BibTeX records: Zekeriya Erkin

download as .bib file

@article{DBLP:journals/sensors/KromesLBGHE24,
  author       = {Roland Kromes and
                  Tianyu Li and
                  Maxime Bouillion and
                  Talha Enes G{\"{u}}ler and
                  Victor van der Hulst and
                  Zekeriya Erkin},
  title        = {Fear of Missing Out: Constrained Trial of Blockchain in Supply Chain},
  journal      = {Sensors},
  volume       = {24},
  number       = {3},
  pages        = {986},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24030986},
  doi          = {10.3390/S24030986},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/KromesLBGHE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZahedaniVE23,
  author       = {Armin Memar Zahedani and
                  Jelle Vos and
                  Zekeriya Erkin},
  title        = {Practical Verifiable {\&} Privacy-Preserving Double Auctions},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {25:1--25:9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3600190},
  doi          = {10.1145/3600160.3600190},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZahedaniVE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcca/XuLE23,
  author       = {Li Xu and
                  Tianyu Li and
                  Zekeriya Erkin},
  editor       = {Moayad Aloqaily and
                  Safa Otoum and
                  Ouns Bouachir and
                  Yaser Jararweh and
                  Ismaeel Al Ridhawi and
                  Khalid Al{-}Begain and
                  Mohammad A. Alsmirat},
  title        = {Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation
                  Mechanism},
  booktitle    = {Fifth International Conference on Blockchain Computing and Applications,
                  {BCCA} 2023, Kuwait, Kuwait, October 24-26, 2023},
  pages        = {266--273},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BCCA58897.2023.10338923},
  doi          = {10.1109/BCCA58897.2023.10338923},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bcca/XuLE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/de/MaesenILE23,
  author       = {Palle Maesen and
                  Devri\c{s} \.{I}\c{s}ler and
                  Nikolaos Laoutaris and
                  Zekeriya Erkin},
  title        = {Image Watermarking for Machine Learning Datasets},
  booktitle    = {Proceedings of the Second {ACM} Data Economy Workshop, {DEC} 2023,
                  Seattle, WA, USA, 18 June 2023},
  pages        = {7--13},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600046.3600048},
  doi          = {10.1145/3600046.3600048},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/de/MaesenILE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/de/HristovILE23,
  author       = {Tsvetomir Hristov and
                  Devri\c{s} \.{I}\c{s}ler and
                  Nikolaos Laoutaris and
                  Zekeriya Erkin},
  title        = {Graph Database Watermarking Using Pseudo-Nodes},
  booktitle    = {Proceedings of the Second {ACM} Data Economy Workshop, {DEC} 2023,
                  Seattle, WA, USA, 18 June 2023},
  pages        = {14--20},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600046.3600049},
  doi          = {10.1145/3600046.3600049},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/de/HristovILE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiXEL23,
  author       = {Tianyu Li and
                  Li Xu and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Trajectory Hiding and Sharing for Supply Chains with Differential
                  Privacy},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  pages        = {297--317},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_15},
  doi          = {10.1007/978-3-031-51476-0\_15},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LiXEL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-15394,
  author       = {Dani{\"{e}}l Vos and
                  Jelle Vos and
                  Tianyu Li and
                  Zekeriya Erkin and
                  Sicco Verwer},
  title        = {Differentially-Private Decision Trees with Probabilistic Robustness
                  to Data Poisoning},
  journal      = {CoRR},
  volume       = {abs/2305.15394},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.15394},
  doi          = {10.48550/ARXIV.2305.15394},
  eprinttype    = {arXiv},
  eprint       = {2305.15394},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-15394.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-05248,
  author       = {Florine W. Dekker and
                  Zekeriya Erkin and
                  Mauro Conti},
  title        = {Topology-Based Reconstruction Prevention for Decentralised Learning},
  journal      = {CoRR},
  volume       = {abs/2312.05248},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.05248},
  doi          = {10.48550/ARXIV.2312.05248},
  eprinttype    = {arXiv},
  eprint       = {2312.05248},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-05248.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VosCE23,
  author       = {Jelle Vos and
                  Mauro Conti and
                  Zekeriya Erkin},
  title        = {SoK: Collusion-resistant Multi-party Private Set Intersections in
                  the Semi-honest Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1777},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1777},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/VosCE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BayEHSV22,
  author       = {Asl{\'{\i}} Bay and
                  Zekeriya Erkin and
                  Jaap{-}Henk Hoepman and
                  Simona Samardjiska and
                  Jelle Vos},
  title        = {Practical Multi-Party Private Set Intersection Protocols},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2021.3118879},
  doi          = {10.1109/TIFS.2021.3118879},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BayEHSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/VosVE22,
  author       = {Jelle Vos and
                  Dani{\"{e}}l Vos and
                  Zekeriya Erkin},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Efficient Circuits for Permuting and Mapping Packed Values Across
                  Leveled Homomorphic Ciphertexts},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13554},
  pages        = {408--423},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6\_20},
  doi          = {10.1007/978-3-031-17140-6\_20},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/VosVE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/LiVE22,
  author       = {Tianyu Li and
