Searched for: author%3A%22Erkin%2C+Z.%22
(1 - 6 of 6)
document
Memar Zahedani, Armin (author), Vos, J.V. (author), Erkin, Z. (author)
Double auctions are procedures to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Buyers and sellers inform the auctioneer what quantity they want to buy or sell at specific prices. The auctioneer aggregates these offers into demand and supply curves and finds the intersection representing the...
conference paper 2023
document
Bay, Asli (author), Erkin, Z. (author), Hoepman, Jaap Henk (author), Samardjiska, Simona (author), Vos, Jelle (author)
Privacy-preserving techniques for processing sets of information have attracted the research community's attention in recent years due to society's increasing dependency on the availability of data at any time. One of the fundamental problems in set operations is known as Private Set Intersection (PSI). The problem requires two parties to...
journal article 2022
document
Vos, J.V. (author), Vos, D.A. (author), Erkin, Z. (author)
Cloud services are an essential part of our digital infrastructure as organizations outsource large amounts of data storage and computations. While organizations typically keep sensitive data in encrypted form at rest, they decrypt it when performing computations, leaving the cloud provider free to observe the data. Unfortunately, access to...
conference paper 2022
document
Li, T. (author), Vos, J.V. (author), Erkin, Z. (author)
In January 2017, a truck crossed the border between Spain and France for the first time using an e-CMR: An electronic version of the primary transport document required for inter-European logistics. Since that crossing, researchers and logistic organizations have proposed a large number of ideas to further digitize Europe’s supply chain. Many of...
conference paper 2022
document
Bay, Asli (author), Erkin, Z. (author), Alishahi, Mina (author), Vos, J.V. (author)
Multi-Party Private Set Intersection (MPSI) is an attractive topic in research since a practical MPSI protocol can be deployed in several real-world scenarios, including but not limited to finding the common list of customers among several companies or privacy-preserving analyses of data from different stakeholders. Several solutions have...
conference paper 2021
document
Vos, J.V. (author), Erkin, Z. (author), Dörr, C. (author)
In their pursuit to maximize their return on investment, cybercriminals will likely reuse as much as possible between their campaigns. Not only will the same phishing mail be sent to tens of thousands of targets, but reuse of the tools and infrastructure across attempts will lower their costs of doing business. This reuse, however, creates an...
conference paper 2021
Searched for: author%3A%22Erkin%2C+Z.%22
(1 - 6 of 6)