Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zekeriya Erkin
@article{DBLP:journals/sensors/KromesLBGHE24, author = {Roland Kromes and Tianyu Li and Maxime Bouillion and Talha Enes G{\"{u}}ler and Victor van der Hulst and Zekeriya Erkin}, title = {Fear of Missing Out: Constrained Trial of Blockchain in Supply Chain}, journal = {Sensors}, volume = {24}, number = {3}, pages = {986}, year = {2024}, url = {https://doi.org/10.3390/s24030986}, doi = {10.3390/S24030986}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/KromesLBGHE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ZahedaniVE23, author = {Armin Memar Zahedani and Jelle Vos and Zekeriya Erkin}, title = {Practical Verifiable {\&} Privacy-Preserving Double Auctions}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {25:1--25:9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3600190}, doi = {10.1145/3600160.3600190}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ZahedaniVE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcca/XuLE23, author = {Li Xu and Tianyu Li and Zekeriya Erkin}, editor = {Moayad Aloqaily and Safa Otoum and Ouns Bouachir and Yaser Jararweh and Ismaeel Al Ridhawi and Khalid Al{-}Begain and Mohammad A. Alsmirat}, title = {Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism}, booktitle = {Fifth International Conference on Blockchain Computing and Applications, {BCCA} 2023, Kuwait, Kuwait, October 24-26, 2023}, pages = {266--273}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BCCA58897.2023.10338923}, doi = {10.1109/BCCA58897.2023.10338923}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bcca/XuLE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/de/MaesenILE23, author = {Palle Maesen and Devri\c{s} \.{I}\c{s}ler and Nikolaos Laoutaris and Zekeriya Erkin}, title = {Image Watermarking for Machine Learning Datasets}, booktitle = {Proceedings of the Second {ACM} Data Economy Workshop, {DEC} 2023, Seattle, WA, USA, 18 June 2023}, pages = {7--13}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600046.3600048}, doi = {10.1145/3600046.3600048}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/de/MaesenILE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/de/HristovILE23, author = {Tsvetomir Hristov and Devri\c{s} \.{I}\c{s}ler and Nikolaos Laoutaris and Zekeriya Erkin}, title = {Graph Database Watermarking Using Pseudo-Nodes}, booktitle = {Proceedings of the Second {ACM} Data Economy Workshop, {DEC} 2023, Seattle, WA, USA, 18 June 2023}, pages = {14--20}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600046.3600049}, doi = {10.1145/3600046.3600049}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/de/HristovILE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiXEL23, author = {Tianyu Li and Li Xu and Zekeriya Erkin and Reginald L. Lagendijk}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Trajectory Hiding and Sharing for Supply Chains with Differential Privacy}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14345}, pages = {297--317}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51476-0\_15}, doi = {10.1007/978-3-031-51476-0\_15}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LiXEL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-15394, author = {Dani{\"{e}}l Vos and Jelle Vos and Tianyu Li and Zekeriya Erkin and Sicco Verwer}, title = {Differentially-Private Decision Trees with Probabilistic Robustness to Data Poisoning}, journal = {CoRR}, volume = {abs/2305.15394}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.15394}, doi = {10.48550/ARXIV.2305.15394}, eprinttype = {arXiv}, eprint = {2305.15394}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-15394.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-05248, author = {Florine W. Dekker and Zekeriya Erkin and Mauro Conti}, title = {Topology-Based Reconstruction Prevention for Decentralised Learning}, journal = {CoRR}, volume = {abs/2312.05248}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.05248}, doi = {10.48550/ARXIV.2312.05248}, eprinttype = {arXiv}, eprint = {2312.05248}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-05248.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VosCE23, author = {Jelle Vos and Mauro Conti and Zekeriya Erkin}, title = {SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1777}, year = {2023}, url = {https://eprint.iacr.org/2023/1777}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/VosCE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BayEHSV22, author = {Asl{\'{\i}} Bay and Zekeriya Erkin and Jaap{-}Henk Hoepman and Simona Samardjiska and Jelle Vos}, title = {Practical Multi-Party Private Set Intersection Protocols}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2021.3118879}, doi = {10.1109/TIFS.2021.3118879}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BayEHSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/VosVE22, author = {Jelle Vos and Dani{\"{e}}l Vos and Zekeriya Erkin}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, pages = {408--423}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6\_20}, doi = {10.1007/978-3-031-17140-6\_20}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/VosVE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/LiVE22, author = {Tianyu Li and Jelle Vos and Zekeriya Erkin}, title = {Decentralized Private Freight Declaration {\&} Tracking with Data Validation}, booktitle = {2022 {IEEE} International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom 2022 Workshops, Pisa, Italy, March 21-25, 2022}, pages = {267--272}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/PerComWorkshops53856.2022.9767444}, doi = {10.1109/PERCOMWORKSHOPS53856.2022.9767444}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/LiVE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/KesterLE22, author = {David Kester and Tianyu Li and Zekeriya Erkin}, title = {{PRIDE:} {A} Privacy-Preserving Decentralised Key Management System}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2022, Shanghai, China, December 12-16, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WIFS55849.2022.9975379}, doi = {10.1109/WIFS55849.2022.9975379}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/KesterLE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VosCE22, author = {Jelle Vos and Mauro Conti and Zekeriya Erkin}, title = {Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {721}, year = {2022}, url = {https://eprint.iacr.org/2022/721}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VosCE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DekkerE21, author = {Florine W. Dekker and Zekeriya Erkin}, editor = {Kazue Sako and Nils Ole Tippenhauer}, title = {Privacy-Preserving Data Aggregation with Probabilistic Range Validation}, booktitle = {Applied Cryptography and Network Security - 19th International Conference, {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12727}, pages = {79--98}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78375-4\_4}, doi = {10.1007/978-3-030-78375-4\_4}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DekkerE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dappcon/ErsoyGEC21, author = {Oguzhan Ersoy and Ziya Alper Gen{\c{c}} and Zekeriya Erkin and Mauro Conti}, title = {Practical Exchange for Unique Digital Goods}, booktitle = {{IEEE} International Conference on Decentralized Applications and Infrastructures, {DAPPS} 2021, Online Event, August 23-26, 2021}, pages = {49--58}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DAPPS52256.2021.00011}, doi = {10.1109/DAPPS52256.2021.00011}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dappcon/ErsoyGEC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HoogerwerfTBE21, author = {Erwin Hoogerwerf and Daphne van Tetering and Asl{\'{\i}} Bay and Zekeriya Erkin}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Efficient Joint Random Number Generation for Secure Multi-party Computation}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {436--443}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010534804360443}, doi = {10.5220/0010534804360443}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HoogerwerfTBE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BayEAV21, author = {Asl{\'{\i}} Bay and Zeki Erkin and Mina Alishahi and Jelle Vos}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Multi-Party Private Set Intersection Protocols for Practical Applications}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {515--522}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010547605150522}, doi = {10.5220/0010547605150522}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BayEAV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/VosED21, author = {Jelle Vos and Zekeriya Erkin and Christian Doerr}, title = {Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2021, Montpellier, France, December 7-10, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WIFS53200.2021.9648381}, doi = {10.1109/WIFS53200.2021.9648381}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/VosED21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VosED21, author = {Jelle Vos and Zekeriya Erkin and Christian Doerr}, title = {Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1260}, year = {2021}, url = {https://eprint.iacr.org/2021/1260}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VosED21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/UgwuokeERL20, author = {Chibuike Ugwuoke and Zekeriya Erkin and Marcel J. T. Reinders and Reginald L. Lagendijk}, editor = {Vassil Roussev and Bhavani Thuraisingham and Barbara Carminati and Murat Kantarcioglu}, title = {{PREDICT:} Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model}, booktitle = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020}, pages = {329--340}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3374664.3375729}, doi = {10.1145/3374664.3375729}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/UgwuokeERL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/EsginEE20, author = {Muhammed F. Esgin and Oguzhan Ersoy and Zekeriya Erkin}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Post-Quantum Adaptor Signatures and Payment Channel Networks}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {378--397}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_19}, doi = {10.1007/978-3-030-59013-0\_19}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/EsginEE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ErsoyRE20, author = {Oguzhan Ersoy and Stefanie Roos and Zekeriya Erkin}, editor = {Joseph Bonneau and Nadia Heninger}, title = {How to Profit from Payments Channels}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {284--303}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4\_16}, doi = {10.1007/978-3-030-51280-4\_16}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ErsoyRE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EsginEE20, author = {Muhammed F. Esgin and Oguzhan Ersoy and Zekeriya Erkin}, title = {Post-Quantum Adaptor Signatures and Payment Channel Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2020}, url = {https://eprint.iacr.org/2020/845}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EsginEE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eninf/NandakumarTEK19, author = {Lakshminarayanan Nandakumar and Gamze Tillem and Zekeriya Erkin and Tam{\'{a}}s Keviczky}, title = {Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscation}, journal = {Energy Inform.