                  Jelle Vos and
                  Zekeriya Erkin},
  title        = {Decentralized Private Freight Declaration {\&} Tracking with Data
                  Validation},
  booktitle    = {2022 {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops and other Affiliated Events, PerCom 2022 Workshops, Pisa,
                  Italy, March 21-25, 2022},
  pages        = {267--272},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/PerComWorkshops53856.2022.9767444},
  doi          = {10.1109/PERCOMWORKSHOPS53856.2022.9767444},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/LiVE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KesterLE22,
  author       = {David Kester and
                  Tianyu Li and
                  Zekeriya Erkin},
  title        = {{PRIDE:} {A} Privacy-Preserving Decentralised Key Management System},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2022, Shanghai, China, December 12-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WIFS55849.2022.9975379},
  doi          = {10.1109/WIFS55849.2022.9975379},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KesterLE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VosCE22,
  author       = {Jelle Vos and
                  Mauro Conti and
                  Zekeriya Erkin},
  title        = {Fast Multi-party Private Set Operations in the Star Topology from
                  Secure ANDs and ORs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {721},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/721},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VosCE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DekkerE21,
  author       = {Florine W. Dekker and
                  Zekeriya Erkin},
  editor       = {Kazue Sako and
                  Nils Ole Tippenhauer},
  title        = {Privacy-Preserving Data Aggregation with Probabilistic Range Validation},
  booktitle    = {Applied Cryptography and Network Security - 19th International Conference,
                  {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12727},
  pages        = {79--98},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78375-4\_4},
  doi          = {10.1007/978-3-030-78375-4\_4},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DekkerE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dappcon/ErsoyGEC21,
  author       = {Oguzhan Ersoy and
                  Ziya Alper Gen{\c{c}} and
                  Zekeriya Erkin and
                  Mauro Conti},
  title        = {Practical Exchange for Unique Digital Goods},
  booktitle    = {{IEEE} International Conference on Decentralized Applications and
                  Infrastructures, {DAPPS} 2021, Online Event, August 23-26, 2021},
  pages        = {49--58},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DAPPS52256.2021.00011},
  doi          = {10.1109/DAPPS52256.2021.00011},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dappcon/ErsoyGEC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HoogerwerfTBE21,
  author       = {Erwin Hoogerwerf and
                  Daphne van Tetering and
                  Asl{\'{\i}} Bay and
                  Zekeriya Erkin},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Efficient Joint Random Number Generation for Secure Multi-party Computation},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {436--443},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010534804360443},
  doi          = {10.5220/0010534804360443},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HoogerwerfTBE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BayEAV21,
  author       = {Asl{\'{\i}} Bay and
                  Zeki Erkin and
                  Mina Alishahi and
                  Jelle Vos},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Multi-Party Private Set Intersection Protocols for Practical Applications},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {515--522},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010547605150522},
  doi          = {10.5220/0010547605150522},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BayEAV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/VosED21,
  author       = {Jelle Vos and
                  Zekeriya Erkin and
                  Christian Doerr},
  title        = {Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence
                  Providers},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648381},
  doi          = {10.1109/WIFS53200.2021.9648381},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/VosED21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VosED21,
  author       = {Jelle Vos and
                  Zekeriya Erkin and
                  Christian Doerr},
  title        = {Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence
                  Providers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1260},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1260},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VosED21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/UgwuokeERL20,
  author       = {Chibuike Ugwuoke and
                  Zekeriya Erkin and
                  Marcel J. T. Reinders and
                  Reginald L. Lagendijk},
  editor       = {Vassil Roussev and
                  Bhavani Thuraisingham and
                  Barbara Carminati and
                  Murat Kantarcioglu},
  title        = {{PREDICT:} Efficient Private Disease Susceptibility Testing in Direct-to-Consumer
                  Model},
  booktitle    = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security
                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},
  pages        = {329--340},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374664.3375729},
  doi          = {10.1145/3374664.3375729},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/UgwuokeERL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/EsginEE20,
  author       = {Muhammed F. Esgin and
                  Oguzhan Ersoy and
                  Zekeriya Erkin},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Post-Quantum Adaptor Signatures and Payment Channel Networks},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {378--397},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_19},
  doi          = {10.1007/978-3-030-59013-0\_19},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/EsginEE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ErsoyRE20,
  author       = {Oguzhan Ersoy and
                  Stefanie Roos and
                  Zekeriya Erkin},
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {How to Profit from Payments Channels},
  booktitle    = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {284--303},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4\_16},
