Survey and benchmark of block ciphers for wireless sensor networks YW Law, J Doumen, P Hartel ACM Transactions on Sensor Networks (TOSN) 2 (1), 65-93, 2006 | 398 | 2006 |
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols YW Law, M Palaniswami, LV Hoesel, J Doumen, P Hartel, P Havinga ACM Transactions on Sensor Networks (TOSN) 5 (1), 6, 2009 | 389 | 2009 |
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols YW Law, L Van Hoesel, J Doumen, P Hartel, P Havinga Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor …, 2005 | 389* | 2005 |
Computationally efficient searchable symmetric encryption P Van Liesdonk, S Sedghi, J Doumen, P Hartel, W Jonker Workshop on Secure Data Management, 87-100, 2010 | 295 | 2010 |
Fuzzy extractors for continuous distributions I Buhan, J Doumen, P Hartel, R Veldhuis Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 122 | 2007 |
Analysing password protocol security against off-line dictionary attacks R Corin, J Doumen, S Etalle Electronic Notes in Theoretical Computer Science 121, 47-63, 2005 | 82 | 2005 |
Benchmarking block ciphers for wireless sensor networks YW Law, J Doumen, P Hartel 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE …, 2004 | 76 | 2004 |
Using secret sharing for searching in encrypted data R Brinkman, J Doumen, W Jonker Workshop on Secure Data Management, 18-27, 2004 | 74 | 2004 |
How robust are gossip-based communication protocols? L Alvisi, J Doumen, R Guerraoui, B Koldehofe, H Li, R Van Renesse, ... ACM SIGOPS Operating Systems Review 41 (5), 14-18, 2007 | 60 | 2007 |
Faster batch forgery identification DJ Bernstein, J Doumen, T Lange, JJ Oosterwijk Progress in Cryptology-INDOCRYPT 2012: 13th International Conference on …, 2012 | 47 | 2012 |
Efficient tree search in encrypted data R Brinkman, L Feng, J Doumen, PH Hartel, W Jonker Information systems security 13 (3), 14-21, 2004 | 47 | 2004 |
Constructing practical fuzzy extractors using qim I Buhan, J Doumen, P Hartel, R Veldhuis Centre for Telematics and Information Technology, University of Twente …, 2007 | 45 | 2007 |
Pseudorandom sequences from elliptic curves PHT Beelen, JM Doumen Finite Fields with Applications to Coding Theory, Cryptography and Related …, 2002 | 44 | 2002 |
Dynamic Tardos traitor tracing schemes T Laarhoven, J Doumen, P Roelse, B Škorić, B de Weger IEEE Transactions on Information Theory 59 (7), 4230-4242, 2013 | 38 | 2013 |
Secure ad-hoc pairing with biometrics: SAfE I Buhan, J Doumen, P Hartel, R Veldhuis Proc. IWSSI, 450-456, 2007 | 34 | 2007 |
Nonmonotonic trust management for P2P applications M Czenko, H Tran, J Doumen, S Etalle, P Hartel, J den Hartog Electronic Notes in Theoretical Computer Science 157 (3), 113-130, 2006 | 33 | 2006 |
Method and system for providing content to a recipient device D Jarnikov, JM Doumen US Patent 10,241,720, 2019 | 29 | 2019 |
Method and system for providing content to a recipient device D Jarnikov, JM Doumen US Patent 10,241,720, 2019 | 29 | 2019 |
A capacity-achieving simple decoder for bias-based traitor tracing schemes JJ Oosterwijk, B Škorić, J Doumen IEEE Transactions on Information Theory 61 (7), 3882-3900, 2015 | 28 | 2015 |
Secure pairing with biometrics I Buhan, B Boom, J Doumen, PH Hartel, RNJ Veldhuis International Journal of Security and Networks 4 (1-2), 27-42, 2009 | 26 | 2009 |