Jeroen Doumen
Jeroen Doumen
Technology Manager, Irdeto B.V.
Verified email at doumen.nl
TitleCited byYear
Survey and benchmark of block ciphers for wireless sensor networks
YW Law, J Doumen, P Hartel
ACM Transactions on Sensor Networks (TOSN) 2 (1), 65-93, 2006
3402006
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
YW Law, M Palaniswami, LV Hoesel, J Doumen, P Hartel, P Havinga
ACM Transactions on Sensor Networks (TOSN) 5 (1), 6, 2009
3142009
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
YW Law, L Van Hoesel, J Doumen, P Hartel, P Havinga
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor …, 2005
314*2005
Computationally efficient searchable symmetric encryption
P Van Liesdonk, S Sedghi, J Doumen, P Hartel, W Jonker
Workshop on Secure Data Management, 87-100, 2010
2062010
Fuzzy extractors for continuous distributions
I Buhan, J Doumen, P Hartel, R Veldhuis
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1032007
Analysing password protocol security against off-line dictionary attacks
R Corin, J Doumen, S Etalle
Electronic Notes in Theoretical Computer Science 121, 47-63, 2005
782005
Using secret sharing for searching in encrypted data
R Brinkman, J Doumen, W Jonker
Workshop on Secure Data Management, 18-27, 2004
652004
Benchmarking block ciphers for wireless sensor networks
YW Law, J Doumen, P Hartel
2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE …, 2004
592004
How robust are gossip-based communication protocols?
L Alvisi, J Doumen, R Guerraoui, B Koldehofe, H Li, R Van Renesse, ...
ACM SIGOPS Operating Systems Review 41 (5), 14-18, 2007
502007
Pseudorandom sequences from elliptic curves
PHT Beelen, JM Doumen
Finite Fields with Applications to Coding Theory, Cryptography and Related …, 2002
442002
Efficient tree search in encrypted data
R Brinkman, L Feng, J Doumen, PH Hartel, W Jonker
Information systems security 13 (3), 14-21, 2004
412004
Constructing practical fuzzy extractors using qim
I Buhan, J Doumen, P Hartel, R Veldhuis
Centre for Telematics and Information Technology, University of Twente …, 2007
402007
Secure ad-hoc pairing with biometrics: SAfE
I Buhan, J Doumen, P Hartel, R Veldhuis
Proc. IWSSI, 450-456, 2007
322007
Dynamic Tardos traitor tracing schemes
T Laarhoven, J Doumen, P Roelse, B Škorić, B de Weger
IEEE Transactions on Information Theory 59 (7), 4230-4242, 2013
312013
Nonmonotonic trust management for P2P applications
M Czenko, H Tran, J Doumen, S Etalle, P Hartel, J den Hartog
Electronic Notes in Theoretical Computer Science 157 (3), 113-130, 2006
292006
A capacity-achieving simple decoder for bias-based traitor tracing schemes
JJ Oosterwijk, B Škorić, J Doumen
IEEE Transactions on Information Theory 61 (7), 3882-3900, 2015
232015
Optimal Suspicion Functions for Tardos Traitor Tracing Schemes
JJ Oosterwijk, B Škoric, J Doumen
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
232013
Secure pairing with biometrics
I Buhan, B Boom, J Doumen, PH Hartel, RNJ Veldhuis
International Journal of Security and Networks 4 (1-2), 27-42, 2009
202009
Method and system for providing content to a recipient device
D Jarnikov, JM Doumen
US Patent App. 13/821,935, 2013
192013
Dynamic traitor tracing for arbitrary alphabets: Divide and conquer
T Laarhoven, JJ Oosterwijk, J Doumen
Information Forensics and Security (WIFS), 2012 IEEE International Workshop …, 2012
162012
The system can't perform the operation now. Try again later.
Articles 1–20