Publications

photo

Peer-reviewed publications

Generated using php-bibHTML by Hugo Jonker, based on the BiblioPhile PHP BibTex parser.

  • 2014:
    1. Secure Auctions Without Cryptography. J. Dreier, H.L. Jonker and P. Lafourcade. In Proc. 7th conference on Fun with Algorithms (FUN’14), Springer, LNCS 8496, pp. 158-170, 2014. bib | preprint | DOI ]
  • 2013:
    1. Privacy and verifiability in voting systems: Methods, developments and trends. H.L. Jonker, S. Mauw and J. Pang. Computer Science Review, 10:1-30, 2013. bib | preprint | from publisher ]
    2. Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. N. Dong, H.L. Jonker and J. Pang. In Proc. 18th European Symposium on Research in Computer Security (ESORICS’13), Springer-Verlag, LNCS 8134, pp. 499-516, 2013. bib | preprint | from publisher ]
    3. Modeling the German Legal Latitude Principles for Internet Voting Systems. S. Neumann, A. Kahlert, M. Henning, H. Jonker and M. Volkamer. In Proc. 5th conference on eParticipation (ePart’13), Springer-Verlag, LNCS 8075, pp. 49-56, 2013. bib | preprint | from publisher ]
    4. Defining Verifiability in e-Auction Protocols. J. Dreier, H.L. Jonker and P. Lafourcade. In Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS’13), ACM, pp. 547-552, 2013. bib | preprint | from publisher ]
    5. Verifiability in e-Auction protocols & Brandt’s protocol revisited. J. Dreier, J.-G. Dumas, H.L. Jonker and P. Lafourcade. In 1st Workshop on Hot Issues in Security Principles and Trust (HOTSPOT’13), 2013. bib | preprint | from publisher ]
    6. Unterstützung der juristisch-informatischen Kommunikation im Hinblick auf elektronische Wahlprotokolle. S. Neumann, A. Kahlert, M. Henning, H. Jonker and M. Volkamer. In Proc. 16. Internationales Rechtsinformatik Symposion (IRIS’13), Oesterreichische Computer Gesellschaft, 2013. bib | from publisher ]
  • 2012:
    1. Formal analysis of privacy in an eHealth protocol. N. Dong, H.L. Jonker and J. Pang. In Proc. 17th European Symposium on Research in Computer Security (ESORICS’12), Springer-Verlag, LNCS 7459, pp. 325-342, 2012. bib | preprint | from publisher ]
    2. Random Block Verification: Improving the Norwegian Electoral Mix Net. D. Demirel, H. Jonker and M. Volkamer. In Proc. 5th International Conference on Electronic Voting (EVOTE’12), Gesellschaft für Informatik, Lecture Notes in Informatics 205, pp. 65–78, 2012. bib | preprint | slides ]
    3. Location-Based Services: Privacy, Security and Assurance. H.L. Jonker, S. Mauw and J. Pang. In Digital Enlightenment Yearbook 2012, IOS Press, pp. 235–244, 2012. bib | preprint ]
    4. Challenges in eHealth: from enabling to enforcing privacy. N. Dong, H.L. Jonker and J. Pang. In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (FHIES’11), Springer-Verlag, LNCS 7151, pp. 195–206, 2012. bib | preprint | from publisher | slides ]
  • 2011:
    1. Bulletin boards in voting systems: Modelling and measuring privacy. H. Jonker and J. Pang. In Proc. 6th International Conference on Availability, Reliability and Security (ARES’11), IEEE Computer Society, pp. 294–300, 2011. bib | preprint | from publisher ]
    2. Analysis of a receipt-free auction protocol in the applied pi calculus. N. Dong, H.L. Jonker and J. Pang. In Proc. 7th Workshop on Formal Aspects in Security and Trust (FAST’10), Springer-Verlag, LNCS 6561, pp. 223–238, 2011. bib | preprint | from publisher ]
  • 2010:
    1. Anonymity and Verifiability in Voting: Understanding (Un)Linkability. L. Langer, H. Jonker and W. Pieters. In Proc. 12th Conference on Information and Communications Security (ICICS’10), Springer-Verlag, LNCS 6476, pp. 296–310, 2010. bib | preprint | from publisher ]
    2. Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface. Z. Xia, C. Culnane, J. Heather, H. Jonker, P. Ryan, S. Schneider and S. Srinivasan. In Proc. 11th International Conference on Cryptology in India (IndoCrypt’10), Springer-Verlag, LNCS 6498, pp. 98–114, 2010. bib | preprint | from publisher ]
    3. Anonymity in Voting Revisited. H. Jonker and W. Pieters. In Towards Trustworthy Elections, Springer-Verlag, LNCS 6000, pp. 216–230, 2010. bib | preprint | from publisher ]
  • 2009:
    1. Discovering the core security requirements of DRM systems by means of objective trees. H.L. Jonker and S. Mauw. In Handbook of Research on Secure Multimedia Distribution, IGI Global, pp. 71–85, 2009. bib | preprint | from publisher ]
    2. A formal framework for quantifying voter-controlled privacy. H. Jonker, S. Mauw and J. Pang. Journal of Algorithms in Cognition, Informatics and Logic, 64(2-3):89–105, 2009. bib | preprint | from publisher ]
    3. Measuring voter-controlled privacy. H.L. Jonker, S. Mauw and J. Pang. In Proc. 4th International Conference on Availability, Reliability and Security (ARES’09), IEEE Computer Society, pp. 289–298, 2009. bib | preprint | from publisher ]
  • 2008:
    1. Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme. M. Torabi Dashti, S. Krishnan Nair and H. Jonker. Fundamenta Informaticae, 89(4):393–417, 2008. bib | preprint | from publisher ]
  • 2007:
    1. Core security requirements of DRM systems. H.L. Jonker and S. Mauw. In Digital Rights Management – An Introduction, ICFAI University Press, pp. 73–90, 2007. bib ]
    2. Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme. M. Torabi Dashti, S. Krishnan Nair and H.L. Jonker. In Proc. First International Symposium on Fundamentals of Software Engineering (FSEN’07), Springer-Verlag, LNCS 4767, pp. 33-48, 2007. bib | preprint | from publisher ]
    3. Compliance of RIES to the proposed e-Voting protection profile. H.L. Jonker and M. Volkamer. In Proc. First Conference on E-Voting and Identity (VOTE-ID’07), Springer-Verlag, LNCS 4896, pp. 50–61, 2007. bib | preprint | from publisher | slides ]
  • 2006:
    1. Receipt-Freeness as a special case of Anonymity in Epistemic Logic. H.L. Jonker and W. Pieters. In Proc. Workshop On Trustworthy Elections (WOTE’06), pp. , 2006. bib | preprint | slides ]
    2. Formalising Receipt-Freeness. H.L. Jonker and E.P. de Vink. In Proc. 9th Conference on Information Security (ISC’06), Springer-Verlag, LNCS 4176, pp. 476–488, 2006. bib | preprint | from publisher | slides ]
  • 2004:
    1. Security Aspects of DRM Systems. H.L. Jonker, S. Mauw, J.H.S. Verschuren and A.T.S.C. Schoonen. In 25th Symposium on Information Theory in the BeNeLux, Werkgemeenschap voor Informatie- en Communicatietheorie, pp. 169–176, 2004. bib | preprint | slides ]

Peer-reviewed, no official proceedings

Theses

Miscellaneous publications

Presentations

Tech reports