}, volume = {2}, number = {{S1}}, year = {2019}, url = {https://doi.org/10.1186/s42162-019-0078-y}, doi = {10.1186/S42162-019-0078-Y}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eninf/NandakumarTEK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HoogervorstZTEV19, author = {Rowan Hoogervorst and Yingqian Zhang and Gamze Tillem and Zekeriya Erkin and Sicco Verwer}, title = {Solving bin-packing problems under privacy preservation: Possibilities and trade-offs}, journal = {Inf. Sci.}, volume = {500}, pages = {203--216}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.05.011}, doi = {10.1016/J.INS.2019.05.011}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HoogervorstZTEV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HelslootTE19, author = {Leon J. Helsloot and Gamze Tillem and Zekeriya Erkin}, title = {BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {1}, pages = {23--41}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.03.31.023}, doi = {10.22667/JOWUA.2019.03.31.023}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HelslootTE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KarakocNE19, author = {Ferhat Karako{\c{c}} and Majid Nateghizad and Zekeriya Erkin}, title = {{SET-OT:} {A} Secure Equality Testing Protocol Based on Oblivious Transfer}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {12:1--12:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339264}, doi = {10.1145/3339252.3339264}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KarakocNE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ErsoyEL19, author = {Oguzhan Ersoy and Zekeriya Erkin and Reginald L. Lagendijk}, title = {{TULIP:} {A} Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication}, booktitle = {2019 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {396--405}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSPW.2019.00050}, doi = {10.1109/EUROSPW.2019.00050}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ErsoyEL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RenE19, author = {Zhijie Ren and Zekeriya Erkin}, editor = {Ian Goldberg and Tyler Moore}, title = {{VAPOR:} {A} Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {487--507}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_29}, doi = {10.1007/978-3-030-32101-7\_29}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/RenE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/marble/ErsoyEL19, author = {Oguzhan Ersoy and Zekeriya Erkin and Reginald L. Lagendijk}, editor = {Panos M. Pardalos and Ilias S. Kotsireas and Yike Guo and William J. Knottenbelt}, title = {Decentralized Incentive-Compatible and Sybil-Proof Transaction Advertisement}, booktitle = {1st International Conference on Mathematical Research for Blockchain Economy, {MARBLE} 2019, Santorini, Greece, May 6-9, 2019}, series = {Springer Proceedings in Business and Economics}, pages = {151--165}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37110-4\_11}, doi = {10.1007/978-3-030-37110-4\_11}, timestamp = {Tue, 11 Jul 2023 15:51:52 +0200}, biburl = {https://dblp.org/rec/conf/marble/ErsoyEL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/KampUE19, author = {Lars Van De Kamp and Chibuike Ugwuoke and Zekeriya Erkin}, title = {ECONoMy: Ensemble Collaborative Learning Using Masking}, booktitle = {30th {IEEE} International Symposium on Personal, Indoor and Mobile Radio Communications Workshops, {PIMRC} Workshops 2019, Istanbul, Turkey, September 8, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PIMRCW.2019.8880822}, doi = {10.1109/PIMRCW.2019.8880822}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/KampUE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/MaouchiEE19, author = {Mourad el Maouchi and Oguzhan Ersoy and Zekeriya Erkin}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {{DECOUPLES:} a decentralized, unlinkable and privacy-preserving traceability system for the supply chain}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {364--373}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297318}, doi = {10.1145/3297280.3297318}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/MaouchiEE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/LaanEE19, author = {Bjorn van der Laan and Oguzhan Ersoy and Zekeriya Erkin}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {{MUSCLE:} authenticated external data retrieval from multiple sources for smart contracts}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {382--391}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297320}, doi = {10.1145/3297280.3297320}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/LaanEE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SheikhalishahiN19, author = {Mina Sheikhalishahi and Majid Nateghizad and Fabio Martinelli and Zekeriya Erkin and Marco Loog}, editor = {Sjouke Mauw and Mauro Conti}, title = {On the Statistical Detection of Adversarial Instances over Encrypted Data}, booktitle = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, pages = {71--88}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5\_5}, doi = {10.1007/978-3-030-31511-5\_5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SheikhalishahiN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/SheikhalishahiT19, author = {Mina Sheikhalishahi and Gamze Tillem and Zekeriya Erkin and Nicola Zannone}, editor = {Lorenzo Cavallaro and Johannes Kinder and Josep Domingo{-}Ferrer}, title = {Privacy-Preserving Multi-Party Access Control}, booktitle = {Proceedings of the 18th {ACM} Workshop on Privacy in the Electronic Society, WPES@CCS 2019, London, UK, November 11, 2019}, pages = {1--13}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338498.3358643}, doi = {10.1145/3338498.3358643}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/SheikhalishahiT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-08803, author = {Oguzhan Ersoy and Stefanie Roos and Zekeriya Erkin}, title = {How to profit from payments channels}, journal = {CoRR}, volume = {abs/1911.08803}, year = {2019}, url = {http://arxiv.org/abs/1911.08803}, eprinttype = {arXiv}, eprint = {1911.08803}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-08803.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NateghizadVEL18, author = {Majid Nateghizad and Thijs Veugen and Zekeriya Erkin and Reginald L. Lagendijk}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Secure Equality Testing Protocols in the Two-Party Setting}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {3:1--3:10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3230866}, doi = {10.1145/3230833.3230866}, timestamp = {Thu, 17 Jan 2019 22:19:51 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/NateghizadVEL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/UgwuokeEL18, author = {Chibuike Ugwuoke and Zekeriya Erkin and Reginald L. Lagendijk}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Secure Fixed-point Division for Homomorphically Encrypted Operands}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {33:1--33:10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3233272}, doi = {10.1145/3230833.3233272}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/UgwuokeEL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvcbt/RenCAJME18, author = {Zhijie Ren and Kelong Cong and Taico Aerts and Bart de Jonge and Alejandro Morais and Zekeriya Erkin}, title = {A Scale-Out Blockchain for Value Transfer with Spontaneous Sharding}, booktitle = {Crypto Valley Conference on Blockchain Technology, {CVCBT} 2018, Zug, Switzerland, June 20-22, 2018}, pages = {1--10}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CVCBT.2018.00006}, doi = {10.1109/CVCBT.2018.00006}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/cvcbt/RenCAJME18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvcbt/ErsoyREL18, author = {Oguzhan Ersoy and Zhijie Ren and Zekeriya Erkin and Reginald L. Lagendijk}, title = {Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms}, booktitle = {Crypto Valley Conference on Blockchain Technology, {CVCBT} 2018, Zug, Switzerland, June 20-22, 2018}, pages = {20--30}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CVCBT.2018.00008}, doi = {10.1109/CVCBT.2018.00008}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvcbt/ErsoyREL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/VerhaertNE18, author = {Danilo Verhaert and Majid Nateghizad and Zekeriya Erkin}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {An Efficient Privacy-preserving Recommender System for e-Healthcare Systems}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {354--365}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006858503540365}, doi = {10.5220/0006858503540365}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/VerhaertNE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/NateghizadEL18, author = {Majid Nateghizad and Zekeriya Erkin and Reginald L. Lagendijk}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Efficient Index-based Search Protocols for Encrypted Databases}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {436--447}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006869804360447}, doi = {10.5220/0006869804360447}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/NateghizadEL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/MaulanyNME18, author = {Christian Maulany and Majid Nateghizad and Bart Mennink and Zekeriya Erkin}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Privacy-preserving Distributed Access Control for Medical Data}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {488--497}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006841404880497}, doi = {10.5220/0006841404880497}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/MaulanyNME18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/HelslootTE18, author = {Leon J. Helsloot and Gamze Tillem and Zekeriya Erkin}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {397--405}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_23}, doi = {10.1007/978-3-030-01446-9\_23}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/HelslootTE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/TillemEL18, author = {Gamze Tillem and Zekeriya Erkin and Reginald L. Lagendijk}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {Mining Sequential Patterns from Outsourced Data via Encryption Switching}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514205}, doi = {10.1109/PST.2018.8514205}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/TillemEL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/NateghizadEL18, author = {Majid Nateghizad and Zekeriya Erkin and Reginald L. Lagendijk}, title = {A Novel Approach For Data Packing: Using Trapdoor Knapsack}, booktitle = {2018 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2018, Hong Kong, China, December 11-13, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/WIFS.2018.8630769}, doi = {10.1109/WIFS.2018.8630769}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/NateghizadEL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-02531, author = {Zhijie Ren and Zekeriya Erkin}, title = {A Scale-out Blockchain for Value Transfer with Spontaneous Sharding}, journal = {CoRR}, volume = {abs/1801.02531}, year = {2018}, url = {http://arxiv.org/abs/1801.02531}, eprinttype = {arXiv}, eprint = {1801.02531}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-02531.