Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hugo L. Jonker
@inproceedings{DBLP:conf/IEEEares/BoumaJMA23, author = {Jelle Bouma and Hugo Jonker and Vincent van der Meer and Eddy Van Den Aker}, title = {Reconstructing Timelines: From {NTFS} Timestamps to File Histories}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {154:1--154:9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605027}, doi = {10.1145/3600160.3605027}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BoumaJMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/KrumnowJK22, author = {Benjamin Krumnow and Hugo Jonker and Stefan Karsch}, editor = {Giuseppe Bianchi and Alessandro Mei}, title = {How gullible are web measurement tools?: a case study analysing and strengthening OpenWPM's reliability}, booktitle = {Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2022, Roma, Italy, December 6-9, 2022}, pages = {171--186}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3555050.3569131}, doi = {10.1145/3555050.3569131}, timestamp = {Thu, 01 Dec 2022 11:47:13 +0100}, biburl = {https://dblp.org/rec/conf/conext/KrumnowJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TorresJS22, author = {Christof Ferreira Torres and Hugo Jonker and Radu State}, title = {Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {115--128}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545975}, doi = {10.1145/3545948.3545975}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/TorresJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-08686, author = {Zach Smith and Hugo Jonker and Sjouke Mauw and Hyunwoo Lee}, title = {Modelling Agent-Skipping Attacks in Message Forwarding Protocols}, journal = {CoRR}, volume = {abs/2201.08686}, year = {2022}, url = {https://arxiv.org/abs/2201.08686}, eprinttype = {arXiv}, eprint = {2201.08686}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-08686.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-08890, author = {Benjamin Krumnow and Hugo Jonker and Stefan Karsch}, title = {Analysing and strengthening OpenWPM's reliability}, journal = {CoRR}, volume = {abs/2205.08890}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.08890}, doi = {10.48550/ARXIV.2205.08890}, eprinttype = {arXiv}, eprint = {2205.08890}, timestamp = {Mon, 23 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-08890.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CalzavaraJKR21, author = {Stefano Calzavara and Hugo Jonker and Benjamin Krumnow and Alvise Rabitti}, title = {Measuring Web Session Security at Scale}, journal = {Comput. Secur.}, volume = {111}, pages = {102472}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102472}, doi = {10.1016/J.COSE.2021.102472}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CalzavaraJKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/CompagnaJKKS21, author = {Luca Compagna and Hugo Jonker and Johannes Krochewski and Benjamin Krumnow and Merve Sahin}, title = {A preliminary study on the adoption and effectiveness of SameSite cookies as a {CSRF} defence}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {49--59}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSPW54576.2021.00012}, doi = {10.1109/EUROSPW54576.2021.00012}, timestamp = {Mon, 08 Nov 2021 16:43:34 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/CompagnaJKKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/GossenJKKR21, author = {Daniel Go{\ss}en and Hugo Jonker and Stefan Karsch and Benjamin Krumnow and David Roefs}, editor = {Dave Levin and Alan Mislove and Johanna Amann and Matthew Luckie}, title = {{HLISA:} towards a more reliable measurement tool}, booktitle = {{IMC} '21: {ACM} Internet Measurement Conference, Virtual Event, USA, November 2-4, 2021}, pages = {380--389}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3487552.3487843}, doi = {10.1145/3487552.3487843}, timestamp = {Thu, 04 Nov 2021 08:55:53 +0100}, biburl = {https://dblp.org/rec/conf/imc/GossenJKKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-10071, author = {Christof Ferreira Torres and Hugo Jonker and Radu State}, title = {Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching}, journal = {CoRR}, volume = {abs/2108.10071}, year = {2021}, url = {https://arxiv.org/abs/2108.10071}, eprinttype = {arXiv}, eprint = {2108.10071}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-10071.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TorresBNPJM20, author = {Christof Ferreira Torres and Mathis Baden and Robert Norvill and Beltran Borja Fiz Pontiveros and Hugo Jonker and Sjouke Mauw}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {{\AE}GIS: Shielding Vulnerable Smart Contracts Against Attacks}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {584--597}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384756}, doi = {10.1145/3320269.3384756}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TorresBNPJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-05987, author = {Christof Ferreira Torres and Mathis Baden and Robert Norvill and Beltran Borja Fiz Pontiveros and Hugo Jonker and Sjouke Mauw}, title = {{\AE}GIS: Shielding Vulnerable Smart Contracts Against Attacks}, journal = {CoRR}, volume = {abs/2003.05987}, year = {2020}, url = {https://arxiv.org/abs/2003.05987}, eprinttype = {arXiv}, eprint = {2003.05987}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-05987.