Thijs Veugen

2011
2010
Veugen T. Encrypted Integer Division. In: IEEE Workshop on Information Forensics and Security (WIFS'10). IEEE Workshop on Information Forensics and Security (WIFS'10). Seattle; 2010. Available at: http://wifs10.org/. Download: Encrypted integer division.pdf (181.46 KB)
Erkin Z, Beye M, Veugen T, Lagendijk RL. Efficiently Computing Private Recommendations. Advanced School of Computing and Imaging. 2010;2010. Download: ASCI10.pdf (100.9 KB)
Erkin Z, Beye M, Veugen T, Lagendijk RL. Privacy Enhanced Recommender System. In: Thirty-first Symposium on Information Theory in the Benelux. Thirty-first Symposium on Information Theory in the Benelux. Rotterdam; 2010:35-42. Download: EBVL10a.pdf (113.95 KB)
2009
Beye M. RFID - Threat Taxonomies & Improved Anonymity for Hash-Trees. Department of Information and Computing Sciences. 2009;Master of Science:120. Download: Thesis Michael Beye.pdf (2.17 MB)
Hoepman J-H, Veugen T. Threats and vulnerabilities of RFID and beyond. In: Zhang Y, Kitsos P Security in RFID and Sensor Networks. Security in RFID and Sensor Networks. Boca Raton; 2009:469-488. Available at: http://www.amazon.co.uk/Security-Sensor-Networks-Wireless-Communications/dp/1420068393. Download: Book chapter RFID security - januari 2008.pdf (364.14 KB)
Erkin Z, Veugen T, Toft T, Lagendijk RL. Privacy-Preserving User Clustering in a Social Network. In: IEEE International Workshop on Information Forensics and Security. IEEE International Workshop on Information Forensics and Security.; 2009. Download: WI090052.pdf (146.42 KB)
Bianchi T, Veugen T, Piva A, Barni M. Processing in the encrypted domain using a composite signal representation: pros and cons. In: IEEE International Workshop on Information Forensics and Security. IEEE International Workshop on Information Forensics and Security.; 2009. Download: WI090091.pdf (148.59 KB)
2008
2007
2006