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-09257, author = {Dani{\"{e}}l Vos and Leon Overweel and Wouter Raateland and Jelle Vos and Matthijs Bijman and Max Pigmans and Zekeriya Erkin}, title = {DEFenD: {A} Secure and Privacy-Preserving Decentralized System for Freight Declaration}, journal = {CoRR}, volume = {abs/1803.09257}, year = {2018}, url = {http://arxiv.org/abs/1803.09257}, eprinttype = {arXiv}, eprint = {1803.09257}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-09257.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-12596, author = {Zhijie Ren and Zekeriya Erkin}, title = {{VAPOR:} a Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design}, journal = {CoRR}, volume = {abs/1810.12596}, year = {2018}, url = {http://arxiv.org/abs/1810.12596}, eprinttype = {arXiv}, eprint = {1810.12596}, timestamp = {Thu, 08 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-12596.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HelslootTE18, author = {Leon J. Helsloot and Gamze Tillem and Zekeriya Erkin}, title = {BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {744}, year = {2018}, url = {https://eprint.iacr.org/2018/744}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HelslootTE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/VeugenDEPVW17, author = {Thijs Veugen and Jeroen Doumen and Zekeriya Erkin and Gaetano Pellegrino and Sicco Verwer and Jos H. Weber}, title = {Improved privacy of dynamic group services}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {3}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0054-7}, doi = {10.1186/S13635-017-0054-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/VeugenDEPVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/UgwuokeEL17, author = {Chibuike Ugwuoke and Zekeriya Erkin and Reginald L. Lagendijk}, title = {Privacy-safe linkage analysis with homomorphic encryption}, booktitle = {25th European Signal Processing Conference, {EUSIPCO} 2017, Kos, Greece, August 28 - September 2, 2017}, pages = {961--965}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/EUSIPCO.2017.8081350}, doi = {10.23919/EUSIPCO.2017.8081350}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/UgwuokeEL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TillemEL17, author = {Gamze Tillem and Zekeriya Erkin and Reginald L. Lagendijk}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Mining Encrypted Software Logs using Alpha Algorithm}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {267--274}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006408602670274}, doi = {10.5220/0006408602670274}, timestamp = {Thu, 17 Aug 2017 18:31:18 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TillemEL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/HijgenaarEKSBV17, author = {Sjors Hijgenaar and Zekeriya Erkin and Tam{\'{a}}s Keviczky and Jos Siemons and Ralph Bisschops and Alexander Verbraeck}, title = {A decentralised energy trading architecture for future smart grid load balancing}, booktitle = {2017 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2017, Dresden, Germany, October 23-27, 2017}, pages = {77--82}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SmartGridComm.2017.8340707}, doi = {10.1109/SMARTGRIDCOMM.2017.8340707}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/HijgenaarEKSBV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/HelslootTE17, author = {Leon J. Helsloot and Gamze Tillem and Zekeriya Erkin}, title = {AHEad: Privacy-preserving online behavioural advertising using homomorphic encryption}, booktitle = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS} 2017, Rennes, France, December 4-7, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WIFS.2017.8267662}, doi = {10.1109/WIFS.2017.8267662}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/HelslootTE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/KnirschEE17, author = {Fabian Knirsch and Dominik Engel and Zekeriya Erkin}, title = {A fault-tolerant and efficient scheme for data aggregation over groups in the smart grid}, booktitle = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS} 2017, Rennes, France, December 4-7, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WIFS.2017.8267646}, doi = {10.1109/WIFS.2017.8267646}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/KnirschEE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RenCPE17, author = {Zhijie Ren and Kelong Cong and Johan Pouwelse and Zekeriya Erkin}, title = {Implicit Consensus: Blockchain with Unbounded Throughput}, journal = {CoRR}, volume = {abs/1705.11046}, year = {2017}, url = {http://arxiv.org/abs/1705.11046}, eprinttype = {arXiv}, eprint = {1705.11046}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RenCPE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-07564, author = {Oguzhan Ersoy and Zhijie Ren and Zekeriya Erkin and Reginald L. Lagendijk}, title = {Information Propagation on Permissionless Blockchains}, journal = {CoRR}, volume = {abs/1712.07564}, year = {2017}, url = {http://arxiv.org/abs/1712.07564}, eprinttype = {arXiv}, eprint = {1712.07564}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-07564.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/NateghizadEL16, author = {Majid Nateghizad and Zekeriya Erkin and Reginald L. Lagendijk}, title = {An efficient privacy-preserving comparison protocol in smart metering systems}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {11}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0033-4}, doi = {10.1186/S13635-016-0033-4}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/NateghizadEL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cd/SeepersWESS16, author = {Robert M. Seepers and Jos H. Weber and Zekeriya Erkin and Ioannis Sourdis and Christos Strydis}, editor = {Gianluca Palermo and John Feo}, title = {Secure key-exchange protocol for implants using heartbeats}, booktitle = {Proceedings of the {ACM} International Conference on Computing Frontiers, CF'16, Como, Italy, May 16-19, 2016}, pages = {119--126}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2903150.2903165}, doi = {10.1145/2903150.2903165}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cd/SeepersWESS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/SunilEV16, author = {Archana Bindu Sunil and Zekeriya Erkin and Thijs Veugen}, title = {Secure matching of dutch car license plates}, booktitle = {24th European Signal Processing Conference, {EUSIPCO} 2016, Budapest, Hungary, August 29 - September 2, 2016}, pages = {2116--2120}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EUSIPCO.2016.7760622}, doi = {10.1109/EUSIPCO.2016.7760622}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/SunilEV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/ShrishakES16, author = {Kris Shrishak and Zekeriya Erkin and Remco Schaar}, editor = {Mohamad Badra and Giovanni Pau and Vasos Vassiliou}, title = {Enhancing User Privacy in Federated eID Schemes}, booktitle = {8th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NTMS.2016.7792448}, doi = {10.1109/NTMS.2016.7792448}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/ShrishakES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/NateghizadEL16, author = {Majid Nateghizad and Zekeriya Erkin and Reginald L. Lagendijk}, title = {Efficient and secure equality tests}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WIFS.2016.7823915}, doi = {10.1109/WIFS.2016.7823915}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/NateghizadEL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jstsp/VeugenBHE15, author = {Thijs Veugen and Frank Blom and Sebastiaan J. A. de Hoogh and Zekeriya Erkin}, title = {Secure Comparison Protocols in the Semi-Honest Model}, journal = {{IEEE} J. Sel. Top. Signal Process.}, volume = {9}, number = {7}, pages = {1217--1228}, year = {2015}, url = {https://doi.org/10.1109/JSTSP.2015.2429117}, doi = {10.1109/JSTSP.2015.2429117}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jstsp/VeugenBHE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/VeugenE15, author = {Thijs Veugen and Zekeriya Erkin}, title = {Content-based recommendations with approximate integer division}, booktitle = {2015 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2015, South Brisbane, Queensland, Australia, April 19-24, 2015}, pages = {1802--1806}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICASSP.2015.7178281}, doi = {10.1109/ICASSP.2015.7178281}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/VeugenE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Erkin15, author = {Zekeriya Erkin}, title = {Private data aggregation with groups for smart grids in a dynamic setting using {CRT}}, booktitle = {2015 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2015, Roma, Italy, November 16-19, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/WIFS.2015.7368584}, doi = {10.1109/WIFS.2015.7368584}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Erkin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amt/ErkinLVR14, author = {Zekeriya Erkin and Jie Li and Arnold P. O. S. Vermeeren and Huib de Ridder}, editor = {Dominik Slezak and Gerald Schaefer and Son T. Vuong and Yoo{-}Sung Kim}, title = {Privacy-Preserving Emotion Detection for Crowd Management}, booktitle = {Active Media Technology - 10th International Conference, {AMT} 2014, Warsaw, Poland, August 11-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8610}, pages = {359--370}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09912-5\_30}, doi = {10.1007/978-3-319-09912-5\_30}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amt/ErkinLVR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/balkancryptsec/LubbeBE14, author = {Jan C. A. van der Lubbe and Merel J. de Boer and Zeki Erkin}, editor = {Berna {\"{O}}rs and Bart Preneel}, title = {A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties}, booktitle = {Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9024}, pages = {237--249}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-21356-9\_16}, doi = {10.1007/978-3-319-21356-9\_16}, timestamp = {Tue, 16 Nov 2021 09:08:54 +0100}, biburl = {https://dblp.org/rec/conf/balkancryptsec/LubbeBE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ErkinV14, author = {Zekeriya Erkin and Thijs Veugen}, editor = {Klaus Kursawe and Benessa Defend}, title = {Privacy Enhanced Personal Services for Smart Grids}, booktitle = {Proceedings of the 2nd Workshop on Smart Energy Grid Security, SEGS@CCS 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {7--12}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2667190.2667193}, doi = {10.1145/2667190.2667193}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ErkinV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DantasEDHB14, author = {Henrique Dantas and Zekeriya Erkin and Christian Doerr and Raymond Hallie and Gerrit van der Bij}, editor = {Klaus Kursawe and Benessa Defend}, title = {eFuzz: {A} Fuzzer for {DLMS/COSEM} Electricity Meters}, booktitle = {Proceedings of the 2nd Workshop on Smart Energy Grid Security, SEGS@CCS 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {31--38}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2667190.2667194}, doi = {10.1145/2667190.2667194}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DantasEDHB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ErkinVTL13, author = {Zekeriya Erkin and Thijs Veugen and Tomas Toft and Reginald L. Lagendijk}, title = {Privacy-preserving distributed clustering}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2013}, pages = {4}, year = {2013}, url = {https://doi.org/10.1186/1687-417X-2013-4}, doi = {10.1186/1687-417X-2013-4}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ErkinVTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spm/LagendijkEB13, author = {Reginald L. Lagendijk and Zekeriya Erkin and Mauro Barni}, title = {Encrypted Signal Processing for Privacy Protection: Conveying the Utility of Homomorphic Encryption and Multiparty Computation}, journal = {{IEEE} Signal Process. Mag.}, volume = {30}, number = {1}, pages = {82--105}, year = {2013}, url = {https://doi.org/10.1109/MSP.2012.2219653}, doi = {10.1109/MSP.2012.2219653}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spm/LagendijkEB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spm/ErkinTLP13, author = {Zekeriya Erkin and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Reginald L. Lagendijk and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview}, journal = {{IEEE} Signal Process. Mag.}, volume = {30}, number = {2}, pages = {75--86}, year = {2013}, url = {https://doi.org/10.1109/MSP.2012.2228343}, doi = {10.1109/MSP.2012.2228343}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spm/ErkinTLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KononchukELL13, author = {Dmitry Kononchuk and Zekeriya Erkin and Jan C. A. van der Lubbe and Reginald L. Lagendijk}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {418--442}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_24}, doi = {10.1007/978-3-642-40203-6\_24}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KononchukELL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/HendriksEG13, author = {Richard C. Hendriks and Zekeriya Erkin and Timo Gerkmann}, title = {Privacy preserving distributed beamforming based on homomorphic encryption}, booktitle = {21st European Signal Processing Conference, {EUSIPCO} 2013, Marrakech, Morocco, September 9-13, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6811479/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/HendriksEG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/HendriksEG13, author = {Richard C. Hendriks and Zekeriya Erkin and Timo Gerkmann}, title = {Privacy-preserving distributed speech enhancement forwireless sensor networks by processing in the encrypted domain}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2013, Vancouver, BC, Canada, May 26-31, 2013}, pages = {7005--7009}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICASSP.2013.6639020}, doi = {10.1109/ICASSP.2013.6639020}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/HendriksEG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ErkinVL13, author = {Zekeriya Erkin and Thijs Veugen and Reginald L. Lagendijk}, title = {Privacy-preserving recommender systems in dynamic environments}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {61--66}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707795}, doi = {10.1109/WIFS.2013.6707795}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ErkinVL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ZeilemakerEPP13, author = {Niels Zeilemaker and Zekeriya Erkin and Paolo Palmieri and Johan A. Pouwelse}, title = {Building a privacy-preserving semantic overlay for Peer-to-Peer networks}, booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2013, Guangzhou, China, November 18-21, 2013}, pages = {79--84}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WIFS.2013.6707798}, doi = {10.1109/WIFS.2013.6707798}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ZeilemakerEPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/JeckmansBEHLT13, author = {Arjan J. P. Jeckmans and Michael Beye and Zekeriya Erkin and Pieter H. Hartel and Reginald L. Lagendijk and Qiang Tang}, editor = {Naeem Ramzan and Roelof van Zwol and Jong{-}Seok Lee and Kai Cl{\"{u}}ver and Xian{-}Sheng Hua}, title = {Privacy in Recommender Systems}, booktitle = {Social Media Retrieval}, series = {Computer Communications and Networks}, pages = {263--281}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4471-4555-4\_12}, doi = {10.1007/978-1-4471-4555-4\_12}, timestamp = {Fri, 09 Apr 2021 18:18:56 +0200}, biburl = {https://dblp.org/rec/series/ccn/JeckmansBEHLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ErkinVTL12, author = {Zekeriya Erkin and Thijs Veugen and Tomas