1. 2020
  2. How to profit from payments channels

    Ersoy, O., Roos, S. & Erkin, Z., Feb 2020, Proceedings of the 24th Financial Cryptography and Data Security, Kota Kinabalu, Sabah, Malaysia. 17 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  3. PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model

    Ugwuoke, C., Erkin, Z., Reinders, M. & Lagendijk, R., 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Carminati, B. & Kantarcioglu, M. (eds.). Association for Computing Machinery (ACM), p. 329-340 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  4. 2019
  5. ECONoMy: Ensemble collaborative learning using masking

    Van De Kamp, L., Ugwuoke, C. & Erkin, Z., 1 Sep 2019, 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC Workshops 2019. Institute of Electrical and Electronics Engineers (IEEE), 7 p. 8880822

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  6. A novel approach for data packing: Using trapdoor knapsack

    Nateghizad, M., Erkin, Z. & Lagendijk, R. L., 2019, 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Kumar, A., Yuen, P. C. & Huang, J. (eds.). Piscataway: IEEE, p. 1-6 6 p. 8630769

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  7. Badass: Preserving privacy in behavioural advertising with applied secret sharing

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2019, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 10, 1, p. 23-41 19 p.

    Research output: Contribution to journalArticleScientificpeer-review

  8. Decouples: A Decentralized, Unlinkable and Privacy-preserving Traceability System for the Supply Chain

    El Maouchi, M., Ersoy, O. & Erkin, Z., 2019, SAC'19 : Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing . New York, NY, USA: Association for Computing Machinery (ACM), Vol. F147772. p. 364-373 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  9. MUSCLE: Authenticated External Data Retrieval from Multiple Sources for Smart Contracts

    van der Laan, B., Ersoy, O. & Erkin, Z., 2019, Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC '19. Hung, C-C. & Papadopoulos, G. A. (eds.). New York, NY: Association for Computing Machinery (ACM), Vol. F147772. p. 382-391 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  10. On the Statistical Detection of Adversarial Instances over Encrypted Data

    Sheikhalishahi, M., Nateghizad, M., Martinelli, F., Erkin, Z. & Loog, M., 2019, Security and Trust Management - 15th International Workshop, STM 2019, Proceedings. Mauw, S. & Conti, M. (eds.). Springer, p. 71-88 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11738 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  11. Privacy-preserving multi-party access control

    Sheikhalishahi, M., Tillem, G., Erkin, Z. & Zannone, N., 2019, WPES'19: Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society. New York: Association for Computing Machinery (ACM), p. 1-13 13 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  12. Private Data Aggregation in Decentralized Networks

    Setia, P. K., Tillem, G. & Erkin, Z., 2019, 2019 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG). Cetin, A. (ed.). IEEE, p. 76-80 5 p. 8782377

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  13. SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer

    Karakoç, F., Nateghizad, M. & Erkin, Z., 2019, ARES '19 : Proceedings of the 14th International Conference on Availability, Reliability and Security. New York: Association for Computing Machinery (ACM), p. 1-9 9 p. 12

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  14. Solving bin-packing problems under privacy preservation: Possibilities and trade-offs

    Hoogervorst, R., Zhang, Y., Tillem, G., Erkin, Z. & Verwer, S., 2019, In : Information Sciences. 500, p. 203-216 14 p.

    Research output: Contribution to journalArticleScientificpeer-review

  15. Tulip: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication

    Ersoy, O., Erkin, Z. & Lagendijk, R. L., 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW): Proceedings. IEEE, p. 396-405 10 p. 8802398

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  16. VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design

    Ren, Z. & Erkin, Z., 2019, Financial Cryptography and Data Security : 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Cham: Springer, p. 487-507 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598)(Security and Cryptology; vol. 11598).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  17. 2018
  18. A Fault-tolerant and Efficient Scheme for Data Aggregation Over Groups in the Smart Grid

    Knirsch, F., Engel, D. & Erkin, Z., 2018, 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017. Piscataway, NJ: IEEE, Vol. 2018-January. p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  19. A Scale-out Blockchain for Value Transfer with Spontaneous Sharding

    Ren, Z., Cong, K., Aerts, T. V., de Jonge, B. A. P., Morais, A. F. & Erkin, Z., 2018, Proceedings - 2018 Crypto Valley Conference on Blockchain Technology, CVCBT 2018. Los Alamitos, CA: IEEE, p. 1-10 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

