default search action
Zekeriya Erkin
Person information
- affiliation: Delft University of Technology, Netherlands
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Jelle Vos, Sikha Pentyala, Steven Golob, Ricardo Maia, Dean F. Kelley, Zekeriya Erkin, Martine De Cock, Anderson Nascimento:
Privacy-Preserving Membership Queries for Federated Anomaly Detection. Proc. Priv. Enhancing Technol. 2024(3): 186-201 (2024) - [j14]Roland Kromes, Tianyu Li, Maxime Bouillion, Talha Enes Güler, Victor van der Hulst, Zekeriya Erkin:
Fear of Missing Out: Constrained Trial of Blockchain in Supply Chain. Sensors 24(3): 986 (2024) - [c65]Jelle Vos, Mauro Conti, Zekeriya Erkin:
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model. SP 2024: 465-483 - [c64]Marco Palazzo, Florine W. Dekker, Alessandro Brighente, Mauro Conti, Zekeriya Erkin:
Privacy-Preserving Data Aggregation with Public Verifiability Against Internal Adversaries. USENIX Security Symposium 2024 - [i15]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Depth-Aware Arithmetization of Common Primitives in Prime Fields. IACR Cryptol. ePrint Arch. 2024: 1200 (2024) - [i14]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Oraqle: A Depth-Aware Secure Computation Compiler. IACR Cryptol. ePrint Arch. 2024: 1409 (2024) - 2023
- [c63]Armin Memar Zahedani, Jelle Vos, Zekeriya Erkin:
Practical Verifiable & Privacy-Preserving Double Auctions. ARES 2023: 25:1-25:9 - [c62]Li Xu, Tianyu Li, Zekeriya Erkin:
Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism. BCCA 2023: 266-273 - [c61]Palle Maesen, Devris Isler, Nikolaos Laoutaris, Zekeriya Erkin:
Image Watermarking for Machine Learning Datasets. DEC@SIGMOD 2023: 7-13 - [c60]Tsvetomir Hristov, Devris Isler, Nikolaos Laoutaris, Zekeriya Erkin:
Graph Database Watermarking Using Pseudo-Nodes. DEC@SIGMOD 2023: 14-20 - [c59]Tianyu Li, Li Xu, Zekeriya Erkin, Reginald L. Lagendijk:
Trajectory Hiding and Sharing for Supply Chains with Differential Privacy. ESORICS (2) 2023: 297-317 - [i13]Daniël Vos, Jelle Vos, Tianyu Li, Zekeriya Erkin, Sicco Verwer:
Differentially-Private Decision Trees with Probabilistic Robustness to Data Poisoning. CoRR abs/2305.15394 (2023) - [i12]Florine W. Dekker, Zekeriya Erkin, Mauro Conti:
Topology-Based Reconstruction Prevention for Decentralised Learning. CoRR abs/2312.05248 (2023) - [i11]Jelle Vos, Mauro Conti, Zekeriya Erkin:
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model. IACR Cryptol. ePrint Arch. 2023: 1777 (2023) - 2022
- [j13]Aslí Bay, Zekeriya Erkin, Jaap-Henk Hoepman, Simona Samardjiska, Jelle Vos:
Practical Multi-Party Private Set Intersection Protocols. IEEE Trans. Inf. Forensics Secur. 17: 1-15 (2022) - [c58]Jelle Vos, Daniël Vos, Zekeriya Erkin:
Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts. ESORICS (1) 2022: 408-423 - [c57]Tianyu Li, Jelle Vos, Zekeriya Erkin:
Decentralized Private Freight Declaration & Tracking with Data Validation. PerCom Workshops 2022: 267-272 - [c56]David Kester, Tianyu Li, Zekeriya Erkin:
PRIDE: A Privacy-Preserving Decentralised Key Management System. WIFS 2022: 1-6 - [i10]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs. IACR Cryptol. ePrint Arch. 2022: 721 (2022) - 2021
- [c55]Florine W. Dekker, Zekeriya Erkin:
Privacy-Preserving Data Aggregation with Probabilistic Range Validation. ACNS (2) 2021: 79-98 - [c54]Oguzhan Ersoy, Ziya Alper Genç, Zekeriya Erkin, Mauro Conti:
Practical Exchange for Unique Digital Goods. DAPPS 2021: 49-58 - [c53]Erwin Hoogerwerf, Daphne van Tetering, Aslí Bay, Zekeriya Erkin:
Efficient Joint Random Number Generation for Secure Multi-party Computation. SECRYPT 2021: 436-443 - [c52]Aslí Bay, Zeki Erkin, Mina Alishahi, Jelle Vos:
Multi-Party Private Set Intersection Protocols for Practical Applications. SECRYPT 2021: 515-522 - [c51]Jelle Vos, Zekeriya Erkin, Christian Doerr:
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers. WIFS 2021: 1-6 - [i9]Jelle Vos, Zekeriya Erkin, Christian Doerr:
