default search action
Willem Jonker
Person information
- affiliation: University of Twente, Enschede, Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j11]Tim van de Kamp, Andreas Peter, Willem Jonker:
A multi-authority approach to various predicate encryption types. Des. Codes Cryptogr. 88(2): 363-390 (2020) - [c60]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Thomas Hupperich, Maarten H. Everts, Reza Rafati, Willem Jonker, Pieter H. Hartel, Andreas Peter:
HeadPrint: detecting anomalous communications through header-based application fingerprinting. SAC 2020: 1696-1705
2010 – 2019
- 2019
- [c59]Tim van de Kamp, David Stritzl, Willem Jonker, Andreas Peter:
Two-Client and Multi-client Functional Encryption for Set Intersection. ACISP 2019: 97-115 - [c58]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Maarten H. Everts, Willem Jonker, Pieter H. Hartel, Andreas Peter:
Victim-Aware Adaptive Covert Channels. SecureComm (1) 2019: 450-471 - 2018
- [i1]Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker:
Multi-client Predicate-only Encryption for Conjunctive Equality Tests. IACR Cryptol. ePrint Arch. 2018: 563 (2018) - 2017
- [c57]Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter:
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. ACSAC 2017: 373-386 - [c56]Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker:
Multi-client Predicate-Only Encryption for Conjunctive Equality Tests. CANS 2017: 135-157 - 2016
- [c55]Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel:
Reliably determining data leakage in the presence of strong attackers. ACSAC 2016: 484-495 - [c54]Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker:
Private Sharing of IOCs and Sightings. WISCS@CCS 2016: 35-38 - 2015
- [c53]Bence Gabor Bakondi, Andreas Peter, Maarten H. Everts, Pieter H. Hartel, Willem Jonker:
Publicly Verifiable Private Aggregation of Time-Series Data. ARES 2015: 50-59 - 2014
- [j10]Christoph Bösch, Pieter H. Hartel, Willem Jonker, Andreas Peter:
A Survey of Provably Secure Searchable Encryption. ACM Comput. Surv. 47(2): 18:1-18:51 (2014) - [c52]Christoph Bösch, Andreas Peter, Pieter H. Hartel, Willem Jonker:
SOFIR: Securely outsourced Forensic image recognition. ICASSP 2014: 2694-2698 - [c51]Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter H. Hartel, Willem Jonker:
Distributed Searchable Symmetric Encryption. PST 2014: 330-337 - [e13]Willem Jonker, Milan Petkovic:
Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings. Lecture Notes in Computer Science 8425, Springer 2014, ISBN 978-3-319-06810-7 [contents] - 2013
- [c50]Willem Jonker, Milan Petkovic:
Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler. Secure Data Management 2013: 54-58 - [c49]Eleftheria Makri, Maarten H. Everts, Sebastiaan de Hoogh, Andreas Peter, Harm op den Akker, Pieter H. Hartel, Willem Jonker:
Privacy-Preserving Verification of Clinical Research. Sicherheit 2013: 481-500 - 2012
- [c48]Christoph Bösch, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Selective Document Retrieval from Encrypted Database. ISC 2012: 224-241 - [e12]Willem Jonker, Milan Petkovic:
Secure Data Management - 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings. Lecture Notes in Computer Science 7482, Springer 2012, ISBN 978-3-642-32872-5 [contents] - 2011
- [c47]Luan Ibraimi, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Public-Key Encryption with Delegated Search. ACNS 2011: 532-549 - [c46]Saeed Sedghi, Pieter H. Hartel, Willem Jonker, Svetla Nikova:
Privacy Enhanced Access Control by Means of Policy Blinding. ISPEC 2011: 108-122 - [c45]Christoph Bösch, Richard Brinkman, Pieter H. Hartel, Willem Jonker:
Conjunctive Wildcard Search over Encrypted Data. Secure Data Management 2011: 114-127 - [e11]Willem Jonker, Milan Petkovic:
Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings. Lecture Notes in Computer Science 6933, Springer 2011, ISBN 978-3-642-23555-9 [contents] - 2010
- [j9]Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. Int. J. Comput. Model. Algorithms Medicine 1(2): 1-21 (2010) - [j8]Emile J. C. Kelkboom, Gary Garcia Molina, Jeroen Breebaart, Raymond N. J. Veldhuis, Tom A. M. Kevenaar, Willem Jonker:
Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption. IEEE Trans. Syst. Man Cybern. Part A 40(3): 555-571 (2010) - [c44]Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Searching Keywords with Wildcards on Encrypted Data. SCN 2010: 138-153 - [c43]Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Computationally Efficient Searchable Symmetric Encryption. Secure Data Management 2010: 87-100 - [e10]Willem Jonker, Milan Petkovic:
Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings. Lecture Notes in Computer Science 6358, Springer 2010, ISBN 978-3-642-15545-1 [contents]
2000 – 2009
- 2009
- [j7]Milan Petkovic, Willem Jonker:
Preface. J. Comput. Secur. 17(1): 1-3 (2009) - [c42]Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. ISPEC 2009: 1-12 - [c41]Luan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. WISA 2009: 309-323 - [e9]Willem Jonker, Milan Petkovic:
Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings. Lecture Notes in Computer Science 5776, Springer 2009, ISBN 978-3-642-04218-8 [contents] - 2008
- [j6]Anna Zych, Milan Petkovic, Willem Jonker:
Efficient key management for cryptographically enforced access control. Comput. Stand. Interfaces 30(6): 410-417 (2008) - [c40]Qiang Tang, Pieter H. Hartel, Willem Jonker:
Inter-domain Identity-Based Proxy Re-encryption. Inscrypt 2008: 332-347 - [c39]Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Towards an Information Theoretic Analysis of Searchable Encryption. ICICS 2008: 345-360 - [c38]Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker:
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. Secure Data Management 2008: 185-198 - [e8]Willem Jonker, Milan Petkovic:
Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings. Lecture Notes in Computer Science 5159, Springer 2008, ISBN 978-3-540-85258-2 [contents] - 2007
- [c37]Anna Zych, Milan Petkovic, Willem Jonker:
The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. DBSec 2007: 95-97 - [c36]Anna Zych, Milan Petkovic, Willem Jonker:
A Key Management Method for Cryptographically Enforced Access Control. WOSIS 2007: 9-22 - [p6]Milan Petkovic, Willem Jonker:
Privacy and Security Issues in a Digital World. Security, Privacy, and Trust in Modern Data Management 2007: 3-10 - [p5]Milan Petkovic, Willem Jonker, Henk M. Blanken:
A Spatio-Temporal and a Probabilistic Approach for Video Retrieval. Multimedia Retrieval 2007: 251-269 - [p4]Willem Jonker:
An Introduction to Digital Rights Management Systems. Security, Privacy, and Trust in Modern Data Management 2007: 257-265 - [p3]Vojkan Mihajlovic, Milan Petkovic, Willem Jonker, Henk M. Blanken:
Multimodal Content-based Video Retrieval. Multimedia Retrieval 2007: 271-294 - [p2]R. Paul Koster, Willem Jonker:
Digital Rights Management. Multimedia Retrieval 2007: 321-345 - [p1]Milan Petkovic, Claudine Conrado, Geert Jan Schrijen, Willem Jonker:
Enhancing Privacy for Digital Rights Management. Security, Privacy, and Trust in Modern Data Management 2007: 347-364 - [e7]Milan Petkovic, Willem Jonker:
Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications, Springer 2007, ISBN 978-3-540-69860-9 [contents] - [e6]Willem Jonker, Milan Petkovic:
Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings. Lecture Notes in Computer Science 4721, Springer 2007, ISBN 978-3-540-75247-9 [contents] - 2006
- [c35]Marko Smiljanic, Maurice van Keulen, Willem Jonker:
