Prof.dr.ir. R.L. (Inald) Lagendijk

subjects
2006 - Multimedia Compression
2006 - Information Processing
2006 - Stochastic Processes
2006 - Stochastic Processes
2006 - Data Carrying Signals
2006 - Selected Topics in Multimedia Computing
2006 - Stochastic Processes
2007 - Data Carrying Signals
2007 - Information Processing
2007 - Stochastic Processes
2007 - Multimedia Compression
2007 - Selected Topics in Multimedia Computing
2007 - Stochastic Processes
2009 - Information Processing
2009 - Stochastic Processes
2008 - Multimedia Compression
2008 - Stochastic Processes
2008 - Information Processing
2008 - Seminar Selected Topics in Multimedia Computing
2009 - Multimedia Compression
2009 - Seminar Selected Topics in Multimedia Computing
2010 - Multimedia Compression
2010 - Seminar Selected Topics in Multimedia Computing
2010 - Stochastic Processes
2011 - Seminar Selected Topics in Multimedia Computing
2011 - Multimedia Compression
2011 - Signaalverwerking
2013 - Signal Processing
2014 - Signal Processing
2012 - Seminar Selected Topics in Multimedia Computing
2012 - Signaalverwerking
2015 - Signal Processing
2017 - Signal Processing
2016 - Signal Processing
ancillary activities
-(Bestuurs)lid cie/vereniging - Ministerie van Economische Zaken

2017-01-01 - 2019-01-01

Openb best, overheid, soc.verz

-(Bestuurs)lid cie/vereniging - Ministerie van Economische Zaken

2019-01-01 - 2019-12-31

Openb best, overheid, soc.verz

-(Bestuurs)lid cie/vereniging - Stichting COMMIT/

2017-01-01 - 2019-01-01

Informatie en communicatie

-Adviseur/Consultant - Trinity College Dublin

2017-01-01 - 2019-01-01

Onderwijs

-Adviseur/Consultant - Trinity College Dublin

2019-01-01 - 2019-09-01

Onderwijs

-Adviseur/Consultant - TNO

2017-02-01 - 2017-08-01

Informatie en communicatie

publications
A Privacy-Preserving GWAS Computation with Homomorphic Encryption

peer reviewed : N

(2016) 8 pages , p. 166-173

authors

  • Chibuike Ugwuoke
  • Zekeriya Erkin
  • Inald Lagendijk
An efficient privacy-preserving comparison protocol in smart metering systems

peer reviewed : Y

Eurasip Journal on Information Security (2016)

authors

  • Majid Nateghizad
  • Zekeriya Erkin
  • Reginald L. Lagendijk
Privacy-Preserving Alpha Algorithm for Software Analysis

peer reviewed : N

(2016) 8 pages , p. 136-143

authors

  • Gamze Tillem
  • Zekeriya Erkin
  • Inald Lagendijk
Building blocks for privacy-preserving recommender systems in a dynamic setting

peer reviewed : N

Proceedings of the 34th WIC Symposium on Information Theory in the Benelux, 3rd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux (2013) 8 pages , p. 37-44

authors

  • D Kononchuk
  • Z Erkin
  • JCA van der Lubbe
  • RL Lagendijk

editors

  • S Pollin
  • L van der Perre
Encrypted signal processing for privacy protection

peer reviewed : Y

IEEE Signal Processing Magazine (2013) 24 pages , p. 82-105

authors

  • RL Lagendijk
  • Z Erkin
  • M Barni
Privacy in recommender systems

peer reviewed : N

Social media retrieval (2013) 484 pages , p. 263-281

authors

  • AJP Jeckmans
  • MRT Beye
  • Z Erkin
  • PH Hartel
  • RL Lagendijk
  • Q Tang

editors

  • N Ramzan
  • R van Zwol et al.
Privacy-preserving data aggregation in smart metering systems: an overview

peer reviewed : Y

IEEE Signal Processing Magazine (2013) 12 pages , p. 75-86

authors

  • Z Erkin
  • JR Troncoso-Pastoriza
  • RL Lagendijk
  • F Pérez-González
Privacy-preserving distributed clustering

peer reviewed : Y

Eurasip Journal on Information Security (2013) 15 pages , p. 1-15

authors

  • Z Erkin
  • PJM Veugen
  • T Toft
  • RL Lagendijk
Privacy-preserving recommender systems in dynamic environments

peer reviewed : Y

Proceedings of the 2013 IEEE Workshop on Information Forensics and Security (2013) 6 pages , p. 61-66

authors

  • Z Erkin
  • PJM Veugen
  • RL Lagendijk

editors

  • T Kalker
  • J Huang
Privacy-preserving user data oriented services for groups with dynamic participation

peer reviewed : Y

Computer Security - Proceedings 18th European Symposium on Research in Computer Security (2013) 25 pages , p. 418-442

authors

  • D Kononchuk
  • Z Erkin
  • JCA van der Lubbe
  • RL Lagendijk

editors

  • J Crampton
  • S Jajodia
  • K Mayes