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers. IACR Cryptol. ePrint Arch. 2021: 1260 (2021) - 2020
- [c50]Chibuike Ugwuoke, Zekeriya Erkin, Marcel J. T. Reinders, Reginald L. Lagendijk:
PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model. CODASPY 2020: 329-340 - [c49]Muhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin:
Post-Quantum Adaptor Signatures and Payment Channel Networks. ESORICS (2) 2020: 378-397 - [c48]Oguzhan Ersoy, Stefanie Roos, Zekeriya Erkin:
How to Profit from Payments Channels. Financial Cryptography 2020: 284-303 - [i8]Muhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin:
Post-Quantum Adaptor Signatures and Payment Channel Networks. IACR Cryptol. ePrint Arch. 2020: 845 (2020)
2010 – 2019
- 2019
- [j12]Lakshminarayanan Nandakumar, Gamze Tillem, Zekeriya Erkin, Tamás Keviczky:
Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscation. Energy Inform. 2(S1) (2019) - [j11]Rowan Hoogervorst, Yingqian Zhang, Gamze Tillem, Zekeriya Erkin, Sicco Verwer:
Solving bin-packing problems under privacy preservation: Possibilities and trade-offs. Inf. Sci. 500: 203-216 (2019) - [j10]Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin:
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(1): 23-41 (2019) - [c47]Ferhat Karakoç, Majid Nateghizad, Zekeriya Erkin:
SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer. ARES 2019: 12:1-12:9 - [c46]Oguzhan Ersoy, Zekeriya Erkin, Reginald L. Lagendijk:
TULIP: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication. EuroS&P Workshops 2019: 396-405 - [c45]Zhijie Ren, Zekeriya Erkin:
VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design. Financial Cryptography 2019: 487-507 - [c44]Oguzhan Ersoy, Zekeriya Erkin, Reginald L. Lagendijk:
Decentralized Incentive-Compatible and Sybil-Proof Transaction Advertisement. MARBLE 2019: 151-165 - [c43]Lars Van De Kamp, Chibuike Ugwuoke, Zekeriya Erkin:
ECONoMy: Ensemble Collaborative Learning Using Masking. PIMRC Workshops 2019: 1-6 - [c42]Mourad el Maouchi, Oguzhan Ersoy, Zekeriya Erkin:
DECOUPLES: a decentralized, unlinkable and privacy-preserving traceability system for the supply chain. SAC 2019: 364-373 - [c41]Bjorn van der Laan, Oguzhan Ersoy, Zekeriya Erkin:
MUSCLE: authenticated external data retrieval from multiple sources for smart contracts. SAC 2019: 382-391 - [c40]Mina Sheikhalishahi, Majid Nateghizad, Fabio Martinelli, Zekeriya Erkin, Marco Loog:
On the Statistical Detection of Adversarial Instances over Encrypted Data. STM 2019: 71-88 - [c39]Mina Sheikhalishahi, Gamze Tillem, Zekeriya Erkin, Nicola Zannone:
Privacy-Preserving Multi-Party Access Control. WPES@CCS 2019: 1-13 - [i7]Oguzhan Ersoy, Stefanie Roos, Zekeriya Erkin:
How to profit from payments channels. CoRR abs/1911.08803 (2019) - 2018
- [c38]Majid Nateghizad, Thijs Veugen, Zekeriya Erkin, Reginald L. Lagendijk:
Secure Equality Testing Protocols in the Two-Party Setting. ARES 2018: 3:1-3:10 - [c37]Chibuike Ugwuoke, Zekeriya Erkin, Reginald L. Lagendijk:
Secure Fixed-point Division for Homomorphically Encrypted Operands. ARES 2018: 33:1-33:10 - [c36]Zhijie Ren, Kelong Cong, Taico Aerts, Bart de Jonge, Alejandro Morais, Zekeriya Erkin:
A Scale-Out Blockchain for Value Transfer with Spontaneous Sharding. CVCBT 2018: 1-10 - [c35]Oguzhan Ersoy, Zhijie Ren, Zekeriya Erkin, Reginald L. Lagendijk:
Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms. CVCBT 2018: 20-30 - [c34]Danilo Verhaert, Majid Nateghizad, Zekeriya Erkin:
An Efficient Privacy-preserving Recommender System for e-Healthcare Systems. ICETE (2) 2018: 354-365 - [c33]Majid Nateghizad, Zekeriya Erkin, Reginald L. Lagendijk:
Efficient Index-based Search Protocols for Encrypted Databases. ICETE (2) 2018: 436-447 - [c32]Christian Maulany, Majid Nateghizad, Bart Mennink, Zekeriya Erkin:
