Meilof Veeningen
Meilof Veeningen
Postdoctoral researcher, Eindhoven University of Technology
Dirección de correo verificada de tue.nl - Página principal
Título
Citado por
Citado por
Año
Universally verifiable multiparty computation from threshold homomorphic cryptosystems
B Schoenmakers, M Veeningen
International Conference on Applied Cryptography and Network Security, 3-22, 2015
272015
Modeling identity-related properties and their privacy strength
M Veeningen, B De Weger, N Zannone
International Workshop on Formal Aspects in Security and Trust, 126-140, 2010
222010
Minimising communication in honest-majority MPC by batchwise multiplication verification
PS Nordholt, M Veeningen
International Conference on Applied Cryptography and Network Security, 321-339, 2018
172018
Formal privacy analysis of communication protocols for identity management
M Veeningen, B De Weger, N Zannone
International Conference on Information Systems Security, 235-249, 2011
172011
Pinocchio-based adaptive zk-SNARKs and secure/correct adaptive function evaluation
M Veeningen
International Conference on Cryptology in Africa, 21-39, 2017
82017
Trinocchio: privacy-preserving outsourcing by distributed verifiable computation
B Schoenmakers, M Veeningen, N de Vreede
International Conference on Applied Cryptography and Network Security, 346-366, 2016
72016
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation.
B Schoenmakers, M Veeningen, N de Vreede
IACR Cryptol. ePrint Arch. 2015, 480, 2015
72015
Formal modelling of (De) pseudonymisation: a case study in health care privacy
M Veeningen, B De Weger, N Zannone
International Workshop on Security and Trust Management, 145-160, 2012
72012
Data minimisation in communication protocols: a formal analysis framework and application to identity management
M Veeningen, B De Weger, N Zannone
International journal of information security 13 (6), 529-569, 2014
62014
Are on-line personae really unlinkable?
M Veeningen, A Piepoli, N Zannone
Data Privacy Management and Autonomous Spontaneous Security, 369-379, 2013
62013
Secure distributed key generation in attribute based encryption systems
D Pletea, S Sedghi, M Veeningen, M Petkovic
2015 10th International Conference for Internet Technology and Secured …, 2015
52015
A formal privacy analysis of identity management systems
M Veeningen, B de Weger, N Zannone
arXiv preprint arXiv:1206.7111, 2012
52012
Certificate validation in secure computation and its use in verifiable linear programming
S de Hoogh, B Schoenmakers, M Veeningen
International Conference on Cryptology in Africa, 265-284, 2016
42016
Symbolic privacy analysis through linkability and detectability
M Veeningen, B de Weger, N Zannone
IFIP International Conference on Trust Management, 1-16, 2013
42013
Enabling Analytics on Sensitive Medical Data with Secure Multi-Party Computation.
M Veeningen, S Chatterjea, AZ Horváth, G Spindler, E Boersma, ...
MIE, 76-80, 2018
32018
Multi-party computation system for learning a classifier
MG Veeningen
US Patent App. 16/122,942, 2019
22019
POSTER: TRIPLEX: verifying data minimisation in communication systems
M Veeningen, M Brusò, J Den Hartog, N Zannone
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
22013
Symbolic Analysis of Identity Mixer
M Veeningen
Tech report, www. mobiman. me, 2013
22013
Edit script verification with match operations and difference operations
MG Veeningen, B Schoenmakers, S Asadova
US Patent App. 16/110,222, 2019
12019
Basic constructions of secure multiparty computation
AS aCybernetica
Applications of Secure Multiparty Computation 13, 1, 2015
12015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20