Jelle Vos, Mauro Conti, Zekeriya Erkin (2024), SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model, In Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024 p.465-483, IEEE.
Tianyu Li, Li Xu, Zekeriya Erkin, Reginald L. Lagendijk (2024), Trajectory Hiding and Sharing for Supply Chains with Differential Privacy, Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis (Eds.), In Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings p.297-317, Springer.
Armin Memar Zahedani, Jelle Vos, Zekeriya Erkin (2023), Practical Verifiable & Privacy-Preserving Double Auctions, In ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings, ACM.
Li Xu, Tianyu Li, Zekeriya Erkin (2023), Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism, In Proceedings of the 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA) p.266-273, IEEE.
Tianyu Li, Jelle Vos, Zekeriya Erkin (2022), Decentralized Private Freight Declaration & Tracking with Data Validation, In Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) p.267-272, IEEE.
Jelle Vos, Daniël Vos, Zekeriya Erkin (2022), Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts, Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng (Eds.), In Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings p.408-423, Springer.
David Kester, Tianyu Li, Zekeriya Erkin (2022), PRIDE: A Privacy-Preserving Decentralised Key Management System, In Proceedings of the 2022 IEEE International Workshop on Information Forensics and Security (WIFS) p.1-6, IEEE.
Asli Bay, Zekeriya Erkin, Jaap Henk Hoepman, Simona Samardjiska, Jelle Vos (2022), Practical Multi-Party Private Set Intersection Protocols, In IEEE Transactions on Information Forensics and Security Volume 17 p.1-15.
Tianyu Li, Zekeriya Erkin, Reginald L. Lagendijk (2022), Privacy-Preserving Bin-Packing With Differential Privacy, In IEEE Open Journal of Signal Processing Volume 3 p.94-106.
Jelle Vos, Zekeriya Erkin, Christian Dörr (2021), Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers, In 2021 IEEE International Workshop on Information Forensics and Security, WIFS 2021 p.44-49, IEEE.