Hugo L. Jonker

Orcid: 0000-0002-7958-8921

Affiliations:
  • Open University of the Netherlands, The Netherlands
  • Radbound University, Heerlen, Netherlands
  • University of Luxembourg (former)


According to our database1, Hugo L. Jonker authored at least 45 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Reconstructing Timelines: From NTFS Timestamps to File Histories.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Analysing and strengthening OpenWPM's reliability.
CoRR, 2022

Modelling Agent-Skipping Attacks in Message Forwarding Protocols.
CoRR, 2022

Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

How gullible are web measurement tools?: a case study analysing and strengthening OpenWPM's reliability.
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, 2022

2021
Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching.
CoRR, 2021

Measuring Web Session Security at Scale.
Comput. Secur., 2021

HLISA: towards a more reliable measurement tool.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

2020
ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Investigating the effectiveness of web adblockers.
CoRR, 2019

File Fragmentation in the Wild: a Privacy-Friendly Approach.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Fingerprint Surface-Based Detection of Web Bot Detectors.
Proceedings of the Computer Security - ESORICS 2019, 2019

ÆGIS: Smart Shielding of Smart Contracts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Formal Analysis of an E-Health Protocol.
CoRR, 2018

Shepherd: Enabling Automatic and Large-Scale Login Security Studies.
CoRR, 2018

Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications.
Proceedings of the Computer Security, 2018

2017
Formal modelling and analysis of receipt-free auction protocols in applied pi.
Comput. Secur., 2017

Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate Online Elections.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

A Security Perspective on Publication Metrics.
Proceedings of the Security Protocols XXV, 2017

A Security Perspective on Publication Metrics (Transcript of Discussion).
Proceedings of the Security Protocols XXV, 2017

Analysing Privacy Analyses.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

2016
Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't.
Proceedings of the Security Protocols XXIV, 2016

Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016

2015
Location-Private Interstellar Communication.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Secure Auctions without Cryptography.
Proceedings of the Fun with Algorithms - 7th International Conference, 2014

2013
Privacy and verifiability in voting systems: Methods, developments and trends.
Comput. Sci. Rev., 2013

Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations.
Proceedings of the Computer Security - ESORICS 2013, 2013

Modeling the German Legal Latitude Principles.
Proceedings of the Electronic Participation - 5th IFIP WG 8.5 International Conference, 2013

Defining verifiability in e-auction protocols.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Random Block Verification: Improving the Norwegian Electoral Mix-Net.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

Formal Analysis of Privacy in an eHealth Protocol.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Challenges in eHealth: From Enabling to Enforcing Privacy.
Proceedings of the Foundations of Health Informatics Engineering and Systems, 2011

Bulletin Boards in Voting Systems: Modelling and Measuring Privacy.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Anonymity in Voting Revisited.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
A formal framework for quantifying voter-controlled privacy.
J. Algorithms, 2009

Measuring Voter-Controlled Privacy.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme.
Fundam. Informaticae, 2008

2007
Compliance of RIES to the Proposed e-Voting Protection Profile.
Proceedings of the E-Voting and Identity, First International Conference, 2007

Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007

2006
Formalising Receipt-Freeness.
Proceedings of the Information Security, 9th International Conference, 2006


  Loading...