Follow
Arjan Jeckmans
Arjan Jeckmans
Verified email at utwente.nl - Homepage
Title
Cited by
Cited by
Year
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
1762013
Privacy in online social networks
M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Computational social networks: security and privacy, 87-113, 2012
522012
Efficient privacy-enhanced familiarity-based recommender system
A Jeckmans, A Peter, P Hartel
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
492013
Literature overview-privacy in online social networks
M Beye, A Jeckmans, Z Erkin, PH Hartel, R Lagendijk, Q Tang
Centre for Telematics and Information Technology (CTIT), 2010
442010
Privacy-preserving collaborative filtering based on horizontally partitioned dataset
A Jeckmans, Q Tang, P Hartel
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
382012
Poster: privacy-preserving profile similarity computation in online social networks
A Jeckmans, Q Tang, P Hartel
Proceedings of the 18th ACM conference on Computer and Communications …, 2011
182011
On non-parallelizable deterministic client puzzle scheme with batch verification modes
Q Tang, A Jeckmans
Centre for Telematics and Information Technology (CTIT), 2010
112010
Practical client puzzle from repeated squaring
AJP Jeckmans
University of Twente, 2009
112009
Cryptographically-enhanced privacy for recommender systems
A Jeckmans
72014
On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. Centre for Telematics and Information Technology, University of Twente (January 2010)
Q Tang, A Jeckmans
J. Shi and J.-F. Ma,“Design and analysis of a wireless authentication …, 0
6
Social Media Retrieval, chapter Privacy in Recommender systems
M Beye, A Jeckmans, Z Erkin, Q Tang, P Hartel, I Lagendijk
Springer, 2013
52013
Privacy-preserving profile matching using the social graph
A Jeckmans, Q Tang, P Hartel
2011 International Conference on Computational Aspects of Social Networks …, 2011
52011
Towards a security model for computational puzzle schemes
Q Tang, A Jeckmans
International Journal of Computer Mathematics 88 (11), 2246-2257, 2011
32011
Contextual Authentication: Using Mobile Phone Movements to Authenticate Owners Implicitly
Y Badin
University of Twente, 2016
12016
Efficient client puzzle schemes to mitigate DoS attacks
Q Tang, A Jeckmans
2010 International Conference on Computational Intelligence and Security …, 2010
12010
Aspect Only Software Development
A Jeckmans
2006
The system can't perform the operation now. Try again later.
Articles 1–16