Willem Jonker

According to our database1, Willem Jonker authored at least 74 papers between 1990 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
A multi-authority approach to various predicate encryption types.
Des. Codes Cryptogr., 2020

2019
Two-Client and Multi-client Functional Encryption for Set Intersection.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Multi-client Predicate-only Encryption for Conjunctive Equality Tests.
IACR Cryptology ePrint Archive, 2018

2017
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Private Sharing of IOCs and Sightings.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

Reliably determining data leakage in the presence of strong attackers.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Publicly Verifiable Private Aggregation of Time-Series Data.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
A Survey of Provably Secure Searchable Encryption.
ACM Comput. Surv., 2014

Distributed Searchable Symmetric Encryption.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

SOFIR: Securely outsourced Forensic image recognition.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Privacy-Preserving Verification of Clinical Research.
Proceedings of the Sicherheit 2014: Sicherheit, 2013

Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

2012
Selective Document Retrieval from Encrypted Database.
Proceedings of the Information Security - 15th International Conference, 2012

2011
Conjunctive Wildcard Search over Encrypted Data.
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011

Privacy Enhanced Access Control by Means of Policy Blinding.
Proceedings of the Information Security Practice and Experience, 2011

Public-Key Encryption with Delegated Search.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2010

Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records.
IJCMAM, 2010

Computationally Efficient Searchable Symmetric Encryption.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

Searching Keywords with Wildcards on Encrypted Data.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

2009
Preface.
Journal of Computer Security, 2009

Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes.
Proceedings of the Information Security Practice and Experience, 2009

2008
Efficient key management for cryptographically enforced access control.
Comput. Stand. Interfaces, 2008

A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Towards an Information Theoretic Analysis of Searchable Encryption.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Inter-domain Identity-Based Proxy Re-encryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
A Key Management Method for Cryptographically Enforced Access Control.
Proceedings of the Security in Information Systems, 2007

The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers.
Proceedings of the Data and Applications Security XXI, 2007

A Spatio-Temporal and a Probabilistic Approach for Video Retrieval.
Proceedings of the Multimedia Retrieval, 2007

Privacy and Security Issues in a Digital World.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

Enhancing Privacy for Digital Rights Management.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

Multimodal Content-based Video Retrieval.
Proceedings of the Multimedia Retrieval, 2007

Digital Rights Management.
Proceedings of the Multimedia Retrieval, 2007

An Introduction to Digital Rights Management Systems.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Effectiveness Bounds for Non-Exhaustive Schema Matching Systems.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

Using Element Clustering to Increase the Efficiency of XML Schema Matching.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

2005
Experiments with Queries over Encrypted Data Using Secret Sharing.
Proceedings of the Secure Data Management, 2005

Requirements for Secure Logging of Decentralized Cross-Organizational Workflow Executions.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005

Formalizing the XML Schema Matching Problem as a Constraint Optimization Problem.
Proceedings of the Database and Expert Systems Applications, 16th International Conference, 2005

2004
Integrated use of different content derivation techniques within a multimedia database management system.
J. Vis. Commun. Image Represent., 2004

Efficient Tree Search in Encrypted Data.
Information Systems Security, 2004

Preparations for encrypted XML metadata querying.
Comput. Syst. Sci. Eng., 2004

Privacy-Preserving Digital Rights Management.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Using Secret Sharing for Searching in Encrypted Data.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Towards Context-Aware Data Management for Ambient Intelligence.
Proceedings of the Database and Expert Systems Applications, 15th International Conference, 2004

2003
XML and secure data management in an ambient world.
Comput. Syst. Sci. Eng., 2003

Web-Based Distributed XML Query Processing.
Proceedings of the Intelligent Search on XML Data, Applications, Languages, Models, 2003

LicenseScript: a novel digital rights language and its semantics.
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003

Efficient Processing of Secured XML Metadata.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

Techniques for automatic video content derivation.
Proceedings of the 2003 International Conference on Image Processing, 2003

Privacy in an Identity-based DRM System.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Content-Based Video Retrieval - A Database Perspective.
Multimedia systems and applications 25, Springer, ISBN: 978-1-4419-5396-4, 2003

2002
Multi-modal extraction of highlights from TV Formula 1 programs.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

Content-Based Video Indexing for the Support of Digital Library Search.
Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002

Extending a DBMS to Support Content-Based Video Retrieval: A Formula 1 Case Study.
Proceedings of the XML-Based Data Management and Multimedia Engineering, 2002

Cobra: A Content-Based Video Retrieval System.
Proceedings of the Advances in Database Technology, 2002

2001
Flexible and scalable digital library search.
Proceedings of the VLDB 2001, 2001

Recognizing Strokes in Tennis Videos using Hidden Markov Models.
Proceedings of the IASTED International Conference on Visualization, 2001

Multimedia information services enabling: an architectural approach.
Proceedings of the 2001 ACM workshops on Multimedia: multimedia information retrieval, Ottawa, ON, Canada, September 30, 2001

Content-Based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events.
Proceedings of the IEEE Workshop on Detection and Recognition of Events in Video, 2001

Experimenting NT Cluster Technology for Massive CDR Processing.
Proceedings of the Databases in Telecommunications II, VLDB 2001 International Workshop, 2001

Customized Atomicity Specification for Transactional Workflows.
Proceedings of the Third International Symposium on Cooperative Database Systems and Applications, 2001

2000
Experimenting NUMA for Scalable CDR Processing.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000

1999
Workflow Management Systems and Cross-Organisational Logistics.
Proceedings of the Workshop on Cross-Organisational Workflow Management and Co-ordination, 1999

Assesment of Scaleable Database Architectures for CDR Analysis - An Experimental Approach.
Proceedings of the Databases in Telecommunications, 1999

1998
Modeling and Retrieving Audiovisual Information: A Soccer Video Retrieval System.
Proceedings of the Advances in Multimedia Information Systems, 4th International Workshop, 1998

Practical Experiences with Materialized Views in a Very Large Data Store for Telecommunication Service Management.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

1995
The ECRC Multi Database System.
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995

1993
KBS Development: From Design Models to Implementations.
Proceedings of the SEKE'93, 1993

A Framework for Supporting Triggers in Deductive Databases.
Proceedings of the Rules in Database Systems. Proceedings of the 1st International Workshop on Rules in Database Systems, Edinburgh, Scotland, 30 August, 1993

Extending Deductive Databases with Object Orientation.
Proceedings of the Workshop on Programming with Logic Databases. In Conjunction with ILPS, 1993

1992
Yet Another Formalisation of KADS Conceptual Models.
Proceedings of the Current Developments in Knowledge Acquisition, 1992

1990
An Interactive Programming Environment for LOTOS.
Proceedings of the Formal Description Techniques, 1990


  Loading...