden via Internet: technische en juridische risico’s. Nederlands Juristenblad, 43:3056-3063, December 12 2014.
-
G. Alpár, J.-H. Hoepman, and J. Siljee.
The Identity Crisis - Security, Privacy and Usability Issues in Identity Management. Journal of Information System Security, 9(1):23-53, 2013.(preprint) -
B.-J. Koops, J.-H. Hoepman, and R. Leenes.
Open-source intelligence and privacy by design. Computer Law & Security Review, 29(6):676-688, December 2013. -
J.-H. Hoepman and T. Hooghiemstra.
Goede code. De digitale samenleving in balans. RegelMaat, 27(2):76-87, 2012.
-
J.-H. Hoepman, A. Larsson, E. M. Schiller, and P. Tsigas.
Secure and Self-Stabilizing Clock Synchronization in Sensor Networks. Theoretical Computer Science, 412(40):5631-5647, 2011. -
J.-H. Hoepman and B. Jacobs.
Increased security through open source. Communications of the ACM, 50(1):79-83, 2007.
-
W. Fokkink, J.-H. Hoepman, and J. Pang.
A Note on K-state Self-stabilization in a Ring with K = N. Nordic Journal of Computing, 12(1):18-26, 2005.
(preprint)
-
J.-H. Hoepman, M. Papatriantafilou, and P. Tsigas.
Self-Stabilization of Wait-Free Shared Memory Objects. Journal of Parallel and Distributed Computing, 62(5):766-791, May 2002.
(preprint)
-
J.-H. Hoepman.
Can an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model?. Information Processing Letters, 79:161-166, August 2001.
-
H. Buhrman, M. Franklin, J. Garay, J.-H. Hoepman, J. Tromp, and
P. Vitányi.
Mutual Search. Journal of the ACM, 46(4):517-536, July 1999. -
H. Buhrman, J.-H. Hoepman, and P. M. B. Vitányi.
Space-efficient routing tables for almost all networks and the incompressibility method. SIAM Journal on Computing, 28(4):1414-1432, April 1999. -
J.-H. Hoepman.
Self-Stabilizing Ring-Orientation Using Constant Space. Information and Computation, 144(1):18-39, July 1998.
Books/Proceedings
-
J.-H. Hoepman.
Privacy Design Strategies. The Little Blue Book, May 2018.
-
J.-H. Hoepman.
Privacyontwerpstrategieën. Het Blauwe Boekje, May 2018.
-
J.-H. Hoepman and S. Katzenbeisser, editors.
IFIP SEC Special issue, volume 71 of Computers and Security (COSE). Elsevier, 2017. -
J.-H. Hoepman and S. Katzenbeisser, editors.
ICT Systems Security and Privacy Protection. 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings, volume 471 of IFIP Advances in Information and Communication Technology. Springer, 2016. -
M. van Lieshout and J.-H. Hoepman, editors.
The Privacy & Identity Lab. 4 Years Later. The Privacy & Identity Lab, 2015. ISBN: 978-90-824835-0-5. -
M. Hansen, J.-H. Hoepman, R. Leenes, and D. Whitehouse, editors.
Privacy and Identity Management for Emerging Services and Technologies. 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, volume 421 of IFIP Advances in Information and Communication Technology. Springer, 2014. -
C. onderzoek elektronisch stemmen in het stemlokaal (commissie Van Beek).
Elke Stem Telt. Elektronsich stemmen en tellen.. Ministerie van Binnenlandse Zaken en Koninkrijksrelaties, December 2013.
-
J.-H. Hoepman and I. Verbauwhede, editors.
Radio Frequency Identification: Security and Privacy Issues. 8th International Workshop, RFIDSec 2012, Nijmegen, the Netherlands, July 2-3, 2012, Revised Selected Papers, volume 7739 of Lecture Notes in Computer Science. Springer, 2012. -
O. Markowitch, A. Bilas, J.-H. Hoepman, C. J. Mitchell, and J.-J. Quisquater,
editors.
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings, volume 5746 of Lecture Notes in Computer Science. Springer, 2009.
