R.G. Kromes, T. Li, Maxime Bouillion, Talha Enes Güler, Victor van der Hulst, Z. Erkin (2024), Fear of Missing Out: Constrained Trial of Blockchain in Supply Chain, In Sensors Volume 24.

Marco Palazzo, Florine W. Dekker, Alessandro Brighente, Mauro Conti, Zekeriya Erkin (2024), Privacy-Preserving Data Aggregation with Public Verifiability Against Internal Adversaries, In Proceedings of the 33rd USENIX Security Symposium p.6957-6974, USENIX Association.

Jelle Vos, Mauro Conti, Zekeriya Erkin (2024), SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model, In Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024 p.465-483, IEEE.

Tianyu Li, Li Xu, Zekeriya Erkin, Reginald L. Lagendijk (2024), Trajectory Hiding and Sharing for Supply Chains with Differential Privacy, Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis (Eds.), In Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings p.297-317, Springer.

Armin Memar Zahedani, Jelle Vos, Zekeriya Erkin (2023), Practical Verifiable & Privacy-Preserving Double Auctions, In ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings, Association for Computing Machinery (ACM).

Florine W. Dekker, Z. Erkin, M. Conti (2023), Topology-Based Reconstruction Prevention for Decentralised Learning.

Li Xu, Tianyu Li, Zekeriya Erkin (2023), Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism, In Proceedings of the 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA) p.266-273, IEEE.

Tianyu Li, Jelle Vos, Zekeriya Erkin (2022), Decentralized Private Freight Declaration & Tracking with Data Validation, In Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) p.267-272, IEEE.

Jelle Vos, Daniël Vos, Zekeriya Erkin (2022), Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts, Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng (Eds.), In Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings p.408-423, Springer.

David Kester, Tianyu Li, Zekeriya Erkin (2022), PRIDE: A Privacy-Preserving Decentralised Key Management System, In Proceedings of the 2022 IEEE International Workshop on Information Forensics and Security (WIFS) p.1-6, IEEE.