- document
-
Veugen, P.J.M. (author), Beye, M. (author)Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an et al. have defined measures for the...bookPart 2013
- document
-
Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)By offering personalized content to users, recommender systems have become a vital tool in e-commerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or consumed. Unfortunately, collecting and storing ratings, on which content-based methods rely,...conference paper 2012
- document
-
Beye, M. (author), Veugen, P.J.M. (author)Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen [3] devised trees to withstand such attacks, but...conference paper 2012
- document
-
Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)By offering personalized content to users, recommender systems have become a vital tool in ecommerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or consumed. Unfortunately, collecting and storing ratings, on which content-based methods rely,...conference paper 2012
- document
-
Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused by the service provider. To protect user privacy, we propose to encrypt the data and generate recommendations by processing them under encryption. Thus, the service...conference paper 2011
- document
-
Beye, M. (author), Veugen, P.J.M. (author)Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen [2] devised trees to withstand such attacks, but...conference paper 2011
- document
-
TNO Informatie- en Communicatietechnologie (author), Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we propose to encrypt the privacy sensitive data...conference paper 2010
- document
-
TNO Informatie- en Communicatietechnologie (author), Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused if it is leaked or by the service provider him self. To protect user’s privacy, we propose to encrypt the data and generate recommendations by processing them under...conference paper 2010