Name
Papers
Collaborators
WILLEM JONKER
76
85
Citations 
PageRank 
Referers 
640
55.71
1453
Referees 
References 
927
664
Search Limit
1001000
Title
Citations
PageRank
Year
A multi-authority approach to various predicate encryption types00.342020
HeadPrint: detecting anomalous communications through header-based application fingerprinting00.342020
Two-Client And Multi-Client Functional Encryption For Set Intersection00.342019
Victim-Aware Adaptive Covert Channels00.342019
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.20.492017
Private Sharing of IOCs and Sightings.10.392016
Reliably determining data leakage in the presence of strong attackers.00.342016
Publicly Verifiable Private Aggregation of Time-Series Data10.372015
A Survey of Provably Secure Searchable Encryption732.202014
Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings161.712014
Distributed Searchable Symmetric Encryption00.342014
SOFIR: Securely outsourced Forensic image recognition20.372014
Privacy-Preserving Verification of Clinical Research.00.342013
Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler.00.342013
Selective document retrieval from encrypted database50.412012
Secure Data Management - 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings120.692012
Conjunctive wildcard search over encrypted data160.732011
Public-key encryption with delegated search100.582011
Preface00.342011
Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings100.602011
Privacy enhanced access control by means of policy blinding10.362011
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records00.342010
Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings110.852010
Searching keywords with wildcards on encrypted data260.872010
Computationally efficient searchable symmetric encryption261.512010
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes411.212009
Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings100.702009
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application401.532009
Inter-domain Identity-Based Proxy Re-encryption170.722008
Towards an Information Theoretic Analysis of Searchable Encryption20.652008
Efficient key management for cryptographically enforced access control80.562008
Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings150.932008
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare130.602008
A Key Management Method for Cryptographically Enforced Access Control10.352007
The interval revocation scheme for broadcasting messages to stateless receivers00.342007
Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings140.962007
Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings120.872006
Effectiveness Bounds for Non-Exhaustive Schema Matching Systems00.342006
Using Element Clustering to Increase the Efficiency of XML Schema Matching100.542006
Secure Data Management, Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005, Proceedings161.522005
Experiments with queries over encrypted data using secret sharing10.372005
Formalizing the XML schema matching problem as a constraint optimization problem140.652005
Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings151.512004
Efficient Tree Search in Encrypted Data.140.932004
Privacy-Preserving Digital Rights Management111.402004
Using Secret Sharing for Searching in Encrypted Data201.132004
Integrated use of different content derivation techniques within a multimedia database management system30.422004
Preparations For Encrypted Xml Metadata Querying10.412004
Privacy in an Identity-based DRM System201.992003
Xml And Secure Data Management In An Ambient World10.402003
  • 1
  • 2