Follow
Zekeriya Erkin
Title
Cited by
Cited by
Year
Privacy-preserving face recognition
Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
883*2009
Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation
RL Lagendijk, Z Erkin, M Barni
IEEE Signal Processing Magazine 30 (1), 82-105, 2012
4132012
Generating private recommendations efficiently using homomorphic encryption and data packing
Z Erkin, T Veugen, T Toft, RL Lagendijk
IEEE transactions on information forensics and security 7 (3), 1053-1066, 2012
2872012
Privacy-preserving data aggregation in smart metering systems: An overview
Z Erkin, JR Troncoso-Pastoriza, RL Lagendijk, F Pérez-González
IEEE Signal Processing Magazine 30 (2), 75-86, 2013
2822013
Private computation of spatial and temporal power consumption with smart meters
Z Erkin, G Tsudik
Applied Cryptography and Network Security: 10th International Conference …, 2012
2562012
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
Z Erkin, A Piva, S Katzenbeisser, RL Lagendijk, J Shokrollahi, G Neven, ...
EURASIP Journal on Information Security 2007, 1-20, 2007
2172007
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
1962013
Secure comparison protocols in the semi-honest model
T Veugen, F Blom, SJA De Hoogh, Z Erkin
IEEE Journal of Selected Topics in Signal Processing 9 (7), 1217-1228, 2015
742015
Anonymous fingerprinting with robust QIM watermarking techniques
JP Prins, Z Erkin, RL Lagendijk
EURASIP Journal on Information Security 2007, 1-13, 2007
722007
Privacy enhanced recommender system
Z Erkin, M Beye, T Veugen, RL Lagendijk
31st WIC Symposium on Information Theory in the Benelux 2010, 2010
692010
Efficiently computing private recommendations
Z Erkin, M Beye, T Veugen, RL Lagendijk
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
622011
Transaction propagation on permissionless blockchains: incentive and routing mechanisms
O Ersoy, Z Ren, Z Erkin, RL Lagendijk
2018 crypto valley conference on blockchain technology (cvcbt), 20-30, 2018
602018
A scale-out blockchain for value transfer with spontaneous sharding
Z Ren, K Cong, T Aerts, B de Jonge, A Morais, Z Erkin
2018 Crypto Valley Conference on Blockchain Technology (CVCBT), 1-10, 2018
572018
Practical multi-party private set intersection protocols
A Bay, Z Erkin, JH Hoepman, S Samardjiska, J Vos
IEEE Transactions on Information Forensics and Security 17, 1-15, 2021
532021
Privacy in online social networks
M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Computational social networks: security and privacy, 87-113, 2012
522012
Privacy-preserving user clustering in a social network
Z Erkin, T Veugen, T Toft, RL Lagendijk
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
502009
DecReg: A Framework for Preventing Double-Financing using Blockchain Technology
H Lycklama, J Oudejans, Z Erkin
Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and …, 2017
482017
Literature overview-privacy in online social networks
M Beye, A Jeckmans, Z Erkin, PH Hartel, R Lagendijk, Q Tang
Centre for Telematics and Information Technology (CTIT), 2010
462010
Remote monitoring of cardiac implanted electronic devices: legal requirements and ethical principles-ESC Regulatory Affairs Committee/EHRA joint task force report
JC Nielsen, J Kautzner, R Casado-Arroyo, H Burri, S Callens, MR Cowie, ...
EP Europace 22 (11), 1742-1758, 2020
432020
How to profit from payments channels
O Ersoy, S Roos, Z Erkin
International Conference on Financial Cryptography and Data Security, 284-303, 2020
432020
The system can't perform the operation now. Try again later.
Articles 1–20