Hi. I am Jaap-Henk Hoepman.
Because we have become increasingly dependent on information technology, I believe it is important that that we, users individually as well as society as a whole, remain in control. This means we must do all that is necessary to ensure that the technology is open, transparent, reliable, trustable, secure and aligned with our digital liberties. I think different professionals (engineers, legal scholars, social scientists and even artists) can learn from each other’s approaches and results. We should join forces to shape our future in this new world.
I am an associate professor in privacy enhancing protocols and privacy by design at theDigital Security group of the Institute for Computing and Information Sciences of the Radboud University Nijmegen, the Netherlands. I am also scientific director of the Privacy & Identity Lab.
My research is inspired by practical problems. I study privacy by design, and privacy friendly protocols for identity management and the Internet of Things. I enjoy talking about my research, and speaking about it in public to a general audience. That is also one of the main reasons to maintain this blog.
His blogs expresses personal views and does not express the views of the University of Nijmegen.
Kennisplatform artikelen door Jaap-Henk Hoepman
|Politie en gezichts-herkenning. Twee vragen.||01-03-2018||1|
|How the military thinks about cyberspace||14-12-2017||1|
|Blockcerts: Using blokchain for identity management is (mostly) ridiculous||21-09-2017||0|
|ALLE netwerken zijn onveilig||27-07-2017||0|
|I’ve seen the future of smart living. And it was horrible.||27-10-2016||0|
|De Privacy Maffia versus de Big Data Baronnen||08-09-2016||3|
|Does ‘Quantum encryption’ defend against a quantum computer?||26-05-2016||3|
|Mag Facebook weghalen wat het wil?||11-05-2016||0|
|Wie mag er meekijken op uw smartphone?||08-03-2016||3|
|The second crypto war is not about crypto||15-12-2015||3|
|Tijd voor een metadata protection verordening||03-11-2015||0|
|The value of verifying public keys revisited. Or: how to limit the options for dragnet surveillance.||17-09-2015||0|
|Big data: limits and pitfalls||03-06-2015||0|