Publications

Export 287 results:
Sort by: Author Title Type [ Year  (Desc)]
2017
Maulany C, Nateghizad M, Erkin Z. Privacy-Preserving Collection and Retrieval of Medical Wearables Data. Symposium on Information Theory and Signal Processing in the Benelux. 2017. Download: 22.pdf (144.95 KB)
Nateghizad M, Erkin Z, Lagendijk RL. Privacy-Preserving Equality Test. Symposium on Information Theory and Signal Processing in the Benelux. 2017. Download: WIC2017.pdf (205.29 KB)
Zhang Y, Lin Q, Wang J, Verwer SE, Dolan J. Data-driven Behavior Generation Algorithm in Car-following Scenarios. In: 25th International Symposium on Dynamics of Vehicles on Roads and Tracks (IAVSD 2017). 25th International Symposium on Dynamics of Vehicles on Roads and Tracks (IAVSD 2017). Queensland, Australia; 2017.
Helsloot LJ, Tillem G, Erkin Z. Privacy concerns and protection measures in online behavioural advertising. 2017 Symposium on Information Theory and Signal Processing in the Benelux. 2017:89-96. Download: wic-paper.pdf (116.94 KB)
Lycklama H, Oudejans J, Erkin Z. DecReg: A Framework for Preventing Double-Financing using Blockchain Technology. In: ASIA CCS 2017 WORKSHOP on Blockchain, Cryptocurrencies and Contracts, BCC'17. ASIA CCS 2017 WORKSHOP on Blockchain, Cryptocurrencies and Contracts, BCC'17. Abu Dhabi, UAE; 2017.
Veugen T, Doumen J, Erkin Z, et al. Improved privacy of dynamic group services. EURASIP Journal on Information Security. 2017;1:1-9. Download: Improved privacy of dynamic group services - 2017.pdf (606.13 KB)
Liu X, Lin Q, Verwer SE, Jarnikov DS. Anomaly Detection in Digital Video Broadcasting System Using Timed Automata. In: Thirty-Second Annual ACM/IEEE Symposium on Logic in Computer Science (LICS) Workshop on Learning and Automata (LearnAut). Thirty-Second Annual ACM/IEEE Symposium on Logic in Computer Science (LICS) Workshop on Learning and Automata (LearnAut). Reykjavik, Iceland; 2017.
Luchs M, Doerr C. Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems. In: International Conference on Detection of Intrusions and Malware & Vulnerability Assessment. International Conference on Detection of Intrusions and Malware & Vulnerability Assessment.; 2017. Download: paper.pdf (530.05 KB)
Zhang Y, Lin Q, Wang J, Verwer SE. Learning Car-following Behaviors Using Timed Automata. In: The 20th World Congress of the International Federation of Automatic Control (IFAC 2017). The 20th World Congress of the International Federation of Automatic Control (IFAC 2017). Toulouse, France; 2017.
2016
Nateghizad M, Erkin Z, Lagendijk RL. Efficient and Secure Equality Tests. {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2016. 2016:1--6. Download: 07823915.pdf (169.84 KB)
Shrishak K, Erkin Z, Schaar R. Enhancing User Privacy in Federated eID Schemes. In: 8th IFIP International Conference on New Technologies, Mobility and Security. 8th IFIP International Conference on New Technologies, Mobility and Security. Larnaca, Cyprus; 2016.
Ren Z, Goseling J, Weber JH, Gastpar M. On the Energy Benefit of Compute-and-forward for Multiple Unicasts. In: IEEE ISIT 2016. IEEE ISIT 2016. Barcelona, Spain; 2016:2334-2338. Download: ISIT2016 p2334-ren.pdf (126.62 KB)
Weber JH, Swart TG, Immink KAS. Simple Systematic Pearson Coding. In: IEEE ISIT 2016. IEEE ISIT 2016. Barcelona, Spain; 2016:385-389. Download: ISIT2016 p385-weber.pdf (111.63 KB)
Shrishak K, Erkin Z, Schaar R. Enhancing privacy of users in eID schemes. In: 37th WIC Symposium on Information Theory in the Benelux. 37th WIC Symposium on Information Theory in the Benelux. Leuven, Belgium; 2016:158-165. Download: SES16.pdf (163.97 KB)
Veugen T. Proof of the Median Paths. In: 37th WIC Symposium on Information Theory in the Benelux. 37th WIC Symposium on Information Theory in the Benelux. Université catholique de Louvain; 2016. Available at: http://sites.uclouvain.be/sitb2016/Proceedings_SITB2016_preliminary.pdf. Abstract  Download: 3.pdf (366.64 KB)