Expertise

  • Computer Science

    • Encryption Scheme
    • Encryption
    • Access Control
    • Plaintext
    • Application
    • Testing
    • Vectors
    • proxy re encryption

Organisations

Ancillary activities

  • AiNedChairman
  • EIT DigitalAdvisor

Publications

2024

Text2Weak: mapping CVEs to CWEs using description embeddings analysis (2024)In The 4th Workshop on Artificial Intelligence-Enabled Cybersecurity Analytics. Simonetto, S., van Ede, T. S., Bosch, P. & Jonker, W.https://ai4cyber-kdd.com/KDD-AISec_files/Submission_8_final.pdf

2020

HeadPrint: Detecting Anomalous Communications through Header-based APplication Fingerprinting (2020)In 35th Annual ACM Symposium on Applied Computing, SAC 2020 (pp. 1696-1705). Association for Computing Machinery. Bortolameotti, R., van Ede, T. S., Continella, A., Hupperich, T. M., Everts, M. H., Rafati, R., Jonker, W., Hartel, P. & Peter, A.https://doi.org/10.1145/3341105.3373862Multi-client functional encryption for controlled data sharing (2020)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. van de Kamp, T. R.https://doi.org/10.3990/1.9789036549585A multi-authority approach to various predicate encryption types (2020)Designs, codes and cryptography, 88(2), 363–390. van de Kamp, T., Peter, A. & Jonker, W.https://doi.org/10.1007/s10623-019-00686-x

Research profiles

Address

University of Twente

Zilverling (building no. 11), room 2007
Hallenweg 19
7522 NH Enschede
Netherlands

Navigate to location

Organisations

Scan the QR code or
Download vCard