Arjan Jeckmans
Arjan Jeckmans
Vahvistettu sähköpostiosoite verkkotunnuksessa utwente.nl - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
1022013
Privacy in online social networks
M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Computational Social Networks, 87-113, 2012
442012
Efficient privacy-enhanced familiarity-based recommender system
A Jeckmans, A Peter, P Hartel
European Symposium on Research in Computer Security, 400-417, 2013
412013
Privacy-preserving collaborative filtering based on horizontally partitioned dataset
A Jeckmans, Q Tang, P Hartel
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
342012
Literature overview-privacy in online social networks
M Beye, A Jeckmans, Z Erkin, P Hartel, R Lagendijk, Q Tang
Centre for Telematics and Information Technology, University of Twente, 2010
322010
Poster: privacy-preserving profile similarity computation in online social networks
A Jeckmans, Q Tang, P Hartel
Proceedings of the 18th ACM conference on Computer and Communications …, 2011
162011
On non-parallelizable deterministic client puzzle scheme with batch verification modes
Q Tang, A Jeckmans
Centre for Telematics and Information Technology University of Twente, 2010
112010
Practical client puzzle from repeated squaring
AJP Jeckmans
University of Twente, 2009
112009
Cryptographically-Enhanced Privacy for Recommender Systems.
AJP Jeckmans
University of Twente, 2014
52014
Social Media Retrieval, chapter Privacy in Recommender systems
M Beye, A Jeckmans, Z Erkin, Q Tang, P Hartel, I Lagendijk
Springer, 2013
52013
Privacy-preserving profile matching using the social graph
A Jeckmans, Q Tang, P Hartel
2011 International Conference on Computational Aspects of Social Networks …, 2011
52011
On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. Centre for Telematics and Information Technology, University of Twente, January 2010
Q Tang, A Jeckmans
4
Towards a security model for computational puzzle schemes
Q Tang, A Jeckmans
International journal of computer mathematics 88 (11), 2246-2257, 2011
22011
Contextual Authentication: Using Mobile Phone Movements to Authenticate Owners Implicitly
Y Badin
University of Twente, 2016
12016
Efficient client puzzle schemes to mitigate DoS attacks
Q Tang, A Jeckmans
2010 International Conference on Computational Intelligence and Security …, 2010
12010
Aspect Only Software Development
A Jeckmans
2006
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–16