BibTeX records: Hugo L. Jonker

download as .bib file

@inproceedings{DBLP:conf/IEEEares/BoumaJMA23,
  author       = {Jelle Bouma and
                  Hugo Jonker and
                  Vincent van der Meer and
                  Eddy Van Den Aker},
  title        = {Reconstructing Timelines: From {NTFS} Timestamps to File Histories},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {154:1--154:9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605027},
  doi          = {10.1145/3600160.3605027},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BoumaJMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/KrumnowJK22,
  author       = {Benjamin Krumnow and
                  Hugo Jonker and
                  Stefan Karsch},
  editor       = {Giuseppe Bianchi and
                  Alessandro Mei},
  title        = {How gullible are web measurement tools?: a case study analysing and
                  strengthening OpenWPM's reliability},
  booktitle    = {Proceedings of the 18th International Conference on emerging Networking
                  EXperiments and Technologies, CoNEXT 2022, Roma, Italy, December 6-9,
                  2022},
  pages        = {171--186},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3555050.3569131},
  doi          = {10.1145/3555050.3569131},
  timestamp    = {Thu, 01 Dec 2022 11:47:13 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/KrumnowJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TorresJS22,
  author       = {Christof Ferreira Torres and
                  Hugo Jonker and
                  Radu State},
  title        = {Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal
                  Vulnerable Smart Contracts},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {115--128},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545975},
  doi          = {10.1145/3545948.3545975},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/TorresJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-08686,
  author       = {Zach Smith and
                  Hugo Jonker and
                  Sjouke Mauw and
                  Hyunwoo Lee},
  title        = {Modelling Agent-Skipping Attacks in Message Forwarding Protocols},
  journal      = {CoRR},
  volume       = {abs/2201.08686},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.08686},
  eprinttype    = {arXiv},
  eprint       = {2201.08686},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-08686.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-08890,
  author       = {Benjamin Krumnow and
                  Hugo Jonker and
                  Stefan Karsch},
  title        = {Analysing and strengthening OpenWPM's reliability},
  journal      = {CoRR},
  volume       = {abs/2205.08890},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.08890},
  doi          = {10.48550/ARXIV.2205.08890},
  eprinttype    = {arXiv},
  eprint       = {2205.08890},
  timestamp    = {Mon, 23 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-08890.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CalzavaraJKR21,
  author       = {Stefano Calzavara and
                  Hugo Jonker and
                  Benjamin Krumnow and
                  Alvise Rabitti},
  title        = {Measuring Web Session Security at Scale},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102472},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102472},
  doi          = {10.1016/J.COSE.2021.102472},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CalzavaraJKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/CompagnaJKKS21,
  author       = {Luca Compagna and
                  Hugo Jonker and
                  Johannes Krochewski and
                  Benjamin Krumnow and
                  Merve Sahin},
  title        = {A preliminary study on the adoption and effectiveness of SameSite
                  cookies as a {CSRF} defence},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {49--59},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSPW54576.2021.00012},
  doi          = {10.1109/EUROSPW54576.2021.00012},
  timestamp    = {Mon, 08 Nov 2021 16:43:34 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/CompagnaJKKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/GossenJKKR21,
  author       = {Daniel Go{\ss}en and
                  Hugo Jonker and
                  Stefan Karsch and
                  Benjamin Krumnow and
                  David Roefs},
  editor       = {Dave Levin and
                  Alan Mislove and
                  Johanna Amann and
                  Matthew Luckie},
  title        = {{HLISA:} towards a more reliable measurement tool},
  booktitle    = {{IMC} '21: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  November 2-4, 2021},
  pages        = {380--389},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3487552.3487843},
  doi          = {10.1145/3487552.3487843},
  timestamp    = {Thu, 04 Nov 2021 08:55:53 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/GossenJKKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-10071,
  author       = {Christof Ferreira Torres and
                  Hugo Jonker and
                  Radu State},
  title        = {Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware
                  Patching},
  journal      = {CoRR},
  volume       = {abs/2108.10071},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.10071},
  eprinttype    = {arXiv},
  eprint       = {2108.10071},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-10071.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TorresBNPJM20,
  author       = {Christof Ferreira Torres and
                  Mathis Baden and
                  Robert Norvill and
                  Beltran Borja Fiz Pontiveros and
                  Hugo Jonker and
                  Sjouke Mauw},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {{\AE}GIS: Shielding Vulnerable Smart Contracts Against Attacks},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {584--597},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384756},
  doi          = {10.1145/3320269.3384756},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TorresBNPJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-05987,
  author       = {Christof Ferreira Torres and
                  Mathis Baden and
                  Robert Norvill and
                  Beltran Borja Fiz Pontiveros and
                  Hugo Jonker and
                  Sjouke Mauw},
  title        = {{\AE}GIS: Shielding Vulnerable Smart Contracts Against Attacks},
  journal      = {CoRR},
  volume       = {abs/2003.05987},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.05987},
  eprinttype    = {arXiv},
  eprint       = {2003.05987},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-05987.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TorresBNJ19,
  author       = {Christof Ferreira Torres and
                  Mathis Baden and
                  Robert Norvill and
                  Hugo Jonker},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {{\AE}GIS: Smart Shielding of Smart Contracts},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2589--2591},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363263},
  doi          = {10.1145/3319535.3363263},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TorresBNJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JonkerKV19,
  author       = {Hugo Jonker and
                  Benjamin Krumnow and
                  Gabry Vlot},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Fingerprint Surface-Based Detection of Web Bot Detectors},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {586--605},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_28},
  doi          = {10.1007/978-3-030-29962-0\_28},
  timestamp    = {Mon, 05 Feb 2024 20:29:41 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/JonkerKV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MeerJDBBE19,
  author       = {Vincent van der Meer and
                  Hugo Jonker and
                  Guy Dols and
                  Harm M. A. van Beek and
                  Jeroen van den Bos and
                  Marko C. J. D. van Eekelen},
  title        = {File Fragmentation in the Wild: a Privacy-Friendly Approach},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9034981},
  doi          = {10.1109/WIFS47025.2019.9034981},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/MeerJDBBE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-06176,
  author       = {Clayton Drazner and
                  Nikola Duza and
                  Hugo Jonker and
                  Dan S. Wallach},
  title        = {Investigating the effectiveness of web adblockers},
  journal      = {CoRR},
  volume       = {abs/1912.06176},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.06176},
  eprinttype    = {arXiv},
  eprint       = {1912.06176},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-06176.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TorresJ18,
  author       = {Christof Ferreira Torres and
                  Hugo Jonker},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Investigating Fingerprinters and Fingerprinting-Alike Behaviour of
                  Android Applications},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {60--80},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_4},
  doi          = {10.1007/978-3-319-98989-1\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/TorresJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-00840,
  author       = {Hugo Jonker and
                  Jelmer Kalkman and
                  Benjamin Krumnow and
                  Marc Sleegers and
                  Alan Verresen},
  title        = {Shepherd: Enabling Automatic and Large-Scale Login Security Studies},
  journal      = {CoRR},
  volume       = {abs/1808.00840},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.00840},
  eprinttype    = {arXiv},
  eprint       = {1808.00840},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-00840.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-08403,
  author       = {Naipeng Dong and
                  Hugo Jonker and
                  Jun Pang},
  title        = {Formal Analysis of an E-Health Protocol},
  journal      = {CoRR},
  volume       = {abs/1808.08403},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.08403},
  eprinttype    = {arXiv},
  eprint       = {1808.08403},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-08403.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DongJP17,
  author       = {Naipeng Dong and
                  Hugo L. Jonker and
                  Jun Pang},
  title        = {Formal modelling and analysis of receipt-free auction protocols in
                  applied pi},
  journal      = {Comput. Secur.},
  volume       = {65},
  pages        = {405--432},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.09.002},
  doi          = {10.1016/J.COSE.2016.09.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DongJP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/BellaBJ17,
  author       = {Giampaolo Bella and
                  Denis Butin and
                  Hugo Jonker},
  editor       = {Alessandro Armando and
                  Roberto Baldoni and
                  Riccardo Focardi},
  title        = {Analysing Privacy Analyses},
  booktitle    = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17),
                  Venice, Italy, January 17-20, 2017},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1816},
  pages        = {19--28},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-1816/paper-03.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},
  biburl       = {https://dblp.org/rec/conf/itasec/BellaBJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JonkerM17,
  author       = {Hugo Jonker and
                  Sjouke Mauw},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {A Security Perspective on Publication Metrics},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_21},
  doi          = {10.1007/978-3-319-71075-4\_21},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/JonkerM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Jonker17,
  author       = {Hugo Jonker},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {A Security Perspective on Publication Metrics (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {201--213},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_22},
  doi          = {10.1007/978-3-319-71075-4\_22},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Jonker17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/JonkerMS17,
  author       = {Hugo Jonker and
                  Sjouke Mauw and
                  Tom Schmitz},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Nadja Braun Binder and
                  Norbert Kersting and
                  Olivier Pereira and
                  Carsten Sch{\"{u}}rmann},
  title        = {Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate
                  Online Elections},
  booktitle    = {Electronic Voting - Second International Joint Conference, E-Vote-ID
                  2017, Bregenz, Austria, October 24-27, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10615},
  pages        = {183--197},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68687-5\_11},
