Profil

JONKER Hugo

Main Referenced Co-authors
PANG, Jun  (9)
MAUW, Sjouke  (6)
DONG, Naipeng  (4)
Volkamer, Melanie (4)
Dreier, Jannik (2)
Main Referenced Keywords
voting (6); applied pi (3); digital rights management (3); formal verification (3); privacy (3);
Main Referenced Disciplines
Computer science (25)
Law, criminology & political science: Multidisciplinary, general & others (1)

Publications (total 25)

The most downloaded
344 downloads
Jonker, H., & Volkamer, M. (2007). Compliance of RIES to the proposed e-Voting protection profile. In Proc. First Conference on E-Voting and Identity (VOTE-ID’07) (pp. 50-61). Berlin, Germany: Springer. doi:10.1007/978-3-540-77493-8_5 https://hdl.handle.net/10993/575

The most cited

48 citations (Scopus®)

Dong, N., Jonker, H., & Pang, J. (2012). Challenges in eHealth: from enabling to enforcing privacy. In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (pp. 195-206). Springer-Verlag. https://hdl.handle.net/10993/213

Ferreira Torres, C., Steichen, M., Norvill, R., & Jonker, H. (2019). ÆGIS: Smart Shielding of Smart Contracts [Poster presentation]. CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security.

Jonker, H., Mauw, S., & Radomirovic, S. (2015). Location-private interstellar communication. In 23rd Security Protocols Workshop. Springer-Verlag. doi:10.1007/978-3-319-26096-9_11
Peer reviewed

Dreier, J., Jonker, H., & Lafourcade, P. (2014). Secure Auctions Without Cryptography. In 7th conference on Fun with Algorithms (FUN'14), Lipari Island, Sicily, Italy, July 1--3, 2014. Springer. doi:10.1007/978-3-319-07890-8_14
Peer reviewed

Neumann, S., Kahlert, A., Henning, M., Jonker, H., & Volkamer, M. (2013). Unterstützung der juristisch-informatischen Kommunikation im Hinblick auf elektronische Wahlprotokolle. In Proc.\ 16. Internationales Rechtsinformatik Symposion (IRIS2013). Oesterreichische Computer Gesellschaft.
Peer reviewed

Dreier, J., Dumas, G. J., Jonker, H., & Lafourcade, P. (2013). Verifiability in e-Auction protocols & Brandt's protocol revisited [Paper presentation]. 1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013).

Dong, N., Jonker, H., & Pang, J. (2013). Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. In Proceedings of the 18th European Symposium on Research in Computer Security (pp. 499-516). Springer.
Peer reviewed

Jonker, H., Mauw, S., & Pang, J. (2013). Privacy and verifiability in voting systems: Methods, developments and trends. Computer Science Review. doi:10.1016/j.cosrev.2013.08.002
Peer reviewed

Dreier, J., Jonker, H., & Lafourcade, P. (2013). Defining Verifiability in e-Auction Protocols. In Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013). ACM. doi:10.1145/2484313.2484387
Peer reviewed

Neumann, S., Kahlert, A., Henning, M., Jonker, H., & Volkamer, M. (2013). Modeling the German Legal Latitude Principles for Internet Voting Systems. In Proc. 5th conference on eParticipation (ePart 2013). Springer-Verlag.
Peer reviewed

Demirel, D., Jonker, H., & Volkamer, M. (2012). Random block verification: Improving the Norwegian electoral mix net. In Proc. 5th International Conference on Electronic Voting (EVOTE'12) (pp. 65-78). Gesellschaft für Informatik e.V.
Peer reviewed

Jonker, H., Mauw, S., & Pang, J. (2012). Location-Based Services: Privacy, Security and Assurance. In Digital Enlightenment Yearbook 2012 (pp. 235-244). IOS Press. doi:10.3233/978-1-61499-057-4-235

Dong, N., Jonker, H., & Pang, J. (2012). Formal analysis of privacy in an eHealth protocol. In Proc. 17th European Symposium on Research in Computer Security (pp. 325-342). Springer-Verlag.
Peer reviewed

Dong, N., Jonker, H., & Pang, J. (2012). Challenges in eHealth: from enabling to enforcing privacy. In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (pp. 195-206). Springer-Verlag.
Peer reviewed

Dong, N., Jonker, H., & Pang, J. (2011). Analysis of a receipt-free auction protocol in the applied pi calculus. In Proc. 7th Workshop on Formal Aspects in Security and Trust (pp. 223–238). Springer-Verlag.
Peer reviewed

Jonker, H., & Pang, J. (2011). Bulletin boards in voting systems: Modelling and measuring privacy. In Proc. 6th International Conference on Availability, Reliability and Security (pp. 294-300). IEEE CS. doi:10.1109/ARES.2011.50
Peer reviewed

Xia, Z., Culnane, C., Heather, J., Jonker, H., Ryan, P., Schneider, S., & Srinivasan, S. (2010). Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. In Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (pp. 98–114). Springer-Verlag. doi:10.1007/978-3-642-17401-8_8
Peer reviewed

Langer, L., Jonker, H., & Pieters, W. (2010). Anonymity and Verifiability in Voting: Understanding (Un)Linkability. In Proc. 12th Conference on Information and Communications Security (ICICS 2010) (pp. 296–310). Springer. doi:10.1007/978-3-642-17650-0_21
Peer reviewed

Jonker, H., & Pieters, W. (2010). Anonymity in Voting Revisited. In Towards Trustworthy Elections, 6000 (pp. 216–230). Springer. doi:10.1007/978-3-642-12980-3_13
Peer reviewed

Jonker, H. (2009). Security matters: Privacy in Voting and Fairness in Digital Exchange [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/15487

Jonker, H., Mauw, S., & Pang, J. (2009). A formal framework for quantifying voter-controlled privacy. Journal of Algorithms in Cognition, Informatics and Logic, 89-105. doi:10.1016/j.jalgor.2009.02.007
Peer reviewed

Jonker, H., & Mauw, S. (2009). Discovering the core security requirements of DRM systems by means of objective trees. In Handbook of Research on Secure Multimedia Distribution (pp. 71-85). IGI Global. doi:10.4018/978-1-60566-262-6.ch005
Peer reviewed

Jonker, H., Mauw, S., & Pang, J. (2009). Measuring voter-controlled privacy. In Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (pp. 289-298). IEEE Computer Society. doi:10.1109/ARES.2009.81
Peer reviewed

Torabi Dashti, M., Krishnan Nair, S., & Jonker, H. (2008). Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme. Fundamenta Informaticae, 89 (4), 393-417.
Peer Reviewed verified by ORBi

Dashti, M. T., Nair, S. K., & Jonker, H. (2007). Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme. In Proc. First International Symposium on Fundamentals of Software Engineering (FSEN'07) (pp. 33-48). Springer. doi:10.1007/978-3-540-75698-9_3
Peer reviewed

Jonker, H., & Volkamer, M. (2007). Compliance of RIES to the proposed e-Voting protection profile. In Proc. First Conference on E-Voting and Identity (VOTE-ID’07) (pp. 50-61). Berlin, Germany: Springer. doi:10.1007/978-3-540-77493-8_5
Peer reviewed

Contact ORBilu