Seguir
Hugo Jonker
Título
Citado por
Citado por
Ano
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting
CF Torres, H Jonker, S Mauw
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
842015
Challenges in eHealth: From Enabling to Enforcing Privacy
N Dong, H Jonker
Foundations of Health Informatics Engineering and Systems, 195-206, 2012
822012
Privacy and verifiability in voting systems: Methods, developments and trends
H Jonker, S Mauw, J Pang
Computer Science Review 10, 1-30, 2013
792013
Formalising receipt-freeness
HL Jonker, EP de Vink
Information Security: 9th International Conference, ISC 2006, Samos Island …, 2006
562006
Receipt-freeness as a special case of anonymity in epistemic logic
HL Jonker, W Pieters
Cambridge: Robinson College, 2006
492006
Fingerprint surface-based detection of web bot detectors
H Jonker, B Krumnow, G Vlot
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
442019
Ægis: Shielding vulnerable smart contracts against attacks
C Ferreira Torres, M Baden, R Norvill, BB Fiz Pontiveros, H Jonker, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
432020
Defining verifiability in e-auction protocols
J Dreier, H Jonker, P Lafourcade
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
392013
ÆGIS: Smart shielding of smart contracts
C Ferreira Torres, M Baden, R Norvill, H Jonker
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
352019
Analysis of a receipt-free auction protocol in the applied pi calculus
N Dong, H Jonker, J Pang
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011
332011
Versatile Prêt à Voter: Handling multiple election methods with a unified interface
Z Xia, C Culnane, J Heather, H Jonker, PYA Ryan, S Schneider, ...
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
302010
Formal analysis of privacy in an eHealth protocol
N Dong, H Jonker, J Pang
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
292012
Anonymity and verifiability in voting: understanding (un) linkability
L Langer, H Jonker, W Pieters
Information and Communications Security: 12th International Conference …, 2010
232010
A formal framework for quantifying voter-controlled privacy
H Jonker, S Mauw, J Pang
Journal of Algorithms 64 (2-3), 89-105, 2009
222009
Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching [J]
CF Torres, H Jonker, Radu State
CoRR, 2021
20*2021
Shepherd: a generic approach to automating website login
H Jonker, S Karsch, B Krumnow, M Sleegers
Reston: Internet Society, 2020
162020
Security aspects of DRM systems
HL Jonker, S Mauw, JHS Verschuren, A Schoonen
25th Symposium on information theory in the Benelux, 169-176, 2004
152004
Secure auctions without cryptography
J Dreier, H Jonker, P Lafourcade
Fun with Algorithms: 7th International Conference, FUN 2014, Lipari Island …, 2014
132014
Nuovo DRM paradiso: Towards a verified fair DRM scheme
MT Dashti, SK Nair, HL Jonker
FSEN 7, 33-48, 2007
132007
Enforcing privacy in the presence of others: Notions, formalisations and relations
N Dong, H Jonker, J Pang
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
122013
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20