  doi          = {10.1007/978-3-319-68687-5\_11},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/JonkerMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JonkerMT16,
  author       = {Hugo L. Jonker and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {19--25},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_3},
  doi          = {10.1007/978-3-319-62033-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JonkerMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Jonker16,
  author       = {Hugo Jonker},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {26--34},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_4},
  doi          = {10.1007/978-3-319-62033-6\_4},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Jonker16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TorresJM15,
  author       = {Christof Ferreira Torres and
                  Hugo L. Jonker and
                  Sjouke Mauw},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_1},
  doi          = {10.1007/978-3-319-24177-7\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/TorresJM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JonkerMR15,
  author       = {Hugo Jonker and
                  Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Location-Private Interstellar Communication},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {105--115},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_11},
  doi          = {10.1007/978-3-319-26096-9\_11},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/JonkerMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fun/DreierJL14,
  author       = {Jannik Dreier and
                  Hugo Jonker and
                  Pascal Lafourcade},
  editor       = {Alfredo Ferro and
                  Fabrizio Luccio and
                  Peter Widmayer},
  title        = {Secure Auctions without Cryptography},
  booktitle    = {Fun with Algorithms - 7th International Conference, {FUN} 2014, Lipari
                  Island, Sicily, Italy, July 1-3, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8496},
  pages        = {158--170},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07890-8\_14},
  doi          = {10.1007/978-3-319-07890-8\_14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fun/DreierJL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csr/JonkerMP13,
  author       = {Hugo Jonker and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Privacy and verifiability in voting systems: Methods, developments
                  and trends},
  journal      = {Comput. Sci. Rev.},
  volume       = {10},
  pages        = {1--30},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cosrev.2013.08.002},
  doi          = {10.1016/J.COSREV.2013.08.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csr/JonkerMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DreierJL13,
  author       = {Jannik Dreier and
                  Hugo Jonker and
                  Pascal Lafourcade},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Defining verifiability in e-auction protocols},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {547--552},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484387},
  doi          = {10.1145/2484313.2484387},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DreierJL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epart/NeumannKHRJV13,
  author       = {Stephan Neumann and
                  Anna Kahlert and
                  Maria Henning and
                  Philipp Richter and
                  Hugo Jonker and
                  Melanie Volkamer},
  editor       = {Maria A. Wimmer and
                  Efthimios Tambouris and
                  Ann Macintosh},
  title        = {Modeling the German Legal Latitude Principles},
  booktitle    = {Electronic Participation - 5th {IFIP} {WG} 8.5 International Conference,
                  ePart 2013, Koblenz, Germany, September 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8075},
  pages        = {49--56},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40346-0\_5},
  doi          = {10.1007/978-3-642-40346-0\_5},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/epart/NeumannKHRJV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DongJP13,
  author       = {Naipeng Dong and
                  Hugo Jonker and
                  Jun Pang},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Enforcing Privacy in the Presence of Others: Notions, Formalisations
                  and Relations},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {499--516},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_28},
  doi          = {10.1007/978-3-642-40203-6\_28},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DongJP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JonkerMP13,
  author       = {Hugo Jonker and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Privacy and Verifiability in Voting Systems: Methods, Developments
                  and Trends},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JonkerMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DongJP12,
  author       = {Naipeng Dong and
                  Hugo Jonker and
                  Jun Pang},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Formal Analysis of Privacy in an eHealth Protocol},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {325--342},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_19},
  doi          = {10.1007/978-3-642-33167-1\_19},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DongJP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/DemirelJV12,
  author       = {Denise Demirel and
                  Hugo Jonker and
                  Melanie Volkamer},
  editor       = {Manuel J. Kripp and
                  Melanie Volkamer and
                  R{\"{u}}diger Grimm},
  title        = {Random Block Verification: Improving the Norwegian Electoral Mix-Net},
  booktitle    = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012),
                  Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r
                  Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz,
                  Austria},
  series       = {{LNI}},
  volume       = {{P-205}},
  pages        = {65--78},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18226},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/DemirelJV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JonkerP11,
  author       = {Hugo Jonker and
                  Jun Pang},
  title        = {Bulletin Boards in Voting Systems: Modelling and Measuring Privacy},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {294--300},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.50},