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TorresBNJ19, author = {Christof Ferreira Torres and Mathis Baden and Robert Norvill and Hugo Jonker}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {{\AE}GIS: Smart Shielding of Smart Contracts}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2589--2591}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363263}, doi = {10.1145/3319535.3363263}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TorresBNJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JonkerKV19, author = {Hugo Jonker and Benjamin Krumnow and Gabry Vlot}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Fingerprint Surface-Based Detection of Web Bot Detectors}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {586--605}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_28}, doi = {10.1007/978-3-030-29962-0\_28}, timestamp = {Mon, 05 Feb 2024 20:29:41 +0100}, biburl = {https://dblp.org/rec/conf/esorics/JonkerKV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MeerJDBBE19, author = {Vincent van der Meer and Hugo Jonker and Guy Dols and Harm M. A. van Beek and Jeroen van den Bos and Marko C. J. D. van Eekelen}, title = {File Fragmentation in the Wild: a Privacy-Friendly Approach}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WIFS47025.2019.9034981}, doi = {10.1109/WIFS47025.2019.9034981}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/MeerJDBBE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-06176, author = {Clayton Drazner and Nikola Duza and Hugo Jonker and Dan S. Wallach}, title = {Investigating the effectiveness of web adblockers}, journal = {CoRR}, volume = {abs/1912.06176}, year = {2019}, url = {http://arxiv.org/abs/1912.06176}, eprinttype = {arXiv}, eprint = {1912.06176}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-06176.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TorresJ18, author = {Christof Ferreira Torres and Hugo Jonker}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {60--80}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_4}, doi = {10.1007/978-3-319-98989-1\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/TorresJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-00840, author = {Hugo Jonker and Jelmer Kalkman and Benjamin Krumnow and Marc Sleegers and Alan Verresen}, title = {Shepherd: Enabling Automatic and Large-Scale Login Security Studies}, journal = {CoRR}, volume = {abs/1808.00840}, year = {2018}, url = {http://arxiv.org/abs/1808.00840}, eprinttype = {arXiv}, eprint = {1808.00840}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-00840.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-08403, author = {Naipeng Dong and Hugo Jonker and Jun Pang}, title = {Formal Analysis of an E-Health Protocol}, journal = {CoRR}, volume = {abs/1808.08403}, year = {2018}, url = {http://arxiv.org/abs/1808.08403}, eprinttype = {arXiv}, eprint = {1808.08403}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-08403.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DongJP17, author = {Naipeng Dong and Hugo L. Jonker and Jun Pang}, title = {Formal modelling and analysis of receipt-free auction protocols in applied pi}, journal = {Comput. Secur.}, volume = {65}, pages = {405--432}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.09.002}, doi = {10.1016/J.COSE.2016.09.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DongJP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BellaBJ17, author = {Giampaolo Bella and Denis Butin and Hugo Jonker}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Analysing Privacy Analyses}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {19--28}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-03.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BellaBJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerM17, author = {Hugo Jonker and Sjouke Mauw}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {A Security Perspective on Publication Metrics}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {186--200}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_21}, doi = {10.1007/978-3-319-71075-4\_21}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/JonkerM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Jonker17, author = {Hugo Jonker}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {A Security Perspective on Publication Metrics (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {201--213}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_22}, doi = {10.1007/978-3-319-71075-4\_22}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Jonker17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/JonkerMS17, author = {Hugo Jonker and Sjouke Mauw and Tom Schmitz}, editor = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann}, title = {Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate Online Elections}, booktitle = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10615}, pages = {183--197}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68687-5\_11}, doi = {10.1007/978-3-319-68687-5\_11}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/JonkerMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerMT16, author = {Hugo L. Jonker and Sjouke Mauw and Rolando Trujillo{-}Rasua}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {19--25}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_3}, doi = {10.1007/978-3-319-62033-6\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/JonkerMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Jonker16, author = {Hugo Jonker}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {26--34}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_4}, doi = {10.1007/978-3-319-62033-6\_4}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Jonker16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TorresJM15, author = {Christof Ferreira Torres and Hugo L. Jonker and Sjouke Mauw}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {3--19}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_1}, doi = {10.1007/978-3-319-24177-7\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/TorresJM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerMR15, author = {Hugo Jonker and Sjouke Mauw and Sasa Radomirovic}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Location-Private Interstellar Communication}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {105--115}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_11}, doi = {10.1007/978-3-319-26096-9\_11}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/JonkerMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fun/DreierJL14, author = {Jannik Dreier and Hugo Jonker and Pascal Lafourcade}, editor = {Alfredo Ferro and Fabrizio Luccio and Peter Widmayer}, title = {Secure Auctions without Cryptography}, booktitle = {Fun with Algorithms - 7th International Conference, {FUN} 2014, Lipari Island, Sicily, Italy, July 1-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8496}, pages = {158--170}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07890-8\_14}, doi = {10.1007/978-3-319-07890-8\_14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fun/DreierJL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/JonkerMP13, author = {Hugo Jonker and Sjouke Mauw and Jun Pang}, title = {Privacy and verifiability in voting systems: Methods, developments and trends}, journal = {Comput. Sci. Rev.}, volume = {10}, pages = {1--30}, year = {2013}, url = {https://doi.org/10.1016/j.cosrev.2013.08.002}, doi = {10.1016/J.COSREV.2013.08.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csr/JonkerMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DreierJL13, author = {Jannik Dreier and Hugo Jonker and Pascal Lafourcade}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Defining verifiability in e-auction protocols}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {547--552}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484387}, doi = {10.1145/2484313.2484387}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DreierJL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epart/NeumannKHRJV13, author = {Stephan Neumann and Anna Kahlert and Maria Henning and Philipp Richter and Hugo Jonker and Melanie Volkamer}, editor = {Maria A. Wimmer and Efthimios Tambouris and Ann Macintosh}, title = {Modeling the German Legal Latitude Principles}, booktitle = {Electronic Participation - 5th {IFIP} {WG} 8.5 International Conference, ePart 2013, Koblenz, Germany, September 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8075}, pages = {49--56}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40346-0\_5}, doi = {10.1007/978-3-642-40346-0\_5}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/epart/NeumannKHRJV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DongJP13, author = {Naipeng Dong and Hugo Jonker and Jun Pang}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {499--516}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_28}, doi = {10.1007/978-3-642-40203-6\_28}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DongJP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JonkerMP13, author = {Hugo Jonker and Sjouke Mauw and Jun Pang}, title = {Privacy and Verifiability in Voting Systems: Methods, Developments and Trends}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2013}, url = {http://eprint.iacr.org/2013/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JonkerMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DongJP12, author = {Naipeng Dong and Hugo Jonker and Jun Pang}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Formal Analysis of Privacy in an eHealth Protocol}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {325--342}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_19}, doi = {10.1007/978-3-642-33167-1\_19}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DongJP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/DemirelJV12, author = {Denise Demirel and Hugo Jonker and Melanie Volkamer}, editor = {Manuel J. Kripp and Melanie Volkamer and R{\"{u}}diger Grimm}, title = {Random Block Verification: Improving the Norwegian Electoral Mix-Net}, booktitle = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012), Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-205}}, pages = {65--78}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18226}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/DemirelJV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/JonkerP11, author = {Hugo Jonker and Jun Pang}, title = {Bulletin Boards in Voting Systems: Modelling and Measuring Privacy}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {294--300}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.50}, doi = {10.1109/ARES.2011.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/JonkerP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fhies/DongJP11, author = {Naipeng Dong and Hugo Jonker and Jun Pang}, editor = {Zhiming Liu and Alan Wassyng}, title = {Challenges in eHealth: From Enabling to Enforcing Privacy}, booktitle = {Foundations of Health Informatics Engineering and Systems - First International Symposium, {FHIES} 2011, Johannesburg, South Africa, August 29-30, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7151}, pages = {195--206}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32355-3\_12}, doi = {10.1007/978-3-642-32355-3\_12}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fhies/DongJP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LangerJP10, author = {Lucie Langer and Hugo Jonker and Wolter Pieters}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Anonymity and Verifiability in Voting: Understanding (Un)Linkability}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {296--310}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_21}, doi = {10.1007/978-3-642-17650-0\_21}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LangerJP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DongJP10, author = {Naipeng Dong and Hugo L. Jonker and Jun Pang}, editor = {Pierpaolo Degano and Sandro Etalle and Joshua D. Guttman}, title = {Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus}, booktitle = {Formal Aspects of Security and Trust - 7th International Workshop, {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6561}, pages = {223--238}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19751-2\_15}, doi = {10.1007/978-3-642-19751-2\_15}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/DongJP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/XiaCHJRSS10, author = {Zhe Xia and Chris Culnane and James Heather and Hugo Jonker and Peter Y. A. Ryan and Steve A. Schneider and Sriramkrishnan Srinivasan}, editor = {Guang Gong and Kishan Chand Gupta}, title = {Versatile Pr{\^{e}}t {\`{a}} Voter: Handling Multiple Election Methods with a Unified Interface}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6498}, pages = {98--114}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17401-8\_8}, doi = {10.1007/978-3-642-17401-8\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/XiaCHJRSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/JonkerP10, author = {Hugo Jonker and Wolter Pieters}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Anonymity in Voting Revisited}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {216--230}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_13}, doi = {10.1007/978-3-642-12980-3\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/wote/JonkerP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/JonkerMP09, author = {Hugo L. Jonker and Sjouke Mauw and Jun Pang}, title = {A formal framework for quantifying voter-controlled privacy}, journal = {J. Algorithms}, volume = {64}, number = {2-3}, pages = {89--105}, year = {2009}, url = {https://doi.org/10.1016/j.jalgor.2009.02.007}, doi = {10.1016/J.JALGOR.2009.02.007}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jal/JonkerMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/JonkerMP09, author = {Hugo L. Jonker and Sjouke Mauw and Jun Pang}, title = {Measuring Voter-Controlled Privacy}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {289--298}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.81}, doi = {10.1109/ARES.2009.81}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/JonkerMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/DashtiNJ08, author = {Muhammad Torabi Dashti and Srijith Krishnan Nair and Hugo L. Jonker}, title = {Nuovo {DRM} Paradiso: Designing a Secure, Verified, Fair Exchange {DRM} Scheme}, journal = {Fundam. Informaticae}, volume = {89}, number = {4}, pages = {393--417}, year = {2008}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi89-4-03}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/DashtiNJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsen/DashtiNJ07, author = {Muhammad Torabi Dashti and Srijith Krishnan Nair and Hugo L. Jonker}, editor = {Farhad Arbab and Marjan Sirjani}, title = {Nuovo {DRM} Paradiso: Towards a Verified Fair {DRM} Scheme}, booktitle = {International Symposium on Fundamentals of Software Engineering, International Symposium, {FSEN} 2007, Tehran, Iran, April 17-19, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4767}, pages = {33--48}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75698-9\_3}, doi = {10.1007/978-3-540-75698-9\_3}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/fsen/DashtiNJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/JonkerV07, author = {Hugo L. Jonker and Melanie Volkamer}, editor = {Ammar Alkassar and Melanie Volkamer}, title = {Compliance of {RIES} to the Proposed e-Voting Protection Profile}, booktitle = {E-Voting and Identity, First International Conference, {VOTE-ID} 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4896}, pages = {50--61}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77493-8\_5}, doi = {10.1007/978-3-540-77493-8\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/voteid/JonkerV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JonkerV06, author = {Hugo L. Jonker and Erik P. de Vink}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Formalising Receipt-Freeness}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {476--488}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_34}, doi = {10.1007/11836810\_34}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/JonkerV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.