Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing Z Erkin, T Veugen, T Toft, RL Lagendijk Information Forensics and Security, IEEE Transactions on 7 (3), 1053-1066, 2012 | 158 | 2012 |
Method and system for protected exchange of data PJM Veugen US Patent App. 10/116,445, 2018 | 59 | 2018 |
Efficiently computing private recommendations Z Erkin, M Beye, T Veugen, RL Lagendijk 2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011 | 53 | 2011 |
Secure distribution of content P Veugen, MO Van Deventer, OA Niamut US Patent 9350539B2, 2016 | 51 | 2016 |
Transparency enhancing tools (TETs): an overview M Janic, JP Wijbenga, T Veugen Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013 | 46 | 2013 |
Privacy enhanced recommender system Z Erkin, M Beye, T Veugen, RL Lagendijk Thirty-first Symposium on Information Theory in the Benelux, Rotterdam, 35-42, 2010 | 44 | 2010 |
Encrypted integer division and secure comparison T Veugen International Journal of Applied Cryptography 3 (2), 166-180, 2014 | 36 | 2014 |
Improving the DGK comparison protocol T Veugen IEEE Workshop on Information Forensics and Security, 2012 | 36 | 2012 |
Encrypted integer division T Veugen Information Forensics and Security (WIFS), 2010 IEEE International Workshop …, 2010 | 35 | 2010 |
Privacy-preserving user clustering in a social network Z Erkin, T Veugen, T Toft, RL Lagendijk 2009 First IEEE International Workshop on Information Forensics and Security …, 2009 | 34 | 2009 |
Handbook of wireless local area networks: Applications, Technology, Security, and Standards M Ilyas, SA Ahson CRC Press, 2005 | 29 | 2005 |
Secure comparison protocols in the semi-honest model T Veugen, F Blom, SJA de Hoogh, Z Erkin IEEE Journal of Selected Topics in Signal Processing 9 (7), 1217-1228, 2015 | 28 | 2015 |
System for outputting a choice recommendation to users R Van Brandenburg, MO Van Deventer, PJM Veugen EP Patent 2,451,183, 2012 | 27 | 2012 |
Processing in the encrypted domain using a composite signal representation: pros and cons T Bianchi, T Veugen, A Piva, M Barni 2009 First IEEE International Workshop on Information Forensics and Security …, 2009 | 26 | 2009 |
RFID technologies: Emerging issues, challenges and policy options M van Lieshout, L Grossi, G Spinelli, S Helmus, L Kool, L Pennings, ... I. Maghiros, P. Rotter and M. v. Lieshout. Luxembourg, European Commission …, 2007 | 26 | 2007 |
Privacy-preserving content-based recommender system Z Erkin, M Beye, T Veugen, RL Lagendijk Proceedings of the on Multimedia and security, 77-84, 2012 | 20 | 2012 |
COMPARING ENCRYPTED DATA T Veugen Unpublished, 2010 | 20 | 2010 |
A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations T Veugen, R de Haan, R Cramer, F Muller IEEE Transactions on Information Forensics and Security 10 (3), 445-457, 2014 | 19 | 2014 |
Privacy-preserving distributed clustering Z Erkin, T Veugen, T Toft, RL Lagendijk EURASIP Journal on Information Security 2013 (1), 4, 2013 | 19 | 2013 |
Generating private recommendations in a social trust network Z Erkin, T Veugen, RL Lagendijk 2011 International Conference on Computational Aspects of Social Networks …, 2011 | 18 | 2011 |