EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Project: Kindred Spirits: Privacy Enhanced Social Networking
Home Policy Brochure Browse Search User Area Contact Help

2014

Jeckmans, A.J.P. (2014) Cryptographically-Enhanced Privacy for Recommender Systems. PhD thesis, Univ. of Twente. CTIT Ph.D.-thesis series No. 13-290 ISBN 978-90-365-3593-9

2013

Jeckmans, A.J.P. and Beye, M.R.T. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2013) Privacy in Recommender Systems. In: Social Media Retrieval. Computer Communications and Networks. Springer Verlag, London, pp. 263-281. ISSN 1617-7975 ISBN 978-1-4471-4554-7
Lagendijk, R.L. and Erkin, Z. and Barni, M. (2013) Encrypted signal processing for privacy protection. IEEE Signal Processing Magazine, 30 (1). pp. 82-105. ISSN 1053-5888 *** ISI Impact 6,671 ***

2012

Beye, M.R.T. and Jeckmans, A.J.P. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2012) Privacy in Online Social Networks. In: Computational Social Networks: Security and Privacy. Springer Verlag, London, pp. 87-113. ISBN 978-1-4471-4050-4
Erkin, Z. and Beye, M.R.T. and Veugen, T. and Lagendijk, R.L. (2012) Privacy-preserving content-based recommendations through homomorphic encryption. In: Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux, 24-25 May 2012, Boekelo. pp. 71-77. IEEE Benelux Information Theory Chapter. ISBN 978-90-365-3383-6
Erkin, Z. and Beye, M.R.T. and Veugen, T. and Lagendijk, R.L. (2012) Privacy-preserving content-based recommender system. In: Proceedings of the 14th ACM workshop on Multimedia and Security, 6-7 Sep 2012, Coventry, UK. pp. 77-84. ACM. ISBN 978-1-4503-1417-6
Erkin, Z. and Veugen, T. and Toft, T. and Lagendijk, R.L. (2012) Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE transactions on information forensics and security, 7 (3). pp. 1053-1066. ISSN 1556-6013 *** ISI Impact 2,441 ***
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2012) Privacy-Preserving Collaborative Filtering based on Horizontally Partitioned Dataset. In: International Conference on Collaboration Technologies and Systems (CTS 2012), 21-25 May 2012, Denver, CO, USA. pp. 439-446. IEEE Computer Society. ISBN 978-1-4673-1381-0
Tang, Qiang (2012) Cryptographic framework for analyzing the privacy of recommender algorithms. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 may. 2012, Denver, USA. pp. 455-462. IEEE Computer Society. ISBN 978-1-4673-1381-0
Tang, Qiang (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5 (12). pp. 1351-1362. ISSN 1939-0114 *** ISI Impact 0,806 ***
Tang, Qiang (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2 (4). pp. 304-321. ISSN 1753-0563

2011

Beye, M.R.T. and Erkin, Z. and Lagendijk, R.L. (2011) Efficient privacy preserving K-means clustering in a three-party setting. In: IEEE International Workshop on Information Forensics and Security, WIFS 2011, 29 Nov - 02 Dec 2011 , Iguacu Falls, Brazil. pp. 1-6. IEEE. ISBN 978-1-4577-1018-6
Erkin, Z. and Beye, M.R.T. and Veugen, T. and Lagendijk, R.L. (2011) Efficiently computing private recommendations. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011, 22-27 May 2011, Prague. pp. 5864-5867. IEEE. ISSN 1520-6149 ISBN 978-1-4577-0537-3
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) Privacy-Preserving Profile Matching Using the Social Graph. Technical Report TR-CTIT-11-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) Privacy-Preserving Profile Matching Using the Social Graph. In: International Conference on Computational Aspects of Social Networks, CASoN 2011, 19-21 Oct 2011 , Salamanca, Spain. pp. 42-47. IEEE Computer Society. ISBN 978-1-4577-1132-9
Jeckmans, A.J.P. and Tang, Qiang and Hartel, P.H. (2011) POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks. In: Proceedings of the 18th ACM conference on Computer and communications security (CCS), 17-21 Oct 2011 , Chicago, IL, USA. pp. 793-795. ACM. ISBN 978-1-4503-0948-6
Tang, Qiang (2011) Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. In: Proceedings of the 16th Australian conference on information security and privacy, 11-13 Jul 2011, Melbourne, Australia. pp. 389-406. Lecture Notes in Computer Science 6812. Springer Verlag. ISBN 978-3-642-22497-3
Tang, Qiang (2011) Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization. Technical Report TR-CTIT-11-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang and Chen, Liqun (2011) Extended KCI attack against two-party key establishment protocols. Information processing letters, 111 (15). pp. 744-747. ISSN 0020-0190 *** ISI Impact 0,605 ***
Tang, Qiang and Jeckmans, A.J.P. (2011) Towards a security model for computational puzzle schemes. International Journal of Computer Mathematics, 88 (11). pp. 2246-2257. ISSN 0020-7160 *** ISI Impact 0,577 ***

2010

Beye, M. and Jeckmans, A.J.P. and Erkin, Z. and Hartel, P.H. and Lagendijk, R.L. and Tang, Qiang (2010) Literature Overview - Privacy in Online Social Networks. Technical Report TR-CTIT-10-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Erkin, Z. and Beye, M.R.T. and Veugen, T. and Lagendijk, R.L. (2010) Privacy enhanced recommender system. In: Proceedings of the 31st Symposium on Information Theory in the Benelux, 11-12 May 2010, Rotterdam. pp. 35-42. IEEE Benelux Information Theory Chapter. ISBN 978-90-710-4823-4
Tang, Qiang (2010) From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. Technical Report TR-CTIT-10-01, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2010) User-friendly matching protocol for online social networks. In: ACM Conference on Computer and Communications Security, 4-8 Oct 2010, Chicago, IL, USA. pp. 732-734. ACM. ISBN 978-1-4503-0245-6
Tang, Qiang (2010) Privacy Preserving Mapping Schemes Supporting Comparison. In: ACM Cloud Computing Security Workshop (CCSW), 9 Oct 2010, Chicago, Illinois. pp. 53-58. ACM. ISBN 978-1-4503-0089-6
Tang, Qiang and Jeckmans, A.J.P. (2010) On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. Technical Report TR-CTIT-10-02, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang and Jeckmans, A.J.P. (2010) Efficient Client Puzzle Schemes to Mitigate DoS Attacks. In: International Conference on Computational Intelligence and Security (CIS 2010), 11-14 dec 2010, Nanning, China. pp. 293-297. IEEE Computational Intelligence Society. ISBN 978-1-4244-9114-8