Hugo Jonker
Hugo Jonker
Bestätigte E-Mail-Adresse bei ou.nl - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Privacy and verifiability in voting systems: Methods, developments and trends
H Jonker, S Mauw, J Pang
Computer Science Review 10, 1-30, 2013
642013
Challenges in eHealth: From Enabling to Enforcing Privacy
N Dong, H Jonker
Foundations of Health Informatics Engineering and Systems, 195-206, 2012
572012
Formalising receipt-freeness
HL Jonker, EP de Vink
International Conference on Information Security, 476-488, 2006
552006
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting
CF Torres, H Jonker, S Mauw
European Symposium on Research in Computer Security, 3-19, 2015
472015
Receipt-freeness as a special case of anonymity in epistemic logic
HL Jonker, W Pieters
IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006
462006
Defining verifiability in e-auction protocols
J Dreier, H Jonker, P Lafourcade
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
352013
Analysis of a receipt-free auction protocol in the applied pi calculus
N Dong, H Jonker, J Pang
International Workshop on Formal Aspects in Security and Trust, 223-238, 2010
292010
Versatile Prêt à Voter: Handling multiple election methods with a unified interface
Z Xia, C Culnane, J Heather, H Jonker, PYA Ryan, S Schneider, ...
International Conference on Cryptology in India, 98-114, 2010
252010
Formal analysis of privacy in an eHealth protocol
N Dong, H Jonker, J Pang
European Symposium on Research in Computer Security, 325-342, 2012
242012
A formal framework for quantifying voter-controlled privacy
H Jonker, S Mauw, J Pang
Journal of Algorithms 64 (2-3), 89-105, 2009
222009
Anonymity and verifiability in voting: understanding (un) linkability
L Langer, H Jonker, W Pieters
International Conference on Information and Communications Security, 296-310, 2010
192010
Security aspects of DRM systems
HL Jonker, S Mauw, JHS Verschuren, A Schoonen
25th Symposium on information theory in the Benelux, 169-176, 2004
152004
Ægis: Smart shielding of smart contracts
C Ferreira Torres, M Baden, R Norvill, H Jonker
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
122019
Nuovo DRM paradiso: Towards a verified fair DRM scheme
MT Dashti, SK Nair, HL Jonker
International Conference on Fundamentals of Software Engineering, 33-48, 2007
122007
Fingerprint surface-based detection of web bot detectors
H Jonker, B Krumnow, G Vlot
European Symposium on Research in Computer Security, 586-605, 2019
112019
Modeling the german legal latitude principles
S Neumann, A Kahlert, M Henning, P Richter, H Jonker, M Volkamer
International Conference on Electronic Participation, 49-56, 2013
112013
Core security requirements of DRM systems
HL Jonker, S Mauw
Symposium on Information theory in the Benelux, 2004
112004
Bulletin boards in voting systems: Modelling and measuring privacy
H Jonker, J Pang
2011 Sixth International Conference on Availability, Reliability and …, 2011
102011
Handbook of Research on Secure Multimedia Distribution
PA Jamkhedkar, GL Heileman
IGI Publishing, 2008
102008
Ægis: Shielding vulnerable smart contracts against attacks
C Ferreira Torres, M Baden, R Norvill, BB Fiz Pontiveros, H Jonker, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
92020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20