Book chapters
-
J.-H. Hoepman.
Making Privacy By Design Concrete. In European Cyber Security Perspectives, pages 26-28. KPN CISO Office, The Hague, The Netherlands, 2018.
-
J.-H. Hoepman and M. van Lieshout.
Privacy. In E. R. Leukfeldt and W. P. Stol, editors, Cyber Safety: An Introduction, pages pp 75-87. Eleven International Publishing, The Hague, 2012.
-
J.-H. Hoepman and B. Jacobs.
Privacy: code in context. In V. Frissen, L. Kool, and M. van Lieshout, editors, De Transparante Samenleving. Jaarboek ICT en Samenleving 2011, pages pp 237-252. Media Update, Gorredijk, 2011.
-
C. de Vey Mestdagh and J.-H. Hoepman.
Inconsistent Knowledge as a Natural Phenomenon: The Ranking of Reasonable Inferences as a Computational Approach to Naturally Inconsistent (Legal) Theories. In G. Dodig-Crnkovic and M. Burgin, editors, Information And Computation, chapter 16, pages 439-476. World Scientific Publishing Co., June 2011. -
J.-H. Hoepman and T. Veugen.
Threats and Vulnerabilities of RFID and Beyond. In Y. Zhang and P. Kitsos, editors, Security in RFID and Sensor Networks, chapter ?, pages 469-488. CRC Press, 2009. -
H. Meijer, J.-H. Hoepman, B. Jacobs, and E. Poll.
Computer security through Correctness and Transparency. In K. de Leeuw and J. Bergstra, editors, The History of Information Security, chapter ? Elsevier, 2007.
Conferences
-
M. Colesky, J. C. Caiza, J. M. D. Alamo, J.-H. Hoepman, and Y.-S. Martín.
A System of Privacy Patterns for User Control. In The 33rd ACM Symposium On Applied Computing (SAC 2018), Pau, France, April 9 - 13 2018.
-
J.-H. Hoepman.
Privacy Friendly Aggregation of Smart Meter Readings, Even When Meters Crash. In 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), pages 3-7, Pittsburgh, PA, USA, April 21 2017.
-
J. van Puijenbroek and J.-H. Hoepman.
Privacy impact assessment in practice. The results of a descriptive field study in the Netherlands. In International Workshop on Privacy Engineering (IWPE 2017), San Jose, CA, USA, May 25 2017.
-
S. Ringers, E. Verheul, and J.-H. Hoepman.
An efficient self-blindable attribute-based credential scheme. In Financial Cryptography (FC 2017), Malta, April 3-7 2017. (to appear). -
W. Lueks, M. Everts, and J.-H. Hoepman.
Vote to Link: recovering from misbehaving anonymous users. In Workshop on Privacy in the Electronic Society (WPES 2016), pages 111-122, Vienna, Austria, October 24 2016.
-
M. Colesky, J.-H. Hoepman, and C. Hillen.
A Critical Analysis of Privacy Design Strategies. In 2016 International Workshop on Privacy Engineering – IWPE'16, pages 33-40, San Jose, CA, USA, May 26 2016.
-
M. Hansen, J.-H. Hoepman, and M. Jensen.
Towards Measuring Maturity of Privacy-Enhancing Technologies. In Annual Privacy Forum (APF 2015), Lect. Not. Comp. Sci. 9484, pages 3-20, 2016.
-
W. Lueks, M. Everts, and J.-H. Hoepman.
Revocable Privacy: Principles, Use Cases, and Technologies. In Annual Privacy Forum (APF 2015), Lect. Not. Comp. Sci. 9484, pages 124-143, 2016.
-
E. Verheul, S. Ringers, and J.-H. Hoepman.
The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable. In Financial Cryptography (FC 2016), Barbados, February 22-26 2016. (to appear).(preprint) -
M. Hansen, J.-H. Hoepman, M. Jensen, and S. Schiffner.
Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies. In 11th Int. IFIP Summerschool, Edinburgh, UK, 2015.
-
J.-H. Hoepman.
