Follow
Zekeriya Erkin
Title
Cited by
Cited by
Year
Privacy-preserving face recognition
Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
6902009
Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation
RL Lagendijk, Z Erkin, M Barni
IEEE Signal Processing Magazine 30 (1), 82-105, 2012
3692012
Privacy-preserving data aggregation in smart metering systems: An overview
Z Erkin, JR Troncoso-Pastoriza, RL Lagendijk, F Pérez-González
IEEE Signal Processing Magazine 30 (2), 75-86, 2013
2552013
Generating private recommendations efficiently using homomorphic encryption and data packing
Z Erkin, T Veugen, T Toft, RL Lagendijk
IEEE transactions on information forensics and security 7 (3), 1053-1066, 2012
2472012
Private computation of spatial and temporal power consumption with smart meters
Z Erkin, G Tsudik
Applied Cryptography and Network Security: 10th International Conference …, 2012
2332012
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
Z Erkin, A Piva, S Katzenbeisser, RL Lagendijk, J Shokrollahi, G Neven, ...
EURASIP Journal on Information Security 2007, 1-20, 2007
2162007
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
1522013
Anonymous fingerprinting with robust QIM watermarking techniques
JP Prins, Z Erkin, RL Lagendijk
EURASIP Journal on Information Security 2007, 1-13, 2007
762007
Efficiently computing private recommendations
Z Erkin, M Beye, T Veugen, RL Lagendijk
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
642011
Privacy enhanced recommender system
Z Erkin, M Beye, T Veugen, RL Lagendijk
Thirty-first symposium on information theory in the Benelux, 35-42, 2010
612010
Secure comparison protocols in the semi-honest model
T Veugen, F Blom, SJA de Hoogh, Z Erkin
IEEE Journal of Selected Topics in Signal Processing 9 (7), 1217-1228, 2015
592015
Privacy in online social networks
M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Computational social networks: security and privacy, 87-113, 2012
532012
Transaction propagation on permissionless blockchains: incentive and routing mechanisms
O Ersoy, Z Ren, Z Erkin, RL Lagendijk
2018 crypto valley conference on blockchain technology (cvcbt), 20-30, 2018
492018
Privacy-preserving user clustering in a social network
Z Erkin, T Veugen, T Toft, RL Lagendijk
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
482009
Literature overview-privacy in online social networks
M Beye, A Jeckmans, Z Erkin, P Hartel, R Lagendijk, Q Tang
Centre for Telematics and Information Technology, University of Twente, 2010
432010
DecReg: A Framework for Preventing Double-Financing using Blockchain Technology
H Lycklama, J Oudejans, Z Erkin
Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and …, 2017
392017
Efficient privacy preserving k-means clustering in a three-party setting
M Beye, Z Erkin, RL Lagendijk
2011 IEEE International Workshop on Information Forensics and Security, 1-6, 2011
382011
A scale-out blockchain for value transfer with spontaneous sharding
Z Ren, K Cong, T Aerts, B de Jonge, A Morais, Z Erkin
2018 Crypto Valley Conference on Blockchain Technology (CVCBT), 1-10, 2018
372018
Privacy-preserving distributed clustering
Z Erkin, T Veugen, T Toft, RL Lagendijk
EURASIP Journal on Information Security 2013 (1), 1-15, 2013
342013
Emerging cryptographic challenges in image and video processing
W Puech, Z Erkin, M Barni, S Rane, RL Lagendijk
2012 19th IEEE International Conference on Image Processing, 2629-2632, 2012
342012
The system can't perform the operation now. Try again later.
Articles 1–20