Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing Z Erkin, T Veugen, T Toft, RL Lagendijk Information Forensics and Security, IEEE Transactions on 7 (3), 1053-1066, 2012 | 272 | 2012 |
Secure distribution of content P Veugen, MO Van Deventer, OA Niamut US Patent 9350539B2, 2016 | 118 | 2016 |
Transparency enhancing tools (TETs): an overview M Janic, JP Wijbenga, T Veugen Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013 | 103 | 2013 |
Improving the DGK comparison protocol T Veugen IEEE Workshop on Information Forensics and Security, 2012 | 81 | 2012 |
Secure comparison protocols in the semi-honest model T Veugen, F Blom, SJA de Hoogh, Z Erkin IEEE Journal of Selected Topics in Signal Processing 9 (7), 1217-1228, 2015 | 71 | 2015 |
Encrypted integer division and secure comparison T Veugen International Journal of Applied Cryptography 3 (2), 166-180, 2014 | 69 | 2014 |
Privacy enhanced recommender system Z Erkin, M Beye, T Veugen, RL Lagendijk Thirty-first Symposium on Information Theory in the Benelux, Rotterdam, 35-42, 2010 | 68 | 2010 |
Efficiently computing private recommendations Z Erkin, M Beye, T Veugen, RL Lagendijk 2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011 | 62 | 2011 |
Secure multiparty PageRank algorithm for collaborative fraud detection A Sangers, M van Heesch, T Attema, T Veugen, M Wiggerman, J Veldsink, ... Financial Cryptography and Data Security 2019, 2019 | 54 | 2019 |
Privacy-preserving user clustering in a social network Z Erkin, T Veugen, T Toft, RL Lagendijk 2009 First IEEE International Workshop on Information Forensics and Security …, 2009 | 50 | 2009 |
Encrypted integer division T Veugen Information Forensics and Security (WIFS), 2010 IEEE International Workshop …, 2010 | 44 | 2010 |
Privacy-preserving distributed clustering Z Erkin, T Veugen, T Toft, RL Lagendijk EURASIP Journal on Information Security 2013, 1-15, 2013 | 41 | 2013 |
Privacy preserving computation protocol for data analytics T Veugen US Patent App. 16/017,617, 2018 | 37 | 2018 |
Handbook of wireless local area networks: Applications, Technology, Security, and Standards M Ilyas, SA Ahson CRC Press, 2005 | 36 | 2005 |
A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations T Veugen, R de Haan, R Cramer, F Muller IEEE Transactions on Information Forensics and Security 10 (3), 445-457, 2014 | 35 | 2014 |
Privacy-preserving content-based recommender system Z Erkin, M Beye, T Veugen, RL Lagendijk Proceedings of the on Multimedia and security, 77-84, 2012 | 35 | 2012 |
COMPARING ENCRYPTED DATA T Veugen Unpublished, 2010 | 32 | 2010 |
RFID technologies: Emerging issues, challenges and policy options M van Lieshout, L Grossi, G Spinelli, S Helmus, L Kool, L Pennings, ... I. Maghiros, P. Rotter and M. v. Lieshout. Luxembourg, European Commission …, 2007 | 29 | 2007 |
Secure Evaluation of a Program PJM Veugen US Patent 20,150,089,243, 2015 | 27 | 2015 |
Processing in the encrypted domain using a composite signal representation: pros and cons T Bianchi, T Veugen, A Piva, M Barni 2009 First IEEE International Workshop on Information Forensics and Security …, 2009 | 27 | 2009 |