Welkom...

prof.dr. W. Jonker (Willem)

Hoogleraar

Expertises

Engineering & Materials Science
Access Control
Communication
Cryptography
Information Analysis
Information Management
Monitoring
Mathematics
Encryption
Predicate

Publicaties

Recent
Bortolameotti, R. , van Ede, T. S. , Continella, A. , Hupperich, T. M. , Everts, M. H., Rafati, R. , Jonker, W. , Hartel, P. , & Peter, A. (2020). HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting. In 35th Annual ACM Symposium on Applied Computing, SAC 2020 (pp. 1696-1705). Association for Computing Machinery (ACM). https://doi.org/10.1145/3341105.3373862
Bortolameotti, R. , van Ede, T. S. , Everts, M. H. , Jonker, W. , Hartel, P. H. , Peter, A. , & Continella, A. (2019). Victim-Aware Adaptive Covert Channels. In S. Chen, K-K. R. Choo, X. Fu, W. Lou, & A. Mohaisen (Eds.), Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I (pp. 450-471). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Vol. 304 LNICST). https://doi.org/10.1007/978-3-030-37228-6_22
van de Kamp, T. R., Stritzl, D. , Jonker, W. , & Peter, A. (2019). Two-Client and Multi-client Functional Encryption for Set Intersection. In J. Jang-Jaccard, & F. Guo (Eds.), Information security and privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings (pp. 97-115). (Lecture Notes in Computer Science; Vol. 11547). Springer. https://doi.org/10.1007/978-3-030-21548-4_6
van de Kamp, T. , Peter, A. , Everts, M. H. , & Jonker, W. (2018). Multi-client predicate-only encryption for conjunctive equality tests. In S. Capkun, & S. S. M. Chow (Eds.), Cryptology and Network Security - 16th International Conference, CANS 2017, Revised Selected Papers (pp. 135-157). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11261 LNCS). Springer. https://doi.org/10.1007/978-3-030-02641-7_7
Bortolameotti, R. , van Ede, T. S., Caselli, M. , Everts, M. H. , Hartel, P. H., Hofstede, R. , Jonker, W. , & Peter, A. (2017). DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. In ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 373-386) https://doi.org/10.1145/3134600.3134605
van de Kamp, T. R. , Peter, A. , Everts, M. H. , & Jonker, W. (2017). Multi-client Predicate-only Encryption for Conjunctive Equality Tests. Paper presented at 16th International Conference on Cryptology And Network Security 2017, Hong Kong, China.

Pure Link

Contactgegevens

+31534894283 (secretaresse)
+31534893690 (bij geen gehoor)
 

Bezoekadres

Universiteit Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling (gebouwnr. 11), kamer 2007
Hallenweg 19
7522NH  Enschede

Navigeer naar locatie

Postadres

Universiteit Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling  2007
Postbus 217
7500 AE Enschede