Zum Hauptinhalt springen

Showing 1–25 of 25 results for author: Hoepman, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.03442  [pdf, ps, other

    cs.CR cs.CY cs.SE

    Privacy Engineering From Principles to Practice: A Roadmap

    Authors: Frank Pallas, Katharina Koerner, Isabel Barberá, Jaap-Henk Hoepman, Meiko Jensen, Nandita Rao Narla, Nikita Samarin, Max-R. Ulbricht, Isabel Wagner, Kim Wuyts, Christian Zimmermann

    Abstract: Privacy engineering is gaining momentum in industry and academia alike. So far, manifold low-level primitives and higher-level methods and strategies have successfully been established. Still, fostering adoption in real-world information systems calls for additional aspects to be consciously considered in research and practice.

    Submitted 4 April, 2024; originally announced April 2024.

    ACM Class: K.5.0; H.1.0; D.2.1; D.2.2

    Journal ref: IEEE Security & Privacy, volume 22, issue 2, March-April 2024

  2. arXiv:2209.12003  [pdf, ps, other

    cs.CY

    Mutual Contact Discovery

    Authors: Jaap-Henk Hoepman

    Abstract: Contact discovery allows new users of a messaging service to find existing contacts that already use that service. Existing users are similarly informed of new users that join. This creates a privacy issue: anyone already on the service that has your number on their contact list gets notified that you joined. Even if you don't know that person, or if it is an ex or former colleague that you long p… ▽ More

    Submitted 5 December, 2023; v1 submitted 24 September, 2022; originally announced September 2022.

    Comments: 33 pages (including appendix)

  3. arXiv:2101.09085  [pdf, ps, other

    cs.CR

    Privacy Friendly E-Ticketing For Public Transport

    Authors: Jaap-Henk Hoepman

    Abstract: This paper studies how to implement a privacy friendly form of ticketing for public transport in practice. The protocols described are inspired by current (privacy invasive) public transport ticketing systems used around the world. The first protocol emulates paper based tickets. The second protocol implements a pay-as-you-go approach, with fares determined when users check-in and check-out. Both… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

    Comments: 31 pages, 2 figures

  4. arXiv:2101.03241  [pdf, ps, other

    cs.CR

    Hansel and Gretel and the Virus: Privacy Conscious Contact Tracing

    Authors: Jaap-Henk Hoepman

    Abstract: Digital contact tracing has been proposed to support the health authorities in fighting the current Covid-19 pandemic. In this paper we propose two centralised protocols for digital contact tracing that, contrary to the common hypothesis that this is an inherent risk, do not allow (retroactive) tracking of the location of a device over time. The first protocol does not rely on synchronised clocks.… ▽ More

    Submitted 21 February, 2021; v1 submitted 8 January, 2021; originally announced January 2021.

    Comments: 29 pages, 3 figures

  5. arXiv:2012.05097  [pdf, ps, other

    cs.CY

    A Critique of the Google Apple Exposure Notification (GAEN) Framework

    Authors: Jaap-Henk Hoepman

    Abstract: As a response to the COVID-19 pandemic digital contact tracing has been proposed as a tool to support the health authorities in their quest to determine who has been in close and sustained contact with a person infected by the coronavirus. In April 2020 Google and Apple released the Google Apple Exposure Notification (GAEN) framework, as a decentralised and more privacy friendly platform for conta… ▽ More

    Submitted 12 January, 2021; v1 submitted 9 December, 2020; originally announced December 2020.

    Comments: 19 pages, 3 figures

  6. arXiv:1910.06682  [pdf, other

    cs.DC

    Hydra: A Multiple Blockchain Protocol for Improving Transaction Throughput

    Authors: Rowel Gündlach, Jaap-Henk Hoepman, Remco van der Hofstad, Tommy Koens, Stijn Meijer

    Abstract: Improving transaction throughput is one of the main challenges in decentralized payment systems. Attempts to improve transaction throughput in cryptocurrencies are usually a trade-off between throughput and security or introduce a central component. We propose Hydra, a decentralized protocol that improves transaction throughput without the security trade-off and has no central component. Our nov… ▽ More

    Submitted 15 October, 2019; originally announced October 2019.

