Searched for: author%3A%22Erkin%2C+Z.%22
(1 - 14 of 14)
document
Nateghizad, M. (author), Veugen, P.J.M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In...
conference paper 2018
document
Veugen, T. (author), Doumen, J. (author), Erkin, Z. (author), Pellegrino, G. (author), Verwer, S. (author), Weber, J. (author)
We consider dynamic group services, where outputs based on small samples of privacy-sensitive user inputs are repetitively computed. The leakage of user input data is analysed, caused by producing multiple outputs, resulting from inputs of frequently changing sets of users. A cryptographic technique, known as random user selection, is...
article 2017
document
Veugen, P.J.M. (author), Blom, F. (author), de Hoogh, S.J.A. (author), Erkin, Z. (author)
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair...
article 2015
document
Erkin, Z. (author), Veugen, P.J.M. (author)
Millions of people are now increasingly using smart devices at home to improve the quality of their lives. Unfortunately, the smart devices that we use at home for comfort and sim-plicity make our lives more complicated in terms of man-agement due to several issues like mismatching interfaces and complexity of the micro-management. One approach...
conference paper 2014
document
Erkin, Z. (author), Veugen, T. (author), Lagendijk, R.L. (author)
Recommender systems play a crucial role today in on-line applications as they improve the customer satisfaction, and at the same time results in an increase in the profit for the service provider. However, there are serious privacy concerns as such systems rely on the personal data of the customers. There have been several proposals to provide...
conference paper 2013
document
Erkin, Z. (author), Veugen, T. (author), Toft, T. (author), Lagendijk, R.L. (author)
Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a data set. The data set to be used for clustering can be owned by a single entity, or in some cases, information from different databases is...
article 2013
document
Erkin, Z. (author), Veugen, P.J.M. (author), Toft, T. (author), Lagendijk, R.L. (author)
Recommender systems have become an important tool for personalization of online services. Generating recommendations in online services depends on privacy-sensitive data collected from the users. Traditional data protection mechanisms focus on access control and secure transmission, which provide security only against malicious third parties,...
article 2012
document
Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)
By offering personalized content to users, recommender systems have become a vital tool in e-commerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or consumed. Unfortunately, collecting and storing ratings, on which content-based methods rely,...
conference paper 2012
document
Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)
By offering personalized content to users, recommender systems have become a vital tool in ecommerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or consumed. Unfortunately, collecting and storing ratings, on which content-based methods rely,...
conference paper 2012
document
Erkin, Z. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)
Recommender systems have become increasingly important in e-commerce as they can guide customers with finding personalized services and products. A variant of recommender systems that generates recommendations from a set of trusted people is recently getting more attention in social networks. However, people are concerned about their privacy as...
conference paper 2011
document
Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused by the service provider. To protect user privacy, we propose to encrypt the data and generate recommendations by processing them under encryption. Thus, the service...
conference paper 2011
document
TNO Informatie- en Communicatietechnologie (author), Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)
Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we propose to encrypt the privacy sensitive data...
conference paper 2010
document
TNO Informatie- en Communicatietechnologie (author), Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused if it is leaked or by the service provider him self. To protect user’s privacy, we propose to encrypt the data and generate recommendations by processing them under...
conference paper 2010
document
Erkin, Z. (author), Veugen, P.J.M. (author), Toft, T. (author), Lagendijk, R.L. (author), TNO Informatie- en Communicatietechnologie (author)
In a ubiquitously connected world, social networks are playing an important role on the Internet by allowing users to find groups of people with similar interests. The data needed to construct such networks may be considered sensitive personal information by the users, which raises privacy concerns. The problem of building social networks while...
conference paper 2009
Searched for: author%3A%22Erkin%2C+Z.%22
(1 - 14 of 14)