Thijs Veugen

2017
Veugen T, Doumen J, Erkin Z, et al. Improved privacy of dynamic group services. EURASIP Journal on Information Security. 2017;1:1-9. Download: Improved privacy of dynamic group services - 2017.pdf (606.13 KB)
2016
Veugen T. Proof of the Median Paths. In: 37th WIC Symposium on Information Theory in the Benelux. 37th WIC Symposium on Information Theory in the Benelux. Université catholique de Louvain; 2016. Available at: http://sites.uclouvain.be/sitb2016/Proceedings_SITB2016_preliminary.pdf. Abstract  Download: 3.pdf (366.64 KB)
2015
Veugen T, Blom F, de Hoogh S, Erkin Z. Secure Comparison Protocols in the Semi-Honest Model. IEEE Journal of Selected Topics in Signal Processing. 2015;9(7 (Special issue on Signal and Information Processing for Privacy). Available at: http://dx.doi.org/10.1109/JSTSP.2015.2429117. Download: Implementation.zip (34.81 KB); JSTSP2429117.pdf (242.56 KB)
A. Sunil B. Secure License Plate Matching using Homomorphic Encryption. Parallel and Distributed Computer Systems. 2015;MSc:63. Download: A_BinduSunil_Masters_Thesis.pdf (585.97 KB)
Veugen T. Linear Round Bit-Decomposition of Secret-Shared Values. IEEE Transactions on Information Forensics and Security. 2015;10(3). Download: Linear Round Bit-Decomposition of Secret-Shared Values.pdf (1.14 MB)
2014
Erkin Z, Veugen T. Privacy Enhanced Personal Services for Smart Grids. SEGS 14: Smart Energy Grid Security Workshop. 2014:7-12. Download: CamReady.pdf (291.35 KB)
Veugen T. Encrypted integer division and secure comparison. International Journal of Applied Cryptography. 2014;3(2). Download: IJACT030205 VEUGEN.pdf (380.87 KB)
2013
Janic M, Veugen T, Wijbenga JP. Transparency enhancing tools (TETs): an overview. In: 3rd workshop on Socio-Technical Aspects in Security and Trust (STAST). 3rd workshop on Socio-Technical Aspects in Security and Trust (STAST). New Orleans; 2013. Download: TETs paper STAST2013.pdf (338.66 KB)
Veugen T, Stokking H. Secure Processing Offload in Recombining Media Segments for Mobile Access. In: Symposium on Information Theory in the Benelux.Vol 34. Symposium on Information Theory in the Benelux. Leuven; 2013. Available at: http://www.w-i-c.org/publications-presentations-4.html. Download: Veugen-16.pdf (569.09 KB)
2012
Erkin Z, Beye M, Veugen T, Lagendijk RL. Privacy-Preserving Content-Based Recommendations through Homomorphic Encryption. In: 33rd WIC Symposium on Information Theory in the Benelux. 33rd WIC Symposium on Information Theory in the Benelux. Boekelo, The Netherlands; 2012. Download: Privacy-Preserving Content-Based Recommendations through Homomorphic Encryption - 2012.pdf (128.24 KB)
Veugen T. Improving the DGK comparison protocol. In: IEEE Workshop on Information Forensics and Security. IEEE Workshop on Information Forensics and Security. Tenerife; 2012. Download: 0000049.pdf (1.23 MB)
Erkin Z, Beye M, Veugen T, Lagendijk RL. Privacy-Preserving Content-Based Recommender System. In: The 14th ACM Workshop on Multimedia and Security. The 14th ACM Workshop on Multimedia and Security. Coventry, UK; 2012:77-84. Download: Privacy-Preserving Content-Based Recommender System - 2012.pdf (134.14 KB)
Veugen T, Beye M. Improved Anonimity for Key Trees. In: RFIDsec 2012. RFIDsec 2012.; 2012. Download: Hash_tree_matlab.zip (3.36 KB); Hash_tree_paper.pdf (240.78 KB)
2011
Erkin Z, Beye M, Veugen T, Lagendijk RL. Efficiently Computing Private Recommendations. In: International Conference on Acoustic, Speech and Signal Processing-ICASSP . International Conference on Acoustic, Speech and Signal Processing-ICASSP . Prag, Czech Republic; 2011:5864--5867. Download: Efficiently computing private recommendations - ICASSP 2011.pdf (112.39 KB)