Welcome...

prof.dr. W. Jonker (Willem)

Full Professor

Expertise

Cryptography
Semantics
Xml
Servers
Access Control
Experiments
Bayesian Networks
Hidden Markov Models

Ancillary Activities

  • EIT Digital
    CEO

Publications

Recent Articles
Bortolameotti, R., Peter, A., Everts, M. H., Jonker, W., & Hartel, P. H. (2016). Reliably determining data leakage in the presence of strong attackers. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016 (pp. 484-495). New York: ACM. DOI: 10.1145/2991079.2991095
van de Kamp, T. R., Peter, A., Everts, M. H., & Jonker, W. (2016). Private Sharing of IOCs and Sightings. In 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016 (pp. 35-38). New York: ACM. DOI: 10.1145/2994539.2994544
Bakondi, B. G., Peter, A., Everts, M. H., Hartel, P. H., & Jonker, W. (2015). Publicly Verifiable Private Aggregation of Time-Series Data. In 10th International Conference on Availability, Reliability and Security, ARES 2015 (pp. 50-59). Piscataway, NJ, USA: IEEE. DOI: 10.1109/ARES.2015.82
Bösch, C. T., Peter, A., Leenders, B., Lim, H. W., Tang, Q., Wang, H., ... Jonker, W. (2014). Distributed Searchable Symmetric Encryption. In Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014 (pp. 330-337). USA: IEEE. DOI: 10.1109/PST.2014.6890956
Bösch, C. T., Peter, A., Hartel, P. H., & Jonker, W. (2014). SOFIR: Securely Outsourced Forensic Image Recognition. In 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014 (pp. 2694-2698). USA: IEEE. DOI: 10.1109/ICASSP.2014.6854089
Makri, E., Everts, M. H., de Hoogh, S., Peter, A., op den Akker, H., Hartel, P. H., & Jonker, W. (2014). Privacy-Preserving Verification of Clinical Research. In Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) (pp. 481-500). (Lecture Notes in Informatics (LNI)). Bonn: Gesellschaft für Informatik.
Bösch, C. T., Tang, Q., Hartel, P. H., & Jonker, W. (2012). Selective Document Retrieval from Encrypted Database. In 15th International Conference on Information Security (ISC) (pp. 224-241). (Lecture Notes in Computer Science; Vol. 7483). Berlin: Springer Verlag. DOI: 10.1007/978-3-642-33383-5_14

UT Research Information System

Contact Details

Visiting Address

University of Twente
Faculty of Electrical Engineering, Mathematics & Computer Science
Zilverling (building no. 11), room 2007
Hallenweg 19
7522NH  Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
Faculty of Electrical Engineering, Mathematics & Computer Science
Zilverling  2007
P.O. Box 217
7500 AE Enschede
The Netherlands