Welkom...

prof.dr. W. Jonker (Willem)

Hoogleraar

Expertises

Cryptography
Xml
Access Control
Semantics
Information Management
Experiments
Servers
Psychometrics
Content Based Retrieval
Formal Specification
Management
Http
Information Analysis
Politics
World Wide Web
Biometrics
Error Probability
Gene
Query Processing
Genes
Genes

Publicaties

Recent
Bortolameotti, R., van Ede, T. S., Caselli, M., Everts, M. H., Hartel, P. H., Hofstede, R., ... Peter, A. (2017). DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. In ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 373-386). DOI: 10.1145/3134600.3134605
van de Kamp, T. R., Peter, A., Everts, M. H., & Jonker, W. (2017). Multi-client Predicate-only Encryption for Conjunctive Equality Tests. Paper presented at 16th International Conference on Cryptology And Network Security 2017, Hong Kong, China.
Bortolameotti, R., Peter, A., Everts, M. H., Jonker, W., & Hartel, P. H. (2016). Reliably determining data leakage in the presence of strong attackers. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016 (pp. 484-495). New York: Association for Computing Machinery. DOI: 10.1145/2991079.2991095
van de Kamp, T. R., Peter, A., Everts, M. H., & Jonker, W. (2016). Private Sharing of IOCs and Sightings. In 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016 (pp. 35-38). New York: Association for Computing Machinery. DOI: 10.1145/2994539.2994544
Bakondi, B. G., Peter, A., Everts, M. H., Hartel, P. H., & Jonker, W. (2015). Publicly Verifiable Private Aggregation of Time-Series Data. In 10th International Conference on Availability, Reliability and Security, ARES 2015 (pp. 50-59). Piscataway, NJ, USA: IEEE. DOI: 10.1109/ARES.2015.82
Bösch, C. T., Peter, A., Leenders, B., Lim, H. W., Tang, Q., Wang, H., ... Jonker, W. (2014). Distributed Searchable Symmetric Encryption. In Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014 (pp. 330-337). USA: IEEE. DOI: 10.1109/PST.2014.6890956
Bösch, C. T., Peter, A., Hartel, P. H., & Jonker, W. (2014). SOFIR: Securely Outsourced Forensic Image Recognition. In 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014 (pp. 2694-2698). USA: IEEE. DOI: 10.1109/ICASSP.2014.6854089
Makri, E., Everts, M. H., de Hoogh, S., Peter, A., op den Akker, H., Hartel, P. H., & Jonker, W. (2014). Privacy-Preserving Verification of Clinical Research. In Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) (pp. 481-500). (Lecture Notes in Informatics (LNI)). Bonn: Gesellschaft für Informatik e.V..

Pure Link

Contactgegevens

+31534894283 (secretaresse)
+31534893690 (bij geen gehoor)
 

Bezoekadres

Universiteit Twente
Faculteit Elektrotechniek, Wiskunde en Informatica
Zilverling (gebouwnr. 11), kamer 2007
Hallenweg 19
7522NH  Enschede

Navigeer naar locatie

Postadres

Universiteit Twente
Faculteit Elektrotechniek, Wiskunde en Informatica
Zilverling  2007
Postbus 217
7500 AE Enschede