1. 2019
  2. Badass: Preserving privacy in behavioural advertising with applied secret sharing

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2019, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 10, 1, p. 23-41 19 p.

    Research output: Contribution to journalArticleScientificpeer-review

  3. Private Data Aggregation in Decentralized Networks

    Setia, P. K., Tillem, G. & Erkin, Z., 2019, 2019 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG). Cetin, A. (ed.). IEEE, p. 76-80 5 p. 8782377

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  4. Solving bin-packing problems under privacy preservation: Possibilities and trade-offs

    Hoogervorst, R., Zhang, Y., Tillem, G., Erkin, Z. & Verwer, S., 2019, In : Information Sciences. 500, p. 203-216 14 p.

    Research output: Contribution to journalArticleScientificpeer-review

  5. 2018
  6. AHEad: Privacy-preserving Online Behavioural Advertising using Homomorphic Encryption

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2018, 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017. Piscataway, NJ: IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  7. BAdASS: Preserving privacy in behavioural advertising with applied secret sharing

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2018, Provable Security: 12th International Conference, ProvSec 2018 - Proceedings. Baek, J., Susilo, W. & Kim, J. (eds.). Cham: Springer, p. 397-405 9 p. (Lecture Notes in Computer Science; vol. 11192).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  8. Mining Sequential Patterns from Outsourced Data via Encryption Switching

    Tillem, G., Erkin, Z. & Lagendijk, R. L., 2018, 16th Annual Conference on Privacy, Security and Trust, PST 2018. Piscataway, NJ: IEEE, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  9. 2017
  10. Mining encrypted software logs using alpha algorithm

    Tillem, G., Erkin, Z. & Lagendijk, I., 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Obaidat, M. S., Samarati, P. & Cabello, E. (eds.). SciTePress, Vol. 4. p. 267-274 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  11. Privacy concerns and protection measures in online behavioural advertising

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 89-96 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  12. 2016
  13. Privacy-Preserving Alpha Algorithm for Software Analysis

    Tillem, G., Erkin, Z. & Lagendijk, I., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 136-143 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

ID: 144598