  doi          = {10.1007/978-3-030-51280-4\_16},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ErsoyRE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EsginEE20,
  author       = {Muhammed F. Esgin and
                  Oguzhan Ersoy and
                  Zekeriya Erkin},
  title        = {Post-Quantum Adaptor Signatures and Payment Channel Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/845},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EsginEE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eninf/NandakumarTEK19,
  author       = {Lakshminarayanan Nandakumar and
                  Gamze Tillem and
                  Zekeriya Erkin and
                  Tam{\'{a}}s Keviczky},
  title        = {Protecting the grid topology and user consumption patterns during
                  state estimation in smart grids based on data obfuscation},
  journal      = {Energy Inform.},
  volume       = {2},
  number       = {{S1}},
  year         = {2019},
  url          = {https://doi.org/10.1186/s42162-019-0078-y},
  doi          = {10.1186/S42162-019-0078-Y},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eninf/NandakumarTEK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HoogervorstZTEV19,
  author       = {Rowan Hoogervorst and
                  Yingqian Zhang and
                  Gamze Tillem and
                  Zekeriya Erkin and
                  Sicco Verwer},
  title        = {Solving bin-packing problems under privacy preservation: Possibilities
                  and trade-offs},
  journal      = {Inf. Sci.},
  volume       = {500},
  pages        = {203--216},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.05.011},
  doi          = {10.1016/J.INS.2019.05.011},
  timestamp    = {Wed, 26 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HoogervorstZTEV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HelslootTE19,
  author       = {Leon J. Helsloot and
                  Gamze Tillem and
                  Zekeriya Erkin},
  title        = {BAdASS: Preserving Privacy in Behavioural Advertising with Applied
                  Secret Sharing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {1},
  pages        = {23--41},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.03.31.023},
  doi          = {10.22667/JOWUA.2019.03.31.023},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HelslootTE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KarakocNE19,
  author       = {Ferhat Karako{\c{c}} and
                  Majid Nateghizad and
                  Zekeriya Erkin},
  title        = {{SET-OT:} {A} Secure Equality Testing Protocol Based on Oblivious
                  Transfer},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {12:1--12:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339264},
  doi          = {10.1145/3339252.3339264},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KarakocNE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ErsoyEL19,
  author       = {Oguzhan Ersoy and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {{TULIP:} {A} Fully Incentive Compatible Blockchain Framework Amortizing
                  Redundant Communication},
  booktitle    = {2019 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {396--405},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSPW.2019.00050},
  doi          = {10.1109/EUROSPW.2019.00050},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ErsoyEL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RenE19,
  author       = {Zhijie Ren and
                  Zekeriya Erkin},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {{VAPOR:} {A} Value-Centric Blockchain that is Scale-out, Decentralized,
                  and Flexible by Design},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {487--507},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_29},
  doi          = {10.1007/978-3-030-32101-7\_29},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RenE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/marble/ErsoyEL19,
  author       = {Oguzhan Ersoy and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  editor       = {Panos M. Pardalos and
                  Ilias S. Kotsireas and
                  Yike Guo and
                  William J. Knottenbelt},
  title        = {Decentralized Incentive-Compatible and Sybil-Proof Transaction Advertisement},
  booktitle    = {1st International Conference on Mathematical Research for Blockchain
                  Economy, {MARBLE} 2019, Santorini, Greece, May 6-9, 2019},
  series       = {Springer Proceedings in Business and Economics},
  pages        = {151--165},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37110-4\_11},
  doi          = {10.1007/978-3-030-37110-4\_11},
  timestamp    = {Tue, 11 Jul 2023 15:51:52 +0200},
  biburl       = {https://dblp.org/rec/conf/marble/ErsoyEL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/KampUE19,
  author       = {Lars Van De Kamp and
                  Chibuike Ugwuoke and
                  Zekeriya Erkin},
  title        = {ECONoMy: Ensemble Collaborative Learning Using Masking},
  booktitle    = {30th {IEEE} International Symposium on Personal, Indoor and Mobile
                  Radio Communications Workshops, {PIMRC} Workshops 2019, Istanbul,
                  Turkey, September 8, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PIMRCW.2019.8880822},
  doi          = {10.1109/PIMRCW.2019.8880822},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/KampUE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/MaouchiEE19,
  author       = {Mourad el Maouchi and
                  Oguzhan Ersoy and
                  Zekeriya Erkin},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {{DECOUPLES:} a decentralized, unlinkable and privacy-preserving traceability
                  system for the supply chain},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {364--373},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297318},
  doi          = {10.1145/3297280.3297318},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/MaouchiEE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/LaanEE19,
  author       = {Bjorn van der Laan and
                  Oguzhan Ersoy and
                  Zekeriya Erkin},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {{MUSCLE:} authenticated external data retrieval from multiple sources
                  for smart contracts},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {382--391},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297320},
  doi          = {10.1145/3297280.3297320},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/LaanEE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SheikhalishahiN19,