Privately (and Unlinkably) Exchanging Messages Using a Public Bulletin Board. In ACM Workshop on Privacy in the Electronic Society (WPES 2015), pages 85-94, Denver, CO, USA, October 12 2015.
-
W. Lueks, G. Alpár, J.-H. Hoepman, and P. Vullers.
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers (extended abstract). In 30th Int. Conf. on ICT Systems Security and Privacy Protection (IFIP SEC 2015), pages 463-478, Hamburg, Germany, May 26-28 2015.
(preprint)
-
S. Ringers, J.-H. Hoepman, and W. Lueks.
On linkability and malleability in self-blindable credentials. In The 9th WISTP International Conference on Information Security Theory and Practice (WISTP'2015), pages 203-218, Heraklion, Krete, Greece, August 24-25 2015.
-
L. Batina, J. Hermans, J.-H. Hoepman, and A. Krasnova.
High-speed dating. Privacy-preserving attribute matching for RFID. In 10th Workshop on RFID Security (RFIDSec), pages 19-35, Oxford, UK, July 21-23 2014.
-
J.-H. Hoepman.
Privacy Design Strategies. In IFIP TC11 29th Int. Conf. on Information Security (IFIP SEC 2014), pages 446-459, June 2-4 2014. A preliminary version was presented at the Amsterdam Privacy Conference (APC 2012) and the Privacy Law Scholars Conference (PLSC 2013).
(preprint)
-
M. Koning, P. Korenhof, G. Alpár, and J.-H. Hoepman.
The ABCs of ABCs: an analysis of attribute-based credentials in the light of data protection, privacy and identity. In Proceedings of the 10th International Conference on Internet, Law & Politics., Barcelona, Spain, July 3-4 2014. Universitat Oberta de Catalunya. (to appear). A similar version of this paper was presented at HotPETS 2014, Amsterdam.
-
W. Lueks, J.-H. Hoepman, and K. Kursawe.
Forward-Secure Distributed Encryption. In 14th Privacy Enhancing Technologies Symposium (PETS 2014), pages 123-142, Amsterdam, July 16-18 2014.
-
A. de La Piedra, J.-H. Hoepman, and P. Vullers.
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Card. In A. Kiayias and D. Gritzali, editors, 13th Int. Conf. on Cryptology and Network Security (CANS 2014), pages 270-289, Heraklion, Crete, Greece, October 22-24 2014.
-
G. Alpár and J.-H. Hoepman.
A Secure Channel for Attribute-Based Credentials [Short Paper]. In ACM Digital Identity Management Workshop (DIM), pages 13-18, Berlin, Germany, November 8 2013.
-
M. Everts, J.-H. Hoepman, and J. Siljee.
UbiKiMa: Ubiquitous Authentication Using a Smartphone, Migrating from Passwords to Strong Cryptography [Short Paper]. In ACM Digital Identity Management Workshop (DIM), pages 19-24, Berlin, Germany, November 8 2013.
-
J.-H. Hoepman.
In Things We Trust? Towards Trustability in the Internet of Things (Extended Abstract). In R. Wichert, K. V. Laerhoven, and J. Gelissen, editors, Constructing Ambient Intelligence - AmI 2011 Workshops, volume 277 of Communications in Computer and Information Science, pages 287-295, Amsterdam, the Netherlands, 2012. Springer.(preprint) -
G. Alpár and J.-H. Hoepman.
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals. In 7th Int. IFIP Summerschool, Trento, Italy, September 2011.
-
D. Galindo and J.-H. Hoepman.
Non-interactive Distributed Encryption: A New Primitive for Revocable Privacy. In Workshop on Privacy in the Electronic Society (WPES), pages 81-92, Chicago, IL, USA, October 17 2011.
-
L. Batina, J.-H. Hoepman, B. Jacobs, W. Mostowski, and P. Vullers.
Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings. In 9th IFIP Int. Smart Card Research and Advanced Application Conference (CARDIS), pages 209-222, Passau, Germany, April 2010.
-
J.-H. Hoepman.
