Jeroen Doumen
According to our database1,
Jeroen Doumen
authored at least 36 papers
between 2003 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
2015
IEEE Trans. Inf. Theory, 2015
2014
Proceedings of the IEEE International Conference on Consumer Electronics, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the IEEE International Conference on Consumer Electronics, 2012
2011
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011
2010
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010
2009
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
ACM Trans. Sens. Networks, 2009
2008
Proceedings of the Trust Management II, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 2008 16th European Signal Processing Conference, 2008
2007
ACM SIGOPS Oper. Syst. Rev., 2007
Proceedings of the Advances in Biometrics, International Conference, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
ACM Trans. Sens. Networks, 2006
Ann. des Télécommunications, 2006
2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
StreamTo: Streaming Content using a Tamper-Resistant Token.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Secure Data Management, 2005
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005
2004
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004
2003
On the Security of Digital Signature Schemes Based on Error-Correcting Codes.
Des. Codes Cryptogr., 2003