Using Element Clustering to Increase the Efficiency of XML Schema Matching. ICDE Workshops 2006: 45 - [c34]Marko Smiljanic, Maurice van Keulen, Willem Jonker:
Effectiveness Bounds for Non-Exhaustive Schema Matching Systems. ICDE Workshops 2006: 83 - [e5]Willem Jonker, Milan Petkovic:
Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings. Lecture Notes in Computer Science 4165, Springer 2006, ISBN 978-3-540-38984-2 [contents] - 2005
- [c33]Marko Smiljanic, Maurice van Keulen, Willem Jonker:
Formalizing the XML Schema Matching Problem as a Constraint Optimization Problem. DEXA 2005: 333-342 - [c32]Andreas Wombacher, Roel J. Wieringa, Willem Jonker, Predrag Knezevic, Stanislav Pokraev:
Requirements for Secure Logging of Decentralized Cross-Organizational Workflow Executions. OTM Workshops 2005: 526-536 - [c31]Richard Brinkman, Berry Schoenmakers, Jeroen Doumen, Willem Jonker:
Experiments with Queries over Encrypted Data Using Secret Sharing. Secure Data Management 2005: 33-46 - [e4]Willem Jonker, Milan Petkovic:
Secure Data Management, Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005, Proceedings. Lecture Notes in Computer Science 3674, Springer 2005, ISBN 3-540-28798-1 [contents] - 2004
- [j5]Ling Feng, Willem Jonker:
Preparations for encrypted XML metadata querying. Comput. Syst. Sci. Eng. 19(3) (2004) - [j4]Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Efficient Tree Search in Encrypted Data. Inf. Secur. J. A Glob. Perspect. 13(3): 14-21 (2004) - [j3]Milan Petkovic, Willem Jonker:
Integrated use of different content derivation techniques within a multimedia database management system. J. Vis. Commun. Image Represent. 15(3): 303-329 (2004) - [j2]Willem Jonker, Jean-Paul M. G. Linnartz:
Digital rights management in consumer electronics products. IEEE Signal Process. Mag. 21(2): 82-91 (2004) - [c30]Ling Feng, Peter M. G. Apers, Willem Jonker:
Towards Context-Aware Data Management for Ambient Intelligence. DEXA 2004: 422-431 - [c29]Richard Brinkman, Jeroen Doumen, Willem Jonker:
Using Secret Sharing for Searching in Encrypted Data. Secure Data Management 2004: 18-27 - [c28]Claudine Conrado, Milan Petkovic, Willem Jonker:
Privacy-Preserving Digital Rights Management. Secure Data Management 2004: 83-99 - [c27]Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Efficient Tree Search in Encrypted Data. WOSIS 2004: 126-135 - [e3]Willem Jonker, Milan Petkovic:
Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings. Lecture Notes in Computer Science 3178, Springer 2004, ISBN 3-540-22983-3 [contents] - 2003
- [b1]Milan Petkovic, Willem Jonker:
Content-Based Video Retrieval - A Database Perspective. Multimedia systems and applications 25, Springer 2003, ISBN 978-1-4419-5396-4, pp. I-X, 1-151 - [j1]Willem Jonker:
XML and secure data management in an ambient world. Comput. Syst. Sci. Eng. 18(5): 311-317 (2003) - [c26]Claudine Conrado, Frank Kamperman, Geert Jan Schrijen, Willem Jonker:
Privacy in an Identity-based DRM System. DEXA Workshops 2003: 389-395 - [c25]Milan Petkovic, Vojkan Mihajlovic, Willem Jonker:
Techniques for automatic video content derivation. ICIP (2) 2003: 611-614 - [c24]Ling Feng, Willem Jonker:
Efficient Processing of Secured XML Metadata. OTM Workshops 2003: 704-717 - [c23]Cheun Ngen Chong, Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Willem Jonker, Yee Wei Law:
LicenseScript: a novel digital rights language and its semantics. WEDELMUSIC 2003: 122-129 - [c22]Marko Smiljanic, Ling Feng, Willem Jonker:
Web-Based Distributed XML Query Processing. Intelligent Search on XML Data 2003: 207-216 - 2002
- [c21]Milan Petkovic, Willem Jonker:
Cobra: A Content-Based Video Retrieval System. EDBT 2002: 736-738 - [c20]Milan Petkovic, Vojkan Mihajlovic, Willem Jonker:
Extending a DBMS to Support Content-Based Video Retrieval: A Formula 1 Case Study. EDBT Workshops 2002: 318-341 - [c19]Milan Petkovic, Roelof van Zwol, Henk Ernst Blok, Willem Jonker, Peter M. G. Apers, Menzo Windhouwer, Martin L. Kersten:
Content-Based Video Indexing for the Support of Digital Library Search. ICDE 2002: 494-495 - [c18]Milan Petkovic, Vojkan Mihajlovic, Willem Jonker, Slobodanka Djordjevic-Kajan:
Multi-modal extraction of highlights from TV Formula 1 programs. ICME (1) 2002: 817-820 - 2001
- [c17]Wijnand Derks, Juliane Dehnert, Paul W. P. J. Grefen, Willem Jonker:
Customized Atomicity Specification for Transactional Workflows. CODAS 2001: 155-164 - [c16]Jeroen Wijnands, Sietse Dijkstra, Wijnand Derks, Willem Jonker:
Experimenting NT Cluster Technology for Massive CDR Processing. Databases in Telecommunications 2001: 19-36 - [c15]Milan Petkovic, Willem Jonker:
Content-Based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events. IEEE Workshop on Detection and Recognition of Events in Video 2001: 75-82 - [c14]Erik M. Boertjes, Willem Jonker, Jeroen Wijnands:
Multimedia information services enabling: an architectural approach. ACM Multimedia Workshops 2001: 18-23 - [c13]Milan Petkovic, Willem Jonker, Z. Zivkovic:
Recognizing Strokes in Tennis Videos using Hidden Markov Models. VIIP 2001: 512-516 - [c12]Henk Ernst Blok, Menzo Windhouwer, Roelof van Zwol, Milan Petkovic, Peter M. G. Apers, Martin L. Kersten, Willem Jonker:
Flexible and scalable digital library search. VLDB 2001: 705-706 - [e2]Willem Jonker:
Databases in Telecommunications II, VLDB 2001 International Workshop, DBTel 2001 Rome, Italy, September 10, 2001, Proceedings. Lecture Notes in Computer Science 2209, Springer 2001, ISBN 3-540-42623-X [contents] - 2000
- [c11]Wijnand Derks, Sietse Dijkstra, H. D. Enting, Willem Jonker, Jeroen Wijnands:
Experimenting NUMA for Scalable CDR Processing. DEXA 2000: 970-980 - [e1]Willem Jonker:
Databases in Telecommunications, International Workshop Co-located with VLDB-99, Edinburgh, Scotland, UK, September 6, 1999, Proceedings. Lecture Notes in Computer Science 1819, Springer 2000, ISBN 3-540-67667-8 [contents]
1990 – 1999
- 1999
- [c10]Wijnand Derks, Sietse Dijkstra, Willem Jonker, Jeroen Wijnands:
Assesment of Scaleable Database Architectures for CDR Analysis - An Experimental Approach. Databases in Telecommunications 1999: 133-143 - [c9]Willem Jonker, Wim Nijenhuis, Zef Damen, Martin Verwijmeren:
Workflow Management Systems and Cross-Organisational Logistics. Cross-Organisational Workflow Management and Co-ordination 1999 - 1998
- [c8]Wijnand Derks, Willem Jonker:
Practical Experiences with Materialized Views in a Very Large Data Store for Telecommunication Service Management. DEXA Workshop 1998: 881-886 - [c7]A. Woudstra, D. D. Velthausz, H. J. G. de Poot, F. Moelaert El-Hadidy, Willem Jonker, Maurice A. W. Houtsma, R. G. Heller, J. N. H. Heemskerk:
Modeling and Retrieving Audiovisual Information: A Soccer Video Retrieval System. Multimedia Information Systems 1998: 161-173 - 1995
- [c6]Willem Jonker, Heribert Schütz:
The ECRC Multi Database System. SIGMOD Conference 1995: 490 - 1993
- [c5]Stéphane Bressan, Willem Jonker, Andrea Sikeler:
Extending Deductive Databases with Object Orientation. Workshop on Programming with Logic Databases (Informal Proceedings), ILPS 1993: 167 - [c4]Petra Bayer, Willem Jonker:
A Framework for Supporting Triggers in Deductive Databases. Rules in Database Systems 1993: 316-330 - [c3]Willem Jonker, Bob Goedhart:
KBS Development: From Design Models to Implementations. SEKE 1993: 657-664 - 1992
- [c2]Willem Jonker, Jan Willem Spee:
Yet Another Formalisation of KADS Conceptual Models. EKAW 1992: 211-229 - 1990
- [c1]Paul de Jager, Willem Jonker, Albert Wammes, Johan Wester:
An Interactive Programming Environment for LOTOS. FORTE 1990: 581-584
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint