Filter
Conference contribution

Search results

  • 2024

    Trajectory Hiding and Sharing for Supply Chains with Differential Privacy

    Li, T., Xu, L., Erkin, Z. & Lagendijk, R. L., 2024, Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings. Tsudik, G., Conti, M., Liang, K. & Smaragdakis, G. (eds.). Springer, p. 297-317 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14345 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • 2023

    Practical Verifiable & Privacy-Preserving Double Auctions

    Memar Zahedani, A., Vos, J. & Erkin, Z., 2023, ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings. Association for Computing Machinery (ACM), 9 p. 25. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    12 Downloads (Pure)
  • Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism

    Xu, L., Li, T. & Erkin, Z., 2023, Proceedings of the 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA). Danvers: IEEE , p. 266-273 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • 2022

    Decentralized Private Freight Declaration & Tracking with Data Validation

    Li, T., Vos, J. & Erkin, Z., 2022, Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops). Danvers: IEEE , p. 267-272 6 p. 9767444

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    27 Downloads (Pure)
  • Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts

    Vos, J., Vos, D. & Erkin, Z., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, V., Di Pietro, R., Jensen, C. D. & Meng, W. (eds.). Springer, p. 408-423 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13554 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    25 Downloads (Pure)
  • PRIDE: A Privacy-Preserving Decentralised Key Management System

    Kester, D., Li, T. & Erkin, Z., 2022, Proceedings of the 2022 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE , p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    16 Downloads (Pure)
  • 2021

    Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers

    Vos, J., Erkin, Z. & Dörr, C., 2021, 2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021: Proceedings. IEEE , p. 44-49 6 p. 9648381. (2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    20 Downloads (Pure)
  • Efficient joint random number generation for secure multi-party computation

    Hoogerwerf, E., van Tetering, D., Bay, A. & Erkin, Z., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (eds.). SciTePress, p. 436-443 8 p. (Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Multi-party private set intersection protocols for practical applications

    Bay, A., Erkin, Z., Alishahi, M. & Vos, J., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (eds.). SciTePress, p. 515-522 8 p. (Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    104 Downloads (Pure)
  • Practical Exchange for Unique Digital Goods

    Ersoy, O., Genç, Z. A., Erkin, Z. & Conti, M., 2021, 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS): Proceedings. O'Conner, L. (ed.). Piscataway: IEEE , p. 49-58 10 p. 9566170

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    17 Downloads (Pure)
  • Privacy-Preserving Data Aggregation with Probabilistic Range Validation

    Dekker, F. W. & Erkin, Z., 2021, Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings. Sako, K. & Tippenhauer, N. O. (eds.). 19 ed. Kamakura, Japan: Springer Nature, Vol. 12727. p. 79-98 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12727 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    906 Downloads (Pure)
  • 2020

    How to profit from payments channels

    Ersoy, O., Roos, S. & Erkin, Z., 2020, Proceedings of the 24th Financial Cryptography and Data Security, Kota Kinabalu, Sabah, Malaysia. Bonneau, J. & Heninger, N. (eds.). Cham: Springer, Vol. 12059. p. 284-303 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12059 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    File
    10 Citations (Scopus)
    126 Downloads (Pure)
  • Post-quantum adaptor signatures and payment channel networks

    Esgin, M. F., Ersoy, O. & Erkin, Z., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings: 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Part II ed. Cham: Springer, p. 378-397 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Citations (Scopus)
    60 Downloads (Pure)
  • PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model

    Ugwuoke, C., Erkin, Z., Reinders, M. & Lagendijk, R., 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Carminati, B. & Kantarcioglu, M. (eds.). Association for Computing Machinery (ACM), p. 329-340 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    90 Downloads (Pure)
  • 2019

    A novel approach for data packing: Using trapdoor knapsack

    Nateghizad, M., Erkin, Z. & Lagendijk, R. L., 2019, 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Kumar, A., Yuen, P. C. & Huang, J. (eds.). Piscataway: IEEE , p. 1-6 6 p. 8630769

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Decouples: A Decentralized, Unlinkable and Privacy-preserving Traceability System for the Supply Chain

    El Maouchi, M., Ersoy, O. & Erkin, Z., 2019, Proceedings of the ACM Symposium on Applied Computing: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing . New York, NY, USA: Association for Computing Machinery (ACM), Vol. F147772. p. 364-373 10 p. (Proceedings of the ACM Symposium on Applied Computing; vol. Part F147772).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    15 Citations (Scopus)
  • ECONoMy: Ensemble collaborative learning using masking

    Van De Kamp, L., Ugwuoke, C. & Erkin, Z., 1 Sept 2019, 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC Workshops 2019. Institute of Electrical and Electronics Engineers (IEEE), 7 p. 8880822. (2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC Workshops 2019).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • MUSCLE: Authenticated External Data Retrieval from Multiple Sources for Smart Contracts

    van der Laan, B., Ersoy, O. & Erkin, Z., 2019, Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC '19. Hung, C-C. & Papadopoulos, G. A. (eds.). New York, NY: Association for Computing Machinery (ACM), Vol. F147772. p. 382-391 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • On the Statistical Detection of Adversarial Instances over Encrypted Data

    Sheikhalishahi, M., Nateghizad, M., Martinelli, F., Erkin, Z. & Loog, M., 2019, Security and Trust Management - 15th International Workshop, STM 2019, Proceedings. Mauw, S. & Conti, M. (eds.). Springer, Vol. 11738. p. 71-88 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11738 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Privacy-preserving multi-party access control

    Sheikhalishahi, M., Tillem, G., Erkin, Z. & Zannone, N., 2019, WPES'19: Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society. New York: Association for Computing Machinery (ACM), p. 1-13 13 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Private Data Aggregation in Decentralized Networks

    Setia, P. K., Tillem, G. & Erkin, Z., 2019, 2019 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG). Cetin, A. (ed.). IEEE , p. 76-80 5 p. 8782377

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer

    Karakoç, F., Nateghizad, M. & Erkin, Z., 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019: Proceedings of the 14th International Conference on Availability, Reliability and Security. New York: Association for Computing Machinery (ACM), p. 1-9 9 p. 3339264. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Tulip: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication

    Ersoy, O., Erkin, Z. & Lagendijk, R. L., 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019: Proceedings. IEEE , p. 396-405 10 p. 8802398. (Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design

    Ren, Z. & Erkin, Z., 2019, Financial Cryptography and Data Security : 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Cham: Springer, Vol. 11598. p. 487-507 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598)(Security and Cryptology; vol. 11598).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    69 Downloads (Pure)
  • 2018

    A Fault-tolerant and Efficient Scheme for Data Aggregation Over Groups in the Smart Grid

    Knirsch, F., Engel, D. & Erkin, Z., 2018, 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017. Piscataway, NJ: IEEE , Vol. 2018-January. p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • AHEad: Privacy-preserving Online Behavioural Advertising using Homomorphic Encryption

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2018, 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017. Piscataway, NJ: IEEE , p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • An Efficient Privacy-preserving Recommender System for e-Healthcare systems

    Verhaert, D., Nateghizad, M. & Erkin, Z., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 188-199 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • BAdASS: Preserving privacy in behavioural advertising with applied secret sharing

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2018, Provable Security: 12th International Conference, ProvSec 2018 - Proceedings. Baek, J., Susilo, W. & Kim, J. (eds.). Cham: Springer, p. 397-405 9 p. (Lecture Notes in Computer Science; vol. 11192).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration

    Vos, D., Overweel, L., Raateland, W., Vos, J., Bijman, M., Pigmans, M. & Erkin, Z., 2018, Proceedings of the 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies , p. 1-8 8 p. (Reports of the European Society for Socially Embedded Technologies; vol. 2, no. 11).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  • Efficient Index-based Search Protocols for Encrypted Databases

    Nateghizad, M., Erkin, Z. & Lagendijk, R., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 270-281 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Mining Sequential Patterns from Outsourced Data via Encryption Switching

    Tillem, G., Erkin, Z. & Lagendijk, R. L., 2018, 16th Annual Conference on Privacy, Security and Trust, PST 2018. Piscataway, NJ: IEEE , p. 1-10 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Privacy-preserving Distributed Access Control for Medical Data

    Maulany, C., Nateghizad, M., Mennink, B. & Erkin, Z., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 322-331 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Secure Equality Testing Protocols in the Two-Party Setting

    Nateghizad, M., Veugen, T., Erkin, Z. & Lagendijk, I., 2018, ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security . New York, NY: Association for Computing Machinery (ACM), p. 1-10 10 p. 3

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Secure Fixed-point Division for Homomorphically Encrypted Operands

    Ugwuoke, C., Erkin, Z. & Lagendijk, I., 2018, ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security . New York: Association for Computer Machinery, p. 1-10 10 p. 33

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • TRADE: A Transparent, Decentralized Traceability System for the Supply Chain

    El Maouchi, M., Ersoy, O. & Erkin, Z., 2018, Proceedings of the 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies , p. 1-6 6 p. (Reports of the European Society for Socially Embedded Technologies; vol. 2, no. 4).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientific

  • 2017

    A decentralised energy trading architecture for future smart grid load balancing

    Hijgenaar, S., Erkin, Z., Keviczky, T., Siemons, J., Bisschops, R. & Verbraeck, A., 2017, Proceedings 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm 2017). Piscataway, NJ, USA: IEEE , p. 77-82

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    129 Downloads (Pure)
  • DecReg: A Framework for Preventing Double-Financing using Blockchain Technology

    Lycklama à Nijeholt, H., Erkin, Z. & Oudejans, J., 2017, BCC'17 Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts. New York: Association for Computing Machinery (ACM), p. 29-34 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    27 Citations (Scopus)
  • Efficient and secure equality tests

    Nateghizad, M., Erkin, Z. & Lagendijk, I., 2017, 2016 IEEE International Workshop on Information Forensics and Security (WIFS). Institute of Electrical and Electronics Engineers (IEEE), p. 1-6 6 p. 7823915

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Mining encrypted software logs using alpha algorithm

    Tillem, G., Erkin, Z. & Lagendijk, I., 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Obaidat, M. S., Samarati, P. & Cabello, E. (eds.). SciTePress, Vol. 4. p. 267-274 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    59 Downloads (Pure)
  • Privacy concerns and protection measures in online behavioural advertising

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 89-96 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Privacy-Preserving Collection and Retrieval of Medical Wearables Data

    Nateghizad, M., Maulany, C. & Erkin, Z., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 141-148 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    64 Downloads (Pure)
  • Privacy-Preserving Equality Test

    Nateghizad, M., Erkin, Z. & Lagendijk, I., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 167-177 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    59 Downloads (Pure)
  • Privacy-safe linkage analysis with homomorphic encryption

    Ugwuoke, C., Erkin, Z. & Lagendijk, R. L., 2017, 25th European Signal Processing Conference, EUSIPCO 2017. Piscataway, NJ: IEEE , p. 961-965 5 p. 8081350

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • 2016

    A Privacy-Preserving GWAS Computation with Homomorphic Encryption

    Ugwuoke, C., Erkin, Z. & Lagendijk, I., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 166-173 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    98 Downloads (Pure)
  • Enhancing privacy of users in eID schemes

    Shrishak, K., Erkin, Z. & Schaar, R., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 158-165 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    56 Downloads (Pure)
  • Enhancing user privacy in federated eID schemes

    Shrishak, K., Erkin, Z. & Schaar, R., 22 Dec 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security ( NTMS). Badra, M., Pau, G. & Vassiliou, V. (eds.). Piscataway: IEEE , p. 1-5 5 p. 7792448

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Privacy-Preserving Alpha Algorithm for Software Analysis

    Tillem, G., Erkin, Z. & Lagendijk, I., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 136-143 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    254 Downloads (Pure)
  • Secure Key-Exchange Protocol for Implants Using Heartbeats

    Seepers, R., Weber, J., Erkin, Z., Sourdis, Y. & Strydis, C., 2016, Proceedings of the ACM International Conference on Computing Frontiers, CF '16. New York: Association for Computing Machinery (ACM), p. 119-126 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    20 Citations (Scopus)
  • Secure Matching of Dutch Car License Plates

    Bindu Sunil, A., Erkin, Z. & Veugen, T., 2016, 24th European Signal Processing Conference, EUSIPCO 2016. Piscataway: IEEE , p. 2116-2120 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • 2015

    A signature scheme for a dynamic coalition defence environment without trusted third parties

    van der Lubbe, JCA., de Boer, MJ. & Erkin, Z., 2015, Cryptography and Information Security in the Balkans: First International Conferende. Ors, B. & Preneel, B. (eds.). Cham: Springer, p. 237-249 13 p. (Lecture Notes in Computer Science; vol. 9024).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review