  author       = {Mina Sheikhalishahi and
                  Majid Nateghizad and
                  Fabio Martinelli and
                  Zekeriya Erkin and
                  Marco Loog},
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {On the Statistical Detection of Adversarial Instances over Encrypted
                  Data},
  booktitle    = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  pages        = {71--88},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5\_5},
  doi          = {10.1007/978-3-030-31511-5\_5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SheikhalishahiN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/SheikhalishahiT19,
  author       = {Mina Sheikhalishahi and
                  Gamze Tillem and
                  Zekeriya Erkin and
                  Nicola Zannone},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Josep Domingo{-}Ferrer},
  title        = {Privacy-Preserving Multi-Party Access Control},
  booktitle    = {Proceedings of the 18th {ACM} Workshop on Privacy in the Electronic
                  Society, WPES@CCS 2019, London, UK, November 11, 2019},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338498.3358643},
  doi          = {10.1145/3338498.3358643},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/SheikhalishahiT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-08803,
  author       = {Oguzhan Ersoy and
                  Stefanie Roos and
                  Zekeriya Erkin},
  title        = {How to profit from payments channels},
  journal      = {CoRR},
  volume       = {abs/1911.08803},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.08803},
  eprinttype    = {arXiv},
  eprint       = {1911.08803},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-08803.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NateghizadVEL18,
  author       = {Majid Nateghizad and
                  Thijs Veugen and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Secure Equality Testing Protocols in the Two-Party Setting},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {3:1--3:10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3230866},
  doi          = {10.1145/3230833.3230866},
  timestamp    = {Thu, 17 Jan 2019 22:19:51 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NateghizadVEL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/UgwuokeEL18,
  author       = {Chibuike Ugwuoke and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Secure Fixed-point Division for Homomorphically Encrypted Operands},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {33:1--33:10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3233272},
  doi          = {10.1145/3230833.3233272},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/UgwuokeEL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvcbt/RenCAJME18,
  author       = {Zhijie Ren and
                  Kelong Cong and
                  Taico Aerts and
                  Bart de Jonge and
                  Alejandro Morais and
                  Zekeriya Erkin},
  title        = {A Scale-Out Blockchain for Value Transfer with Spontaneous Sharding},
  booktitle    = {Crypto Valley Conference on Blockchain Technology, {CVCBT} 2018, Zug,
                  Switzerland, June 20-22, 2018},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CVCBT.2018.00006},
  doi          = {10.1109/CVCBT.2018.00006},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cvcbt/RenCAJME18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvcbt/ErsoyREL18,
  author       = {Oguzhan Ersoy and
                  Zhijie Ren and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {Transaction Propagation on Permissionless Blockchains: Incentive and
                  Routing Mechanisms},
  booktitle    = {Crypto Valley Conference on Blockchain Technology, {CVCBT} 2018, Zug,
                  Switzerland, June 20-22, 2018},
  pages        = {20--30},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CVCBT.2018.00008},
  doi          = {10.1109/CVCBT.2018.00008},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvcbt/ErsoyREL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/VerhaertNE18,
  author       = {Danilo Verhaert and
                  Majid Nateghizad and
                  Zekeriya Erkin},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {An Efficient Privacy-preserving Recommender System for e-Healthcare
                  Systems},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {354--365},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006858503540365},
  doi          = {10.5220/0006858503540365},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/VerhaertNE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/NateghizadEL18,
  author       = {Majid Nateghizad and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {Efficient Index-based Search Protocols for Encrypted Databases},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {436--447},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006869804360447},
  doi          = {10.5220/0006869804360447},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/NateghizadEL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/MaulanyNME18,
  author       = {Christian Maulany and
                  Majid Nateghizad and
                  Bart Mennink and
                  Zekeriya Erkin},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {Privacy-preserving Distributed Access Control for Medical Data},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {488--497},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006841404880497},
  doi          = {10.5220/0006841404880497},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/MaulanyNME18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/HelslootTE18,
  author       = {Leon J. Helsloot and
                  Gamze Tillem and
                  Zekeriya Erkin},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {BAdASS: Preserving Privacy in Behavioural Advertising with Applied
                  Secret Sharing},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {397--405},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_23},
  doi          = {10.1007/978-3-030-01446-9\_23},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/HelslootTE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/TillemEL18,
  author       = {Gamze Tillem and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {Mining Sequential Patterns from Outsourced Data via Encryption Switching},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514205},
  doi          = {10.1109/PST.2018.8514205},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/TillemEL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NateghizadEL18,
  author       = {Majid Nateghizad and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {A Novel Approach For Data Packing: Using Trapdoor Knapsack},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630769},
  doi          = {10.1109/WIFS.2018.8630769},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/NateghizadEL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-02531,
  author       = {Zhijie Ren and
                  Zekeriya Erkin},
  title        = {A Scale-out Blockchain for Value Transfer with Spontaneous Sharding},
  journal      = {CoRR},
  volume       = {abs/1801.02531},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.02531},
  eprinttype    = {arXiv},
  eprint       = {1801.02531},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-02531.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-09257,
  author       = {Dani{\"{e}}l Vos and
                  Leon Overweel and
                  Wouter Raateland and
                  Jelle Vos and
                  Matthijs Bijman and
                  Max Pigmans and
                  Zekeriya Erkin},
  title        = {DEFenD: {A} Secure and Privacy-Preserving Decentralized System for
                  Freight Declaration},
  journal      = {CoRR},
  volume       = {abs/1803.09257},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.09257},
  eprinttype    = {arXiv},
  eprint       = {1803.09257},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-09257.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-12596,
  author       = {Zhijie Ren and
                  Zekeriya Erkin},
  title        = {{VAPOR:} a Value-Centric Blockchain that is Scale-out, Decentralized,
                  and Flexible by Design},
  journal      = {CoRR},
  volume       = {abs/1810.12596},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.12596},
  eprinttype    = {arXiv},
  eprint       = {1810.12596},
  timestamp    = {Thu, 08 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-12596.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HelslootTE18,
  author       = {Leon J. Helsloot and
                  Gamze Tillem and
                  Zekeriya Erkin},
  title        = {BAdASS: Preserving Privacy in Behavioural Advertising with Applied
                  Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {744},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/744},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HelslootTE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/VeugenDEPVW17,
  author       = {Thijs Veugen and
                  Jeroen Doumen and
                  Zekeriya Erkin and
                  Gaetano Pellegrino and
                  Sicco Verwer and
                  Jos H. Weber},
  title        = {Improved privacy of dynamic group services},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {3},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0054-7},
  doi          = {10.1186/S13635-017-0054-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/VeugenDEPVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/UgwuokeEL17,
  author       = {Chibuike Ugwuoke and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {Privacy-safe linkage analysis with homomorphic encryption},
  booktitle    = {25th European Signal Processing Conference, {EUSIPCO} 2017, Kos, Greece,
                  August 28 - September 2, 2017},
  pages        = {961--965},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/EUSIPCO.2017.8081350},
  doi          = {10.23919/EUSIPCO.2017.8081350},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/UgwuokeEL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TillemEL17,
  author       = {Gamze Tillem and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Mining Encrypted Software Logs using Alpha Algorithm},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {267--274},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006408602670274},
  doi          = {10.5220/0006408602670274},
  timestamp    = {Thu, 17 Aug 2017 18:31:18 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TillemEL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/HijgenaarEKSBV17,
  author       = {Sjors Hijgenaar and
                  Zekeriya Erkin and
                  Tam{\'{a}}s Keviczky and
                  Jos Siemons and
                  Ralph Bisschops and
                  Alexander Verbraeck},
  title        = {A decentralised energy trading architecture for future smart grid
                  load balancing},
  booktitle    = {2017 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2017, Dresden, Germany, October 23-27, 2017},
  pages        = {77--82},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SmartGridComm.2017.8340707},
  doi          = {10.1109/SMARTGRIDCOMM.2017.8340707},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/HijgenaarEKSBV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/HelslootTE17,
  author       = {Leon J. Helsloot and
                  Gamze Tillem and
                  Zekeriya Erkin},
  title        = {AHEad: Privacy-preserving online behavioural advertising using homomorphic
                  encryption},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267662},
  doi          = {10.1109/WIFS.2017.8267662},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/HelslootTE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KnirschEE17,
  author       = {Fabian Knirsch and
                  Dominik Engel and
                  Zekeriya Erkin},
  title        = {A fault-tolerant and efficient scheme for data aggregation over groups
                  in the smart grid},
  booktitle    = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
                  2017, Rennes, France, December 4-7, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WIFS.2017.8267646},
  doi          = {10.1109/WIFS.2017.8267646},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/KnirschEE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RenCPE17,
  author       = {Zhijie Ren and
                  Kelong Cong and
                  Johan Pouwelse and
                  Zekeriya Erkin},
  title        = {Implicit Consensus: Blockchain with Unbounded Throughput},
  journal      = {CoRR},
  volume       = {abs/1705.11046},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.11046},
  eprinttype    = {arXiv},
  eprint       = {1705.11046},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RenCPE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-07564,
  author       = {Oguzhan Ersoy and