  doi          = {10.1109/ARES.2011.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JonkerP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fhies/DongJP11,
  author       = {Naipeng Dong and
                  Hugo Jonker and
                  Jun Pang},
  editor       = {Zhiming Liu and
                  Alan Wassyng},
  title        = {Challenges in eHealth: From Enabling to Enforcing Privacy},
  booktitle    = {Foundations of Health Informatics Engineering and Systems - First
                  International Symposium, {FHIES} 2011, Johannesburg, South Africa,
                  August 29-30, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7151},
  pages        = {195--206},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32355-3\_12},
  doi          = {10.1007/978-3-642-32355-3\_12},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fhies/DongJP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LangerJP10,
  author       = {Lucie Langer and
                  Hugo Jonker and
                  Wolter Pieters},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Anonymity and Verifiability in Voting: Understanding (Un)Linkability},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {296--310},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_21},
  doi          = {10.1007/978-3-642-17650-0\_21},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LangerJP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/DongJP10,
  author       = {Naipeng Dong and
                  Hugo L. Jonker and
                  Jun Pang},
  editor       = {Pierpaolo Degano and
                  Sandro Etalle and
                  Joshua D. Guttman},
  title        = {Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus},
  booktitle    = {Formal Aspects of Security and Trust - 7th International Workshop,
                  {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6561},
  pages        = {223--238},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19751-2\_15},
  doi          = {10.1007/978-3-642-19751-2\_15},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/DongJP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/XiaCHJRSS10,
  author       = {Zhe Xia and
                  Chris Culnane and
                  James Heather and
                  Hugo Jonker and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan},
  editor       = {Guang Gong and
                  Kishan Chand Gupta},
  title        = {Versatile Pr{\^{e}}t {\`{a}} Voter: Handling Multiple Election Methods
                  with a Unified Interface},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
                  on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6498},
  pages        = {98--114},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17401-8\_8},
  doi          = {10.1007/978-3-642-17401-8\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/XiaCHJRSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/JonkerP10,
  author       = {Hugo Jonker and
                  Wolter Pieters},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Anonymity in Voting Revisited},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {216--230},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_13},
  doi          = {10.1007/978-3-642-12980-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/JonkerP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jal/JonkerMP09,
  author       = {Hugo L. Jonker and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {A formal framework for quantifying voter-controlled privacy},
  journal      = {J. Algorithms},
  volume       = {64},
  number       = {2-3},
  pages        = {89--105},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jalgor.2009.02.007},
  doi          = {10.1016/J.JALGOR.2009.02.007},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jal/JonkerMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JonkerMP09,
  author       = {Hugo L. Jonker and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Measuring Voter-Controlled Privacy},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {289--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.81},
  doi          = {10.1109/ARES.2009.81},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JonkerMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/DashtiNJ08,
  author       = {Muhammad Torabi Dashti and
                  Srijith Krishnan Nair and
                  Hugo L. Jonker},
  title        = {Nuovo {DRM} Paradiso: Designing a Secure, Verified, Fair Exchange
                  {DRM} Scheme},
  journal      = {Fundam. Informaticae},
  volume       = {89},
  number       = {4},
  pages        = {393--417},
  year         = {2008},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi89-4-03},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/DashtiNJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsen/DashtiNJ07,
  author       = {Muhammad Torabi Dashti and
                  Srijith Krishnan Nair and
                  Hugo L. Jonker},
  editor       = {Farhad Arbab and
                  Marjan Sirjani},
  title        = {Nuovo {DRM} Paradiso: Towards a Verified Fair {DRM} Scheme},
  booktitle    = {International Symposium on Fundamentals of Software Engineering, International
                  Symposium, {FSEN} 2007, Tehran, Iran, April 17-19, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4767},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75698-9\_3},
  doi          = {10.1007/978-3-540-75698-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/fsen/DashtiNJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/JonkerV07,
  author       = {Hugo L. Jonker and
                  Melanie Volkamer},
  editor       = {Ammar Alkassar and
                  Melanie Volkamer},
  title        = {Compliance of {RIES} to the Proposed e-Voting Protection Profile},
  booktitle    = {E-Voting and Identity, First International Conference, {VOTE-ID} 2007,
                  Bochum, Germany, October 4-5, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4896},
  pages        = {50--61},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77493-8\_5},
  doi          = {10.1007/978-3-540-77493-8\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/JonkerV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JonkerV06,
  author       = {Hugo L. Jonker and
                  Erik P. de Vink},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Formalising Receipt-Freeness},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {476--488},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_34},
  doi          = {10.1007/11836810\_34},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JonkerV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics