Searched for: author%3A%22Erkin%2C+Z.%22
(1 - 20 of 29)

Pages

document
Memar Zahedani, Armin (author), Vos, J.V. (author), Erkin, Z. (author)
Double auctions are procedures to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Buyers and sellers inform the auctioneer what quantity they want to buy or sell at specific prices. The auctioneer aggregates these offers into demand and supply curves and finds the intersection representing the...
conference paper 2023
document
Li, T. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
With the emerging of e-commerce, package theft is at a high level: It is reported that 1.7 million packages are stolen or lost every day in the U.S. in 2020, which costs $25 million every day for the lost packages and the service. Information leakage during transportation is an important reason for theft since thieves can identify which truck is...
journal article 2022
document
Li, T. (author), Vos, J.V. (author), Erkin, Z. (author)
In January 2017, a truck crossed the border between Spain and France for the first time using an e-CMR: An electronic version of the primary transport document required for inter-European logistics. Since that crossing, researchers and logistic organizations have proposed a large number of ideas to further digitize Europe’s supply chain. Many of...
conference paper 2022
document
Bay, Asli (author), Erkin, Z. (author), Hoepman, Jaap Henk (author), Samardjiska, Simona (author), Vos, Jelle (author)
Privacy-preserving techniques for processing sets of information have attracted the research community's attention in recent years due to society's increasing dependency on the availability of data at any time. One of the fundamental problems in set operations is known as Private Set Intersection (PSI). The problem requires two parties to...
journal article 2022
document
Vos, J.V. (author), Vos, D.A. (author), Erkin, Z. (author)
Cloud services are an essential part of our digital infrastructure as organizations outsource large amounts of data storage and computations. While organizations typically keep sensitive data in encrypted form at rest, they decrypt it when performing computations, leaving the cloud provider free to observe the data. Unfortunately, access to...
conference paper 2022
document
Kester, David (author), Li, T. (author), Erkin, Z. (author)
There is an increase in interest and necessity for an interoperable and efficient railway network across Europe, creating a key distribution problem between train and trackside entities’ key management centres (KMC). Train and trackside entities establish a secure session using symmetric keys (KMAC) loaded beforehand by their respective KMC...
conference paper 2022
document
Bay, Asli (author), Erkin, Z. (author), Alishahi, Mina (author), Vos, J.V. (author)
Multi-Party Private Set Intersection (MPSI) is an attractive topic in research since a practical MPSI protocol can be deployed in several real-world scenarios, including but not limited to finding the common list of customers among several companies or privacy-preserving analyses of data from different stakeholders. Several solutions have...
conference paper 2021
document
Ersoy, O. (author), Genç, Ziya Alper (author), Erkin, Z. (author), Conti, M. (author)
Smart contracts can be used for the fair exchange of digital goods. A smart contract can escrow the exchange where the receiver deposits the payment, and the sender claims it by providing the goods. In the case of misbehavior, the parties provide proof on whether the received goods match the pre-agreed description or not. In general, the...
conference paper 2021
document
Vos, J.V. (author), Erkin, Z. (author), Dörr, C. (author)
In their pursuit to maximize their return on investment, cybercriminals will likely reuse as much as possible between their campaigns. Not only will the same phishing mail be sent to tens of thousands of targets, but reuse of the tools and infrastructure across attempts will lower their costs of doing business. This reuse, however, creates an...
conference paper 2021
document
Dekker, Florine W. (author), Erkin, Z. (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
conference paper 2021
document
Ugwuoke, C.I. (author), Erkin, Z. (author), Reinders, M.J.T. (author), Lagendijk, R.L. (author)
Genome sequencing has rapidly advanced in the last decade, making it easier for anyone to obtain digital genomes at low costs from companies such as Helix, MyHeritage, and 23andMe. Companies now offer their services in a direct-to-consumer (DTC) model without the intervention of a medical institution. Thereby, providing people with direct...
conference paper 2020
document
Ersoy, O. (author), Roos, S. (author), Erkin, Z. (author)
Payment channel networks like Bitcoin’s Lightning network are an auspicious approach for realizing high transaction throughput and almost-instant confirmations in blockchain networks. However, the ability to successfully conduct payments in such networks relies on the willingness of participants to lock collateral in the network. In Lightning...
conference paper 2020
document
Esgin, Muhammed F. (author), Ersoy, O. (author), Erkin, Z. (author)
Adaptor signatures, also known as scriptless scripts, have recently become an important tool in addressing the scalability and interoperability issues of blockchain applications such as cryptocurrencies. An adaptor signature extends a digital signature in a way that a complete signature reveals a secret based on a cryptographic condition. It...
conference paper 2020
document
Nandakumar, Lakshminarayanan (author), Tillem, G. (author), Erkin, Z. (author), Keviczky, T. (author)
Smart grids promise a more reliable, efficient, economically viable, and environment-friendly electricity infrastructure for the future. State estimation in smart grids plays a pivotal role in system monitoring, reliable operation, automation, and grid stabilization. However, the power consumption data collected from the users during state...
journal article 2019
document
Ren, Z. (author), Erkin, Z. (author)
Blockchains is a special type of distributed systems that operates in unsafe networks. In most blockchains, all nodes should reach consensus on all state transitions with Byzantine fault tolerant algorithms, which creates bottlenecks in performance. In this paper, we propose a new type of blockchains, namely Value-Centric Blockchains (VCBs),...
conference paper 2019
document
Nateghizad, M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
Many countries around the globe are investing on e-healthcare increasingly, which offers tremendous benefits to all stakeholders in healthcare. Nevertheless, this technology introduces unprecedented privacy concerns toward patients and raise more uncertainty among them to use e-healthcare for monitoring their vital signs. These concerns...
conference paper 2017
document
Nateghizad, M. (author), Maulany, Christian (author), Erkin, Z. (author)
In recent years we have seen a rise in the amount of fitness tracking and self monitoring devices. These devices which often work in conjunction with a smartphone are becoming more accurate and are becoming widely adopted. This trend goes hand in hand with Electronic Health Care (e-health): the shift of health care to the digital domain. E...
conference paper 2017
document
Tillem, G. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
The growing complexity of software with respect to technological advances encourages model-based analysis of software systems for validation and verification. Process mining is one recently investigated technique for such analysis which enables the discovery of process models from event logs collected during software execution. However, the...
conference paper 2017
document
Hijgenaar, S. (author), Erkin, Z. (author), Keviczky, T. (author), Siemons, Jos (author), Bisschops, Ralph (author), Verbraeck, A. (author)
Current state-of-the-art electric vehicle charging is found to have a profoundly disruptive effect on decentralised grids, increasing prevailing peak demand and causing network congestion. However, when charging behaviour is aligned with the needs of the grid, the batteries of electric vehicles can be used as a distributed resource to provide...
conference paper 2017
document
Veugen, P.J.M. (author), Doumen, Jeroen (author), Erkin, Z. (author), Pellegrino, G. (author), Verwer, S.E. (author), Weber, J.H. (author)
We consider dynamic group services, where outputs based on small samples of privacy-sensitive user inputs are repetitively computed. The leakage of user input data is analysed, caused by producing multiple outputs, resulting from inputs of frequently changing sets of users. A cryptographic technique, known as random user selection, is...
journal article 2017
Searched for: author%3A%22Erkin%2C+Z.%22
(1 - 20 of 29)

Pages