Willem Jonker

prof.dr.

19972019

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Willem Jonker is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

A multi-authority approach to various predicate encryption types

van de Kamp, T. R., Peter, A. & Jonker, W., 25 Oct 2019, In : Designs, codes and cryptography.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
  • 7 Downloads (Pure)

    Two-Client and Multi-client Functional Encryption for Set Intersection

    van de Kamp, T. R., Stritzl, D., Jonker, W. & Peter, A., 30 May 2019, Information security and privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Charm: Springer International Publishing AG, p. 97-115 19 p. (Lecture Notes in Computer Science; vol. 11547).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 1 Downloads (Pure)

    Victim-Aware Adaptive Covert Channels

    Bortolameotti, R., van Ede, T. S., Continella, A., Everts, M. H., Jonker, W., Hartel, P. H. & Peter, A., 2019, Security and Privacy in Communication Networks: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohalsen, A. (eds.). p. 450-471 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 304).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting

    Bortolameotti, R., van Ede, T. S., Caselli, M., Everts, M. H., Hartel, P. H., Hofstede, R., Jonker, W. & Peter, A., 2017, ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference. p. 373-386

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 5 Citations (Scopus)
    4 Downloads (Pure)

    Multi-client Predicate-only Encryption for Conjunctive Equality Tests

    van de Kamp, T. R., Peter, A., Everts, M. H. & Jonker, W., 2017.

    Research output: Contribution to conferencePaper

    Open Access
    File
  • Activities

    • 3 Oral presentation

    Extending a DBMS to Support Content-Based Video Retrieval: A Formula 1 Case Study

    M. Petkovic (Speaker), Willem Jonker (Speaker), V. Mihajlovic (Speaker)
    2002

    Activity: Talk or presentationOral presentation

    Recognizing Strokes in Tennis Videos Using Hidden Markov Models

    M. Petkovic (Speaker), Willem Jonker (Speaker), Z. Zivkovic (Speaker)
    2001

    Activity: Talk or presentationOral presentation

    Content-based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events

    M. Petkovic (Speaker), Willem Jonker (Speaker)
    2001

    Activity: Talk or presentationOral presentation