Thijs Veugen
Thijs Veugen
TNO and Centrum Wiskunde & Informatica
Verified email at tno.nl
TitleCited byYear
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing
Z Erkin, T Veugen, T Toft, RL Lagendijk
Information Forensics and Security, IEEE Transactions on 7 (3), 1053-1066, 2012
1582012
Method and system for protected exchange of data
PJM Veugen
US Patent App. 10/116,445, 2018
592018
Efficiently computing private recommendations
Z Erkin, M Beye, T Veugen, RL Lagendijk
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
532011
Secure distribution of content
P Veugen, MO Van Deventer, OA Niamut
US Patent 9350539B2, 2016
512016
Transparency enhancing tools (TETs): an overview
M Janic, JP Wijbenga, T Veugen
Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013
462013
Privacy enhanced recommender system
Z Erkin, M Beye, T Veugen, RL Lagendijk
Thirty-first Symposium on Information Theory in the Benelux, Rotterdam, 35-42, 2010
442010
Encrypted integer division and secure comparison
T Veugen
International Journal of Applied Cryptography 3 (2), 166-180, 2014
362014
Improving the DGK comparison protocol
T Veugen
IEEE Workshop on Information Forensics and Security, 2012
362012
Encrypted integer division
T Veugen
Information Forensics and Security (WIFS), 2010 IEEE International Workshop …, 2010
352010
Privacy-preserving user clustering in a social network
Z Erkin, T Veugen, T Toft, RL Lagendijk
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
342009
Handbook of wireless local area networks: Applications, Technology, Security, and Standards
M Ilyas, SA Ahson
CRC Press, 2005
292005
Secure comparison protocols in the semi-honest model
T Veugen, F Blom, SJA de Hoogh, Z Erkin
IEEE Journal of Selected Topics in Signal Processing 9 (7), 1217-1228, 2015
282015
System for outputting a choice recommendation to users
R Van Brandenburg, MO Van Deventer, PJM Veugen
EP Patent 2,451,183, 2012
272012
Processing in the encrypted domain using a composite signal representation: pros and cons
T Bianchi, T Veugen, A Piva, M Barni
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
262009
RFID technologies: Emerging issues, challenges and policy options
M van Lieshout, L Grossi, G Spinelli, S Helmus, L Kool, L Pennings, ...
I. Maghiros, P. Rotter and M. v. Lieshout. Luxembourg, European Commission …, 2007
262007
Privacy-preserving content-based recommender system
Z Erkin, M Beye, T Veugen, RL Lagendijk
Proceedings of the on Multimedia and security, 77-84, 2012
202012
COMPARING ENCRYPTED DATA
T Veugen
Unpublished, 2010
202010
A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations
T Veugen, R de Haan, R Cramer, F Muller
IEEE Transactions on Information Forensics and Security 10 (3), 445-457, 2014
192014
Privacy-preserving distributed clustering
Z Erkin, T Veugen, T Toft, RL Lagendijk
EURASIP Journal on Information Security 2013 (1), 4, 2013
192013
Generating private recommendations in a social trust network
Z Erkin, T Veugen, RL Lagendijk
2011 International Conference on Computational Aspects of Social Networks …, 2011
182011
The system can't perform the operation now. Try again later.
Articles 1–20