  20. AHEad: Privacy-preserving Online Behavioural Advertising using Homomorphic Encryption

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2018, 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017. Piscataway, NJ: IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  21. An Efficient Privacy-preserving Recommender System for e-Healthcare systems

    Verhaert, D., Nateghizad, M. & Erkin, Z., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 188-199 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  22. BAdASS: Preserving privacy in behavioural advertising with applied secret sharing

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2018, Provable Security: 12th International Conference, ProvSec 2018 - Proceedings. Baek, J., Susilo, W. & Kim, J. (eds.). Cham: Springer, p. 397-405 9 p. (Lecture Notes in Computer Science; vol. 11192).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  23. DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration

    Vos, D., Overweel, L., Raateland, W., Vos, J., Bijman, M., Pigmans, M. & Erkin, Z., 2018, Proceedings of the 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies , p. 1-8 8 p. (Reports of the European Society for Socially Embedded Technologies; vol. 2, no. 11).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  24. Efficient Index-based Search Protocols for Encrypted Databases

    Nateghizad, M., Erkin, Z. & Lagendijk, R., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 270-281 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  25. Mining Sequential Patterns from Outsourced Data via Encryption Switching

    Tillem, G., Erkin, Z. & Lagendijk, R. L., 2018, 16th Annual Conference on Privacy, Security and Trust, PST 2018. Piscataway, NJ: IEEE, p. 1-10 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  26. Privacy-preserving Distributed Access Control for Medical Data

    Maulany, C., Nateghizad, M., Mennink, B. & Erkin, Z., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 322-331 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  27. Secure Equality Testing Protocols in the Two-Party Setting

    Nateghizad, M., Veugen, T., Erkin, Z. & Lagendijk, I., 2018, ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security . New York, NY: Association for Computing Machinery (ACM), p. 1-10 10 p. 3

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  28. Secure Fixed-point Division for Homomorphically Encrypted Operands

    Ugwuoke, C., Erkin, Z. & Lagendijk, I., 2018, ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security . New York: Association for Computer Machinery, p. 1-10 10 p. 33

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  29. TRADE: A Transparent, Decentralized Traceability System for the Supply Chain

    El Maouchi, M., Ersoy, O. & Erkin, Z., 2018, Proceedings of the 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies , p. 1-6 6 p. (Reports of the European Society for Socially Embedded Technologies; vol. 2, no. 4).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  30. Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms

    Ersoy, O., Ren, Z., Erkin, Z. & Lagendijk, R. L., 2018, Proceedings - 2018 Crypto Valley Conference on Blockchain Technology, CVCBT 2018. Los Alamitos, CA: IEEE, p. 20-30 11 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

  31. 2017
  32. A decentralised energy trading architecture for future smart grid load balancing

    Hijgenaar, S., Erkin, Z., Keviczky, T., Siemons, J., Bisschops, R. & Verbraeck, A., 2017, Proceedings 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm 2017). Piscataway, NJ, USA: IEEE, p. 77-82

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  33. DecReg: A Framework for Preventing Double-Financing using Blockchain Technology

    Lycklama à Nijeholt, H., Erkin, Z. & Oudejans, J., 2017, BCC'17 Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts. New York: Association for Computing Machinery (ACM), p. 29-34 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  34. Efficient and secure equality tests

    Nateghizad, M., Erkin, Z. & Lagendijk, I., 2017, 2016 IEEE International Workshop on Information Forensics and Security (WIFS). Institute of Electrical and Electronics Engineers (IEEE), p. 1-6 6 p. 7823915

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  35. Improved privacy of dynamic group services

    Veugen, T., Doumen, J., Erkin, Z., Pellegrino, N., Verwer, S. & Weber, J., 2017, In : Eurasip Journal on Information Security. 2017, 1, p. 1-9 9 p., 3.

    Research output: Contribution to journalArticleScientificpeer-review

  36. Mining encrypted software logs using alpha algorithm

    Tillem, G., Erkin, Z. & Lagendijk, I., 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Obaidat, M. S., Samarati, P. & Cabello, E. (eds.). SciTePress, Vol. 4. p. 267-274 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  37. Privacy concerns and protection measures in online behavioural advertising

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 89-96 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  38. Privacy-Preserving Collection and Retrieval of Medical Wearables Data

    Nateghizad, M., Maulany, C. & Erkin, Z., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 141-148 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  39. Privacy-Preserving Equality Test

    Nateghizad, M., Erkin, Z. & Lagendijk, I., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 167-177 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  40. Privacy-safe linkage analysis with homomorphic encryption

