Name
Affiliation
Papers
JEROEN DOUMEN
University of Twente, Enschede, The Netherlands
30
Collaborators
Citations 
PageRank 
49
326
21.84
Referers 
Referees 
References 
798
766
487
Search Limit
100798
Title
Citations
PageRank
Year
Improved privacy of dynamic group services00.342017
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes80.492015
Tuple decoders for traitor tracing schemes.30.372014
Optimal suspicion functions for tardos traitor tracing schemes.120.552013
The holey grail A special score function for non-binary traitor tracing10.342013
Faster batch forgery identification.60.512012
Watermarking for adaptive streaming protocols10.362011
An Evaluation Framework for Content Recommender Systems The Industry Perspective00.342010
Embedding renewable cryptographic keys into noisy data40.442010
Computationally efficient searchable symmetric encryption261.512010
Secure pairing with biometrics90.412009
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols381.802009
Embedding Renewable Cryptographic Keys into Continuous Noisy Data100.632008
Trust Management in P2P Systems Using Standard TuLiP.60.442008
Towards an Information Theoretic Analysis of Searchable Encryption20.652008
Controlling leakage of biometric information using dithering70.592008
Fuzzy extractors for continuous distributions.281.352007
Feeling is believing: a secure template exchange protocol20.382007
How robust are gossip-based communication protocols?150.802007
Nonmonotonic Trust Management for P2P Applications140.692006
Survey and benchmark of block ciphers for wireless sensor networks613.152006
LicenseScript: a logical language for digital rights management10.482006
StreamTo: Streaming Content using a Tamper-Resistant Token10.382005
Analysing Password Protocol Security Against Off-line Dictionary Attacks311.152005
Experiments with queries over encrypted data using secret sharing10.372005
Benchmarking block ciphers for wireless sensor networks.00.342004
Efficient Tree Search in Encrypted Data.140.932004
Using Secret Sharing for Searching in Encrypted Data201.132004
License protection with a tamper-resistant token30.432004
On the Security of Digital Signature Schemes Based on Error-Correcting Codes20.482003