Arjan Jeckmans
Arjan Jeckmans
Verified email at utwente.nl - Homepage
Title
Cited by
Cited by
Year
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
832013
Privacy in online social networks
M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Computational Social Networks, 87-113, 2012
382012
Efficient privacy-enhanced familiarity-based recommender system
A Jeckmans, A Peter, P Hartel
European Symposium on Research in Computer Security, 400-417, 2013
342013
Privacy-preserving collaborative filtering based on horizontally partitioned dataset
A Jeckmans, Q Tang, P Hartel
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
302012
Literature overview-privacy in online social networks
M Beye, A Jeckmans, Z Erkin, P Hartel, R Lagendijk, Q Tang
Centre for Telematics and Information Technology, University of Twente, 2010
252010
Poster: privacy-preserving profile similarity computation in online social networks
A Jeckmans, Q Tang, P Hartel
Proceedings of the 18th ACM conference on Computer and communications …, 2011
132011
On non-parallelizable deterministic client puzzle scheme with batch verification modes
Q Tang, A Jeckmans
Centre for Telematics and Information Technology University of Twente, 2010
112010
Practical client puzzle from repeated squaring
AJP Jeckmans
University of Twente, 2009
112009
Social Media Retrieval, chapter Privacy in Recommender systems
M Beye, A Jeckmans, Z Erkin, Q Tang, P Hartel, I Lagendijk
Springer, 2013
52013
Privacy-preserving profile matching using the social graph
A Jeckmans, Q Tang, P Hartel
2011 International Conference on Computational Aspects of Social Networks …, 2011
52011
Cryptographically-Enhanced Privacy for Recommender Systems.
AJP Jeckmans
University of Twente, 2014
42014
On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. Centre for Telematics and Information Technology, University of Twente (January 2010)
Q Tang, A Jeckmans
4
Towards a security model for computational puzzle schemes
Q Tang, A Jeckmans
International journal of computer mathematics 88 (11), 2246-2257, 2011
22011
Contextual Authentication: Using Mobile Phone Movements to Authenticate Owners Implicitly
Y Badin
University of Twente, 2016
12016
Efficient client puzzle schemes to mitigate DoS attacks
Q Tang, A Jeckmans
2010 International Conference on Computational Intelligence and Security …, 2010
12010
Aspect Only Software Development
A Jeckmans
2006
The system can't perform the operation now. Try again later.
Articles 1–16