Distributed Double Spending Prevention. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, 15th Int. Workshop on Security Protocols 2007, Lect. Not. Comp. Sci. 5964, pages 152-165, 2010.
-
J.-H. Hoepman, B. Jacobs, and P. Vullers.
Privacy and Security Issues in e-Ticketing: Optimisation of Smart Card-based Attribute-proving. In Workshop on Foundations of Security and Privacy (FCS-PrivMod), Edinburgh, UK, July 14-15 2010.
-
J.-H. Hoepman and R. Joosten.
Practical Schemes For Privacy & Security Enhanced RFID (extended abstract). In 4th Workshop on Inf. Security Theory and Practices, pages 138-53, Passau, Germany, April 12-14 2010. Springer.
(preprint)
-
G. Broenink, J.-H. Hoepman, C. van 't Hof, R. van Kranenburg, D. Smits, and
T. Wisman.
The Privacy Coach: Supporting customer privacy in the Internet of Things. In Pervasive 2010 Conference Workshop on What can the Internet of Things do for the citizen?, pages 72-81, Helsinki, Finland, May 17 2010.
-
J.-H. Hoepman and G. Huitema.
Privacy Enhanced Fraud Resistant Road Pricing. In What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, volume 328 of IFIP Advances in Information and Communication Technology, pages 202-213, Brisbane, Australia, September 2010. Springer.
-
L. Chmielewski, J.-H. Hoepman, and P. van Rossum.
Client-Server Password Recovery. In The 4th International Symposium on Information Security (IS'09), pages 861-878, Vilamoura, Algarve-Portugal, November 2009.(preprint) -
J.-H. Hoepman, A. Larsson, E. M. Schiller, and P. Tsigas.
Secure and Self-Stabilizing Clock Synchronization in Sensor Networks. In Proc. 9th Scandinavian Workshop on Wireless Ad-hoc Networks (Adhoc 2009), pages 78-82, 2009. -
R. Brinkman, L. Chmielewski, J.-H. Hoepman, and B. Bos.
Using JASON to secure SOA. In 1st Int. Workshop on Middleware Security (MidSec 2008), pages 13-18, Leuven, Belgium, December 2 2008.
-
J. Clarke, W. Donnelly, K. Howker, P. Walland, M. Surridge, F. K. Liotopoulos,
L. Ridel, G. Shafran, and J.-H. Hoepman.
Security, Privacy and Trust Challenges for Networked and Electronic Media. In NEM Summit, Saint-Malo, France, October 13-15 2008. (to appear). -
G. de Koning Gans, J.-H. Hoepman, and F. D. Garcia.
A Practical Attack on the MIFARE Classic. In 8th IFIP Int. Smart Card Research and Advanced Application Conference (CARDIS), Lect. Not. Comp. Sci. 5189, pages 267-282, London, UK, September 2008.(preprint) -
L. Chmielewski and J.-H. Hoepman.
Fuzzy Private Matching (extended abstract). In 3rd Int. Conf. on Availability, Reliability and Security, pages 327-334, Barcelona, Spain, March 4-7 2008.
(preprint)
-
J. H. Hoepman, R. Joosten, and J. Siljee.
Comparing Identity Management Frameworks in a Business Context. In V. Matyáš, S. F. Hübner, D. Cvrcek, and P. Švenda, editors, The Future of Identity in the Information Society. 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, IFIP AICT 298, pages 184-196, Brno, Czech Republic, September 1-7, 2008, 2008. -
B. Bos, L. Chmielewski, J.-H. Hoepman, and T. S. Nguyen.
Remote Management and Secure Application Development for Pervasive Home Systems Using JASON. In 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pages 7-12, Istanbul, Turkey, July 20 2007.
-
J.-H. Hoepman.
Private Handshakes. In F. Stajano, editor, 4th Eur. Symp. on Security and Privacy in Ad hoc and Sensor Networks, Lect. Not. Comp. Sci. 4572, pages 31-42, Cambridge, UK, June 2-3 2007.
-
J.-H. Hoepman, A. Larsson, E. M. Schiller, and P. Tsigas.
