关注
Thijs Veugen
Thijs Veugen
TNO and University of Twente
在 tno.nl 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing
Z Erkin, T Veugen, T Toft, RL Lagendijk
Information Forensics and Security, IEEE Transactions on 7 (3), 1053-1066, 2012
2722012
Secure distribution of content
P Veugen, MO Van Deventer, OA Niamut
US Patent 9350539B2, 2016
1182016
Transparency enhancing tools (TETs): an overview
M Janic, JP Wijbenga, T Veugen
Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013
1032013
Improving the DGK comparison protocol
T Veugen
IEEE Workshop on Information Forensics and Security, 2012
812012
Secure comparison protocols in the semi-honest model
T Veugen, F Blom, SJA de Hoogh, Z Erkin
IEEE Journal of Selected Topics in Signal Processing 9 (7), 1217-1228, 2015
712015
Encrypted integer division and secure comparison
T Veugen
International Journal of Applied Cryptography 3 (2), 166-180, 2014
692014
Privacy enhanced recommender system
Z Erkin, M Beye, T Veugen, RL Lagendijk
Thirty-first Symposium on Information Theory in the Benelux, Rotterdam, 35-42, 2010
682010
Efficiently computing private recommendations
Z Erkin, M Beye, T Veugen, RL Lagendijk
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
622011
Secure multiparty PageRank algorithm for collaborative fraud detection
A Sangers, M van Heesch, T Attema, T Veugen, M Wiggerman, J Veldsink, ...
Financial Cryptography and Data Security 2019, 2019
542019
Privacy-preserving user clustering in a social network
Z Erkin, T Veugen, T Toft, RL Lagendijk
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
502009
Encrypted integer division
T Veugen
Information Forensics and Security (WIFS), 2010 IEEE International Workshop …, 2010
442010
Privacy-preserving distributed clustering
Z Erkin, T Veugen, T Toft, RL Lagendijk
EURASIP Journal on Information Security 2013, 1-15, 2013
412013
Privacy preserving computation protocol for data analytics
T Veugen
US Patent App. 16/017,617, 2018
372018
Handbook of wireless local area networks: Applications, Technology, Security, and Standards
M Ilyas, SA Ahson
CRC Press, 2005
362005
A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations
T Veugen, R de Haan, R Cramer, F Muller
IEEE Transactions on Information Forensics and Security 10 (3), 445-457, 2014
352014
Privacy-preserving content-based recommender system
Z Erkin, M Beye, T Veugen, RL Lagendijk
Proceedings of the on Multimedia and security, 77-84, 2012
352012
COMPARING ENCRYPTED DATA
T Veugen
Unpublished, 2010
322010
RFID technologies: Emerging issues, challenges and policy options
M van Lieshout, L Grossi, G Spinelli, S Helmus, L Kool, L Pennings, ...
I. Maghiros, P. Rotter and M. v. Lieshout. Luxembourg, European Commission …, 2007
292007
Secure Evaluation of a Program
PJM Veugen
US Patent 20,150,089,243, 2015
272015
Processing in the encrypted domain using a composite signal representation: pros and cons
T Bianchi, T Veugen, A Piva, M Barni
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
272009
系统目前无法执行此操作,请稍后再试。
文章 1–20