Toft and Reginald L. Lagendijk}, title = {Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {3}, pages = {1053--1066}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2190726}, doi = {10.1109/TIFS.2012.2190726}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ErkinVTL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ErkinT12, author = {Zekeriya Erkin and Gene Tsudik}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {Private Computation of Spatial and Temporal Power Consumption with Smart Meters}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {561--577}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_33}, doi = {10.1007/978-3-642-31284-7\_33}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/ErkinT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/PuechEBRL12, author = {William Puech and Zekeriya Erkin and Mauro Barni and Shantanu Rane and Reginald L. Lagendijk}, title = {Emerging cryptographic challenges in image and video processing}, booktitle = {19th {IEEE} International Conference on Image Processing, {ICIP} 2012, Lake Buena Vista, Orlando, FL, USA, September 30 - October 3, 2012}, pages = {2629--2632}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICIP.2012.6467438}, doi = {10.1109/ICIP.2012.6467438}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/PuechEBRL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ErkinBVL12, author = {Zekeriya Erkin and Michael Beye and Thijs Veugen and Reginald L. Lagendijk}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Privacy-preserving content-based recommender system}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {77--84}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361420}, doi = {10.1145/2361407.2361420}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ErkinBVL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cason/ErkinVL11, author = {Zekeriya Erkin and Thijs Veugen and Reginald L. Lagendijk}, title = {Generating private recommendations in a social trust network}, booktitle = {International Conference on Computational Aspects of Social Networks, CASoN 2011, Salamanca, Spain, October 19-21, 2011}, pages = {82--87}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CASON.2011.6085923}, doi = {10.1109/CASON.2011.6085923}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/cason/ErkinVL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ErkinBVL11, author = {Zekeriya Erkin and Michael Beye and Thijs Veugen and Reginald L. Lagendijk}, title = {Efficiently computing private recommendations}, booktitle = {Proceedings of the {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2011, May 22-27, 2011, Prague Congress Center, Prague, Czech Republic}, pages = {5864--5867}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICASSP.2011.5947695}, doi = {10.1109/ICASSP.2011.5947695}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/ErkinBVL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BeyeEL11, author = {Michael Beye and Zekeriya Erkin and Reginald L. Lagendijk}, title = {Efficient privacy preserving K-means clustering in a three-party setting}, booktitle = {2011 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WIFS.2011.6123148}, doi = {10.1109/WIFS.2011.6123148}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/BeyeEL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Erkin10, author = {Zekeriya Erkin}, title = {Secure signal processing: Privacy preserving cryptographic protocols for multimedia}, school = {Delft University of Technology, Netherlands}, year = {2010}, url = {http://resolver.tudelft.nl/uuid:a8495e87-4134-4e1b-93cc-b0ba4163b2b0}, timestamp = {Mon, 10 Apr 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Erkin10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/ErkinFGKLT09, author = {Zekeriya Erkin and Martin Franz and Jorge Guajardo and Stefan Katzenbeisser and Inald Lagendijk and Tomas Toft}, editor = {Ian Goldberg and Mikhail J. Atallah}, title = {Privacy-Preserving Face Recognition}, booktitle = {Privacy Enhancing Technologies, 9th International Symposium, {PETS} 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5672}, pages = {235--253}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03168-7\_14}, doi = {10.1007/978-3-642-03168-7\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/ErkinFGKLT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ErkinVTL09, author = {Zekeriya Erkin and Thijs Veugen and Tomas Toft and Reginald L. Lagendijk}, title = {Privacy-preserving user clustering in a social network}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {96--100}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386476}, doi = {10.1109/WIFS.2009.5386476}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ErkinVTL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ErkinPKLSNB07, author = {Zekeriya Erkin and Alessandro Piva and Stefan Katzenbeisser and Reginald L. Lagendijk and Jamshid Shokrollahi and Gregory Neven and Mauro Barni}, title = {Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/78943}, doi = {10.1155/2007/78943}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ErkinPKLSNB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/PrinsEL07, author = {Jeroen P. Prins and Zekeriya Erkin and Reginald L. Lagendijk}, title = {Anonymous Fingerprinting with Robust {QIM} Watermarking Techniques}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/31340}, doi = {10.1155/2007/31340}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/PrinsEL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.