References of "Jonker, Hugo 40020681"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailLocation-private interstellar communication
Jonker, Hugo UL; Mauw, Sjouke UL; Radomirovic, Sasa UL

in 23rd Security Protocols Workshop (2015)

Detailed reference viewed: 54 (5 UL)
Full Text
Peer Reviewed
See detailSecure Auctions Without Cryptography
Dreier, J.; Jonker, Hugo UL; Lafourcade, P.

in 7th conference on Fun with Algorithms (FUN'14), Lipari Island, Sicily, Italy, July 1--3, 2014 (2014)

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailModeling the German Legal Latitude Principles for Internet Voting Systems
Neumann, Stephan; Kahlert, Anna; Henning, Maria et al

in Proc. 5th conference on eParticipation (ePart 2013) (2013)

Detailed reference viewed: 35 (1 UL)
Full Text
Peer Reviewed
See detailVerifiability in e-Auction protocols & Brandt's protocol revisited
Dreier, Jannik; Dumas, G.J.; Jonker, Hugo UL et al

Scientific Conference (2013)

Detailed reference viewed: 25 (0 UL)
Full Text
Peer Reviewed
See detailUnterstützung der juristisch-informatischen Kommunikation im Hinblick auf elektronische Wahlprotokolle
Neumann, Stephan; Kahlert, Anna; Henning, Maria et al

in Proc.\ 16. Internationales Rechtsinformatik Symposion (IRIS2013) (2013)

Detailed reference viewed: 24 (3 UL)
Full Text
Peer Reviewed
See detailDefining Verifiability in e-Auction Protocols
Dreier, Jannik; Jonker, Hugo UL; Lafourcade, Pascal

in Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) (2013)

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailPrivacy and verifiability in voting systems: Methods, developments and trends
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Computer Science Review (2013)

Detailed reference viewed: 89 (0 UL)
Full Text
Peer Reviewed
See detailEnforcing Privacy in the Presence of Others: Notions, Formalisations and Relations
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proceedings of the 18th European Symposium on Research in Computer Security (2013)

Detailed reference viewed: 60 (2 UL)
Full Text
Peer Reviewed
See detailRandom block verification: Improving the Norwegian electoral mix net
Demirel, Denise; Jonker, Hugo UL; Volkamer, Melanie

in Proc. 5th International Conference on Electronic Voting (EVOTE'12) (2012)

Detailed reference viewed: 23 (0 UL)
Full Text
See detailLocation-Based Services: Privacy, Security and Assurance
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Digital Enlightenment Yearbook 2012 (2012)

Detailed reference viewed: 71 (5 UL)
Full Text
Peer Reviewed
See detailChallenges in eHealth: from enabling to enforcing privacy
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (2012)

Detailed reference viewed: 61 (2 UL)
Full Text
Peer Reviewed
See detailFormal analysis of privacy in an eHealth protocol
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proc. 17th European Symposium on Research in Computer Security (2012)

Detailed reference viewed: 44 (6 UL)
Full Text
Peer Reviewed
See detailAnalysis of a receipt-free auction protocol in the applied pi calculus
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proc. 7th Workshop on Formal Aspects in Security and Trust (2011)

Detailed reference viewed: 50 (3 UL)
Full Text
Peer Reviewed
See detailBulletin boards in voting systems: Modelling and measuring privacy
Jonker, Hugo UL; Pang, Jun UL

in Proc. 6th International Conference on Availability, Reliability and Security (2011)

Detailed reference viewed: 70 (1 UL)
Full Text
Peer Reviewed
See detailAnonymity in Voting Revisited
Jonker, Hugo UL; Pieters, Wolter

in Towards Trustworthy Elections, 6000 (2010)

Detailed reference viewed: 41 (1 UL)
Full Text
Peer Reviewed
See detailAnonymity and Verifiability in Voting: Understanding (Un)Linkability
Langer, Lucie; Jonker, Hugo UL; Pieters, Wolter

in Proc. 12th Conference on Information and Communications Security (ICICS 2010) (2010)

Detailed reference viewed: 35 (0 UL)
Full Text
Peer Reviewed
See detailVersatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface
Xia, Zhe; Culnane, Chris; Heather, James et al

in Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (2010)

Detailed reference viewed: 198 (6 UL)
Full Text
See detailSecurity matters: Privacy in Voting and Fairness in Digital Exchange
Jonker, Hugo UL

Doctoral thesis (2009)

Detailed reference viewed: 35 (8 UL)
Full Text
Peer Reviewed
See detailA formal framework for quantifying voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Journal of Algorithms in Cognition, Informatics and Logic (2009)

Detailed reference viewed: 54 (2 UL)
Full Text
Peer Reviewed
See detailMeasuring voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)

Detailed reference viewed: 55 (2 UL)