Author Publications

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Jump to: 2011 | 2009 | 2008 | 2007 | 2005 | 2004 | 2003 | 2002 | 2000
Number of items: 18.

2011

Bösch, Christoph and Brinkman, Richard and Hartel, Pieter and Jonker, Willem (2011) Conjunctive Wildcard Search over Encrypted Data. In: 8th VLDB Workshop on Secure Data Management, SDM 2011, 2 September 2011, Seattle, WA, USA (pp. pp. 114-127).

2009

Jonker, Willem and Brinkman, Richard and Maubach, Stefan (2009) Secure storage system and method for secure storing. Patent.

2008

Chmielewski, Lukasz and Brinkman, Richard and Hoepman, Jaap-Henk and Bos, Bert (2008) Using JASON to secure SOA. In: 1st International Workshop on Middleware Security, MIDSEC, 2 Dec 2008, Leuven, Belgium (pp. pp. 13-18).

2007

Brinkman, R. (2007) Different search strategies on encrypted data compared. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications, XVIII . Springer Verlag, Berlin, pp. 183-196. ISBN 9783540698609

Brinkman, Richard (2007) Searching in encrypted data. thesis.

Jonker, Willem and Brinkman, Richard and Maubach, Stefan (2007) Secure storage system and method for secure storing. Patent.

2005

Brinkman, R. and Schoenmakers, B. and Doumen, J. and Jonker, W. (2005) Experiments with Queries over Encrypted Data Using Secret Sharing. [Report]

Brinkman, R. and Schoenmakers, B. and Doumen, J.M. and Jonker, W. (2005) Experiments With Queries Over Encrypted Data Using Secret Sharing. In: VLDB Workshop on Secure Data Management (SDM), Trondheim, Norway (pp. pp. 33-46).

Jonker, Willem and Brinkman, Richard and Doumen, Jeroen M. and Schoenmakers, Berry (2005) Method of and device for querying of protected structured data. Patent.

2004

Brinkman, R. and Doumen, J.M. and Jonker, W. (2004) Using secret sharing for searching in encrypted data. In: VLDB 2004 Workshop on Secure data management, SDM 2004, Toronto, Canada (pp. pp. 18-27).

Brinkman, R. and Feng, L. and Doumen, J. and Hartel, P.H. and Jonker, W. (2004) Efficient tree search in encrypted data. [Report]

Brinkman, R. and Feng, L. and Doumen, J. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Information systems security, 13 (3). pp. 14-21. ISSN 1065-898X

Brinkman, R. and Feng, L. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. In: Proceedings of the 2nd International Workshop on Security In Information Systems (WOSIS), 13-14 Apr 2004, Porto, Portugal (pp. pp. 126-135).

Brinkman, Richard and Doumen, Jeroen and Jonker, Willem (2004) Using secret sharing for searching in encrypted data. [Report]

Doumen, J.M. and Brinkman, R. and Jonker, W. (2004) Searching in Encrypted Data. In: Finite Fields: Theory and Applications, 5-11 Dec 2004, Oberwolfach, Germany (pp. p. 2951).

2003

Brinkman, Richard and Feng, Ling and Etalle, Sandro and Hartel, Pieter and Jonker, Willem (2003) Experimenting with linear search in encrypted data. [Report]

2002

Brinkman, Richard and Hoepman, Jaap-Henk (2002) Secure Method Invocation in JASON. In: Fifth Smart Card Research and Advanced Applications Conference, CARDIS 2002, November 21-22, 2002, San Jose, CA (pp. pp. 180-193).

2000

Rein, H. van and Brinkman, R. (2000) Home-grown CASE tools with XML and XSLT. In: International Workshop on Model Engineering, IWME 2000, Sophia Antipolis, France (pp. pp. 105-112).

This list was generated on Mon Dec 22 05:25:41 2014 CET.