    Comments: Preprint, 12 pages, 2 figures, short version

  7. Privacy and Data Protection by Design - from policy to engineering

    Authors: George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, Stefan Schiffner

    Abstract: Privacy and data protection constitute core values of individuals and of democratic societies. There have been decades of debate on how those values -and legal obligations- can be embedded into systems, preferably from the very beginning of the design process. One important element in this endeavour are technical mechanisms, known as privacy-enhancing technologies (PETs). Their effectiveness has… ▽ More

    Submitted 10 April, 2015; v1 submitted 12 January, 2015; originally announced January 2015.

    Comments: 79 pages in European Union Agency for Network and Information Security (ENISA) report, December 2014, ISBN 978-92-9204-108-3

    MSC Class: 94A60 ACM Class: K.4.1; D.4.6; H.2.0

  8. arXiv:1210.6621  [pdf, ps, other

    cs.CY cs.CR

    Privacy Design Strategies

    Authors: Jaap-Henk Hoepman

    Abstract: In this paper we define the notion of a privacy design strategy. These strategies help IT architects to support privacy by design early in the software development life cycle, during concept development and analysis. Using current data protection legislation as point of departure we derive the following eight privacy design strategies: minimise, hide, separate, aggregate, inform, control, enforce,… ▽ More

    Submitted 6 May, 2013; v1 submitted 24 October, 2012; originally announced October 2012.

    Comments: 12 pages, 3 figures, 1 table. Presented at the Privacy Law Scholars Conference (PLSC) 2013

  9. arXiv:1109.2637  [pdf, ps, other

    cs.CR cs.CY

    In Things We Trust? Towards trustability in the Internet of Things

    Authors: Jaap-Henk Hoepman

    Abstract: This essay discusses the main privacy, security and trustability issues with the Internet of Things.

    Submitted 12 September, 2011; originally announced September 2011.

  10. arXiv:1101.0427  [pdf

    cs.CR

    The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    Authors: Gergely Alpár, Jaap-Henk Hoepman, Johanneke Siljee

    Abstract: This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single, comprehensive study and proposes recommendations to resolve or to mitigate the problems. Some of these… ▽ More

    Submitted 2 January, 2011; originally announced January 2011.

    Comments: 15 pages, 3 figures

  11. arXiv:1001.4459  [pdf, other

    cs.CY

    The Privacy Coach: Supporting customer privacy in the Internet of Things

    Authors: Gerben Broenink, Jaap-Henk Hoepman, Christian van 't Hof, Rob van Kranenburg, David Smits, Tijmen Wisman

    Abstract: The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator betwe… ▽ More

    Submitted 25 January, 2010; originally announced January 2010.

    Comments: 10 pages

  12. arXiv:0909.1257  [pdf, ps, other

    cs.CR

    Practical Schemes For Privacy & Security Enhanced RFID

    Authors: Jaap-Henk Hoepman, Rieks Joosten

    Abstract: Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access contr… ▽ More

    Submitted 25 February, 2010; v1 submitted 7 September, 2009; originally announced September 2009.

    Comments: 18 pages

  13. arXiv:0906.4668  [pdf, ps, other

    cs.CR

    Client-Server Password Recovery (Extended Abstract)

    Authors: Łukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum

    Abstract: Human memory is not perfect - people constantly memorize new facts and forget old ones. One example is forgetting a password, a common problem raised at IT help desks. We present several protocols that allow a user to automatically recover a password from a server using partial knowledge of the password. These protocols can be easily adapted to the personal entropy setting, where a user can reco… ▽ More

    Submitted 25 June, 2009; originally announced June 2009.

  14. arXiv:0804.0074  [pdf, ps, other

    cs.CR

    Private Handshakes

    Authors: Jaap-Henk Hoepman

    Abstract: Private handshaking allows pairs of users to determine which (secret) groups they are both a member of. Group membership is kept secret to everybody else. Private handshaking is a more private form of secret handshaking, because it does not allow the group administrator to trace users. We extend the original definition of a handshaking protocol to allow and test for membership of multiple groups… ▽ More

    Submitted 1 April, 2008; originally announced April 2008.

    Journal ref: n F. Stajano, editor, 4th Eur. Symp. on Security and Privacy in Ad hoc and Sensor Networks, LNCS 4572, pages 31-42, Cambridge, UK, June 2-3 2007

  15. arXiv:0803.2285  [pdf, ps, other

    cs.CR

    A Practical Attack on the MIFARE Classic

    Authors: Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia

    Abstract: The MIFARE Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer. This paper studies the architecture of the card and the communication protocol between card and reader. Then it gives a practical, low-cost, attack that recovers secret information from the memory of the card. Due to a weakness in the pseudo-… ▽ More

    Submitted 26 June, 2008; v1 submitted 15 March, 2008; originally announced March 2008.

  16. arXiv:0802.0834  [pdf, ps, other

    cs.CR

    The Ephemeral Pairing Problem

    Authors: Jaap-Henk Hoepman

    Abstract: In wireless ad-hoc broadcast networks the pairing problem consists of establishing a (long-term) connection between two specific physical nodes in the network that do not yet know each other. We focus on the ephemeral version of this problem. Ephemeral pairings occur, for example, when electronic business cards are exchanged between two people that meet, or when one pays at a check-out using a w… ▽ More

    Submitted 6 February, 2008; originally announced February 2008.

    Journal ref: In 8th Int. Conf. Financial Cryptography, LNCS 3110, pages 212-226, Key West, FL, USA, February 9-12 2004. Springer

  17. arXiv:0802.0832  [pdf, ps, other

    cs.CR

    Distributed Double Spending Prevention

    Authors: Jaap-Henk Hoepman

    Abstract: We study the problem of preventing double spending in electronic payment schemes in a distributed fashion. This problem occurs, for instance, when the spending of electronic coins needs to be controlled by a large collection of nodes (eg. in a peer-to-peer (P2P) system) instead of one central bank. Contrary to the commonly held belief that this is fundamentally impossible, we propose several sol… ▽ More

    Submitted 6 February, 2008; originally announced February 2008.

    Comments: 15th Int. Workshop on Security Protocols, 2007 (to appear)

  18. arXiv:0801.3930  [pdf, ps, other

    cs.CR cs.CY

    Crossing Borders: Security and Privacy Issues of the European e-Passport

    Authors: Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur

    Abstract: The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show which borders need to be crossed to improve the security and the privacy protection of the next generation of e-passports. In particular we discuss attacks on Basic Access Control due to the low entropy of the data fr… ▽ More

    Submitted 25 January, 2008; originally announced January 2008.

    Journal ref: 1st Int. Workshop on Security, LNCS 4266, pages 152-167, Kyoto, Japan, October 23-24 2006

  19. arXiv:0801.3924  [pdf, ps, other

    cs.CR cs.CY cs.SE

    Increased security through open source

    Authors: Jaap-Henk Hoepman, Bart Jacobs

    Abstract: In this paper we discuss the impact of open source on both the security and transparency of a software system. We focus on the more technical aspects of this issue, combining and extending arguments developed over the years. We stress that our discussion of the problem only applies to software for general purpose computing systems. For embedded systems, where the software usually cannot easily b… ▽ More

    Submitted 25 January, 2008; originally announced January 2008.

