Zekeriya Erkin
Orcid: 0000-0001-8932-4703Affiliations:
- Delft University of Technology, Netherlands
According to our database1,
Zekeriya Erkin
authored at least 89 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Sensors, February, 2024
Proc. Priv. Enhancing Technol., 2024
IACR Cryptol. ePrint Arch., 2024
Privacy-Preserving Data Aggregation with Public Verifiability Against Internal Adversaries.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model.
IACR Cryptol. ePrint Arch., 2023
Differentially-Private Decision Trees with Probabilistic Robustness to Data Poisoning.
CoRR, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Second ACM Data Economy Workshop, 2023
Proceedings of the Second ACM Data Economy Workshop, 2023
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts.
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Financial Cryptography and Data Security, 2020
PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
Solving bin-packing problems under privacy preservation: Possibilities and trade-offs.
Inf. Sci., 2019
Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscation.
Energy Inform., 2019
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019
Proceedings of the Security and Trust Management - 15th International Workshop, 2019
DECOUPLES: a decentralized, unlinkable and privacy-preserving traceability system for the supply chain.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
MUSCLE: authenticated external data retrieval from multiple sources for smart contracts.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the 30th IEEE International Symposium on Personal, 2019
Proceedings of the 1st International Conference on Mathematical Research for Blockchain Economy, 2019
VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design.
Proceedings of the Financial Cryptography and Data Security, 2019
TULIP: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration.
CoRR, 2018
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018
Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
A fault-tolerant and efficient scheme for data aggregation over groups in the smart grid.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
AHEad: Privacy-preserving online behavioural advertising using homomorphic encryption.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 25th European Signal Processing Conference, 2017
2016
EURASIP J. Inf. Secur., 2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Proceedings of the 24th European Signal Processing Conference, 2016
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016
2015
IEEE J. Sel. Top. Signal Process., 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015
2014
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014
A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties.
Proceedings of the Cryptography and Information Security in the Balkans, 2014
Proceedings of the Active Media Technology - 10th International Conference, 2014
2013
Encrypted Signal Processing for Privacy Protection: Conveying the Utility of Homomorphic Encryption and Multiparty Computation.
IEEE Signal Process. Mag., 2013
IEEE Signal Process. Mag., 2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Privacy-preserving distributed speech enhancement forwireless sensor networks by processing in the encrypted domain.
Proceedings of the IEEE International Conference on Acoustics, 2013
Proceedings of the 21st European Signal Processing Conference, 2013
Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation.
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing.
IEEE Trans. Inf. Forensics Secur., 2012
Proceedings of the Multimedia and Security Workshop, 2012
Proceedings of the 19th IEEE International Conference on Image Processing, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011
2010
PhD thesis, 2010
2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
2007
EURASIP J. Inf. Secur., 2007
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Inf. Secur., 2007