Willem Jonker
Willem Jonker
Professor Database Technology, University of Twente, the Netherlands
Verified email at
Cited by
Cited by
Data-Centric Systems and Applications
MJ Carey, S Ceri, P Bernstein, U Dayal, C Faloutsos, JC Freytag, ...
Italy: Springer, 2006
A survey of provably secure searchable encryption
C Bösch, P Hartel, W Jonker, A Peter
ACM Computing Surveys (CSUR) 47 (2), 1-51, 2014
Mediated ciphertext-policy attribute-based encryption and its application
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
International Workshop on Information Security Applications, 309-323, 2009
Computationally efficient searchable symmetric encryption
PV Liesdonk, S Sedghi, J Doumen, P Hartel, W Jonker
Workshop on Secure Data Management, 87-100, 2010
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
L Ibraimi, Q Tang, P Hartel, W Jonker
International conference on information security practice and experience, 1-12, 2009
Certificate based authorized domains
W Jonker, R Koster, P Lenoir, D Schmalz
US Patent App. 10/528,492, 2006
Towards context-aware data management for ambient intelligence
L Feng, PMG Apers, W Jonker
International conference on database and expert systems applications, 422-431, 2004
Content-based video retrieval by integrating spatio-temporal and stochastic recognition of events
M Petkovic, W Jonker
Proceedings IEEE Workshop on Detection and Recognition of Events in Video, 75-82, 2001
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
IEEE Trans. Image process, 2009
Digital rights management in consumer electronics products
W Jonker, JP Linnartz
IEEE Signal Processing Magazine 21 (2), 82-91, 2004
Multi-modal extraction of highlights from TV formula 1 programs
M Petkovic, V Mihajlovic, W Jonker, S Djordjevic-Kajan
Proceedings. IEEE International Conference on Multimedia and Expo 1, 817-820, 2002
Conjunctive wildcard search over encrypted data
C Bösch, R Brinkman, P Hartel, W Jonker
Workshop on Secure Data Management, 114-127, 2011
Recognizing Strokes in Tennis Videos using Hidden Markov Models.
M Petkovic, W Jonker, Z Zivkovic
VIIP, 512-516, 2001
Searching keywords with wildcards on encrypted data
S Sedghi, P Liesdonk, S Nikova, P Hartel, W Jonker
International Conference on Security and Cryptography for Networks, 138-153, 2010
LicenseScript: A novel digital rights language and its semantics
CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law
Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003
Using secret sharing for searching in encrypted data
R Brinkman, J Doumen, W Jonker
Workshop on Secure Data Management, 18-27, 2004
Privacy in an Identity-based DRM System
C Conrado, F Kamperman, GJ Schrijen, W Jonker
14th International Workshop on Database and Expert Systems Applications …, 2003
Security, privacy, and trust in modern data management
M Petkovic, W Jonker
Springer Science & Business Media, 2007
Public-key encryption with delegated search
L Ibraimi, S Nikova, P Hartel, W Jonker
International Conference on Applied Cryptography and Network Security, 532-549, 2011
Customized atomicity specification for transactional workflows
W Derks, J Dehnert, P Grefen, W Jonker
Proceedings of the Third International Symposium on Cooperative Database …, 2001
The system can't perform the operation now. Try again later.
Articles 1–20