    Journal ref: Communications of the ACM, 50(1):79-83, 2007

  20. arXiv:0710.5425  [pdf, ps, other

    cs.CR

    Fuzzy Private Matching (Extended Abstract)

    Authors: Łukasz Chmielewski, Jaap-Henk Hoepman

    Abstract: In the private matching problem, a client and a server each hold a set of $n$ input elements. The client wants to privately compute the intersection of these two sets: he learns which elements he has in common with the server (and nothing more), while the server gains no information at all. In certain applications it would be useful to have a private matching protocol that reports a match even i… ▽ More

    Submitted 29 October, 2007; originally announced October 2007.

  21. arXiv:cs/0410047  [pdf, ps, other

    cs.DC cs.DM

    Simple Distributed Weighted Matchings

    Authors: Jaap-Henk Hoepman

    Abstract: Wattenhofer [WW04] derive a complicated distributed algorithm to compute a weighted matching of an arbitrary weighted graph, that is at most a factor 5 away from the maximum weighted matching of that graph. We show that a variant of the obvious sequential greedy algorithm [Pre99], that computes a weighted matching at most a factor 2 away from the maximum, is easily distributed. This yields the b… ▽ More

    Submitted 19 October, 2004; originally announced October 2004.

  22. arXiv:cs/0402046  [pdf, ps, other

    cs.CR

    Spam filter analysis

    Authors: Flavio D. Garcia, Jaap-Henk Hoepman

    Abstract: Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. Our analysis was performed by simulating email traffic under different conditions. We show that gen… ▽ More

    Submitted 19 February, 2004; originally announced February 2004.

    Comments: Submitted to SEC 2004

    ACM Class: D.4.6; I.5.1; I.5.4; K.6.5

  23. arXiv:cs/9909013  [pdf, ps, other

    cs.DC

    Self-stabilizing mutual exclusion on a ring, even if K=N

    Authors: Jaap-Henk Hoepman

    Abstract: We show that, contrary to common belief, Dijkstra's self-stabilizing mutual exclusion algorithm on a ring [Dij74,Dij82] also stabilizes when the number of states per node is one less than the number of nodes on the ring.

    Submitted 21 September, 1999; originally announced September 1999.

    Comments: 2 pages

    ACM Class: D.4.5; D.1.3

  24. arXiv:cs/9903009  [pdf, ps, other

    cs.DC cs.AR cs.CC cs.DS cs.NI

    Space-Efficient Routing Tables for Almost All Networks and the Incompressibility Method

    Authors: Harry Buhrman, Jaap-Henk Hoepman, Paul Vitanyi

    Abstract: We use the incompressibility method based on Kolmogorov complexity to determine the total number of bits of routing information for almost all network topologies. In most models for routing, for almost all labeled graphs $Θ(n^2)$ bits are necessary and sufficient for shortest path routing. By `almost all graphs' we mean the Kolmogorov random graphs which constitute a fraction of $1-1/n^c$ of all… ▽ More

    Submitted 10 March, 1999; originally announced March 1999.

    Comments: 19 pages, Latex, 1 table, 1 figure; SIAM J. Comput., To appear

    Report number: CWI Tech Report 1997 ACM Class: C.2, F.2, D.4

  25. arXiv:cs/9902005  [pdf, ps, other

    cs.DS cs.CC cs.DB cs.DC cs.DM cs.IR

    Mutual Search

    Authors: Harry Buhrman, Matthew Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul Vitanyi

    Abstract: We introduce a search problem called ``mutual search'' where $k$ \agents, arbitrarily distributed over $n$ sites, are required to locate one another by posing queries of the form ``Anybody at site $i$?''. We ask for the least number of queries that is necessary and sufficient. For the case of two \agents using deterministic protocols we obtain the following worst-case results: In an oblivious se… ▽ More

    Submitted 2 February, 1999; originally announced February 1999.

    Comments: 18 pages, Latex, 5 figures, J. Assoc. Comp. Mach., To appear

    ACM Class: F.2,C.2,E,1,D.4.4