Arjan Jeckmans
Arjan Jeckmans
Verified email at utwente.nl - Homepage
TitleCited byYear
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
652013
Privacy in online social networks
M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Computational Social Networks, 87-113, 2012
392012
Efficient privacy-enhanced familiarity-based recommender system
A Jeckmans, A Peter, P Hartel
European Symposium on Research in Computer Security, 400-417, 2013
312013
Literature overview-privacy in online social networks
M Beye, A Jeckmans, Z Erkin, P Hartel, R Lagendijk, Q Tang
Enschede, October, 2010
252010
Privacy-preserving collaborative filtering based on horizontally partitioned dataset
A Jeckmans, Q Tang, P Hartel
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
242012
Poster: privacy-preserving profile similarity computation in online social networks
A Jeckmans, Q Tang, P Hartel
Proceedings of the 18th ACM conference on Computer and communications …, 2011
122011
On non-parallelizable deterministic client puzzle scheme with batch verification modes
Q Tang, A Jeckmans
Centre for Telematics and Information Technology University of Twente, 2010
102010
Practical client puzzle from repeated squaring
AJP Jeckmans
University of Twente, 2009
102009
Privacy-preserving profile matching using the social graph
A Jeckmans, Q Tang, P Hartel
2011 International Conference on Computational Aspects of Social Networks …, 2011
52011
On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. Centre for Telematics and Information Technology, University of Twente (January 2010)
Q Tang, A Jeckmans
4
Cryptographically-Enhanced Privacy for Recommender Systems.
AJP Jeckmans
University of Twente, Enschede, Netherlands, 2014
22014
Contextual Authentication: Using Mobile Phone Movements to Authenticate Owners Implicitly
Y Badin
University of Twente, 2016
12016
Efficient Client Puzzle Schemes to Mitigate DoS Attacks
Q Tang, A Jeckmans
2010 International Conference on Computational Intelligence and Security …, 2010
12010
Towards a security model for computational puzzle schemes
Q Tang, A Jeckmans
International journal of computer mathematics 88 (11), 2246-2257, 2011
2011
Aspect Only Software Development
A Jeckmans
2006
The system can't perform the operation now. Try again later.
Articles 1–15