Publications

photo

contact info

Dr. Ir. Hugo Jonker
Open Universiteit
Valkenburgerweg 177
6419 AT Heerlen
Netherlands
 
phone: +31 (0)45 576 2143
email: hugo.jonker@ou.nl
www: http://www.open.ou.nl/hjo
twitter: @hugojonker

Peer-reviewed publications

Generated using php-bibHTML by Hugo Jonker, based on the BiblioPhile PHP BibTex parser.

See also DBLP and Google Scholar. Note that these automated lists vary in completeness and soundness.

Journal Articles

  1. A Contemporary Investigation of NTFS File Fragmentation. V. van der Meer, H. Jonker and J. van den Bos. Digital Investigation, 2020. To appear.
    Links: bib, preprint.
  2. Formal Modelling and Analysis of Receipt-free Auction Protocols in Applied Pi. N. Dong, H. Jonker and J. Pang. Computers & Security, 65:405-432, 2017.
    Links: bib, preprint, DOI.
  3. Privacy and verifiability in voting systems: Methods, developments and trends. H.L. Jonker, S. Mauw and J. Pang. Computer Science Review, 10:1-30, 2013.
    Links: bib, preprint, from publisher.
  4. A formal framework for quantifying voter-controlled privacy. H. Jonker, S. Mauw and J. Pang. Journal of Algorithms in Cognition, Informatics and Logic, 64(2-3):89–105, 2009.
    Links: bib, preprint, from publisher.
  5. Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme. M. Torabi Dashti, S. Krishnan Nair and H. Jonker. Fundamenta Informaticae, 89(4):393–417, 2008.
    Links: bib, preprint, from publisher.

