1. 2007
  2. Anonymous fingerprinting with robust QIM watermarking techniques

    Prins, J., Erkin, Z. & Lagendijk, RL., 2007, In : Eurasip Journal on Information Security. 2007, p. 1-13 13 p.

    Research output: Contribution to journalArticleScientificpeer-review

  3. On processing encrypted data

    Erkin, Z. & Lagendijk, RL., 2007, Proceedings of the thirteenth annual conference of the Advanced School for Computing and Imaging. Jansen, F. W., Pierre, G. E. O., Veenman, C. J. & Heijnsdijk, J. W. J. (eds.). Delft: ASCI, p. 322-329 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  4. Robust anonymus fingerprinting

    Prins, J., Erkin, Z. & Lagendijk, RL., 2007, Proceedings of the 28th symposium on information theory in the Benelux. veldhuis, R. & Cronie, H. (eds.). Enschede: Werkgemeenschap Informatie- en Communicatietheorie (WIC), p. 59-66 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  5. 2009
  6. Privacy-preserving face recognition

    Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, RL. & Toft, T., 2009, In : Lecture Notes in Computer Science. 5672/2009, p. 235-255 21 p.

    Research output: Contribution to journalArticleScientificpeer-review

  7. Privacy-preserving user clustering in a social network

    Erkin, Z., Veugen, PJM., Toft, T. & Lagendijk, RL., 2009, Proceedings of the IEEE International Workshop on Information Forensics and Security,. SN (ed.). NY, USA: IEEE Society, p. 96-100 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  8. 2010
  9. Efficiently computing private recommendations

    Erkin, Z., Beye, MRT. & Veugen, PJM., 2010, Proceedings of ASCI 2010. S.N. (ed.). Delft, The Netherlands: Advanced School for Computing and Imaging, p. 1-8 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  10. Privacy enhanced recommender system

    Erkin, Z., Beye, M., Veugen, PJM. & Lagendijk, RL., 2010, Proceedings of the thirty-first symposium on Information Theory in the Benelux. J. Gosseling, JH. W. (ed.). Delft: Werkgemeenschap voor Informatie- en Communicatietheorie, p. 35-43 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  11. Secure signal processing: Privacy preserving cryptographic protocols for multimedia

    Erkin, Z., 2010, Delft: TU Delft Mediamatica. 158 p.

    Research output: ThesisDissertation (TU Delft)

  12. 2011
  13. Efficient privacy preserving K-means clustering in a three-party setting

    Beye, MJT., Erkin, Z. & Lagendijk, RL., 2011, Porceedings of the IEEE Workshop on Information Forensics and Security (WIFS'11). SN (ed.). New York, NY, USA: IEEE Society, p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  14. Efficiently computing private recommendations

    Erkin, Z., Beye, MRT., Veugen, PJM. & Lagendijk, RL., 2011, International Conference on Acoustics, Speech and Signal Processing (ICASSP 2011). Tichavsky, P. & Chambers, JA. (eds.). Piscataway, NJ, USA: IEEE Society, p. 5864-5867 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Previous 1 2 3 4 5 6 7 8 Next

ID: 143065