Searched for: author%3A%22Hoepman%2C+J.H.%22
(1 - 20 of 37)

Pages

document
Hoepman, J.H. (author)
A well studied privacy problem in the area of smart grids is the question of how to aggregate the sum of a set of smart meter readings in a privacy friendly manner, i.e., in such a way that individual meter readings are not revealed to the adversary. Much less well studied is how to deal with arbitrary meter crashes during such aggregation...
conference paper 2017
document
Lueks, W. (author), Everts, M.H. (author), Hoepman, J.H. (author)
Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation, most of the damage has already been done. To help...
conference paper 2016
document
Lueks, W. (author), Everts, M.H. (author), Hoepman, J.H. (author)
Security and privacy often seem to be at odds with one another. In this paper, we revisit the design principle of revocable privacy which guides the creation of systems that offer anonymity for people who do not violate a predefined rule, but can still have consequences for people who do violate the rule. We first improve the definition of...
conference paper 2016
document
Roosendaal, A.P.C. (author), Ooms, M. (author), Hoepman, J.H. (author)
Vanuit de Tweede Kamer is de vraag gekomen hoe de positie van Nederland is wat betreft de bescherming van privacy van burgers door de overheid in vergelijking met andere Europese landen. Dit kan onderzocht worden in een benchmarkstudie waarin Nederland op dit terrein wordt vergeleken met een aantal andere Europese landen. Om deze studie goed op...
report 2015
document
Everts, M.H. (author), Hoepman, J.H. (author), Siljee, B.I.J. (author)
Passwords are the only ubiquitous form of authentication currently available on the web. Unfortunately, passwords are insecure. In this paper we therefore propose the use of strong cryptography, using the fact that users increasingly own a smartphone that can perform the required cryptographic operations on their behalf. This is not as trivial...
conference paper 2013
document
Koops, B.J. (author), Hoepman, J.H. (author), Leenes, R. (author)
As demonstrated by other papers on this issue, open-source intelligence (OSINT) by state authorities poses challenges for privacy protection and intellectual-property enforcement. A possible strategy to address these challenges is to adapt the design of OSINT tools to embed normative requirements, in particular legal requirements. The experience...
article 2013
document
Hoepman, J.H. (author)
The Internet of Things is nothing new. Yet the imminent confluence of cyberspace and physical space into one ambient intelligent system still poses fundamental research challenges in the area of security, privacy and trustability. We discuss these challenges, and present new approaches that may help to overcome them. © 2012 Springer-Verlag.
conference paper 2012
document
Lueks, W. (author), Everts, M.H. (author), Hoepman, J.H. (author)
In this document we have described and partially analysed a number of use cases where revocable privacy can help in providing more privacy for the user. We have seen that the use cases can be classified based primarily on the type of rule they encode. We classified threshold based, time based and predicate based rules. In addition we considered...
report 2012
document
Hoepman, J.H. (author), Hooghiemstra, T. (author)
Onze geschiedenis laat een constante strijd tussen de burgers en hun bestuurders zien als het gaat om het beschermen van de grondrechten aan de ene kant en om het verhogen van de veiligheid en van de efficiëntie en slagkracht van het bestuur aan de andere kant. Dit is in de digitale samenleving niet anders. In het digitale domein woedt echter...
article 2012
document
Galindo, D. (author), Hoepman, J.H. (author)
In this paper we introduce and instantiate a new cryptographic primitive, called non-interactive distributed encryption, that allows a receiver to decrypt a ciphertext only if a minimum number of different senders encrypt the same plaintext. The new functionality can be seen as the dual of the functionality provided by threshold cryptosystems....
conference paper 2011
document
Hoepman, J.H. (author), Jacobs, B. (author)
bookPart 2011
document
de Vey Mestdagh, C.N.J. (author), Hoepman, J.H. (author)
The perspective-bound character of information and information processing gives rise to natural inconsistency. Natural inconsistency poses a problem if a common perspective is needed, for example when a shared (consistent) decision has to be made (by humans, within logics or by computers). There are three main approaches to solving the problem...
bookPart 2011
document
Hoepman, J.H. (author), Larsson, A. (author), Schiller, E.M. (author), Tsigas, P. (author)
In sensor networks, correct clocks have arbitrary starting offsets and nondeterministic fluctuating skews. We consider an adversary that aims at tampering with the clock synchronization by intercepting messages, replaying intercepted messages (after the adversary’s choice of delay), and capturing nodes (i.e., revealing their secret keys and...
article 2011
document
Hoepman, J.H. (author)
Volgens de Wet bescherming persoonsgegevens (Wbp) heeft iedere burger het recht om inzage te krijgen in de persoonsgegevens die een organisatie over haar verwerkt. Tevens moet deze organisatie informatie geven over het doel van de verwerking, de herkomst van de persoonsgegevens, en een overzicht van organisaties waaraan deze gegevens eventueel...
article 2011
document
Hoepman, J.H. (author)
The Internet of Things is nothing new. First introduced as Ubiquitous Computing by Mark Weiser [49] around 1990, the basic concept of the “disappearing computer” has been studied as Ambient Intelligence or Pervasive Computing in the decades that followed. Today we witness the first large scale applications of these ideas. We see RFID technology...
article 2011
document
Koninklijke KPN ; Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek (author), Hoepman, J.H. (author), Joosten, H.J.M. (author), Knobbe, J.W. (author)
A method and a system for securing communication between at least a first and a second hardware components of a mobile device is described. The method includes establishing a first shared secret between the first and the second hardware components during an initialization of the mobile device and, following the initialization of the mobile...
patent 2011
document
Koninklijke KPN ; Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek (author), Knobbe, J.W. (author), Hoepman, J.H. (author), Joosten, H.J.M. (author)
A method and a system for securing communication between at least a first and a second hardware components of a mobile device is described. The method includes establishing a first shared secret between the first and the second hardware components during an initialization of the mobile device and, following the initialization of the mobile...
patent 2011
document
Alpár, G. (author), Hoepman, J.H. (author), Siljee, B.I.J. (author)
This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single, comprehensive study and proposes recommendations...
article 2011
document
Hoepman, J.H. (author), Joosten, R. (author), TNO Informatie- en Communicatietechnologie (author)
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they...
conference paper 2010
document
Batina, L. (author), Hoepman, J.H. (author), Jacobs, B. (author), Mostowski, W. (author), Vullers, P. (author), TNO Informatie- en Communicatietechnologie (author)
This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are verified on the reader-side via a bilinear pairing....
bookPart 2010
Searched for: author%3A%22Hoepman%2C+J.H.%22
(1 - 20 of 37)

Pages