Thijs Veugen
Thijs Veugen
TNO and Centrum Wiskunde & Informatica
Geverifieerd e-mailadres voor tno.nl
Titel
Geciteerd door
Geciteerd door
Jaar
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing
Z Erkin, T Veugen, T Toft, RL Lagendijk
Information Forensics and Security, IEEE Transactions on 7 (3), 1053-1066, 2012
1792012
Efficiently computing private recommendations
Z Erkin, M Beye, T Veugen, RL Lagendijk
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
602011
Transparency enhancing tools (TETs): an overview
M Janic, JP Wijbenga, T Veugen
Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013
592013
Secure distribution of content
P Veugen, MO Van Deventer, OA Niamut
US Patent 9350539B2, 2016
562016
Privacy enhanced recommender system
Z Erkin, M Beye, T Veugen, RL Lagendijk
Thirty-first Symposium on Information Theory in the Benelux, Rotterdam, 35-42, 2010
482010
Encrypted integer division and secure comparison
T Veugen
International Journal of Applied Cryptography 3 (2), 166-180, 2014
462014
Improving the DGK comparison protocol
T Veugen
IEEE Workshop on Information Forensics and Security, 2012
442012
Privacy-preserving user clustering in a social network
Z Erkin, T Veugen, T Toft, RL Lagendijk
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
372009
Encrypted integer division
T Veugen
Information Forensics and Security (WIFS), 2010 IEEE International Workshop …, 2010
362010
Secure comparison protocols in the semi-honest model
T Veugen, F Blom, SJA de Hoogh, Z Erkin
IEEE Journal of Selected Topics in Signal Processing 9 (7), 1217-1228, 2015
332015
Handbook of wireless local area networks: Applications, Technology, Security, and Standards
M Ilyas, SA Ahson
CRC Press, 2005
302005
RFID technologies: Emerging issues, challenges and policy options
M van Lieshout, L Grossi, G Spinelli, S Helmus, L Kool, L Pennings, ...
I. Maghiros, P. Rotter and M. v. Lieshout. Luxembourg, European Commission …, 2007
282007
Privacy-preserving distributed clustering
Z Erkin, T Veugen, T Toft, RL Lagendijk
EURASIP Journal on Information Security 2013 (1), 4, 2013
272013
Processing in the encrypted domain using a composite signal representation: pros and cons
T Bianchi, T Veugen, A Piva, M Barni
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
262009
Privacy-preserving content-based recommender system
Z Erkin, M Beye, T Veugen, RL Lagendijk
Proceedings of the on Multimedia and security, 77-84, 2012
242012
System for outputting a choice recommendation to users
R Van Brandenburg, MO Van Deventer, PJM Veugen
EP Patent 2,451,183, 2012
242012
A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations
T Veugen, R de Haan, R Cramer, F Muller
IEEE Transactions on Information Forensics and Security 10 (3), 445-457, 2014
212014
COMPARING ENCRYPTED DATA
T Veugen
Unpublished, 2010
202010
Generating private recommendations in a social trust network
Z Erkin, T Veugen, RL Lagendijk
2011 International Conference on Computational Aspects of Social Networks …, 2011
192011
RECOMMENDER SYSTEM AND MEDIA RETRIEVAL SYSTEM FOR PROVIDING RECOMMENDATIONS TO GROUPS OF USERS
P VEUGEN, M Joannes
WO Patent 2,013,066,177, 2013
14*2013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20