    Ugwuoke, C., Erkin, Z. & Lagendijk, R. L., 2017, 25th European Signal Processing Conference, EUSIPCO 2017. Piscataway, NJ: IEEE, p. 961-965 5 p. 8081350

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  41. 2016
  42. Enhancing user privacy in federated eID schemes

    Shrishak, K., Erkin, Z. & Schaar, R., 22 Dec 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security ( NTMS). Badra, M., Pau, G. & Vassiliou, V. (eds.). Piscataway: IEEE, p. 1-5 5 p. 7792448

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  43. A Privacy-Preserving GWAS Computation with Homomorphic Encryption

    Ugwuoke, C., Erkin, Z. & Lagendijk, I., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 166-173 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  44. An efficient privacy-preserving comparison protocol in smart metering systems

    Nateghizad, M., Erkin, Z. & Lagendijk, R. L., 2016, In : Eurasip Journal on Information Security. 2016, 1, 11.

    Research output: Contribution to journalArticleScientificpeer-review

  45. Enhancing privacy of users in eID schemes

    Shrishak, K., Erkin, Z. & Schaar, R., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 158-165 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  46. Privacy-Preserving Alpha Algorithm for Software Analysis

    Tillem, G., Erkin, Z. & Lagendijk, I., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 136-143 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  47. Secure Key-Exchange Protocol for Implants Using Heartbeats

    Seepers, R., Weber, J., Erkin, Z., Sourdis, Y. & Strydis, C., 2016, Proceedings of the ACM International Conference on Computing Frontiers, CF '16. New York: Association for Computing Machinery (ACM), p. 119-126 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  48. Secure Matching of Dutch Car License Plates

    Bindu Sunil, A., Erkin, Z. & Veugen, T., 2016, 24th European Signal Processing Conference, EUSIPCO 2016. Piscataway: IEEE, p. 2116-2120 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  49. 2015
  50. A signature scheme for a dynamic coalition defence environment without trusted third parties

    van der Lubbe, JCA., de Boer, MJ. & Erkin, Z., 2015, Cryptography and Information Security in the Balkans: First International Conferende. Ors, B. & Preneel, B. (eds.). Cham: Springer, p. 237-249 13 p. (Lecture Notes in Computer Science; vol. 9024).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  51. Content-based recommendations with approximate integer division

    Veugen, PJM. & Erkin, Z., 2015, Proceedings - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing. Clarkson, V. & Manton, J. (eds.). Piscataway, NJ, USA: IEEE Society, p. 1802-1806 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  52. Private data aggregation with groups for smart grids in a dynamic setting using CRT

    Erkin, Z., 2015, Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, WIFS. s.n. (ed.). Piscataway: IEEE Society, p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  53. Secure comparison protocols in the semi-honest model

    Veugen, PJM., Blom, F., de Hoogh, SJA. & Erkin, Z., 2015, In : IEEE Journal of Selected Topics in Signal Processing. 9, 7, p. 1217-1228 12 p.

    Research output: Contribution to journalArticleScientificpeer-review

  54. 2014
  55. Privacy enhanced personal services for smart grids

    Erkin, Z. & Veugen, PJM., 2014, Proceedings of the 2nd Workshop on Smart Energy Grid Security. Defend, B. & Kursawe, K. (eds.). New York, NY, USA: Association for Computing Machinery (ACM), p. 7-12 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  56. Privacy-preserving emotion detection for crowd management

    Erkin, Z., Li, J., Vermeeren, APOS. & de Ridder, H., 2014, Active Media Technology - Proceedings of the 10th International Conference AMT 2014. Slezak, D., Schaefer, G., Vuong, ST. & Kim, YS. (eds.). Cham, Switzerland: Springer, p. 359-370 12 p. (Lecture Notes in Computer Science; vol. 8610).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  57. eFuzz: a fuzzer for DLMS/COSEM electricity meters

    Erkin, Z., Doerr, C., Dantas, H., Hallie, R. & van der Bij, G., 2014, Proceedings 2nd Workshop on Smart Energy Grid Security. Kursawe, K. & Defend, B. (eds.). New York, NY, USA: Association for Computing Machinery (ACM), p. 31-38 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  58. 2013
  59. A field study on real-time self-reported emotions in crowds

