RL Lagendijk, Z Erkin, M Barni (2013), Encrypted signal processing for privacy protection, In IEEE Signal Processing Magazine Volume 30 p.82-105.

A Noroozian, MM de Weerdt, C Witteveen (2013), Incentivizing cooperation in P2P file sharing: Indirect interaction as an incentive to seed, L Cao, Y Zeng, AL Symeonidis, VI Gorodetsky, PS Yu, MP Singh (Eds.), In Proceedings - 8th International Workshop on Agents and Data Mining Interaction p.36-50, Springer.

H Asghari, MJG van Eeten, M Mueller (2013), Internet Measurements and Public Policy: Mind the Gap, C Kanich (Eds.), In 6th workshop on cyber security experimentation and test, CSET '13 p.1-26, USENIX Association.

C Doerr, N Blenn, PFA Van Mieghem (2013), Lognormal infection times of online information spread, In PLoS ONE Volume 8 p.1-6.

AJP Jeckmans, MRT Beye, Z Erkin, PH Hartel, RL Lagendijk, Q Tang (2013), Privacy in recommender systems, N Ramzan, R van Zwol et al. (Eds.), In Social media retrieval p.263-281, Springer.

RC Hendriks, Z Erkin, T Gerkmann (2013), Privacy preserving distributed beamforming based on homomorphic encryption, In Proceedings of Eusipco 2013 p.1-5, Eurasip.

Z Erkin, JR Troncoso-Pastoriza, RL Lagendijk, F Pérez-González (2013), Privacy-preserving data aggregation in smart metering systems: an overview, In IEEE Signal Processing Magazine Volume 30 p.75-86.

Z Erkin, PJM Veugen, T Toft, RL Lagendijk (2013), Privacy-preserving distributed clustering, In Eurasip Journal on Information Security Volume 2013 p.1-15.

RC Hendriks, Z Erkin, T Gerkmann (2013), Privacy-preserving distributed speech enhancement for wireless sensor networks by processing in the encrypted domain, SN (Eds.), In 2013 International Conference on Acoustic, Speech and Signal Processing-ICASSP p.7005-7009, IEEE.

Z Erkin, PJM Veugen, RL Lagendijk (2013), Privacy-preserving recommender systems in dynamic environments, T Kalker, J Huang (Eds.), In Proceedings of the 2013 IEEE Workshop on Information Forensics and Security p.61-66, IEEE.