                  Zhijie Ren and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {Information Propagation on Permissionless Blockchains},
  journal      = {CoRR},
  volume       = {abs/1712.07564},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.07564},
  eprinttype    = {arXiv},
  eprint       = {1712.07564},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-07564.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/NateghizadEL16,
  author       = {Majid Nateghizad and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {An efficient privacy-preserving comparison protocol in smart metering
                  systems},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {11},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0033-4},
  doi          = {10.1186/S13635-016-0033-4},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/NateghizadEL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cd/SeepersWESS16,
  author       = {Robert M. Seepers and
                  Jos H. Weber and
                  Zekeriya Erkin and
                  Ioannis Sourdis and
                  Christos Strydis},
  editor       = {Gianluca Palermo and
                  John Feo},
  title        = {Secure key-exchange protocol for implants using heartbeats},
  booktitle    = {Proceedings of the {ACM} International Conference on Computing Frontiers,
                  CF'16, Como, Italy, May 16-19, 2016},
  pages        = {119--126},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2903150.2903165},
  doi          = {10.1145/2903150.2903165},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cd/SeepersWESS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/SunilEV16,
  author       = {Archana Bindu Sunil and
                  Zekeriya Erkin and
                  Thijs Veugen},
  title        = {Secure matching of dutch car license plates},
  booktitle    = {24th European Signal Processing Conference, {EUSIPCO} 2016, Budapest,
                  Hungary, August 29 - September 2, 2016},
  pages        = {2116--2120},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EUSIPCO.2016.7760622},
  doi          = {10.1109/EUSIPCO.2016.7760622},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/SunilEV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/ShrishakES16,
  author       = {Kris Shrishak and
                  Zekeriya Erkin and
                  Remco Schaar},
  editor       = {Mohamad Badra and
                  Giovanni Pau and
                  Vasos Vassiliou},
  title        = {Enhancing User Privacy in Federated eID Schemes},
  booktitle    = {8th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NTMS.2016.7792448},
  doi          = {10.1109/NTMS.2016.7792448},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/ShrishakES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/NateghizadEL16,
  author       = {Majid Nateghizad and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {Efficient and secure equality tests},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823915},
  doi          = {10.1109/WIFS.2016.7823915},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/NateghizadEL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jstsp/VeugenBHE15,
  author       = {Thijs Veugen and
                  Frank Blom and
                  Sebastiaan J. A. de Hoogh and
                  Zekeriya Erkin},
  title        = {Secure Comparison Protocols in the Semi-Honest Model},
  journal      = {{IEEE} J. Sel. Top. Signal Process.},
  volume       = {9},
  number       = {7},
  pages        = {1217--1228},
  year         = {2015},
  url          = {https://doi.org/10.1109/JSTSP.2015.2429117},
  doi          = {10.1109/JSTSP.2015.2429117},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jstsp/VeugenBHE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/VeugenE15,
  author       = {Thijs Veugen and
                  Zekeriya Erkin},
  title        = {Content-based recommendations with approximate integer division},
  booktitle    = {2015 {IEEE} International Conference on Acoustics, Speech and Signal
                  Processing, {ICASSP} 2015, South Brisbane, Queensland, Australia,
                  April 19-24, 2015},
  pages        = {1802--1806},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICASSP.2015.7178281},
  doi          = {10.1109/ICASSP.2015.7178281},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/VeugenE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Erkin15,
  author       = {Zekeriya Erkin},
  title        = {Private data aggregation with groups for smart grids in a dynamic
                  setting using {CRT}},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368584},
  doi          = {10.1109/WIFS.2015.7368584},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/Erkin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amt/ErkinLVR14,
  author       = {Zekeriya Erkin and
                  Jie Li and
                  Arnold P. O. S. Vermeeren and
                  Huib de Ridder},
  editor       = {Dominik Slezak and
                  Gerald Schaefer and
                  Son T. Vuong and
                  Yoo{-}Sung Kim},
  title        = {Privacy-Preserving Emotion Detection for Crowd Management},
  booktitle    = {Active Media Technology - 10th International Conference, {AMT} 2014,
                  Warsaw, Poland, August 11-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8610},
  pages        = {359--370},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09912-5\_30},
  doi          = {10.1007/978-3-319-09912-5\_30},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amt/ErkinLVR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/balkancryptsec/LubbeBE14,
  author       = {Jan C. A. van der Lubbe and
                  Merel J. de Boer and
                  Zeki Erkin},
  editor       = {Berna {\"{O}}rs and
                  Bart Preneel},
  title        = {A Signature Scheme for a Dynamic Coalition Defence Environment Without
                  Trusted Third Parties},
  booktitle    = {Cryptography and Information Security in the Balkans - First International
                  Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17,
                  2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9024},
  pages        = {237--249},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-21356-9\_16},
  doi          = {10.1007/978-3-319-21356-9\_16},
  timestamp    = {Tue, 16 Nov 2021 09:08:54 +0100},
  biburl       = {https://dblp.org/rec/conf/balkancryptsec/LubbeBE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ErkinV14,
  author       = {Zekeriya Erkin and
                  Thijs Veugen},
  editor       = {Klaus Kursawe and
                  Benessa Defend},
