FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting CF Torres, H Jonker, S Mauw Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 84 | 2015 |
Privacy and verifiability in voting systems: Methods, developments and trends H Jonker, S Mauw, J Pang Computer Science Review 10, 1-30, 2013 | 82 | 2013 |
Challenges in eHealth: From Enabling to Enforcing Privacy N Dong, H Jonker Foundations of Health Informatics Engineering and Systems, 195-206, 2012 | 81 | 2012 |
Formalising receipt-freeness HL Jonker, EP de Vink Information Security: 9th International Conference, ISC 2006, Samos Island …, 2006 | 58 | 2006 |
Receipt-freeness as a special case of anonymity in epistemic logic HL Jonker, W Pieters Cambridge: Robinson College, 2006 | 49 | 2006 |
Ægis: Shielding vulnerable smart contracts against attacks C Ferreira Torres, M Baden, R Norvill, BB Fiz Pontiveros, H Jonker, ... Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 43 | 2020 |
Fingerprint surface-based detection of web bot detectors H Jonker, B Krumnow, G Vlot Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 43 | 2019 |
Defining verifiability in e-auction protocols J Dreier, H Jonker, P Lafourcade Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 37 | 2013 |
Analysis of a receipt-free auction protocol in the applied pi calculus N Dong, H Jonker, J Pang Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011 | 33 | 2011 |
ÆGIS: Smart shielding of smart contracts C Ferreira Torres, M Baden, R Norvill, H Jonker Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 32 | 2019 |
Versatile Prêt à Voter: Handling multiple election methods with a unified interface Z Xia, C Culnane, J Heather, H Jonker, PYA Ryan, S Schneider, ... Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 30 | 2010 |
Formal analysis of privacy in an eHealth protocol N Dong, H Jonker, J Pang Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 29 | 2012 |
Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching [J] CF Torres, H Jonker, Radu State CoRR, 2021 | 22* | 2021 |
Anonymity and verifiability in voting: understanding (un) linkability L Langer, H Jonker, W Pieters Information and Communications Security: 12th International Conference …, 2010 | 22 | 2010 |
A formal framework for quantifying voter-controlled privacy H Jonker, S Mauw, J Pang Journal of Algorithms 64 (2-3), 89-105, 2009 | 22 | 2009 |
State, R CF Torres, H Jonker Elysium: Automagically healing vulnerable smart contracts using context …, 2021 | 16 | 2021 |
Shepherd: a generic approach to automating website login H Jonker, S Karsch, B Krumnow, M Sleegers Reston: Internet Society, 2020 | 16 | 2020 |
Security aspects of DRM systems HL Jonker, S Mauw, JHS Verschuren, A Schoonen 25th Symposium on information theory in the Benelux, 169-176, 2004 | 15 | 2004 |
Nuovo DRM paradiso: Towards a verified fair DRM scheme MT Dashti, SK Nair, HL Jonker FSEN 7, 33-48, 2007 | 13 | 2007 |
A contemporary investigation of NTFS file fragmentation V van der Meer, H Jonker, J van den Bos Forensic Science International: Digital Investigation 38, 301125, 2021 | 12 | 2021 |