1. 2016
  2. Privacy-Preserving Alpha Algorithm for Software Analysis

    Tillem, G., Erkin, Z. & Lagendijk, I., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 136-143 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  3. Secure Key-Exchange Protocol for Implants Using Heartbeats

    Seepers, R., Weber, J., Erkin, Z., Sourdis, Y. & Strydis, C., 2016, Proceedings of the ACM International Conference on Computing Frontiers, CF '16. New York: Association for Computing Machinery (ACM), p. 119-126 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  4. Secure Matching of Dutch Car License Plates

    Bindu Sunil, A., Erkin, Z. & Veugen, T., 2016, 24th European Signal Processing Conference, EUSIPCO 2016. Piscataway: IEEE, p. 2116-2120 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  5. 2015
  6. A signature scheme for a dynamic coalition defence environment without trusted third parties

    van der Lubbe, JCA., de Boer, MJ. & Erkin, Z., 2015, Cryptography and Information Security in the Balkans: First International Conferende. Ors, B. & Preneel, B. (eds.). Cham: Springer, p. 237-249 13 p. (Lecture Notes in Computer Science; vol. 9024).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  7. Content-based recommendations with approximate integer division

    Veugen, PJM. & Erkin, Z., 2015, Proceedings - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing. Clarkson, V. & Manton, J. (eds.). Piscataway, NJ, USA: IEEE Society, p. 1802-1806 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  8. Private data aggregation with groups for smart grids in a dynamic setting using CRT

    Erkin, Z., 2015, Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, WIFS. s.n. (ed.). Piscataway: IEEE Society, p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  9. Secure comparison protocols in the semi-honest model

    Veugen, PJM., Blom, F., de Hoogh, SJA. & Erkin, Z., 2015, In : IEEE Journal of Selected Topics in Signal Processing. 9, 7, p. 1217-1228 12 p.

    Research output: Contribution to journalArticleScientificpeer-review

  10. 2014
  11. Privacy enhanced personal services for smart grids

    Erkin, Z. & Veugen, PJM., 2014, Proceedings of the 2nd Workshop on Smart Energy Grid Security. Defend, B. & Kursawe, K. (eds.). New York, NY, USA: Association for Computing Machinery (ACM), p. 7-12 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  12. Privacy-preserving emotion detection for crowd management

    Erkin, Z., Li, J., Vermeeren, APOS. & de Ridder, H., 2014, Active Media Technology - Proceedings of the 10th International Conference AMT 2014. Slezak, D., Schaefer, G., Vuong, ST. & Kim, YS. (eds.). Cham, Switzerland: Springer, p. 359-370 12 p. (Lecture Notes in Computer Science; vol. 8610).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  13. eFuzz: a fuzzer for DLMS/COSEM electricity meters

    Erkin, Z., Doerr, C., Dantas, H., Hallie, R. & van der Bij, G., 2014, Proceedings 2nd Workshop on Smart Energy Grid Security. Kursawe, K. & Defend, B. (eds.). New York, NY, USA: Association for Computing Machinery (ACM), p. 31-38 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

ID: 143065