  title        = {Privacy Enhanced Personal Services for Smart Grids},
  booktitle    = {Proceedings of the 2nd Workshop on Smart Energy Grid Security, SEGS@CCS
                  2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2667190.2667193},
  doi          = {10.1145/2667190.2667193},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ErkinV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DantasEDHB14,
  author       = {Henrique Dantas and
                  Zekeriya Erkin and
                  Christian Doerr and
                  Raymond Hallie and
                  Gerrit van der Bij},
  editor       = {Klaus Kursawe and
                  Benessa Defend},
  title        = {eFuzz: {A} Fuzzer for {DLMS/COSEM} Electricity Meters},
  booktitle    = {Proceedings of the 2nd Workshop on Smart Energy Grid Security, SEGS@CCS
                  2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {31--38},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2667190.2667194},
  doi          = {10.1145/2667190.2667194},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DantasEDHB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ErkinVTL13,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Tomas Toft and
                  Reginald L. Lagendijk},
  title        = {Privacy-preserving distributed clustering},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2013},
  pages        = {4},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-417X-2013-4},
  doi          = {10.1186/1687-417X-2013-4},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ErkinVTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spm/LagendijkEB13,
  author       = {Reginald L. Lagendijk and
                  Zekeriya Erkin and
                  Mauro Barni},
  title        = {Encrypted Signal Processing for Privacy Protection: Conveying the
                  Utility of Homomorphic Encryption and Multiparty Computation},
  journal      = {{IEEE} Signal Process. Mag.},
  volume       = {30},
  number       = {1},
  pages        = {82--105},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2012.2219653},
  doi          = {10.1109/MSP.2012.2219653},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spm/LagendijkEB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spm/ErkinTLP13,
  author       = {Zekeriya Erkin and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Reginald L. Lagendijk and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Privacy-Preserving Data Aggregation in Smart Metering Systems: An
                  Overview},
  journal      = {{IEEE} Signal Process. Mag.},
  volume       = {30},
  number       = {2},
  pages        = {75--86},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2012.2228343},
  doi          = {10.1109/MSP.2012.2228343},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spm/ErkinTLP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KononchukELL13,
  author       = {Dmitry Kononchuk and
                  Zekeriya Erkin and
                  Jan C. A. van der Lubbe and
                  Reginald L. Lagendijk},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Privacy-Preserving User Data Oriented Services for Groups with Dynamic
                  Participation},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {418--442},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_24},
  doi          = {10.1007/978-3-642-40203-6\_24},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KononchukELL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/HendriksEG13,
  author       = {Richard C. Hendriks and
                  Zekeriya Erkin and
                  Timo Gerkmann},
  title        = {Privacy preserving distributed beamforming based on homomorphic encryption},
  booktitle    = {21st European Signal Processing Conference, {EUSIPCO} 2013, Marrakech,
                  Morocco, September 9-13, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6811479/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/HendriksEG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/HendriksEG13,
  author       = {Richard C. Hendriks and
                  Zekeriya Erkin and
                  Timo Gerkmann},
  title        = {Privacy-preserving distributed speech enhancement forwireless sensor
                  networks by processing in the encrypted domain},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2013, Vancouver, BC, Canada, May 26-31, 2013},
  pages        = {7005--7009},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICASSP.2013.6639020},
  doi          = {10.1109/ICASSP.2013.6639020},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/HendriksEG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ErkinVL13,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Reginald L. Lagendijk},
  title        = {Privacy-preserving recommender systems in dynamic environments},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707795},
  doi          = {10.1109/WIFS.2013.6707795},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ErkinVL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ZeilemakerEPP13,
  author       = {Niels Zeilemaker and
                  Zekeriya Erkin and
                  Paolo Palmieri and
                  Johan A. Pouwelse},
  title        = {Building a privacy-preserving semantic overlay for Peer-to-Peer networks},
  booktitle    = {2013 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages        = {79--84},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WIFS.2013.6707798},
  doi          = {10.1109/WIFS.2013.6707798},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ZeilemakerEPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/JeckmansBEHLT13,
  author       = {Arjan J. P. Jeckmans and
                  Michael Beye and
                  Zekeriya Erkin and
                  Pieter H. Hartel and
                  Reginald L. Lagendijk and
                  Qiang Tang},
  editor       = {Naeem Ramzan and
                  Roelof van Zwol and
                  Jong{-}Seok Lee and
                  Kai Cl{\"{u}}ver and
                  Xian{-}Sheng Hua},
  title        = {Privacy in Recommender Systems},
  booktitle    = {Social Media Retrieval},
  series       = {Computer Communications and Networks},
  pages        = {263--281},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4471-4555-4\_12},
  doi          = {10.1007/978-1-4471-4555-4\_12},
  timestamp    = {Fri, 09 Apr 2021 18:18:56 +0200},
  biburl       = {https://dblp.org/rec/series/ccn/JeckmansBEHLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ErkinVTL12,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Tomas Toft and
                  Reginald L. Lagendijk},
