Research Output per year
Fingerprint Dive into the research topics where Hugo Jonker is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
Network
Recent external collaboration on country level. Dive into details by clicking on the dots.
Research Output 2017 2018
Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications
Ferreira Torres, C. & Jonker, H. L., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). 1 ed. Springer, Vol. 11099. p. 60-80 21 p. (Lecture Notes in Computer Science book series).Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
Analysing Privacy Analyses
Bella, G., Butin, D. & Jonker, H., 2017, Proceedings of the 1st Italian Conference on Cybersecurity: ITASEC17. Armando, A., Baldoni, R. & Focardi, R. (eds.). Aachen: CEUR-WS.org, p. 19-28 10 p. (CEUR Workshop Proceedings; vol. 1816).Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceeding › Academic › peer-review
A Security Perspective on Publication Metrics
Jonker, H. & Mauw, S., 2017, Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers. Stajano, F., Anderson, J., Christianson, B. & Matyáš, V. (eds.). Cham: Springer International Publishing AG, p. 186-200 15 p. (Lecture Notes in Computer Science; no. 10476)(Security and Cryptology; vol. 10476).Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceeding › Academic › peer-review
A Security Perspective on Publication Metrics (Transcript of Discussion)
Jonker, H., 2017, Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers. Stajano, F., Anderson, J., Christianson, B. & Matyáš, V. (eds.). Cham: Springer International Publishing AG, p. 201-213 14 p. (Lecture Notes in Computer Science; vol. 10476)(Security and Cryptology; vol. 10476).Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceeding › Academic › peer-review
Formal modelling and analysis of receipt-free auction protocols in applied pi
Dong, N., Jonker, H. & Pang, J., Mar 2017, In : Computers & Security. 65, p. 405-432 28 p.Research output: Contribution to journal › Article › Academic › peer-review
Activities 2019 2019
AVG en UPLOADFILTERS: goed bestuur of censuur?
Hugo Jonker (Speaker)Activity: Talk or presentation types › Invited talk › Academic
Shepherd - an automatic and large-scale study of website login security
Hugo Jonker (Speaker)Activity: Talk or presentation types › Invited talk › Academic
Tijd voor digitale veiligheid
Hugo Jonker (Organiser)Activity: Participating in or organising an event types › Participating in OR organising an event › Academic
Press / Media
How come there's no digital voting in the Netherlands?,
15/03/17
1 Media contribution
Press/Media › Popular
Fear of Russian Hacking pushes Netherlands to paper election ballots
15/03/17
1 Media contribution
Press/Media › Popular