The R-norm information measure DE Boekee, JCA Van der Lubbe Information and control 45 (2), 136-155, 1980 | 181 | 1980 |
A comprehensive RFID solution to enhance inpatient medication safety P Peris-Lopez, A Orfila, A Mitrokotsa, JCA van der Lubbe international journal of medical informatics 80 (1), 13-24, 2011 | 163 | 2011 |
Robust labeling methods for copy protection of images GC Langelaar, JCA van der Lubbe, RL Lagendijk Storage and retrieval for Image and Video databases V 3022, 298-309, 1997 | 158 | 1997 |
Basic methods of cryptography JCA Lubbe Cambridge University Press, 1998 | 150 | 1998 |
Facial feature localization and adaptation of a generic face model for model-based coding MJT Reinders, PJL Van Beek, B Sankur, JCA van der Lubbe Signal Processing: Image Communication 7 (1), 57-74, 1995 | 129 | 1995 |
Flaws on RFID grouping-proofs. Guidelines for future sound protocols P Peris-Lopez, A Orfila, JC Hernandez-Castro, JCA Van der Lubbe Journal of Network and Computer Applications 34 (3), 833-845, 2011 | 107 | 2011 |
Copy protection for multimedia data based on labeling techniques GC Langelaar, JCA Van Der Lubbe, J Biemond Symposium on Information Theory in the Benelux, 33-40, 1996 | 94 | 1996 |
Some aspects of error bounds in feature selection DE Boekee, JCA van der Lubbe Pattern recognition 11 (5-6), 353-360, 1979 | 77 | 1979 |
Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, JCA Van der Lubbe Engineering Applications of Artificial Intelligence 24 (6), 1061-1069, 2011 | 47 | 2011 |
On (the emergence of) cyber security science and its challenges for cyber security education J Van den Berg, J Van Zoggel, M Snels, M Van Leeuwen, S Boekee, ... Proceedings of the NATO IST-122 Cyber Security Science and Engineering …, 2015 | 40 | 2015 |
Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, E Palomar, ... 2010 IEEE International Conference on RFID (IEEE RFID 2010), 45-52, 2010 | 40 | 2010 |
Security flaws in a recent ultralightweight RFID protocol P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, JCA van der Lubbe Radio Frequency Identification System Security, 83-94, 2010 | 34 | 2010 |
A generalized class of certainty and information measures JCA van der Lubbe, Y Boxma, DE Boekee Information Sciences 32 (3), 187-215, 1984 | 34 | 1984 |
Cryptographically secure pseudo-random bit generator for RFID tags P Peris-Lopez, E San Millan, JCA Van Der Lubbe, LA Entrena 2010 International Conference for Internet Technology and Secured …, 2010 | 33 | 2010 |
Semantic segmentation of videophone image sequences PJL van Beek, MJT Reinders, B Sankur, JCA van der Lubbe Visual Communications and Image Processing'92 1818, 1182-1193, 1992 | 33 | 1992 |
Shedding some light on RFID distance bounding protocols and terrorist attacks P Peris-Lopez, JCH Castro, JM Estevez-Tapiador, JCA van der Lubbe CoRR abs/0906.4618, 2009 | 26 | 2009 |
Weaknesses in two recent lightweight RFID authentication protocols P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, ... Information Security and Cryptology: 5th International Conference, Inscrypt …, 2010 | 25 | 2010 |
Feature selection for paintings classification by optimal tree pruning AI Deac, J van der Lubbe, E Backer Multimedia Content Representation, Classification and Security …, 2006 | 25 | 2006 |
On certain coding theorems for the information of order α and of type β JCA van der Lubbe Trans. Eighth Prague Conf. Inform. Theory, Statist. Dec. Functions, Random …, 1978 | 21 | 1978 |
Transformation of a general 3D facial model to an actual scene face MJT Reinders, B Sankur, JCA van der Lubbe 11th IAPR International Conference on Pattern Recognition. Vol. III …, 1992 | 20 | 1992 |