  title        = {Generating Private Recommendations Efficiently Using Homomorphic Encryption
                  and Data Packing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {3},
  pages        = {1053--1066},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2190726},
  doi          = {10.1109/TIFS.2012.2190726},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ErkinVTL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ErkinT12,
  author       = {Zekeriya Erkin and
                  Gene Tsudik},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {Private Computation of Spatial and Temporal Power Consumption with
                  Smart Meters},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {561--577},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_33},
  doi          = {10.1007/978-3-642-31284-7\_33},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ErkinT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/PuechEBRL12,
  author       = {William Puech and
                  Zekeriya Erkin and
                  Mauro Barni and
                  Shantanu Rane and
                  Reginald L. Lagendijk},
  title        = {Emerging cryptographic challenges in image and video processing},
  booktitle    = {19th {IEEE} International Conference on Image Processing, {ICIP} 2012,
                  Lake Buena Vista, Orlando, FL, USA, September 30 - October 3, 2012},
  pages        = {2629--2632},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICIP.2012.6467438},
  doi          = {10.1109/ICIP.2012.6467438},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/PuechEBRL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ErkinBVL12,
  author       = {Zekeriya Erkin and
                  Michael Beye and
                  Thijs Veugen and
                  Reginald L. Lagendijk},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Privacy-preserving content-based recommender system},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {77--84},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361420},
  doi          = {10.1145/2361407.2361420},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ErkinBVL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cason/ErkinVL11,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Reginald L. Lagendijk},
  title        = {Generating private recommendations in a social trust network},
  booktitle    = {International Conference on Computational Aspects of Social Networks,
                  CASoN 2011, Salamanca, Spain, October 19-21, 2011},
  pages        = {82--87},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CASON.2011.6085923},
  doi          = {10.1109/CASON.2011.6085923},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cason/ErkinVL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/ErkinBVL11,
  author       = {Zekeriya Erkin and
                  Michael Beye and
                  Thijs Veugen and
                  Reginald L. Lagendijk},
  title        = {Efficiently computing private recommendations},
  booktitle    = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
                  and Signal Processing, {ICASSP} 2011, May 22-27, 2011, Prague Congress
                  Center, Prague, Czech Republic},
  pages        = {5864--5867},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICASSP.2011.5947695},
  doi          = {10.1109/ICASSP.2011.5947695},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/ErkinBVL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BeyeEL11,
  author       = {Michael Beye and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {Efficient privacy preserving K-means clustering in a three-party setting},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123148},
  doi          = {10.1109/WIFS.2011.6123148},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BeyeEL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Erkin10,
  author       = {Zekeriya Erkin},
  title        = {Secure signal processing: Privacy preserving cryptographic protocols
                  for multimedia},
  school       = {Delft University of Technology, Netherlands},
  year         = {2010},
  url          = {http://resolver.tudelft.nl/uuid:a8495e87-4134-4e1b-93cc-b0ba4163b2b0},
  timestamp    = {Mon, 10 Apr 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Erkin10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ErkinFGKLT09,
  author       = {Zekeriya Erkin and
                  Martin Franz and
                  Jorge Guajardo and
                  Stefan Katzenbeisser and
                  Inald Lagendijk and
                  Tomas Toft},
  editor       = {Ian Goldberg and
                  Mikhail J. Atallah},
  title        = {Privacy-Preserving Face Recognition},
  booktitle    = {Privacy Enhancing Technologies, 9th International Symposium, {PETS}
                  2009, Seattle, WA, USA, August 5-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5672},
  pages        = {235--253},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03168-7\_14},
  doi          = {10.1007/978-3-642-03168-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/ErkinFGKLT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ErkinVTL09,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Tomas Toft and
                  Reginald L. Lagendijk},
  title        = {Privacy-preserving user clustering in a social network},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {96--100},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386476},
  doi          = {10.1109/WIFS.2009.5386476},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ErkinVTL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ErkinPKLSNB07,
  author       = {Zekeriya Erkin and
                  Alessandro Piva and
                  Stefan Katzenbeisser and
                  Reginald L. Lagendijk and
                  Jamshid Shokrollahi and
                  Gregory Neven and
                  Mauro Barni},
  title        = {Protection and Retrieval of Encrypted Multimedia Content: When Cryptography
                  Meets Signal Processing},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/78943},
  doi          = {10.1155/2007/78943},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ErkinPKLSNB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/PrinsEL07,
  author       = {Jeroen P. Prins and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {Anonymous Fingerprinting with Robust {QIM} Watermarking Techniques},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/31340},
  doi          = {10.1155/2007/31340},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/PrinsEL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics