Welkom...

prof.dr. W. Jonker (Willem)

Hoogleraar

Expertises

Cryptography
Semantics
Xml
Servers
Access Control
Experiments
Bayesian Networks
Hidden Markov Models

Nevenactiviteiten

  • EIT Digital
    CEO

Publicaties

Recente Artikelen
Bortolameotti, R., Peter, A., Everts, M. H., Jonker, W., & Hartel, P. H. (2016). Reliably determining data leakage in the presence of strong attackers. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016 (pp. 484-495). New York: ACM. DOI: 10.1145/2991079.2991095
van de Kamp, T. R., Peter, A., Everts, M. H., & Jonker, W. (2016). Private Sharing of IOCs and Sightings. In 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016 (pp. 35-38). New York: ACM. DOI: 10.1145/2994539.2994544
Bakondi, B. G., Peter, A., Everts, M. H., Hartel, P. H., & Jonker, W. (2015). Publicly Verifiable Private Aggregation of Time-Series Data. In 10th International Conference on Availability, Reliability and Security, ARES 2015 (pp. 50-59). Piscataway, NJ, USA: IEEE. DOI: 10.1109/ARES.2015.82
Bösch, C. T., Peter, A., Leenders, B., Lim, H. W., Tang, Q., Wang, H., ... Jonker, W. (2014). Distributed Searchable Symmetric Encryption. In Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014 (pp. 330-337). USA: IEEE. DOI: 10.1109/PST.2014.6890956
Bösch, C. T., Peter, A., Hartel, P. H., & Jonker, W. (2014). SOFIR: Securely Outsourced Forensic Image Recognition. In 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014 (pp. 2694-2698). USA: IEEE. DOI: 10.1109/ICASSP.2014.6854089
Makri, E., Everts, M. H., de Hoogh, S., Peter, A., op den Akker, H., Hartel, P. H., & Jonker, W. (2014). Privacy-Preserving Verification of Clinical Research. In Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) (pp. 481-500). (Lecture Notes in Informatics (LNI)). Bonn: Gesellschaft für Informatik.
Bösch, C. T., Tang, Q., Hartel, P. H., & Jonker, W. (2012). Selective Document Retrieval from Encrypted Database. In 15th International Conference on Information Security (ISC) (pp. 224-241). (Lecture Notes in Computer Science; Vol. 7483). Berlin: Springer Verlag. DOI: 10.1007/978-3-642-33383-5_14

Pure Link

Contactgegevens

Bezoekadres

Universiteit Twente
Faculteit Elektrotechniek, Wiskunde en Informatica
Zilverling (gebouwnr. 11), kamer 2007
Hallenweg 19
7522NH  Enschede

Navigeer naar locatie

Postadres

Universiteit Twente
Faculteit Elektrotechniek, Wiskunde en Informatica
Zilverling  2007
Postbus 217
7500 AE Enschede