    Li, J., Erkin, Z., de Ridder, H. & Vermeeren, APOS., 2013, Proceedings ICI.OPEN 2013. Smeulders, A. & Stroobandt et al, D. (eds.). Utrecht, The Netherlands: STW - IPN, p. 80-84 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  60. Building a Privacy-Preserving Semantic Overlay for Peer-to-Peer Networks

    Zeilemaker, NSM., Erkin, Z., Palmieri, P. & Pouwelse, J., 2013, Proceedings of the 2013 IEEE international workshop on information forensics and security (WIFS2013). IEEE Society, p. 79-84 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  61. Building blocks for privacy-preserving recommender systems in a dynamic setting

    Kononchuk, D., Erkin, Z., van der Lubbe, JCA. & Lagendijk, RL., 2013, Proceedings of the 34th WIC Symposium on Information Theory in the Benelux, 3rd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux. Pollin, S. & van der Perre, L. (eds.). WIC, p. 37-44 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  62. Encrypted signal processing for privacy protection

    Lagendijk, RL., Erkin, Z. & Barni, M., 2013, In : IEEE Signal Processing Magazine. 30, 1, p. 82-105 24 p.

    Research output: Contribution to journalArticleScientificpeer-review

  63. Privacy in recommender systems

    Jeckmans, AJP., Beye, MRT., Erkin, Z., Hartel, PH., Lagendijk, RL. & Tang, Q., 2013, Social media retrieval. Ramzan, N. & van Zwol et al., R. (eds.). London, UK: Springer, p. 263-281 484 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific

  64. Privacy preserving distributed beamforming based on homomorphic encryption

    Hendriks, RC., Erkin, Z. & Gerkmann, T., 2013, Proceedings of Eusipco 2013. Eurasip, p. 1-5 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  65. Privacy-preserving data aggregation in smart metering systems: an overview

    Erkin, Z., Troncoso-Pastoriza, JR., Lagendijk, RL. & Pérez-González, F., 2013, In : IEEE Signal Processing Magazine. 30, 2, p. 75-86 12 p.

    Research output: Contribution to journalArticleScientificpeer-review

  66. Privacy-preserving distributed clustering

    Erkin, Z., Veugen, PJM., Toft, T. & Lagendijk, RL., 2013, In : Eurasip Journal on Information Security. 2013, 4, p. 1-15 15 p.

    Research output: Contribution to journalArticleScientificpeer-review

  67. Privacy-preserving distributed speech enhancement for wireless sensor networks by processing in the encrypted domain

    Hendriks, RC., Erkin, Z. & Gerkmann, T., 2013, 2013 International Conference on Acoustic, Speech and Signal Processing-ICASSP. SN (ed.). NY, NY, USA: IEEE Society, p. 7005-7009 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  68. Privacy-preserving recommender systems in dynamic environments

    Erkin, Z., Veugen, PJM. & Lagendijk, RL., 2013, Proceedings of the 2013 IEEE Workshop on Information Forensics and Security. Kalker, T. & Huang, J. (eds.). New York, NY, USA: IEEE Society, p. 61-66 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  69. Privacy-preserving user data oriented services for groups with dynamic participation

    Kononchuk, D., Erkin, Z., van der Lubbe, JCA. & Lagendijk, RL., 2013, Computer Security - Proceedings 18th European Symposium on Research in Computer Security. Crampton, J., Jajodia, S. & Mayes, K. (eds.). Berlin - Heidelberg: Springer, p. 418-442 25 p. (Lecture Notes in Computer Science; vol. 8134).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  70. 2012
  71. Emerging cryptographic challenges in image and video processing

    Puech, W., Erkin, Z., Barni, M., Rane, S. & Lagendijk, RL., 2012, Proceedings of the 2012 IEEE International Conference on Image Processing. Saber, E., Hemami, S. & Sharma, G. (eds.). Piscataway, NJ, USA: IEEE Society, p. 2629-2632 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  72. Generating private recommendations efficiently using homomorphic encryption and data packing

    Erkin, Z., Veugen, PJM., Toft, T. & Lagendijk, RL., 2012, In : IEEE Transactions on Information Forensics and Security. 7, 3, p. 1053-1066 14 p.

