Katrin (Hoeper) Reitsma
Katrin (Hoeper) Reitsma
Security Solutions Manager, Motorola Solutions
Verified email at motorolasolutions.com
Title
Cited by
Cited by
Year
Bootstrapping security in mobile ad hoc networks using identity-based schemes with key revocation
K Hoeper, G Gong
Centre for Applied Cryptographic Research (CACR) at the University of …, 2006
662006
Key revocation for identity-based schemes in mobile ad hoc networks
K Hoeper, G Gong
International Conference on Ad-Hoc Networks and Wireless, 224-237, 2006
522006
Dynamic cryptographic subscriber-device identity binding for subscriber mobility
MF Nakhjiri, K Hoeper, A Medvinsky
US Patent 8,555,361, 2013
402013
Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors
K Gudeth, M Pirretti, K Hoeper, R Buskey
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
372011
Models of authentication in ad hoc networks and their related network properties
K Hoeper, G Gong
International Association for Cryptologic Research, 2004
342004
Where EAP security claims fail
K Hoeper, L Chen
The Fourth International Conference on Heterogeneous Networking for Quality …, 2007
312007
Pre-authentication and authentication models in ad hoc networks
K Hoeper, G Gong
Wireless Network Security, 65-82, 2007
282007
Geodesic distance descriptors
G Shamai, R Kimmel
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2017
222017
Distribution of EAP-based keys for handover and re-authentication
K Hoeper, M Nakhjiri, Y Ohba
RFC 5749, March, 2010
212010
Identity-based key exchange protocols for ad hoc networks
K Hoeper, G Gong
Proceedings of the Canadian Workshop on Information Theory (CWIT’05), 127-130, 2005
202005
Bootstrapping security in mobile ad hoc networks using identity-based schemes
K Hoeper, G Gong
Security in Distributed and Networking Systems, 313-337, 2007
192007
Recommendation for EAP Methods Used in Wireless Network Access Authentication
K Hoeper, L Chen
NIST Special Publication 800, 120, 2009
172009
Channel binding support for eap methods
C Clancy, K Hoeper
draft-clancy-emu-chbind-04 (work in progress), 2008
162008
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
K Hoeper, G Gong
International Journal of Security and Networks 2 (3-4), 239-250, 2007
142007
Using the EAP framework for fast media independent handover authentication
A Izquierdo, N Golmie, K Hoeper, L Chen
Proceedings of the 4th Annual international Conference on Wireless internet, 1-8, 2008
132008
An inconvenient truth about tunneled authentications
K Hoeper, L Chen
IEEE Local Computer Network Conference, 416-423, 2010
102010
Authentication and key exchange in mobile ad hoc networks
K Hoeper
University of Waterloo, 2007
102007
Monitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks: Design and Security Analysis/Katrin Hoeper, Guang Gong
K Hoeper
Security and Privacy for Emerging Areas in Communication Networks. Waterloo …, 2009
92009
Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks
K Hoeper, G Gong
First International Conference on Security and Privacy for Emerging Areas in …, 2005
92005
Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation/Katrin Hoeper, Guang Gong
K Hoeper
Security and Privacy for Emerging Areas in Communication Networks …, 2006
62006
The system can't perform the operation now. Try again later.
Articles 1–20