Willem Jonker

prof.dr.

19972019
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Willem Jonker is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Cryptography Engineering & Materials Science
Access control Engineering & Materials Science
Information management Engineering & Materials Science
Information analysis Engineering & Materials Science
HTTP Engineering & Materials Science
Biometrics Engineering & Materials Science
Predicate Mathematics
Encryption Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1997 2019

A multi-authority approach to various predicate encryption types

van de Kamp, T. R., Peter, A. & Jonker, W., 25 Oct 2019, In : Designs, codes and cryptography.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Predicate
Encryption
Cryptography
Encoding
Decentralized
1 Downloads (Pure)

Two-Client and Multi-client Functional Encryption for Set Intersection

van de Kamp, T. R., Stritzl, D., Jonker, W. & Peter, A., 30 May 2019, Information security and privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Charm: Springer International Publishing AG, p. 97-115 19 p. (Lecture Notes in Computer Science; vol. 11547).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
Data transfer

Victim-Aware Adaptive Covert Channels

Bortolameotti, R., van Ede, T. S., Continella, A., Everts, M. H., Jonker, W., Hartel, P. H. & Peter, A., 2019, Security and Privacy in Communication Networks: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohalsen, A. (eds.). p. 450-471 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 304).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
4 Downloads (Pure)

DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting

Bortolameotti, R., van Ede, T. S., Caselli, M., Everts, M. H., Hartel, P. H., Hofstede, R., Jonker, W. & Peter, A., 2017, ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference. p. 373-386

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

HTTP
Communication
Malware

Multi-client Predicate-only Encryption for Conjunctive Equality Tests

van de Kamp, T. R., Peter, A., Everts, M. H. & Jonker, W., 2017.

Research output: Contribution to conferencePaper

Open Access
File
Cryptography
Hardware
Monitoring
Testing

Activities 2001 2002

  • 2 Oral presentation

Extending a DBMS to Support Content-Based Video Retrieval: A Formula 1 Case Study

M. Petkovic (Speaker), Willem Jonker (Speaker), V. Mihajlovic (Speaker)
2002

Activity: Talk or presentationOral presentation

Recognizing Strokes in Tennis Videos Using Hidden Markov Models

M. Petkovic (Speaker), Willem Jonker (Speaker), Z. Zivkovic (Speaker)
2001

Activity: Talk or presentationOral presentation