Zekeriya Erkin

2012
Beye M, Jeckmans AJP, Erkin Z, et al. Privacy in Online Social Networks. In: Abraham A Computational Social Networks: Security and Privacy. Computational Social Networks: Security and Privacy. London; 2012. Abstract
2011
Erkin Z, Beye M, Veugen T, Lagendijk RL. Efficiently Computing Private Recommendations. In: International Conference on Acoustic, Speech and Signal Processing-ICASSP . International Conference on Acoustic, Speech and Signal Processing-ICASSP . Prag, Czech Republic; 2011:5864--5867. Download: Efficiently computing private recommendations - ICASSP 2011.pdf (112.39 KB)
Beye M, Erkin Z, Lagendijk RL. Efficient Privacy Preserving K-means Clustering in a Three-Party Setting. In: IEEE Workshop on Information Forensics and Security (WIFS’11). IEEE Workshop on Information Forensics and Security (WIFS’11). Foz do Iguaçu, Brazil; 2011. Available at: http://wifs11.org/. Abstract
Erkin Z, Veugen T, Lagendijk RL. Generating Private Recommendations in a Social Trust Network. The International Conference on Computational Aspects of Social Networks (CASoN 2011). 2011. Abstract  Download: Generating Private Recommendations in a Social Trust Network - 2011.pdf (104.34 KB)
2010
Erkin Z, Beye M, Veugen T, Lagendijk RL. Efficiently Computing Private Recommendations. Advanced School of Computing and Imaging. 2010;2010. Download: ASCI10.pdf (100.9 KB)
Erkin Z, Beye M, Veugen T, Lagendijk RL. Privacy Enhanced Recommender System. In: Thirty-first Symposium on Information Theory in the Benelux. Thirty-first Symposium on Information Theory in the Benelux. Rotterdam; 2010:35-42. Download: EBVL10a.pdf (113.95 KB)
2009
Erkin Z, Franz M, Guajardo J, et al. Privacy-Preserving Face Recognition Goldberg I, Atallah M. 9th International Symposium on Privacy Enhancing Technologies. 2009:235-253. Download: pet2009.pdf (232.64 KB); Implementation codes (8.25 MB)
Erkin Z, Veugen T, Toft T, Lagendijk RL. Privacy-Preserving User Clustering in a Social Network. In: IEEE International Workshop on Information Forensics and Security. IEEE International Workshop on Information Forensics and Security.; 2009. Download: WI090052.pdf (146.42 KB)
2007
Prins JP, Erkin Z, Lagendijk RL. Robust Anonymous Fingerprinting. In: Twenty-eight Symposium on Information Theory in the Benelux. Twenty-eight Symposium on Information Theory in the Benelux.; 2007:59-66.
Erkin Z, Lagendijk RL. On Processing Encrypted Data. In: Thirteenth annual conference of the Advanced School for Computing and Imaging. Thirteenth annual conference of the Advanced School for Computing and Imaging.; 2007:322-329.
Prins JP. Robust Anonymous Fingerprinting. Robust Anonymous Fingerprinting. 2007:73.