Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Veeningen, Meilof"'
With the growing amount of personal information exchanged over the Internet, privacy is becoming more and more a concern for users. One of the key principles in protecting privacy is data minimisation. This principle requires that only the minimum am
Externí odkaz:
http://arxiv.org/abs/1206.7111
Publikováno v:
Nordholt, P S & Veeningen, M 2018, Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification . in Applied Cryptography and Network Security-16th International Conference, ACNS 2018, Proceedings . Lecture Notes in Computer Science, vol. 10892, pp. 321-339, Leuven, Belgium, 02/07/2018 .
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::bf81d7ca2fe6d5994dc2a150f610c431
https://pure.au.dk/portal/da/publications/minimising-communication-in-honestmajority-mpc-by-batchwise-multiplication-verification(3fb0131c-7236-4a94-8eb1-498b9c479ac5).html
https://pure.au.dk/portal/da/publications/minimising-communication-in-honestmajority-mpc-by-batchwise-multiplication-verification(3fb0131c-7236-4a94-8eb1-498b9c479ac5).html
Autor:
Veeningen, Meilof, Chatterjea, Supriyo, Horváth, Anna Zsófia, Spindler, Gerald, Boersma, Eric, Spek, Peter, Galiën, Onno, Gutteling, Job, Kraaij, Wessel, Veugen, Thijs
Publikováno v:
Studies in Health Technology and Informatics, 247, 76-80. IOS Press BV
Klein G.O.Karlsson D.Moen A.Ugon A., 40th Medical Informatics in Europe Conference, MIE 2018. 24 April 2018 through 26 April 2018, 247, 76-80
Klein G.O.Karlsson D.Moen A.Ugon A., 40th Medical Informatics in Europe Conference, MIE 2018. 24 April 2018 through 26 April 2018, 247, 76-80
While there is a clear need to apply data analytics in the healthcare sector, this is often difficult because it requires combining sensitive data from multiple data sources. In this paper, we show how the cryptographic technique of secure multiparty
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3bbad710d6253261331c0d382ad6536c
http://resolver.tudelft.nl/uuid:d9ab25fb-9fd4-458f-8746-c3852136fe38
http://resolver.tudelft.nl/uuid:d9ab25fb-9fd4-458f-8746-c3852136fe38
Publikováno v:
International Journal of Information Security. Nov2014, Vol. 13 Issue 6, p529-569. 41p.
Publikováno v:
Applied Cryptography & Network Security (9783319395548); 2016, p346-366, 21p
Publikováno v:
Progress in Cryptology - AFRICACRYPT 2016; 2016, p265-284, 20p
Autor:
Schoenmakers, Berry, Veeningen, Meilof
Publikováno v:
Applied Cryptography & Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers; 2015, p3-22, 20p
Publikováno v:
2015 10th International Conference for Internet Technology & Secured Transactions (ICITST); 1/1/2015, p103-107, 5p
Publikováno v:
Data Privacy Management & Autonomous Spontaneous Security (9783642545672); 2014, p369-379, 11p
Publikováno v:
Trust Management VII; 2013, p1-16, 16p