Privacy in recommender systems AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang Social media retrieval, 263-281, 2013 | 191 | 2013 |
Privacy in online social networks M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang Computational social networks: security and privacy, 87-113, 2012 | 52 | 2012 |
Efficient privacy-enhanced familiarity-based recommender system A Jeckmans, A Peter, P Hartel Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 49 | 2013 |
Literature overview-privacy in online social networks M Beye, A Jeckmans, Z Erkin, PH Hartel, R Lagendijk, Q Tang Centre for Telematics and Information Technology (CTIT), 2010 | 46 | 2010 |
Privacy-preserving collaborative filtering based on horizontally partitioned dataset A Jeckmans, Q Tang, P Hartel 2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012 | 39 | 2012 |
Poster: privacy-preserving profile similarity computation in online social networks A Jeckmans, Q Tang, P Hartel Proceedings of the 18th ACM conference on Computer and Communications …, 2011 | 18 | 2011 |
On non-parallelizable deterministic client puzzle scheme with batch verification modes Q Tang, A Jeckmans Centre for Telematics and Information Technology (CTIT), 2010 | 11 | 2010 |
Practical client puzzle from repeated squaring AJP Jeckmans University of Twente, 2009 | 11 | 2009 |
Cryptographically-enhanced privacy for recommender systems A Jeckmans | 7 | 2014 |
On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. Centre for Telematics and Information Technology, University of Twente (January 2010) Q Tang, A Jeckmans J. Shi and J.-F. Ma,“Design and analysis of a wireless authentication …, 0 | 6 | |
Social Media Retrieval, chapter Privacy in Recommender systems M Beye, A Jeckmans, Z Erkin, Q Tang, P Hartel, I Lagendijk Springer, 2013 | 5 | 2013 |
Privacy-preserving profile matching using the social graph A Jeckmans, Q Tang, P Hartel 2011 International Conference on Computational Aspects of Social Networks …, 2011 | 5 | 2011 |
Towards a security model for computational puzzle schemes Q Tang, A Jeckmans International Journal of Computer Mathematics 88 (11), 2246-2257, 2011 | 4 | 2011 |
Contextual Authentication: Using Mobile Phone Movements to Authenticate Owners Implicitly Y Badin University of Twente, 2016 | 1 | 2016 |
Efficient client puzzle schemes to mitigate DoS attacks Q Tang, A Jeckmans 2010 International Conference on Computational Intelligence and Security …, 2010 | 1 | 2010 |
Aspect Only Software Development A Jeckmans | | 2006 |