Data-Centric Systems and Applications MJ Carey, S Ceri, P Bernstein, U Dayal, C Faloutsos, JC Freytag, ... Italy: Springer, 2006 | 2106 | 2006 |
A survey of provably secure searchable encryption C Bösch, P Hartel, W Jonker, A Peter ACM Computing Surveys (CSUR) 47 (2), 1-51, 2014 | 424 | 2014 |
Mediated ciphertext-policy attribute-based encryption and its application L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker Information Security Applications: 10th International Workshop, WISA 2009 …, 2009 | 339 | 2009 |
Computationally efficient searchable symmetric encryption P Van Liesdonk, S Sedghi, J Doumen, P Hartel, W Jonker Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17 …, 2010 | 315 | 2010 |
Efficient and provable secure ciphertext-policy attribute-based encryption schemes L Ibraimi, Q Tang, P Hartel, W Jonker Information Security Practice and Experience: 5th International Conference …, 2009 | 184 | 2009 |
Towards context-aware data management for ambient intelligence L Feng, PMG Apers, W Jonker Database and Expert Systems Applications: 15th International Conference …, 2004 | 126 | 2004 |
Certificate based authorized domains W Jonker, R Koster, P Lenoir, D Schmalz US Patent App. 10/528,492, 2006 | 118 | 2006 |
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker IEEE Trans. Image process, 2009 | 116 | 2009 |
Content-based video retrieval by integrating spatio-temporal and stochastic recognition of events M Petkovic, W Jonker Proceedings IEEE Workshop on Detection and Recognition of Events in Video, 75-82, 2001 | 109 | 2001 |
Digital rights management in consumer electronics products W Jonker, JP Linnartz IEEE Signal Processing Magazine 21 (2), 82-91, 2004 | 99 | 2004 |
Multi-modal extraction of highlights from TV formula 1 programs M Petkovic, V Mihajlovic, W Jonker, S Djordjevic-Kajan Proceedings. IEEE International Conference on Multimedia and Expo 1, 817-820, 2002 | 99 | 2002 |
Conjunctive wildcard search over encrypted data C Bösch, R Brinkman, P Hartel, W Jonker Secure Data Management: 8th VLDB Workshop, SDM 2011, Seattle, WA, USA …, 2011 | 97 | 2011 |
Searching keywords with wildcards on encrypted data S Sedghi, P Van Liesdonk, S Nikova, P Hartel, W Jonker Security and Cryptography for Networks: 7th International Conference, SCN …, 2010 | 91 | 2010 |
Recognizing Strokes in Tennis Videos using Hidden Markov Models. M Petkovic, W Jonker, Z Zivkovic VIIP, 512-516, 2001 | 84 | 2001 |
Privacy in an Identity-based DRM System C Conrado, F Kamperman, GJ Schrijen, W Jonker 14th International Workshop on Database and Expert Systems Applications …, 2003 | 79 | 2003 |
Using secret sharing for searching in encrypted data R Brinkman, J Doumen, W Jonker Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada …, 2004 | 78 | 2004 |
Security, privacy, and trust in modern data management M Petkovic, W Jonker Springer Science & Business Media, 2007 | 75* | 2007 |
LicenseScript: A novel digital rights language and its semantics CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003 | 75 | 2003 |
Public-key encryption with delegated search L Ibraimi, S Nikova, P Hartel, W Jonker International Conference on Applied Cryptography and Network Security, 532-549, 2011 | 72 | 2011 |
CONTENT-BASED VIDEO RETRIEVAL: A DatabllSe Perspective M Petkovic, W Jonker Databases 11 (1), 81-93, 1999 | 72* | 1999 |