Secure and Self-Stabilizing Clock Synchronization in Sensor Networks. In T. Masuzawa and S. Tixeuil, editors, 9th Int. Symp. on Stabilization, Safety, and Security of Distributed Systems, Lect. Not. Comp. Sci. 4838, pages 340-356, Paris, France, November 14-16 2007. Springer.
-
J.-H. Hoepman and G. Kleinhuis.
Two worlds, one smart card. In 4th European PKI Workshop: Theory and Practice, Lect. Not. Comp. Sci. 4582, pages 236-247, Mallorca, Spain, June 28-30 2007.
-
R. Corin, D. Galindo, and J.-H. Hoepman.
Securing data accountability in decentralized systems. In International Workshop on Information Security, Lect. Not. Comp. Sci. 4277, pages 626-635, Montpellier, France, October 29 - November 1 2006.
-
J.-H. Hoepman, E. Hubbers, B. Jacobs, M. Oostdijk, and R. Wichers Schreur.
Crossing Borders: Security and Privacy Issues of the European e-Passport. In H. Yoshiura, K. Sakurai, K. Rannenberg, Y. Murayama, and S. Kawamura, editors, 1st Int. Workshop on Security, Lect. Not. Comp. Sci. 4266, pages 152-167, Kyoto, Japan, October 23-24 2006. Springer.
-
J.-H. Hoepman, S. Kutten, and Z. Lotker.
Efficient Distributed Weighted Matching on Trees. In 13th Coll. on Structural Information and Communication Complexity, Chester, UK, June 3-5 2006.
-
J.-H. Hoepman.
Ephemeral Pairing on Anonymous Networks. In D. Hutter and M. Ullmann, editors, 2nd Int. Conf. on Security in Pervasive Computing, Lect. Not. Comp. Sci. 3450, pages 101-116, Boppard, Germany, April 6-8 2005. Springer.
-
F. D. Garcia and J.-H. Hoepman.
Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Networks. In J. Ioannidis, A. Keromytis, and M. Yung, editors, 3rd Applied Cryptography and Network Security conference (ACNS), Lect. Not. Comp. Sci. 3531, pages 364-377, New York, NY, USA, June 7-10 2005. Springer.
-
F. D. Garcia and J.-H. Hoepman.
Off-line Karma: A Decentralized Currency for Static Peer-to-peer and Grid Networks. In 5th Int. Network Conf., pages 325-332, Samos, Greece, July 5-7 2005.
-
F. D. Garcia, J.-H. Hoepman, and J. van Nieuwenhuizen.
Spam Filter Analysis. In IFIP TC11 19th Int. Conf. on Information Security (SEC2004), August 2004.
(preprint)
-
J.-H. Hoepman.
The Ephemeral Pairing Problem. In 8th Int. Conf. Financial Cryptography, Lect. Not. Comp. Sci. 3110, pages 212-226, Key West, FL, USA, February 9-12 2004. Springer.
-
F. D. Garcia and J.-H. Hoepman.
Off-line Karma: Towards a Decentralized Currency for Peer-to-peer and Grid Applications (Brief Abstract). In Workshop on Secure Multiparty Computations (SMP), Amsterdam, The Netherlands, October 7-8 2004.
-
J.-H. Hoepman.
Security, Fault-Tolerance and their Verification for Ambient Systems. In D. Gritzalis, S. D. C. di Vimercati, P. Samarati, and S. Katsikas, editors, Security and Privacy in the Age of Uncertainty. IFIP TC11 18th Int. Conf. on Information Security (SEC2003), pages 441-446, Athens, Greece, May 26-28 2003. Kluwer Academic Publishers.
-
J.-H. Hoepman.
Splitters: Objects for On-Line Partitioning. In M. Papatriantafilou and P. Hunel, editors, 7th Int. Conf. on Principles of Distributed Systems, Lect. Not. Comp. Sci. 3144, pages 47-57, La Martinique, France, December 10-13 2003. Springer.