Privacy-preserving Distributed Access Control for Medical Data. ICETE (2) 2018: 488-497 - [c31]Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin:
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing. ProvSec 2018: 397-405 - [c30]Gamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk:
Mining Sequential Patterns from Outsourced Data via Encryption Switching. PST 2018: 1-10 - [c29]Majid Nateghizad, Zekeriya Erkin, Reginald L. Lagendijk:
A Novel Approach For Data Packing: Using Trapdoor Knapsack. WIFS 2018: 1-6 - [i6]Zhijie Ren, Zekeriya Erkin:
A Scale-out Blockchain for Value Transfer with Spontaneous Sharding. CoRR abs/1801.02531 (2018) - [i5]Daniël Vos, Leon Overweel, Wouter Raateland, Jelle Vos, Matthijs Bijman, Max Pigmans, Zekeriya Erkin:
DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration. CoRR abs/1803.09257 (2018) - [i4]Zhijie Ren, Zekeriya Erkin:
VAPOR: a Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design. CoRR abs/1810.12596 (2018) - [i3]Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin:
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing. IACR Cryptol. ePrint Arch. 2018: 744 (2018) - 2017
- [j9]Thijs Veugen, Jeroen Doumen, Zekeriya Erkin, Gaetano Pellegrino, Sicco Verwer, Jos H. Weber:
Improved privacy of dynamic group services. EURASIP J. Inf. Secur. 2017: 3 (2017) - [c28]Chibuike Ugwuoke, Zekeriya Erkin, Reginald L. Lagendijk:
Privacy-safe linkage analysis with homomorphic encryption. EUSIPCO 2017: 961-965 - [c27]Gamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk:
Mining Encrypted Software Logs using Alpha Algorithm. SECRYPT 2017: 267-274 - [c26]Sjors Hijgenaar, Zekeriya Erkin, Tamás Keviczky, Jos Siemons, Ralph Bisschops, Alexander Verbraeck:
A decentralised energy trading architecture for future smart grid load balancing. SmartGridComm 2017: 77-82 - [c25]Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin:
AHEad: Privacy-preserving online behavioural advertising using homomorphic encryption. WIFS 2017: 1-6 - [c24]Fabian Knirsch, Dominik Engel, Zekeriya Erkin:
A fault-tolerant and efficient scheme for data aggregation over groups in the smart grid. WIFS 2017: 1-6 - [i2]Zhijie Ren, Kelong Cong, Johan Pouwelse, Zekeriya Erkin:
Implicit Consensus: Blockchain with Unbounded Throughput. CoRR abs/1705.11046 (2017) - [i1]Oguzhan Ersoy, Zhijie Ren, Zekeriya Erkin, Reginald L. Lagendijk:
Information Propagation on Permissionless Blockchains. CoRR abs/1712.07564 (2017) - 2016
- [j8]Majid Nateghizad, Zekeriya Erkin, Reginald L. Lagendijk:
An efficient privacy-preserving comparison protocol in smart metering systems. EURASIP J. Inf. Secur. 2016: 11 (2016) - [c23]Robert M. Seepers, Jos H. Weber, Zekeriya Erkin, Ioannis Sourdis, Christos Strydis:
Secure key-exchange protocol for implants using heartbeats. Conf. Computing Frontiers 2016: 119-126 - [c22]Archana Bindu Sunil, Zekeriya Erkin, Thijs Veugen:
Secure matching of dutch car license plates. EUSIPCO 2016: 2116-2120 - [c21]Kris Shrishak, Zekeriya Erkin, Remco Schaar:
Enhancing User Privacy in Federated eID Schemes. NTMS 2016: 1-5 - [c20]Majid Nateghizad, Zekeriya Erkin, Reginald L. Lagendijk:
Efficient and secure equality tests. WIFS 2016: 1-6 - 2015
- [j7]Thijs Veugen, Frank Blom, Sebastiaan J. A. de Hoogh, Zekeriya Erkin:
Secure Comparison Protocols in the Semi-Honest Model. IEEE J. Sel. Top. Signal Process. 9(7): 1217-1228 (2015) - [c19]Thijs Veugen, Zekeriya Erkin:
Content-based recommendations with approximate integer division. ICASSP 2015: 1802-1806 - [c18]Zekeriya Erkin:
Private data aggregation with groups for smart grids in a dynamic setting using CRT. WIFS 2015: 1-6 - 2014
- [c17]Zekeriya Erkin, Jie Li, Arnold P. O. S. Vermeeren, Huib de Ridder:
Privacy-Preserving Emotion Detection for Crowd Management. AMT 2014: 359-370 - [c16]Jan C. A. van der Lubbe, Merel J. de Boer, Zeki Erkin:
A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties. BalkanCryptSec 2014: 237-249 - [c15]Zekeriya Erkin, Thijs Veugen:
Privacy Enhanced Personal Services for Smart Grids. SEGS@CCS 2014: 7-12 - [c14]Henrique Dantas, Zekeriya Erkin, Christian Doerr, Raymond Hallie, Gerrit van der Bij:
eFuzz: A Fuzzer for DLMS/COSEM Electricity Meters. SEGS@CCS 2014: 31-38 - 2013
- [j6]Zekeriya Erkin, Thijs Veugen, Tomas Toft, Reginald L. Lagendijk:
Privacy-preserving distributed clustering. EURASIP J. Inf. Secur. 2013: 4 (2013) - [j5]Reginald L. Lagendijk, Zekeriya Erkin, Mauro Barni:
Encrypted Signal Processing for Privacy Protection: Conveying the Utility of Homomorphic Encryption and Multiparty Computation. IEEE Signal Process. Mag. 30(1): 82-105 (2013) - [j4]Zekeriya Erkin, Juan Ramón Troncoso-Pastoriza, Reginald L. Lagendijk, Fernando Pérez-González:
Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview. IEEE Signal Process. Mag. 30(2): 75-86 (2013) - [c13]Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe, Reginald L. Lagendijk:
Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation. ESORICS 2013: 418-442 - [c12]Richard C. Hendriks, Zekeriya Erkin, Timo Gerkmann:
Privacy preserving distributed beamforming based on homomorphic encryption. EUSIPCO 2013: 1-5 - [c11]Richard C. Hendriks, Zekeriya Erkin, Timo Gerkmann:
Privacy-preserving distributed speech enhancement forwireless sensor networks by processing in the encrypted domain. ICASSP 2013: 7005-7009 - [c10]Zekeriya Erkin, Thijs Veugen, Reginald L. Lagendijk:
Privacy-preserving recommender systems in dynamic environments. WIFS 2013: 61-66 - [c9]Niels Zeilemaker, Zekeriya Erkin, Paolo Palmieri, Johan A. Pouwelse:
Building a privacy-preserving semantic overlay for Peer-to-Peer networks. WIFS 2013: 79-84 - [p1]Arjan J. P. Jeckmans, Michael Beye, Zekeriya Erkin, Pieter H. Hartel, Reginald L. Lagendijk, Qiang Tang:
Privacy in Recommender Systems. Social Media Retrieval 2013: 263-281 - 2012
- [j3]Zekeriya Erkin, Thijs Veugen, Tomas Toft, Reginald L. Lagendijk:
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing. IEEE Trans. Inf. Forensics Secur. 7(3): 1053-1066 (2012) - [c8]Zekeriya Erkin, Gene Tsudik:
Private Computation of Spatial and Temporal Power Consumption with Smart Meters. ACNS 2012: 561-577 - [c7]William Puech, Zekeriya Erkin, Mauro Barni, Shantanu Rane, Reginald L. Lagendijk:
Emerging cryptographic challenges in image and video processing. ICIP 2012: 2629-2632 - [c6]Zekeriya Erkin, Michael Beye, Thijs Veugen, Reginald L. Lagendijk:
Privacy-preserving content-based recommender system. MM&Sec 2012: 77-84 - 2011
- [c5]Zekeriya Erkin, Thijs Veugen, Reginald L. Lagendijk:
Generating private recommendations in a social trust network. CASoN 2011: 82-87 - [c4]Zekeriya Erkin, Michael Beye, Thijs Veugen, Reginald L. Lagendijk:
Efficiently computing private recommendations. ICASSP 2011: 5864-5867 - [c3]Michael Beye, Zekeriya Erkin, Reginald L. Lagendijk:
Efficient privacy preserving K-means clustering in a three-party setting. WIFS 2011: 1-6 - 2010
- [b1]Zekeriya Erkin:
Secure signal processing: Privacy preserving cryptographic protocols for multimedia. Delft University of Technology, Netherlands, 2010
2000 – 2009
- 2009
- [c2]Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, Tomas Toft:
Privacy-Preserving Face Recognition. Privacy Enhancing Technologies 2009: 235-253 - [c1]Zekeriya Erkin, Thijs Veugen, Tomas Toft, Reginald L. Lagendijk:
Privacy-preserving user clustering in a social network. WIFS 2009: 96-100 - 2007
- [j2]Zekeriya Erkin, Alessandro Piva, Stefan Katzenbeisser, Reginald L. Lagendijk, Jamshid Shokrollahi, Gregory Neven, Mauro Barni:
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing. EURASIP J. Inf. Secur. 2007 (2007) - [j1]Jeroen P. Prins, Zekeriya Erkin, Reginald L. Lagendijk:
Anonymous Fingerprinting with Robust QIM Watermarking Techniques. EURASIP J. Inf. Secur. 2007 (2007)
Coauthor Index
aka: Inald Lagendijk
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint