Data-Centric Systems and Applications MJ Carey, S Ceri, P Bernstein, U Dayal, C Faloutsos, JC Freytag, ... Italy: Springer, 2006 | 1905 | 2006 |
A survey of provably secure searchable encryption C Bösch, P Hartel, W Jonker, A Peter ACM Computing Surveys (CSUR) 47 (2), 1-51, 2014 | 343 | 2014 |
Mediated ciphertext-policy attribute-based encryption and its application L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker International Workshop on Information Security Applications, 309-323, 2009 | 311 | 2009 |
Computationally efficient searchable symmetric encryption PV Liesdonk, S Sedghi, J Doumen, P Hartel, W Jonker Workshop on Secure Data Management, 87-100, 2010 | 273 | 2010 |
Efficient and provable secure ciphertext-policy attribute-based encryption schemes L Ibraimi, Q Tang, P Hartel, W Jonker International conference on information security practice and experience, 1-12, 2009 | 168 | 2009 |
Certificate based authorized domains W Jonker, R Koster, P Lenoir, D Schmalz US Patent App. 10/528,492, 2006 | 114 | 2006 |
Towards context-aware data management for ambient intelligence L Feng, PMG Apers, W Jonker International conference on database and expert systems applications, 422-431, 2004 | 114 | 2004 |
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker IEEE Trans. Image process, 2009 | 104 | 2009 |
Content-based video retrieval by integrating spatio-temporal and stochastic recognition of events M Petkovic, W Jonker Proceedings IEEE Workshop on Detection and Recognition of Events in Video, 75-82, 2001 | 103 | 2001 |
Digital rights management in consumer electronics products W Jonker, JP Linnartz IEEE Signal Processing Magazine 21 (2), 82-91, 2004 | 96 | 2004 |
Multi-modal extraction of highlights from TV formula 1 programs M Petkovic, V Mihajlovic, W Jonker, S Djordjevic-Kajan Proceedings. IEEE International Conference on Multimedia and Expo 1, 817-820, 2002 | 92 | 2002 |
Conjunctive wildcard search over encrypted data C Bösch, R Brinkman, P Hartel, W Jonker Workshop on Secure Data Management, 114-127, 2011 | 81 | 2011 |
Recognizing Strokes in Tennis Videos using Hidden Markov Models. M Petkovic, W Jonker, Z Zivkovic VIIP, 512-516, 2001 | 79 | 2001 |
Searching keywords with wildcards on encrypted data S Sedghi, P Liesdonk, S Nikova, P Hartel, W Jonker International Conference on Security and Cryptography for Networks, 138-153, 2010 | 78 | 2010 |
LicenseScript: A novel digital rights language and its semantics CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003 | 74 | 2003 |
Privacy in an Identity-based DRM System C Conrado, F Kamperman, GJ Schrijen, W Jonker 14th International Workshop on Database and Expert Systems Applications …, 2003 | 72 | 2003 |
Using secret sharing for searching in encrypted data R Brinkman, J Doumen, W Jonker Workshop on Secure Data Management, 18-27, 2004 | 71 | 2004 |
Security, privacy, and trust in modern data management M Petkovic, W Jonker Springer Science & Business Media, 2007 | 70* | 2007 |
CONTENT-BASED VIDEO RETRIEVAL: A DatabllSe Perspective M Petkovic, W Jonker Databases 11 (1), 81-93, 1999 | 69 | 1999 |
Public-key encryption with delegated search L Ibraimi, S Nikova, P Hartel, W Jonker International Conference on Applied Cryptography and Network Security, 532-549, 2011 | 67 | 2011 |