- document
-
Nateghizad, M. (author), Veugen, P.J.M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In...conference paper 2018
- document
-
Erkin, Z. (author), Veugen, T. (author), Lagendijk, R.L. (author)Recommender systems play a crucial role today in on-line applications as they improve the customer satisfaction, and at the same time results in an increase in the profit for the service provider. However, there are serious privacy concerns as such systems rely on the personal data of the customers. There have been several proposals to provide...conference paper 2013
- document
-
Erkin, Z. (author), Veugen, T. (author), Toft, T. (author), Lagendijk, R.L. (author)Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a data set. The data set to be used for clustering can be owned by a single entity, or in some cases, information from different databases is...article 2013
- document
-
Erkin, Z. (author), Veugen, P.J.M. (author), Toft, T. (author), Lagendijk, R.L. (author)Recommender systems have become an important tool for personalization of online services. Generating recommendations in online services depends on privacy-sensitive data collected from the users. Traditional data protection mechanisms focus on access control and secure transmission, which provide security only against malicious third parties,...article 2012
- document
-
Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)By offering personalized content to users, recommender systems have become a vital tool in e-commerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or consumed. Unfortunately, collecting and storing ratings, on which content-based methods rely,...conference paper 2012
- document
-
Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)By offering personalized content to users, recommender systems have become a vital tool in ecommerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or consumed. Unfortunately, collecting and storing ratings, on which content-based methods rely,...conference paper 2012
- document
-
Erkin, Z. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)Recommender systems have become increasingly important in e-commerce as they can guide customers with finding personalized services and products. A variant of recommender systems that generates recommendations from a set of trusted people is recently getting more attention in social networks. However, people are concerned about their privacy as...conference paper 2011
- document
-
Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused by the service provider. To protect user privacy, we propose to encrypt the data and generate recommendations by processing them under encryption. Thus, the service...conference paper 2011
- document
-
TNO Informatie- en Communicatietechnologie (author), Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we propose to encrypt the privacy sensitive data...conference paper 2010
- document
-
TNO Informatie- en Communicatietechnologie (author), Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused if it is leaked or by the service provider him self. To protect user’s privacy, we propose to encrypt the data and generate recommendations by processing them under...conference paper 2010
- document
-
Erkin, Z. (author), Veugen, P.J.M. (author), Toft, T. (author), Lagendijk, R.L. (author), TNO Informatie- en Communicatietechnologie (author)In a ubiquitously connected world, social networks are playing an important role on the Internet by allowing users to find groups of people with similar interests. The data needed to construct such networks may be considered sensitive personal information by the users, which raises privacy concerns. The problem of building social networks while...conference paper 2009
- document
-
Wang, J. (author), Reinders, M.J.T. (author), Lagendijk, R.L. (author), Lindenberg, J. (author), Kankanhalli, M.S. (author), TNO Human Factors (author)The perceptual satisfaction of a user watching video on a tiny mobile device is constrained by the display capability and network bandwidth. To maximize the user's perceptual satisfaction in this constrained environment, we propose a new method to adaptively represent the video content in real-time on tiny devices according to the user's...conference paper 2004