    Research output: Contribution to journalArticleScientificpeer-review

  73. Privacy in online social networks

    Beye, MRT., Jeckmans, AJP., Erkin, Z., Hartel, PH., Lagendijk, RL. & Tang, Q., 2012, Computational social networks. Abraham, A. (ed.). London, UK: Springer, p. 87-113 347 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific

  74. Privacy-preserving content-based recommendations through homomorphic encryption

    Erkin, Z., Beye, M., Veugen, PJM. & Lagendijk, RL., 2012, Proceedings 33rd WIC Symposium on Information Theory in the Benelux & the 2nd Joint WIC/IEEE Symposium on Information Theory and Signal processing in the Benelux. Veldhuis, RNJ., Spreeuwers, LJ., Goseling, J. & Shao, X. (eds.). Enschede, The Netherlands: Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), p. 71-77 7 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  75. Privacy-preserving content-based recommender system

    Erkin, Z., Beye, MRT., Veugen, PJM. & Lagendijk, RL., 2012, Proceedings of the 14th ACM Workshop on Multimedia and Security. NY, NY, USA: Association for Computing Machinery (ACM), p. 77-84 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  76. Private computation of spatial and temporal power consumption with smart meters

    Erkin, Z. & Tsudik, G., 2012, In : Lecture Notes in Computer Science. 7341, p. 561-577 17 p.

    Research output: Contribution to journalArticleScientificpeer-review

  77. 2011
  78. Efficient privacy preserving K-means clustering in a three-party setting

    Beye, MJT., Erkin, Z. & Lagendijk, RL., 2011, Porceedings of the IEEE Workshop on Information Forensics and Security (WIFS'11). SN (ed.). New York, NY, USA: IEEE Society, p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  79. Efficiently computing private recommendations

    Erkin, Z., Beye, MRT., Veugen, PJM. & Lagendijk, RL., 2011, International Conference on Acoustics, Speech and Signal Processing (ICASSP 2011). Tichavsky, P. & Chambers, JA. (eds.). Piscataway, NJ, USA: IEEE Society, p. 5864-5867 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  80. Generating private recommendations in a social trust network

    Erkin, Z., Veugen, PJM. & Lagendijk, RL., 2011, Proceedings of the international conference on Computational Aspects of Social Networks 2011 (CASoN). Abraham, A., Corchado, E., Alhaj, R. & Snasel, V. (eds.). New York, NY, USA: IEEE Society, p. 82-87 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  81. 2010
  82. Efficiently computing private recommendations

    Erkin, Z., Beye, MRT. & Veugen, PJM., 2010, Proceedings of ASCI 2010. S.N. (ed.). Delft, The Netherlands: Advanced School for Computing and Imaging, p. 1-8 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  83. Privacy enhanced recommender system

    Erkin, Z., Beye, M., Veugen, PJM. & Lagendijk, RL., 2010, Proceedings of the thirty-first symposium on Information Theory in the Benelux. J. Gosseling, JH. W. (ed.). Delft: Werkgemeenschap voor Informatie- en Communicatietheorie, p. 35-43 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  84. Secure signal processing: Privacy preserving cryptographic protocols for multimedia

    Erkin, Z., 2010, Delft: TU Delft Mediamatica. 158 p.

    Research output: ThesisDissertation (TU Delft)

  85. 2009
  86. Privacy-preserving face recognition

    Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, RL. & Toft, T., 2009, In : Lecture Notes in Computer Science. 5672/2009, p. 235-255 21 p.

    Research output: Contribution to journalArticleScientificpeer-review

  87. Privacy-preserving user clustering in a social network

    Erkin, Z., Veugen, PJM., Toft, T. & Lagendijk, RL., 2009, Proceedings of the IEEE International Workshop on Information Forensics and Security,. SN (ed.). NY, USA: IEEE Society, p. 96-100 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  88. 2007
  89. Anonymous fingerprinting with robust QIM watermarking techniques

    Prins, J., Erkin, Z. & Lagendijk, RL., 2007, In : Eurasip Journal on Information Security. 2007, p. 1-13 13 p.

    Research output: Contribution to journalArticleScientificpeer-review

  90. On processing encrypted data

    Erkin, Z. & Lagendijk, RL., 2007, Proceedings of the thirteenth annual conference of the Advanced School for Computing and Imaging. Jansen, F. W., Pierre, G. E. O., Veenman, C. J. & Heijnsdijk, J. W. J. (eds.). Delft: ASCI, p. 322-329 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  91. Robust anonymus fingerprinting

    Prins, J., Erkin, Z. & Lagendijk, RL., 2007, Proceedings of the 28th symposium on information theory in the Benelux. veldhuis, R. & Cronie, H. (eds.). Enschede: Werkgemeenschap Informatie- en Communicatietheorie (WIC), p. 59-66 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

ID: 143065