Willem Jonker
Affiliations:- University of Twente, Enschede, Netherlands
According to our database1,
Willem Jonker
authored at least 77 papers
between 1990 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2020
Des. Codes Cryptogr., 2020
HeadPrint: detecting anomalous communications through header-based application fingerprinting.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the IEEE International Conference on Acoustics, 2014
2013
Proceedings of the Sicherheit 2014: Sicherheit, 2013
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013
2012
Proceedings of the Information Security - 15th International Conference, 2012
2011
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption.
IEEE Trans. Syst. Man Cybern. Part A, 2010
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records.
Int. J. Comput. Model. Algorithms Medicine, 2010
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the Information Security Practice and Experience, 2009
2008
Comput. Stand. Interfaces, 2008
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
A Key Management Method for Cryptographically Enforced Access Control.
Proceedings of the Security in Information Systems, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the Multimedia Retrieval, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
Proceedings of the Multimedia Retrieval, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006
2005
Proceedings of the Secure Data Management, 2005
Requirements for Secure Logging of Decentralized Cross-Organizational Workflow Executions.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005
Proceedings of the Database and Expert Systems Applications, 16th International Conference, 2005
2004
IEEE Signal Process. Mag., 2004
Integrated use of different content derivation techniques within a multimedia database management system.
J. Vis. Commun. Image Represent., 2004
Preparations for encrypted XML metadata querying.
Comput. Syst. Sci. Eng., 2004
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004
Proceedings of the Database and Expert Systems Applications, 15th International Conference, 2004
2003
XML and secure data management in an ambient world.
Comput. Syst. Sci. Eng., 2003
Proceedings of the Intelligent Search on XML Data, Applications, Languages, Models, 2003
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
Proceedings of the 2003 International Conference on Image Processing, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Multimedia systems and applications 25, Springer, ISBN: 978-1-4419-5396-4, 2003
2002
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002
Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002
Proceedings of the XML-Based Data Management and Multimedia Engineering, 2002
Proceedings of the Advances in Database Technology, 2002
2001
Recognizing Strokes in Tennis Videos using Hidden Markov Models.
Proceedings of the IASTED International Conference on Visualization, 2001
Proceedings of the 2001 ACM workshops on Multimedia: multimedia information retrieval, Ottawa, ON, Canada, September 30, 2001
Content-Based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events.
Proceedings of the IEEE Workshop on Detection and Recognition of Events in Video, 2001
Proceedings of the Databases in Telecommunications II, VLDB 2001 International Workshop, 2001
Customized Atomicity Specification for Transactional Workflows.
Proceedings of the Third International Symposium on Cooperative Database Systems and Applications, 2001
2000
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000
1999
Proceedings of the Workshop on Cross-Organisational Workflow Management and Co-ordination, 1999
Assesment of Scaleable Database Architectures for CDR Analysis - An Experimental Approach.
Proceedings of the Databases in Telecommunications, 1999
1998
Proceedings of the Advances in Multimedia Information Systems, 4th International Workshop, 1998
Practical Experiences with Materialized Views in a Very Large Data Store for Telecommunication Service Management.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998
1995
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995
1993
KBS Development: From Design Models to Implementations.
Proceedings of the SEKE'93, 1993
Proceedings of the Rules in Database Systems. Proceedings of the 1st International Workshop on Rules in Database Systems, Edinburgh, Scotland, 30 August, 1993
Extending Deductive Databases with Object Orientation.
Proceedings of the Workshop on Programming with Logic Databases. In Conjunction with ILPS, 1993
1992
Proceedings of the Current Developments in Knowledge Acquisition, 1992
1990
An Interactive Programming Environment for LOTOS.
Proceedings of the Formal Description Techniques, 1990