The R-norm information measure DE Boekee, JCA Van der Lubbe Information and control 45 (2), 136-155, 1980 | 171 | 1980 |
A comprehensive RFID solution to enhance inpatient medication safety P Peris-Lopez, A Orfila, A Mitrokotsa, JCA Van der Lubbe international journal of medical informatics 80 (1), 13-24, 2011 | 153 | 2011 |
Robust labeling methods for copy protection of images GC Langelaar, JCA van der Lubbe, RL Lagendijk Storage and Retrieval for Image and Video Databases V 3022, 298-309, 1997 | 152 | 1997 |
Basic methods of cryptography JCA Lubbe Cambridge University Press, 1998 | 134 | 1998 |
Facial feature localization and adaptation of a generic face model for model-based coding MJT Reinders, PJL Van Beek, B Sankur, JCA van der Lubbe Signal Processing: Image Communication 7 (1), 57-74, 1995 | 131 | 1995 |
Flaws on RFID grouping-proofs. Guidelines for future sound protocols P Peris-Lopez, A Orfila, JC Hernandez-Castro, JCA Van der Lubbe Journal of Network and Computer Applications 34 (3), 833-845, 2011 | 107 | 2011 |
Copy protection for multimedia data based on labeling techniques GC Langelaar, JCA Van Der Lubbe, J Biemond Symposium on Information Theory in the Benelux, 33-40, 1996 | 91 | 1996 |
Some aspects of error bounds in feature selection DE Boekee, JCA van der Lubbe Pattern recognition 11 (5-6), 353-360, 1979 | 70 | 1979 |
Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, JCA Van der Lubbe Engineering Applications of Artificial Intelligence 24 (6), 1061-1069, 2011 | 48 | 2011 |
Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, E Palomar, ... 2010 IEEE International Conference on RFID (IEEE RFID 2010), 45-52, 2010 | 35 | 2010 |
Cryptographically secure pseudo-random bit generator for RFID tags P Peris-Lopez, E San Millan, JCA Van Der Lubbe, LA Entrena 2010 International Conference for Internet Technology and Secured …, 2010 | 33 | 2010 |
A generalized class of certainty and information measures JCA van der Lubbe, Y Boxma, DE Boekee Information Sciences 32 (3), 187-215, 1984 | 33 | 1984 |
Security flaws in a recent ultralightweight RFID protocol P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, JCA van der Lubbe arXiv preprint arXiv:0910.2115, 2009 | 32 | 2009 |
Semantic segmentation of videophone image sequences PJL van Beek, MJT Reinders, B Sankur, JCA van der Lubbe Visual Communications and Image Processing'92 1818, 1182-1193, 1992 | 31 | 1992 |
Weaknesses in two recent lightweight RFID authentication protocols P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, ... Information Security and Cryptology: 5th International Conference, Inscrypt …, 2010 | 25 | 2010 |
Feature selection for paintings classification by optimal tree pruning AI Deac, J van der Lubbe, E Backer Multimedia Content Representation, Classification and Security …, 2006 | 23 | 2006 |
Shedding some light on RFID distance bounding protocols and terrorist attacks P Peris-Lopez, JC Hernandez-Castro, JCA van der Lubbe, JME Tapiador | 22 | 2009 |
On certain coding theorems for the information of order α and of type β JCA van der Lubbe Trans. Eighth Prague Conf. Inform. Theory, Statist. Dec. Functions, Random …, 1978 | 20 | 1978 |
Transformation of a general 3D facial model to an actual scene face MJT Reinders, B Sankur, JCA van der Lubbe 11th IAPR International Conference on Pattern Recognition. Vol. III …, 1992 | 19 | 1992 |
Paper retrieval based on specific paper features: Chain and laid lines M van Staalduinen, JCA van der Lubbe, E Backer, P Paclik Multimedia Content Representation, Classification and Security …, 2006 | 15 | 2006 |