Hugo Jonker
Citeras av
Citeras av
Privacy and verifiability in voting systems: Methods, developments and trends
H Jonker, S Mauw, J Pang
Computer Science Review 10, 1-30, 2013
Challenges in eHealth: From Enabling to Enforcing Privacy
N Dong, H Jonker
Foundations of Health Informatics Engineering and Systems, 195-206, 2012
Formalising receipt-freeness
HL Jonker, EP de Vink
International Conference on Information Security, 476-488, 2006
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting
CF Torres, H Jonker, S Mauw
European Symposium on Research in Computer Security, 3-19, 2015
Receipt-freeness as a special case of anonymity in epistemic logic
HL Jonker, W Pieters
IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006
Defining verifiability in e-auction protocols
J Dreier, H Jonker, P Lafourcade
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Analysis of a receipt-free auction protocol in the applied pi calculus
N Dong, H Jonker, J Pang
International Workshop on Formal Aspects in Security and Trust, 223-238, 2010
Versatile Pręt ā Voter: Handling multiple election methods with a unified interface
Z Xia, C Culnane, J Heather, H Jonker, PYA Ryan, S Schneider, ...
International Conference on Cryptology in India, 98-114, 2010
Formal analysis of privacy in an eHealth protocol
N Dong, H Jonker, J Pang
European Symposium on Research in Computer Security, 325-342, 2012
A formal framework for quantifying voter-controlled privacy
H Jonker, S Mauw, J Pang
Journal of Algorithms 64 (2-3), 89-105, 2009
Anonymity and verifiability in voting: understanding (un) linkability
L Langer, H Jonker, W Pieters
International Conference on Information and Communications Security, 296-310, 2010
Ægis: Smart shielding of smart contracts
C Ferreira Torres, M Baden, R Norvill, H Jonker
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Security aspects of DRM systems
HL Jonker, S Mauw, JHS Verschuren, A Schoonen
25th Symposium on information theory in the Benelux, 169-176, 2004
Ægis: Shielding vulnerable smart contracts against attacks
C Ferreira Torres, M Baden, R Norvill, BB Fiz Pontiveros, H Jonker, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
Fingerprint surface-based detection of web bot detectors
H Jonker, B Krumnow, G Vlot
European Symposium on Research in Computer Security, 586-605, 2019
Nuovo DRM paradiso: Towards a verified fair DRM scheme
MT Dashti, SK Nair, HL Jonker
International Conference on Fundamentals of Software Engineering, 33-48, 2007
Modeling the german legal latitude principles
S Neumann, A Kahlert, M Henning, P Richter, H Jonker, M Volkamer
International Conference on Electronic Participation, 49-56, 2013
Core security requirements of DRM systems
HL Jonker, S Mauw
Symposium on Information theory in the Benelux, 2004
Bulletin boards in voting systems: Modelling and measuring privacy
H Jonker, J Pang
2011 Sixth International Conference on Availability, Reliability and …, 2011
Handbook of Research on Secure Multimedia Distribution
PA Jamkhedkar, GL Heileman
IGI Publishing, 2008
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20