Zobrazeno 1 - 10
of 80
pro vyhledávání: '"Peeter Laud"'
Autor:
Peeter Laud, Alisa Pankova
Publikováno v:
BMC Medical Genomics, Vol 11, Iss S4, Pp 33-46 (2018)
Abstract Background Practical applications for data analysis may require combining multiple databases belonging to different owners, such as health centers. The analysis should be performed without violating privacy of neither the centers themselves,
Externí odkaz:
https://doaj.org/article/8b25c7678c5e42d7b3456f9643168b06
Publikováno v:
Cryptography, Vol 5, Iss 4, p 27 (2021)
In this paper, we propose and present secure multiparty computation (SMC) protocols for single-source shortest distance (SSSD) and all-pairs shortest distance (APSD) in sparse and dense graphs. Our protocols follow the structure of classical algorith
Externí odkaz:
https://doaj.org/article/d8b8395b33084563be743aaa3986ae10
Autor:
Peeter Laud, Jelizaveta Vakarjuk
Publikováno v:
Computer Security. ESORICS 2022 International Workshops ISBN: 9783031254598
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6eb2a068e8593ea4ffc4c883342ddcae
https://doi.org/10.1007/978-3-031-25460-4_36
https://doi.org/10.1007/978-3-031-25460-4_36
Publikováno v:
Security and Trust Management ISBN: 9783031295034
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74f9ddc8883ca1d7fb5fdf3518346fce
https://doi.org/10.1007/978-3-031-29504-1_4
https://doi.org/10.1007/978-3-031-29504-1_4
Autor:
Mohammad Anagreh, Peeter Laud
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031257339
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e5e94bb9e516f6a7552f1bb32528bb33
https://doi.org/10.1007/978-3-031-25734-6_8
https://doi.org/10.1007/978-3-031-25734-6_8
Autor:
Marlon Dumas, Reedik Tuuling, Joosep Jääger, Maksym Yerokhin, Aivo Toots, Raimundas Matulevičius, Martin Pettai, Alisa Pankova, Pille Pullonen-Raudvere, Luciano García-Bañuelos, Peeter Laud
Publikováno v:
International Journal on Software Tools for Technology Transfer. 24:183-203
Privacy regulations, such as GDPR, impose strict requirements to organizations that store and process private data. Privacy-enhancing technologies (PETs), such as secure multi-party computation and differential privacy, provide mechanisms to perform
Publikováno v:
SN Computer Science. 3
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 2, Pp 175-208 (2020)
The meaning of differential privacy (DP) is tightly bound with the notion of distance on databases, typically defined as the number of changed rows. Considering the semantics of data, this metric may be not the most suitable one, particularly when a
Publikováno v:
Proceedings of the 8th International Conference on Information Systems Security and Privacy.
Publikováno v:
Cryptography
Volume 5
Issue 4
Cryptography, Vol 5, Iss 27, p 27 (2021)
Volume 5
Issue 4
Cryptography, Vol 5, Iss 27, p 27 (2021)
In this paper, we propose and present secure multiparty computation (SMC) protocols for single-source shortest distance (SSSD) and all-pairs shortest distance (APSD) in sparse and dense graphs. Our protocols follow the structure of classical algorith