Hugo L. Jonker
Orcid: 0000-0002-7958-8921Affiliations:
- Open University of the Netherlands, The Netherlands
- Radbound University, Heerlen, Netherlands
- University of Luxembourg (former)
According to our database1,
Hugo L. Jonker
authored at least 46 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on open.ou.nl
On csauthors.net:
Bibliography
2024
Problem solved: A reliable, deterministic method for JPEG fragmentation point detection.
Forensic Sci. Int. Digit. Investig., 2024
2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
How gullible are web measurement tools?: a case study analysing and strengthening OpenWPM's reliability.
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, 2022
2021
Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching.
CoRR, 2021
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021
A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021
2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications.
Proceedings of the Computer Security, 2018
2017
Comput. Secur., 2017
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
Proceedings of the Security Protocols XXV, 2017
Proceedings of the Security Protocols XXV, 2017
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017
2016
Proceedings of the Security Protocols XXIV, 2016
Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016
2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
Proceedings of the Fun with Algorithms - 7th International Conference, 2014
2013
Comput. Sci. Rev., 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Electronic Participation - 5th IFIP WG 8.5 International Conference, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the Foundations of Health Informatics Engineering and Systems, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Fundam. Informaticae, 2008
2007
Proceedings of the E-Voting and Identity, First International Conference, 2007
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007
2006
Proceedings of the Information Security, 9th International Conference, 2006