Подписаться
Thijs Veugen
Thijs Veugen
TNO and University of Twente
Подтвержден адрес электронной почты в домене tno.nl - Главная страница
Название
Процитировано
Процитировано
Год
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing
Z Erkin, T Veugen, T Toft, RL Lagendijk
Information Forensics and Security, IEEE Transactions on 7 (3), 1053-1066, 2012
2702012
Secure distribution of content
P Veugen, MO Van Deventer, OA Niamut
US Patent 9350539B2, 2016
1162016
Transparency enhancing tools (TETs): an overview
M Janic, JP Wijbenga, T Veugen
Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013
1002013
Improving the DGK comparison protocol
T Veugen
IEEE Workshop on Information Forensics and Security, 2012
772012
Secure comparison protocols in the semi-honest model
T Veugen, F Blom, SJA de Hoogh, Z Erkin
IEEE Journal of Selected Topics in Signal Processing 9 (7), 1217-1228, 2015
692015
Encrypted integer division and secure comparison
T Veugen
International Journal of Applied Cryptography 3 (2), 166-180, 2014
672014
Privacy enhanced recommender system
Z Erkin, M Beye, T Veugen, RL Lagendijk
Thirty-first Symposium on Information Theory in the Benelux, Rotterdam, 35-42, 2010
672010
Efficiently computing private recommendations
Z Erkin, M Beye, T Veugen, RL Lagendijk
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
612011
Secure multiparty PageRank algorithm for collaborative fraud detection
A Sangers, M van Heesch, T Attema, T Veugen, M Wiggerman, J Veldsink, ...
Financial Cryptography and Data Security 2019, 2019
522019
Privacy-preserving user clustering in a social network
Z Erkin, T Veugen, T Toft, RL Lagendijk
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
502009
Encrypted integer division
T Veugen
Information Forensics and Security (WIFS), 2010 IEEE International Workshop …, 2010
442010
Privacy-preserving distributed clustering
Z Erkin, T Veugen, T Toft, RL Lagendijk
EURASIP Journal on Information Security 2013, 1-15, 2013
402013
Privacy preserving computation protocol for data analytics
T Veugen
US Patent App. 16/017,617, 2018
362018
Handbook of wireless local area networks: Applications, Technology, Security, and Standards
M Ilyas, SA Ahson
CRC Press, 2005
362005
Privacy-preserving content-based recommender system
Z Erkin, M Beye, T Veugen, RL Lagendijk
Proceedings of the on Multimedia and security, 77-84, 2012
352012
A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations
T Veugen, R de Haan, R Cramer, F Muller
IEEE Transactions on Information Forensics and Security 10 (3), 445-457, 2014
342014
COMPARING ENCRYPTED DATA
T Veugen
Unpublished, 2010
322010
RFID technologies: Emerging issues, challenges and policy options
M van Lieshout, L Grossi, G Spinelli, S Helmus, L Kool, L Pennings, ...
I. Maghiros, P. Rotter and M. v. Lieshout. Luxembourg, European Commission …, 2007
322007
Processing in the encrypted domain using a composite signal representation: pros and cons
T Bianchi, T Veugen, A Piva, M Barni
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
272009
Secure Evaluation of a Program
PJM Veugen
US Patent 20,150,089,243, 2015
262015
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20