-
R. Brinkman and J.-H. Hoepman.
Secure Method Invocation in JASON. In 5th USENIX Smart Card Research and Advanced Application Conference (CARDIS), pages 29-40, San Jose, CA, USA, November 2002.
-
J.-H. Hoepman.
Randomised Mutual Search for k > 2 Agents. In J. L. Welch, editor, 15th Int. Symp. Distrbuted Computing, Lect. Not. Comp. Sci. 2180, pages 180-193, Lisbon, Portugal, October 3-5 2001. Springer.
-
J.-H. Hoepman.
Secret key authentication with software-only verification. In Y. Frankel, editor, 4th Int. Conf. Financial Cryptography, Lect. Not. Comp. Sci. 1962, pages 313-326, Anguilla, British West Indies, February 20-24 2000. Springer.
-
H. Buhrman, M. Franklin, J. Garay, J.-H. Hoepman, J. Tromp, and
P. Vitányi.
Mutual Search. In 9th Symposium on Discrete Algorithms, pages 481-489, San Fransisco, Ca., USA, January 25-27 1998. ACM Press. -
H. Buhrman, J.-H. Hoepman, and P. M. B. Vitányi.
Optimal Routing Tables. In 15th Ann. Symp. on Principles of Distributed Computing, pages 134-142, Philadelphia, PA, USA, May 23-26 1996. ACM Press.
-
H. Buhrman, J. A. Garay, and J.-H. Hoepman.
Optimal Resiliency Against Mobile Faults. In 25th Int. Symp. on Fault-Tolerant Computing, pages 83-88, Pasadena, CA, USA, June 27-30 1995. IEEE Comp. Soc. Press.
-
H. Buhrman, J. A. Garay, J.-H. Hoepman, and M. Moir.
Long-Lived Renaming Made Fast. In 14th Ann. Symp. on Principles of Distributed Computing, pages 194-203, Ottawa, Ont., Canada, August 20-23 1995. ACM Press.
-
J.-H. Hoepman, M. Papatriantafilou, and P. Tsigas.
Self-Stabilization of Wait-Free Shared Memory Objects. In J.-M. Hélary and M. Raynal, editors, 9th Int. Workshop on Distributed Algorithms, Lect. Not. Comp. Sci. 972, pages 273-287, Le Mont-Saint-Michel, France, September 12-15 1995. Springer. (Updated version January 2000, Preliminary report: CS-R9514).
-
D. Alstein, J.-H. Hoepman, B. E. Olivier, and P. I. A. van der Put.
Self-Stabilizing Mutual Exclusion on Directed Graphs. In E. Backer, editor, Computer Science in the Netherlands, pages 42-53, Utrecht, The Netherlands, November 21-22 1994. Stichting Mathematisch Centrum, Amsterdam.
(preprint)
-
J.-H. Hoepman.
Uniform Deterministic Self-Stabilizing Ring-Orientation on Odd-Length Rings. In G. Tel and P. M. B. Vitányi, editors, 8th Int. Workshop on Distributed Algorithms, Lect. Not. Comp. Sci. 857, pages 265-279, Terschelling, The Netherlands, September 29-October 1 1994. Springer-Verlag.(preprint) -
J.-H. Hoepman and J. Tromp.
Binary Snapshots. In A. Schiper, editor, 7th Int. Workshop on Distributed Algorithms, Lect. Not. Comp. Sci. 725, pages 18-25, Lausanne, Switzerland, September 27-29 1993. Springer-Verlag.(preprint) -
C. N. J. de Vey Mestdagh, W. Verwaard, and J.-H. Hoepman.
The Logic of Reasonable Inferences. In J. A. Breuker, R. V. de Mulder, and J. C. Hage, editors, Legal Knowledge Based Systems -- Model-Based Legal Reasoning, pages 60-76, Lelystad, 1991. Koninklijke Vermande. ISBN 90 5458 989 2.
Unrefereed journals
-
J.-H. Hoepman.
eID Stelsel wijzigt koers – en raakt daarmee van de wal in de sloot. Privacy & Informatie, pages 42-45, 2015. -
J.-H. Hoepman.
