2008 |
17 | EE | Wiebren de Jonge,
Bart Jacobs:
Privacy-Friendly Electronic Traffic Pricing via Commits.
Formal Aspects in Security and Trust 2008: 143-161 |
1996 |
16 | | Robert Grimm,
Wilson C. Hsieh,
Wiebren de Jonge,
M. Frans Kaashoek:
Atomic Recovery Units: Failure Atomicity for Logical Disks.
ICDCS 1996: 26-37 |
1995 |
15 | | Roel Wieringa,
Wiebren de Jonge,
Paul Spruit:
Using Dynamic Classes and Role Classes to Model Object Migration.
TAPOS 1(1): 61-83 (1995) |
14 | | Roel Wieringa,
Wiebren de Jonge:
Object Identifiers, Keys, and Surrogates: Object Identifiers Revisited.
TAPOS 1(2): 101-114 (1995) |
1994 |
13 | EE | Roel Wieringa,
Wiebren de Jonge,
Paul Spruit:
Roles and Dynamic Subclasses: A Modal Logic Approach.
ECOOP 1994: 32-59 |
1993 |
12 | | Wiebren de Jonge,
M. Frans Kaashoek,
Wilson C. Hsieh:
The Logical Disk: A New Approach to Improving File Systems.
SOSP 1993: 15-28 |
1991 |
11 | EE | Wiebren de Jonge,
Peter Scheuermann,
Ardie Schijf:
Encoding and Manipulating Pictorial Data with S+-trees.
SSD 1991: 401-419 |
1990 |
10 | | Wiebren de Jonge,
Ardie Schijf:
Concurrent Access to B-Trees.
PARBASE 1990: 312-320 |
9 | | Wiebren de Jonge,
Ardie Schijf:
Concurrent Access to B-Trees.
PARBASE / Databases 1990: 37-54 |
1987 |
8 | | Wiebren de Jonge,
Andrew S. Tanenbaum,
Reind P. van de Riet:
Two Access Methods Using Compact Binary Trees.
IEEE Trans. Software Eng. 13(7): 799-810 (1987) |
1986 |
7 | EE | Wiebren de Jonge,
David Chaum:
Some Variations on RSA Signatures and Their Security.
CRYPTO 1986: 49-59 |
1985 |
6 | EE | Wiebren de Jonge,
David Chaum:
Attacks on Some RSA Signatures.
CRYPTO 1985: 18-27 |
1983 |
5 | EE | George L. Sicherman,
Wiebren de Jonge,
Reind P. van de Riet:
Answering Queries Without Revealing Secrets.
ACM Trans. Database Syst. 8(1): 41-59 (1983) |
4 | EE | Wiebren de Jonge:
Compromising Statistical Databases Responding to Queries about Means.
ACM Trans. Database Syst. 8(1): 60-80 (1983) |
3 | | Reind P. van de Riet,
Martin L. Kersten,
Wiebren de Jonge,
Anthony I. Wasserman:
Privacy and security in information systems using programming language features.
Inf. Syst. 8(2): 95-103 (1983) |
1981 |
2 | | Martin L. Kersten,
Reind P. van de Riet,
Wiebren de Jonge:
Privacy and Security in Distributed Database Systems.
DDSS 1981: 229-241 |
1 | EE | Reind P. van de Riet,
Anthony I. Wasserman,
Martin L. Kersten,
Wiebren de Jonge:
High-Level Programming Features for Improving the Efficiency of a Relational Database System.
ACM Trans. Database Syst. 6(3): 464-485 (1981) |