Volgen
Thijs Veugen
Thijs Veugen
TNO and Centrum Wiskunde & Informatica and University of Twente
Geverifieerd e-mailadres voor tno.nl - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing
Z Erkin, T Veugen, T Toft, RL Lagendijk
Information Forensics and Security, IEEE Transactions on 7 (3), 1053-1066, 2012
2362012
Secure distribution of content
P Veugen, MO Van Deventer, OA Niamut
US Patent 9350539B2, 2016
912016
Transparency enhancing tools (TETs): an overview
M Janic, JP Wijbenga, T Veugen
Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013
882013
Improving the DGK comparison protocol
T Veugen
IEEE Workshop on Information Forensics and Security, 2012
652012
Efficiently computing private recommendations
Z Erkin, M Beye, T Veugen, RL Lagendijk
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
632011
Encrypted integer division and secure comparison
T Veugen
International Journal of Applied Cryptography 3 (2), 166-180, 2014
622014
Privacy enhanced recommender system
Z Erkin, M Beye, T Veugen, RL Lagendijk
Thirty-first Symposium on Information Theory in the Benelux, Rotterdam, 35-42, 2010
592010
Secure comparison protocols in the semi-honest model
T Veugen, F Blom, SJA de Hoogh, Z Erkin
IEEE Journal of Selected Topics in Signal Processing 9 (7), 1217-1228, 2015
532015
Privacy-preserving user clustering in a social network
Z Erkin, T Veugen, T Toft, RL Lagendijk
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
492009
Encrypted integer division
T Veugen
Information Forensics and Security (WIFS), 2010 IEEE International Workshop …, 2010
422010
Handbook of wireless local area networks: Applications, Technology, Security, and Standards
M Ilyas, SA Ahson
CRC Press, 2005
342005
Privacy-preserving distributed clustering
Z Erkin, T Veugen, T Toft, RL Lagendijk
EURASIP Journal on Information Security 2013 (1), 1-15, 2013
332013
Secure multiparty PageRank algorithm for collaborative fraud detection
A Sangers, M van Heesch, T Attema, T Veugen, M Wiggerman, J Veldsink, ...
Financial Cryptography and Data Security 2019, 2019
322019
Privacy-preserving content-based recommender system
Z Erkin, M Beye, T Veugen, RL Lagendijk
Proceedings of the on Multimedia and security, 77-84, 2012
312012
COMPARING ENCRYPTED DATA
T Veugen
Unpublished, 2010
312010
A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations
T Veugen, R de Haan, R Cramer, F Muller
IEEE Transactions on Information Forensics and Security 10 (3), 445-457, 2014
292014
RFID technologies: Emerging issues, challenges and policy options
M van Lieshout, L Grossi, G Spinelli, S Helmus, L Kool, L Pennings, ...
I. Maghiros, P. Rotter and M. v. Lieshout. Luxembourg, European Commission …, 2007
282007
Privacy preserving computation protocol for data analytics
T Veugen
US Patent App. 16/017,617, 2018
272018
Processing in the encrypted domain using a composite signal representation: pros and cons
T Bianchi, T Veugen, A Piva, M Barni
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
272009
System for outputting a choice recommendation to users
R Van Brandenburg, MO Van Deventer, PJM Veugen
EP Patent 2,451,183, 2012
252012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20