If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Z. Erkin is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 3 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 62 Conference contribution
  • 12 Article
  • 4 Chapter
  • 1 Dissertation (TU Delft)

How to profit from payments channels

Ersoy, O., Roos, S. & Erkin, Z., Feb 2020, Proceedings of the 24th Financial Cryptography and Data Security, Kota Kinabalu, Sabah, Malaysia. 17 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

File
  • 33 Downloads (Pure)

    Post-quantum adaptor signatures and payment channel networks

    Esgin, M. F., Ersoy, O. & Erkin, Z., 2020, Computer Security – ESORICS 2020 : 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Part II ed. Cham: Springer, p. 378-397 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model

    Ugwuoke, C., Erkin, Z., Reinders, M. & Lagendijk, R., 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Carminati, B. & Kantarcioglu, M. (eds.). Association for Computing Machinery (ACM), p. 329-340 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • A novel approach for data packing: Using trapdoor knapsack

    Nateghizad, M., Erkin, Z. & Lagendijk, R. L., 2019, 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Kumar, A., Yuen, P. C. & Huang, J. (eds.). Piscataway: IEEE, p. 1-6 6 p. 8630769

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Badass: Preserving privacy in behavioural advertising with applied secret sharing

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2019, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 10, 1, p. 23-41 19 p.

    Research output: Contribution to journalArticleScientificpeer-review

  • 1 Citation (Scopus)