default search action
Jan C. A. van der Lubbe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j11]Yuan Zeng, Jan C. A. van der Lubbe, Marco Loog:
Multi-scale convolutional neural network for pixel-wise reconstruction of Van Gogh's drawings. Mach. Vis. Appl. 30(7-8): 1229-1241 (2019) - 2016
- [c20]Yuan Zeng, Jiexiong Tang, Jan C. A. van der Lubbe, Marco Loog:
Learning Algorithms for Digital Reconstruction of Van Gogh's Drawings. EuroMed (1) 2016: 322-333 - 2014
- [c19]Jan C. A. van der Lubbe, Merel J. de Boer, Zeki Erkin:
A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties. BalkanCryptSec 2014: 237-249 - 2013
- [c18]Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe, Reginald L. Lagendijk:
Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation. ESORICS 2013: 418-442 - 2011
- [j10]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Jan C. A. van der Lubbe:
Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Eng. Appl. Artif. Intell. 24(6): 1061-1069 (2011) - [j9]Pedro Peris-Lopez, Agustín Orfila, Aikaterini Mitrokotsa, Jan C. A. van der Lubbe:
A comprehensive RFID solution to enhance inpatient medication safety. Int. J. Medical Informatics 80(1): 13-24 (2011) - [j8]Pedro Peris-Lopez, Agustín Orfila, Julio C. Hernandez-Castro, Jan C. A. van der Lubbe:
Flaws on RFID grouping-proofs. Guidelines for future sound protocols. J. Netw. Comput. Appl. 34(3): 833-845 (2011) - 2010
- [c17]Pedro Peris-Lopez, Enrique San Millán, Jan C. A. van der Lubbe, Luis Entrena:
Cryptographically secure pseudo-random bit generator for RFID tags. ICITST 2010: 1-6 - [i3]Mu'awya Naser, Pedro Peris-Lopez, Mohammd Rafie, Jan C. A. van der Lubbe:
Vulnerability Analysis of PAP for RFID Tags. CoRR abs/1008.3625 (2010)
2000 – 2009
- 2009
- [c16]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Jan C. A. van der Lubbe:
Weaknesses in Two Recent Lightweight RFID Authentication Protocols. Inscrypt 2009: 383-392 - [c15]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Enrique San Millán, Jan C. A. van der Lubbe:
Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments. SEWCN 2009: 25-35 - [c14]Behnaz Pourebrahimi, Jan C. A. van der Lubbe:
A Novel Approach for Noise Reduction in the Gabor Time-frequency Domain. VISAPP (2) 2009: 22-27 - [i2]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks. CoRR abs/0906.4618 (2009) - [i1]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Security Flaws in a Recent Ultralightweight RFID Protocol. CoRR abs/0910.2115 (2009) - 2007
- [j7]Eric O. Postma, H. Jaap van den Herik, Jan C. A. van der Lubbe:
Paintings and writings in the hands of scientists. Pattern Recognit. Lett. 28(6): 671-672 (2007) - [c13]Bartek Gedrojc, Jan C. A. van der Lubbe, Martin van Hensbergen:
Private Computing with Beehive Organized Agents. SECRYPT 2007: 289-294 - 2006
- [c12]M. van Staalduinen, Jan C. A. van der Lubbe, Eric Backer, Pavel Paclík:
Paper Retrieval Based on Specific Paper Features: Chain and Laid Lines. MRCS 2006: 346-353 - [c11]Ana Ioana Deac, Jan C. A. van der Lubbe, Eric Backer:
Feature Selection for Paintings Classification by Optimal Tree Pruning. MRCS 2006: 354-361 - [c10]Bartek Gedrojc, Kathy Cartrysse, Jan C. A. van der Lubbe:
Private Bidding for Mobile Agents. SECRYPT 2006: 277-282 - 2005
- [c9]Kathy Cartrysse, Jan C. A. van der Lubbe:
Information theoretical approach to mobile code. ISIT 2005: 1226-1230 - 2001
- [c8]Jan C. A. van der Lubbe, Eugene P. van Someren, Marcel J. T. Reinders:
Dating and Authentication of Rembrandt's Etchings with the Help of Computational Intelligence. ICHIM (1) 2001: 485-492
1990 – 1999
- 1997
- [c7]G. C. van den Eijkel, Jan C. A. van der Lubbe, Eric Backer:
A Modulated Parzen-Windows Approach for Probability Density Estimation. IDA 1997: 479-489 - [c6]Gerhard C. Langelaar, Jan C. A. van der Lubbe, Reginald L. Lagendijk:
Robust Labeling Methods for Copy Protection of Images. Storage and Retrieval for Image and Video Databases (SPIE) 1997: 298-309 - [c5]Ernst G. P. Bovenkamp, Jan C. A. van der Lubbe:
Temporal Reasoning with Fuzzy Time-Objects. TIME 1997: 128-135 - 1995
- [j6]Marcel J. T. Reinders, P. J. L. van Beek, Bülent Sankur, Jan C. A. van der Lubbe:
Facial feature localization and adaptation of a generic face model for model-based coding. Signal Process. Image Commun. 7(1): 57-74 (1995) - 1993
- [j5]Bülent Sankur, Ronald A. van Schijndel, Jan C. A. van der Lubbe:
Two-layer coding for videotelephone. Signal Process. Image Commun. 5(4): 295-303 (1993) - [c4]Marcel J. T. Reinders, F. A. Odijk, Jan C. A. van der Lubbe, Jan J. Gerbrands:
Tracking of global motion and facial expressions of a human face in image sequences. VCIP 1993 - 1992
- [c3]Marcel J. T. Reinders, Bülent Sankur, Jan C. A. van der Lubbe:
Transformation of a general 3D facial model to an actual scene face. ICPR (3) 1992: 75-78 - 1990
- [c2]Jan C. A. van der Lubbe, Dick E. Boekee:
KEYMEX: An expert system for the design of key management schemes. AUSCRYPT 1990: 96-103 - [c1]Jan C. A. van der Lubbe, Eric Backer, W. Krijgsman:
Models for Reasoning with Multiple Uncertainty in Expert Systems. IPMU 1990: 377-392
1980 – 1989
- 1987
- [j4]Jan C. A. van der Lubbe, Dick E. Boekee, Ysbrand Boxma:
Bivariate certainty and information measures. Inf. Sci. 41(2): 139-169 (1987) - 1984
- [j3]Jan C. A. van der Lubbe, Ysbrand Boxma, Dick E. Boekee:
A generalized class of certainty and information measures. Inf. Sci. 32(3): 187-215 (1984) - 1980
- [j2]Dick E. Boekee, Jan C. A. van der Lubbe:
The R-Norm Information Measure. Inf. Control. 45(2): 136-155 (1980)
1970 – 1979
- 1979
- [j1]Dick E. Boekee, Jan C. A. van der Lubbe:
Some aspects of error bounds in feature selection. Pattern Recognit. 11(5-6): 353-360 (1979)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-22 19:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint