Arjan Jeckmans
Arjan Jeckmans
Verified email at utwente.nl - Homepage
TitleCited byYear
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
722013
Privacy in online social networks
M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Computational Social Networks, 87-113, 2012
412012
Efficient privacy-enhanced familiarity-based recommender system
A Jeckmans, A Peter, P Hartel
European Symposium on Research in Computer Security, 400-417, 2013
332013
Privacy-preserving collaborative filtering based on horizontally partitioned dataset
A Jeckmans, Q Tang, P Hartel
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
272012
Literature overview-privacy in online social networks
M Beye, A Jeckmans, Z Erkin, P Hartel, R Lagendijk, Q Tang
Enschede, October, 2010
262010
Poster: privacy-preserving profile similarity computation in online social networks
A Jeckmans, Q Tang, P Hartel
Proceedings of the 18th ACM conference on Computer and communications …, 2011
122011
On non-parallelizable deterministic client puzzle scheme with batch verification modes
Q Tang, A Jeckmans
Centre for Telematics and Information Technology University of Twente, 2010
112010
Practical client puzzle from repeated squaring
AJP Jeckmans
University of Twente, 2009
112009
Social Media Retrieval, chapter Privacy in Recommender systems
M Beye, A Jeckmans, Z Erkin, Q Tang, P Hartel, I Lagendijk
Springer, 2013
52013
Privacy-preserving profile matching using the social graph
A Jeckmans, Q Tang, P Hartel
2011 International Conference on Computational Aspects of Social Networks …, 2011
52011
On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. Centre for Telematics and Information Technology, University of Twente (January 2010)
Q Tang, A Jeckmans
4
Cryptographically-Enhanced Privacy for Recommender Systems.
AJP Jeckmans
University of Twente, Enschede, Netherlands, 2014
32014
Towards a security model for computational puzzle schemes
Q Tang, A Jeckmans
International journal of computer mathematics 88 (11), 2246-2257, 2011
22011
Contextual Authentication: Using Mobile Phone Movements to Authenticate Owners Implicitly
Y Badin
University of Twente, 2016
12016
Efficient Client Puzzle Schemes to Mitigate DoS Attacks
Q Tang, A Jeckmans
2010 International Conference on Computational Intelligence and Security …, 2010
12010
Aspect Only Software Development
A Jeckmans
2006
The system can't perform the operation now. Try again later.
Articles 1–16