Zekeriya Erkin

Orcid: 0000-0001-8932-4703

Affiliations:
  • Delft University of Technology, Netherlands


According to our database1, Zekeriya Erkin authored at least 86 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fear of Missing Out: Constrained Trial of Blockchain in Supply Chain.
Sensors, February, 2024

2023
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model.
IACR Cryptol. ePrint Arch., 2023

Topology-Based Reconstruction Prevention for Decentralised Learning.
CoRR, 2023

Differentially-Private Decision Trees with Probabilistic Robustness to Data Poisoning.
CoRR, 2023

Trajectory Hiding and Sharing for Supply Chains with Differential Privacy.
Proceedings of the Computer Security - ESORICS 2023, 2023

Image Watermarking for Machine Learning Datasets.
Proceedings of the Second ACM Data Economy Workshop, 2023

Graph Database Watermarking Using Pseudo-Nodes.
Proceedings of the Second ACM Data Economy Workshop, 2023

Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

Practical Verifiable & Privacy-Preserving Double Auctions.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Practical Multi-Party Private Set Intersection Protocols.
IEEE Trans. Inf. Forensics Secur., 2022

Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs.
IACR Cryptol. ePrint Arch., 2022

PRIDE: A Privacy-Preserving Decentralised Key Management System.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Decentralized Private Freight Declaration & Tracking with Data Validation.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers.
IACR Cryptol. ePrint Arch., 2021

Efficient Joint Random Number Generation for Secure Multi-party Computation.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Multi-Party Private Set Intersection Protocols for Practical Applications.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Practical Exchange for Unique Digital Goods.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021

Privacy-Preserving Data Aggregation with Probabilistic Range Validation.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Post-Quantum Adaptor Signatures and Payment Channel Networks.
IACR Cryptol. ePrint Arch., 2020

How to Profit from Payments Channels.
Proceedings of the Financial Cryptography and Data Security, 2020

PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Solving bin-packing problems under privacy preservation: Possibilities and trade-offs.
Inf. Sci., 2019

Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscation.
Energy Inform., 2019

Privacy-Preserving Multi-Party Access Control.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

On the Statistical Detection of Adversarial Instances over Encrypted Data.
Proceedings of the Security and Trust Management - 15th International Workshop, 2019

DECOUPLES: a decentralized, unlinkable and privacy-preserving traceability system for the supply chain.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

MUSCLE: authenticated external data retrieval from multiple sources for smart contracts.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

ECONoMy: Ensemble Collaborative Learning Using Masking.
Proceedings of the 30th IEEE International Symposium on Personal, 2019

Decentralized Incentive-Compatible and Sybil-Proof Transaction Advertisement.
Proceedings of the 1st International Conference on Mathematical Research for Blockchain Economy, 2019

VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design.
Proceedings of the Financial Cryptography and Data Security, 2019

TULIP: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration.
CoRR, 2018

A Scale-out Blockchain for Value Transfer with Spontaneous Sharding.
CoRR, 2018

A Novel Approach For Data Packing: Using Trapdoor Knapsack.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Mining Sequential Patterns from Outsourced Data via Encryption Switching.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

An Efficient Privacy-preserving Recommender System for e-Healthcare Systems.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Efficient Index-based Search Protocols for Encrypted Databases.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Privacy-preserving Distributed Access Control for Medical Data.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

A Scale-Out Blockchain for Value Transfer with Spontaneous Sharding.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018

Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018

Secure Fixed-point Division for Homomorphically Encrypted Operands.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Secure Equality Testing Protocols in the Two-Party Setting.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Improved privacy of dynamic group services.
EURASIP J. Inf. Secur., 2017

Information Propagation on Permissionless Blockchains.
CoRR, 2017

Implicit Consensus: Blockchain with Unbounded Throughput.
CoRR, 2017

A fault-tolerant and efficient scheme for data aggregation over groups in the smart grid.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

AHEad: Privacy-preserving online behavioural advertising using homomorphic encryption.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

A decentralised energy trading architecture for future smart grid load balancing.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Mining Encrypted Software Logs using Alpha Algorithm.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Privacy-safe linkage analysis with homomorphic encryption.
Proceedings of the 25th European Signal Processing Conference, 2017

2016
An efficient privacy-preserving comparison protocol in smart metering systems.
EURASIP J. Inf. Secur., 2016

Efficient and secure equality tests.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Enhancing User Privacy in Federated eID Schemes.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Secure matching of dutch car license plates.
Proceedings of the 24th European Signal Processing Conference, 2016

Secure key-exchange protocol for implants using heartbeats.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

2015
Secure Comparison Protocols in the Semi-Honest Model.
IEEE J. Sel. Top. Signal Process., 2015

Private data aggregation with groups for smart grids in a dynamic setting using CRT.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Content-based recommendations with approximate integer division.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

2014
Privacy Enhanced Personal Services for Smart Grids.
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014

eFuzz: A Fuzzer for DLMS/COSEM Electricity Meters.
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014

A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

Privacy-Preserving Emotion Detection for Crowd Management.
Proceedings of the Active Media Technology - 10th International Conference, 2014

2013
Privacy in Recommender Systems.
Proceedings of the Social Media Retrieval, 2013

Encrypted Signal Processing for Privacy Protection: Conveying the Utility of Homomorphic Encryption and Multiparty Computation.
IEEE Signal Process. Mag., 2013

Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview.
IEEE Signal Process. Mag., 2013

Privacy-preserving distributed clustering.
EURASIP J. Inf. Secur., 2013

Building a privacy-preserving semantic overlay for Peer-to-Peer networks.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Privacy-preserving recommender systems in dynamic environments.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Privacy-preserving distributed speech enhancement forwireless sensor networks by processing in the encrypted domain.
Proceedings of the IEEE International Conference on Acoustics, 2013

Privacy preserving distributed beamforming based on homomorphic encryption.
Proceedings of the 21st European Signal Processing Conference, 2013

Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing.
IEEE Trans. Inf. Forensics Secur., 2012

Privacy-preserving content-based recommender system.
Proceedings of the Multimedia and Security Workshop, 2012

Emerging cryptographic challenges in image and video processing.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Private Computation of Spatial and Temporal Power Consumption with Smart Meters.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Efficient privacy preserving K-means clustering in a three-party setting.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Efficiently computing private recommendations.
Proceedings of the IEEE International Conference on Acoustics, 2011

Generating private recommendations in a social trust network.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

2010
Secure signal processing: Privacy preserving cryptographic protocols for multimedia.
PhD thesis, 2010

2009
Privacy-preserving user clustering in a social network.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Privacy-Preserving Face Recognition.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

2007
Anonymous Fingerprinting with Robust QIM Watermarking Techniques.
EURASIP J. Inf. Secur., 2007

Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Inf. Secur., 2007


  Loading...