Het Privacy & Identity lab. Nationale veiligheid en crisibeheersing, 13(2):34-34, 2015. -
J.-H. Hoepman.
Irma brengt persoonsgegevens efficiënt en privacyvriendelijk naar chipkaart. Bits & Chips, April 26 2013.
-
J.-H. Hoepman.
Het recht op inzage is een wassen neus. Wat nu?. Informatiebeveiliging, 6:16-17, 2011.
-
J.-H. Hoepman.
Revocable Privacy. ENISA Quarterly Review, 5(2):16-17, June 2009. -
J.-H. Hoepman, R. Joosten, M. Schenk, T. Veugen, and D. Welfing.
Veilig en integer beheer van persoonsgegevens. Beveiliging, pages 76-79, April 2008. -
J.-H. Hoepman.
Revocable Privacy. Privacy & Informatie, 11(3):114-118, June 2008.
-
J.-H. Hoepman.
Revocable Privacy. Informatiebeveiliging, (5):14-17, August 2008.
-
J.-H. Hoepman.
Follow that car! Over de mogelijke privacy gevolgen van rekeningrijden, en hoe die te vermijden. Privacy & Informatie, 11(5):225-230, June 2008.
-
J.-H. Hoepman and B. Jacobs.
Software Security Through Open Source. 2007. Preliminary version submitted to CACM.
-
J.-H. Hoepman and B. Jacobs.
E-passports without the big picture. eGov Monitor, February 20 2006. urlhttp://www.egovmonitor.com/node/4716.
-
J.-H. Hoepman.
Veiliger software door open source. Informatiebeveiliging, 8:4-6, December 2005.
-
J.-H. Hoepman.
Veiligheid Door Openheid -- Tot Aan de Bron. Livre, 12:10-11, June 2005.
-
J.-H. Hoepman and B. P. F. Jacobs.
Elektronische handtekening. Wie tekent er voor?. I & I, 21(3):8-9, 2003.
-
J.-H. Hoepman and B. P. F. Jacobs.
Open source software: bron van vertrouwen. I & I, 21(6):12-19, 2003.
-
J.-H. Hoepman.
PKI: Vloek of Zegen?. Informatiebeveiliging, 3:4-8, April 2002.
-
J.-H. Hoepman.
Privacy-vriendelijk ontwerpen als antwoord op de informatiemaatschappij. Informatiebeveiliging, 2:4-6, June 2001.
-
J.-H. Hoepman and A. Helme.
Secure Ecommerce: Voorwaarden voor veilig zakendoen over het Internet. MNet Magazine 20/21, November 1999.
Others
-
J.-H. Hoepman.
Het gebruik van blockchain technologie in het verkiezingsproces. Technical report, Privacy & Identity Lab, 2018.
-
G. Danezis, J. Domingo-Ferrer, M. Hansen, J.-H. Hoepman, D. L. Metayer,
R. Tirtea, and S. Schiffner.
Privacy and Data Protection by Design - from policy to engineering. Technical report, ENISA, December 2014. ISBN 978-92-9204-108-3, DOI 10.2824/38623.
(preprint)
-
J.-H. Hoepman, B.-J. Koops, and W. Lueks.
Haalbaarheid van een anoniem misdaadmeldpunt via het Internet. Technical report, Privacy & Identity Lab, 2014.
-
G. Alpár, J.-H. Hoepman, and W. Lueks.
An Attack Against Fixed Value Discrete Logarithm Representations. Cryptology ePrint Archive, Report 2013/120, March 2013. -
J.-H. Hoepman.
Privacy Design Strategies, October 2012. eprint arXiv:1210.6621. A preliminary version was presented at the Amsterdam Privacy Conference (APC 2012) and the Privacy Law Scholars Conference (PLSC 2013).
-
J.-H. Hoepman.
In Things We Trust? Towards trustability in the Internet of Things, September 2011. eprint CoRR cs.CR:1109.2637.
-
G. Alpár, J.-H. Hoepman, and J. Siljee.
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management, January 2011. eprint CoRR cs.CR:1101.0427.
-
J.-H. Hoepman and J. Siljee.
The Identity Crisis - Usability, Security and Privacy Issues in Identity Management. Whitepaper, TNO, 2009. -
J.-H. Hoepman.
Stemgeheim is niet het enige probleem van NewVote stemcomputer. Appeared as 'Nieuwe risicosport: stemmen', nrc.next, January 15 2007.
-
J.-H. Hoepman and J. Siljee.
Beyond RFID: the NFC Security Landscape. Whitepaper, TNO, 2007. -
K. Cartrysse, R. Corin, M. Dekker, S. Etalle, J.-H. Hoepman, G. Lenzini,
J. v.d. Lubbe, J. Verschuren, and T. Veugen.
Privacy in an Ambient World (PAW): Using licenses and private computing as PET. Technical report, January 2004.
-
M. Witteman and J.-H. Hoepman.
Reverse engineering implementations of cryptographic algorithms by means of Power Analysis. Technical report, February 2004. -
J.-H. Hoepman.
Simple Distributed Weighted Matchings, October 2004. eprint cs.DC/0410047.
-
J.-H. Hoepman.
Maak de broncode van onze stemmachines openbaar. (unpublished), 2004.
-
J.-H. Hoepman.
Standaard computers? Nee bedankt!. (unpublished), September 2003.
-
J.-H. Hoepman.
Digitale kluis is doos van pandora. Forum, De Volkskrant, 3 April 2001.
-
J.-H. Hoepman.
Zonder digitaal paspoort is het Internet ook prima te beveiligen. (unpublished), 2001.
-
J.-H. Hoepman.
Symmetric key authentication using verification in public. Technical report, University of Twente, 2001.
-
J.-H. Hoepman.
Self-stabilizing mutual exclusion on a ring, even if K=N, September 1999. eprint cs.DC/9909013. -
J.-H. Hoepman.
Long-lived Test-And-Set Using Bounded Space. Technical report, University of Twente, September 1999. www.cs.ru.nl/ jhh/publications/test-and-set.ps.
-
J.-H. Hoepman.
Communication, Synchronization & Fault Tolerance. PhD thesis, University of Amsterdam, Amsterdam, June 1996.
Seeds
I maintain a seperate page of seeds: raw, unfinished, or far fetched ideas. Feel free to browse them and get inspired. But tell me if you worked on them!
.
Thesis
|
J.-H. Hoepman
Communication, Synchronization & Fault Tolerance Amsterdam, 1996. Summary
(in Dutch).
To order, send mail to |
Presentations
- Blockchainand Identity: Why you should avoid blockchain like the plague, September 9, 2017, Groningen.
- Security + Privacy != 0, LCB, April 24, 2014, The Hague.
- Online Tracking Technologies, Online Tracking Workshop, February 11, 2014, Brussels.
- The Gospel of IRMA, 30th Chaos Communication Congres (30c3), Hamburg, December 27, 2013. (slides)
- Privacy by Design - Strategies and Patterns, PI.lab annual event, CCC, Amsterdam, December 5, 2013.
- Can we save our online freedom?, Ohm 2013, Noisy2 Village, The Netherlands, July 31, 2013.
- RFID Privacy Risks & Countermeasures - Technical Issues, Mediamatic workshop "RFID Privacies", Amsterdam, NL, August 24, 2004.
- RFID Risks. A perfidious technology?, SIGCHI.NL: Dutch Directions in HCI, Amsterdam, NL, June 10, 2004.
- Can you trust your trusted computing platform?, AEGEE Symposium "What they don't tell us; privacy and security on the computer", Utrecht, NL, April 16, 2004.
- The Ephemeral Pairing Problem, Financial Cryptography 2004, Key West, FL, USA, February 12, 2004.
- Splitters: Objects for On-Line Partitioning, OPODIS 2003, Martinique, France, December 10, 2003.
Last Version -
(Note: changeover from CVS to dotless svn version numbers on Jan 19, 2008, and changeover to GIT versioning on May 30, 2013.)
Maintained by Jaap-Henk Hoepman
Email: jhh@cs.ru.nl