Conference Proceedings

  1. ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. C. Ferreira Torres, M. Baden, R. Norvill, B. Fiz Pontiveros, H. Jonker and S. Mauw. In Proc. 15th ACM Asia Conference on Computer and Communications Security (AsiaCCS’20). ACM, 2020. To appear.
    Links: bib, preprint.
  2. Shepherd: a generic approach to automating website login. H. Jonker, S. Karsch, B. Krumnow and M. Sleegers. In Proc. 2nd Workshop on Measurements, Attacks and Defenses for the Web (MADWEB’20). IEEE, pp. 1–10, 2020.
    Links: bib, preprint, DOI.
  3. ÆGIS: Smart Shielding of Smart Contracts (Extended Abstract). C. Ferreira Torres, M. Baden, R. Norvill and H. Jonker. In Proc. 26th ACM SIGSAC Conference on Computer and Communications Security (CCS’19). ACM, pp. 2589–2591, 2019.
    Links: bib, preprint, DOI.
  4. File Fragmentation in the Wild: a Privacy-Friendly Approach. V. van der Meer, H. Jonker, G. Dols, H. van Beek, J. van den Bos and M. van Eekelen. In Proc. 11th IEEE International Workshop on Information Forensics and Security (WIFS’19). IEEE, 2019. To appear.
    Links: bib, preprint.
  5. Fingerprint surface-based detection of web bot detectors. H. Jonker, B. Krumnow and G. Vlot. In Proc. 24th European Symposium on Research in Computer Security Part II (ESORICS’19). Springer, LNCS 11736, pp. 586–605, 2019.
    Links: bib, preprint, DOI.
  6. Investigating Fingerprinters and Fingerprinting-alike Behaviour of Android Applications. C. Ferreira Torres and H. Jonker. In Proc. 23rd European Symposium on Research in Computer Security (ESORICS’18). Springer, LNCS 11023, pp. 60-80, 2018.
    Links: bib, preprint, DOI.
  7. Reverse Bayesian poisoning: how to use spam filters to manipulate online elections. H. Jonker, S. Mauw and T. Schmitz. In Proc. 2nd International Conference on Electronic Voting (E-Vote-ID’17). Springer, LNCS 10615, pp. 183–197, 2017.
    Links: bib, preprint, DOI.
  8. A Much-needed Security Perspective on Publication Metrics. H. Jonker and S. Mauw. In Proc. 25th Security Protocols Workshop (SPW’17). Springer, LNCS 10476, pp. 186-200, 2017.
    Links: bib, preprint, DOI.
  9. A Much-needed Security Perspective on Publication Metrics (Transcript of Discussion). H. Jonker. In Proc. 25th Security Protocols Workshop (SPW’17). Springer, LNCS 10476, pp. 201-213, 2017.
    Links: bib, DOI.
  10. Analysing Privacy Analyses. G. Bella, D. Butin and H. Jonker. In Proc. 1st Italian Conference on Cybersecurity (ITA-SEC’17). CEUR, CEUR Workshop Proceedings 1816, pp. 19–28, 2017.
    Links: bib, preprint, from publisher.
  11. Man-in-the-middle attacks evolved... but our security models didn’t. H. Jonker, S. Mauw and R. Trujillo-Rasua. In Proc. 24th Security Protocols Workshop (SPW’16). Springer, LNCS 10368, pp. 19–25, 2016.
    Links: bib, preprint, from publisher.
  12. Man-in-the-middle attacks evolved... but our security models didn’t (Transcript of Discussion). H. Jonker. In Proc. 24th Security Protocols Workshop (SPW’16). Springer, LNCS 10368, pp. 26–34, 2016.
    Links: bib, preprint, from publisher.
  13. FP-Block: usable web privacy by controlling browser fingerprinting. C. Torres Ferreira, H.L. Jonker and S. Mauw. In Proc. 20th European Symposium on Research in Computer Security, part II (ESORICS’15). Springer, LNCS 9327, pp. 3-19, 2015.
    Links: bib, preprint, from publisher, DOI.
  14. Location-private interstellar communication. H.L. Jonker, S. Mauw and S. Radomirović. In Proc. 23rd Security Protocols Workshop (SPW’15). Springer, LNCS 9379, pp. 105–115, 2015.
    Links: bib, preprint, from publisher, DOI.
  15. Secure Auctions Without Cryptography. J. Dreier, H.L. Jonker and P. Lafourcade. In Proc. 7th conference on Fun with Algorithms (FUN’14). Springer, LNCS 8496, pp. 158-170, 2014.
    Links: bib, preprint, DOI.
  16. Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. N. Dong, H.L. Jonker and J. Pang. In Proc. 18th European Symposium on Research in Computer Security (ESORICS’13). Springer-Verlag, LNCS 8134, pp. 499-516, 2013.
    Links: bib, preprint, from publisher.
  17. Modeling the German Legal Latitude Principles for Internet Voting Systems. S. Neumann, A. Kahlert, M. Henning, H. Jonker and M. Volkamer. In Proc. 5th conference on eParticipation (ePart’13). Springer-Verlag, LNCS 8075, pp. 49-56, 2013.
    Links: bib, preprint, from publisher.
  18. Defining Verifiability in e-Auction Protocols. J. Dreier, H.L. Jonker and P. Lafourcade. In Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS’13). ACM, pp. 547-552, 2013.
    Links: bib, preprint, from publisher.
  19. Verifiability in e-Auction protocols & Brandt’s protocol revisited. J. Dreier, J.-G. Dumas, H.L. Jonker and P. Lafourcade. In 1st Workshop on Hot Issues in Security Principles and Trust (HOTSPOT’13). 2013.
    Links: bib, preprint, from publisher.
  20. Unterstützung der juristisch-informatischen Kommunikation im Hinblick auf elektronische Wahlprotokolle. S. Neumann, A. Kahlert, M. Henning, H. Jonker and M. Volkamer. In Proc. 16. Internationales Rechtsinformatik Symposion (IRIS’13). Oesterreichische Computer Gesellschaft, 2013.
    Links: bib, preprint, from publisher.
  21. Formal analysis of privacy in an eHealth protocol. N. Dong, H.L. Jonker and J. Pang. In Proc. 17th European Symposium on Research in Computer Security (ESORICS’12). Springer-Verlag, LNCS 7459, pp. 325-342, 2012.
    Links: bib, preprint, from publisher.
  22. Random Block Verification: Improving the Norwegian Electoral Mix Net. D. Demirel, H. Jonker and M. Volkamer. In Proc. 5th International Conference on Electronic Voting (EVOTE’12). Gesellschaft für Informatik, Lecture Notes in Informatics 205, pp. 65–78, 2012. Best paper award.
    Links: bib, preprint, from publisher.
  23. Challenges in eHealth: from enabling to enforcing privacy. N. Dong, H.L. Jonker and J. Pang. In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (FHIES’11). Springer-Verlag, LNCS 7151, pp. 195–206, 2012.
    Links: bib, preprint, from publisher.
  24. Bulletin boards in voting systems: Modelling and measuring privacy. H. Jonker and J. Pang. In Proc. 6th International Conference on Availability, Reliability and Security (ARES’11). IEEE Computer Society, pp. 294–300, 2011.
    Links: bib, preprint, from publisher.
  25. Analysis of a receipt-free auction protocol in the applied pi calculus. N. Dong, H.L. Jonker and J. Pang. In Proc. 7th Workshop on Formal Aspects in Security and Trust (FAST’10). Springer-Verlag, LNCS 6561, pp. 223–238, 2011.
    Links: bib, preprint, from publisher.
  26. Anonymity and Verifiability in Voting: Understanding (Un)Linkability. L. Langer, H. Jonker and W. Pieters. In Proc. 12th Conference on Information and Communications Security (ICICS’10). Springer-Verlag, LNCS 6476, pp. 296–310, 2010.
    Links: bib, preprint, from publisher.
  27. Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface. Z. Xia, C. Culnane, J. Heather, H. Jonker, P. Ryan, S. Schneider and S. Srinivasan. In Proc. 11th International Conference on Cryptology in India (IndoCrypt’10). Springer-Verlag, LNCS 6498, pp. 98–114, 2010.
    Links: bib, preprint, from publisher.
  28. Anonymity in Voting Revisited. H. Jonker and W. Pieters. In Towards Trustworthy Elections. Springer-Verlag, LNCS 6000, pp. 216–230, 2010.
    Links: bib, preprint, from publisher.
  29. Measuring voter-controlled privacy. H.L. Jonker, S. Mauw and J. Pang. In Proc. 4th International Conference on Availability, Reliability and Security (ARES’09). IEEE Computer Society, pp. 289–298, 2009.
    Links: bib, preprint, from publisher.
  30. Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme. M. Torabi Dashti, S. Krishnan Nair and H.L. Jonker. In Proc. First International Symposium on Fundamentals of Software Engineering (FSEN’07). Springer-Verlag, LNCS 4767, pp. 33-48, 2007.
    Links: bib, preprint, from publisher.
  31. Compliance of RIES to the proposed e-Voting protection profile. H.L. Jonker and M. Volkamer. In Proc. First Conference on E-Voting and Identity (VOTE-ID’07). Springer-Verlag, LNCS 4896, pp. 50–61, 2007. Bochum, Germany.
    Links: bib, preprint, from publisher.
  32. Formalising Receipt-Freeness. H.L. Jonker and E.P. de Vink. In Proc. 9th Conference on Information Security (ISC’06). Springer-Verlag, LNCS 4176, pp. 476–488, 2006. Samos Island, Greece.
    Links: bib, preprint, from publisher.
  33. Security Aspects of DRM Systems. H.L. Jonker, S. Mauw, J.H.S. Verschuren and A.T.S.C. Schoonen. In 25th Symposium on Information Theory in the BeNeLux. Werkgemeenschap voor Informatie- en Communicatietheorie, pp. 169–176, 2004.
    Links: bib, preprint.

