Segui
Gamze Tillem
Gamze Tillem
Email verificata su tudelft.nl - Home page
Titolo
Citata da
Citata da
Anno
Badass: Preserving privacy in behavioural advertising with applied secret sharing
LJ Helsloot, G Tillem, Z Erkin
Provable Security: 12th International Conference, ProvSec 2018, Jeju, South …, 2018
142018
Privacy-preserving alpha algorithm for software analysis
G Tillem, Z Erkin, RL Lagendijk
37th WIC Symposium on Information Theory in the Benelux/6th WIC/IEEE SP …, 2016
132016
Privacy-preserving multi-party access control
M Sheikhalishahi, G Tillem, Z Erkin, N Zannone
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 1-13, 2019
92019
Solving bin-packing problems under privacy preservation: Possibilities and trade-offs
R Hoogervorst, Y Zhang, G Tillem, Z Erkin, S Verwer
Information Sciences 500, 203-216, 2019
92019
AHEad: Privacy-preserving online behavioural advertising using homomorphic encryption
LJ Helsloot, G Tillem, Z Erkin
2017 IEEE Workshop on Information Forensics and Security (WIFS), 1-6, 2017
92017
Mining Encrypted Software Logs using Alpha Algorithm.
G Tillem, Z Erkin, RL Lagendijk
SECRYPT, 267-274, 2017
62017
SwaNN: Switching among cryptographic tools for privacy-preserving neural network predictions
G Tillem, B Bozdemir, M Önen
SECRYPT 2020, 17th International Conference on Security and Cryptography, 2020
52020
Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscation
L Nandakumar, G Tillem, Z Erkin, T Keviczky
Energy Informatics 2, 1-23, 2019
52019
Hiding access patterns in range queries using private information retrieval and ORAM
G Tillem, ÖM Candan, E Savaş, K Kaya
Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016
52016
Private data aggregation in decentralized networks
PK Setia, G Tillem, Z Erkin
2019 7th International Istanbul Smart Grids and Cities Congress and Fair …, 2019
42019
Mining sequential patterns from outsourced data via encryption switching
G Tillem, Z Erkin, RL Lagendijk
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018
22018
A new method for computational private information retrieval
G Tillem, E Savaş, K Kaya
The Computer Journal 60 (8), 1238-1250, 2017
22017
Privacy concerns and protection measures in online behavioural advertising
LJ Helsloot, G Tillem, Z Erkin
2017 Symposium on Information Theory and Signal Processing in the Benelux, 89, 2017
22017
DEA-based benchmarking models in supply chain management: an application-oriented literature review
G Ertek, N Akyurt, G Tillem
Istanbul Kemerburgaz University & Logistics Association (LODER) & Ideal …, 2012
22012
Check for updates ZKFlow: Private Transactions in Corda with ZKP
M van den Bos, V Ermolaev, S King, A Koren, G Tillem
Financial Cryptography and Data Security. FC 2022 International Workshops …, 2023
2023
ZKFlow: Private Transactions in Corda with ZKP
M van den Bos, V Ermolaev, S King, A Koren, G Tillem
International Conference on Financial Cryptography and Data Security, 138-163, 2022
2022
How to Share and Own a Secret
V Ermolaev, G Tillem
Cryptology ePrint Archive, 2021
2021
Preserving Confidentiality in Data Analytics-as-a-Service
G Tillem
2020
Hiding query access patterns in range queries using private information retrieval and oblivious ram
G Tillem
2015
Private Neural Network Predictions
G Tillem, B Bozdemir, M Önen
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20