Book Chapters

  1. Location-Based Services: Privacy, Security and Assurance. H.L. Jonker, S. Mauw and J. Pang. In Digital Enlightenment Yearbook 2012, IOS Press, pp. 235–244, 2012.
    Links: bib, preprint, from publisher.
  2. Discovering the core security requirements of DRM systems by means of objective trees. H.L. Jonker and S. Mauw. In Handbook of Research on Secure Multimedia Distribution, IGI Global, pp. 71–85, 2009.
    Links: bib, preprint, from publisher.
  3. Core security requirements of DRM systems. H.L. Jonker and S. Mauw. In Digital Rights Management – An Introduction, ICFAI University Press, pp. 73–90, 2007.
    Links: bib, preprint.

Technical Reports

  1. Investigating the effectiveness of web adblockers. C. Drazner, N. Duza, H. Jonker and D.S. Wallach. Technical report 1912.06176, ArXiv, 2019.
    Links: bib, link.
  2. Formal Analysis of an E-Health Protocol. N. Dong, H. Jonker and J. Pang. Technical report 1808.08403, arXiv, 2018.
    Links: bib, link.
  3. Shepherd: Enabling Automatic and Large-Scale Login Security Studies. H. Jonker, J. Kalkman, B. Krumnow, M. Sleegers and A. Verresen. Technical report 1808.00840, ArXiv, 2018.
    Links: bib, link.
  4. Verkenning Risicobeperking internetstemmen voor stemmers buiten Nederland. H. Jonker. Technical report U2017/02168/HJO, Open University of the Netherlands, 2017.
    Links: bib, link.

Peer-reviewed w/o official proceedings

Theses

Tech reports