From keys to databases—real-world applications of secure multi-party computation DW Archer, D Bogdanov, Y Lindell, L Kamm, K Nielsen, JI Pagter, ... The Computer Journal 61 (12), 1749-1771, 2018 | 175 | 2018 |
A new way to protect privacy in large-scale genome-wide association studies L Kamm, D Bogdanov, S Laur, J Vilo Bioinformatics 29 (7), 886-893, 2013 | 172 | 2013 |
Secure floating point arithmetic and private satellite collision analysis L Kamm, J Willemson International Journal of Information Security 14 (6), 531-548, 2015 | 139 | 2015 |
Students and taxes: a privacy-preserving study using secure computation D Bogdanov, L Kamm, B Kubo, R Rebane, V Sokk, R Talviste Proceedings on Privacy Enhancing Technologies, 2016 | 113 | 2016 |
Rmind: a tool for cryptographically secure statistical analysis D Bogdanov, L Kamm, S Laur, V Sokk IEEE Transactions on Dependable and Secure Computing 15 (3), 481-495, 2016 | 93 | 2016 |
Privacy-preserving statistical data analysis on federated databases D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt, R Talviste, ... Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014 | 57 | 2014 |
Implementation and evaluation of an algorithm for cryptographically private principal component analysis on genomic data D Bogdanov, L Kamm, S Laur, V Sokk IEEE/ACM transactions on computational biology and bioinformatics 15 (5 …, 2018 | 40 | 2018 |
Privacy-preserving statistical analysis using secure multi-party computation L Kamm Ph. D. dissertation, 2015 | 36 | 2015 |
Secure multi-party data analysis: end user validation and practical experiments D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt Cryptology ePrint Archive, 2013 | 24 | 2013 |
Applications of secure multiparty computation P Laud, L Kamm Ios Press, 2015 | 21 | 2015 |
Stateful abstractions of secure multiparty computation P Laud, L Kamm Applications of secure multiparty computation 13, 26-42, 2015 | 10 | 2015 |
Practical applications of secure multiparty computation P Laud, L Kamm Applications of secure multiparty computation 13 (246), 2015 | 9 | 2015 |
Implementing privacy-preserving genotype analysis with consideration for population stratification A Ostrak, J Randmets, V Sokk, S Laur, L Kamm Cryptography 5 (3), 21, 2021 | 8 | 2021 |
Flexible database platform for biomedical research with multiple user interfaces and a universal query engine JV TALVIKb, A VILGOTA, J VILO Databases and Information Systems V: Selected Papers from the Eighth …, 2009 | 7 | 2009 |
Basic constructions of secure multiparty computation AS aCybernetica Applications of Secure Multiparty Computation 13, 1, 2015 | 4 | 2015 |
Modeling texas hold’em poker strategies with bayesian networks K Tretyakov, L Kamm tech. rep, techreport, 2009 | 4 | 2009 |
Integrating and validating maritime transport security services: Initial results from the cs4eu demonstrator C Grigoriadis, S Papastergiou, P Kotzanikolaou, C Douligeris, ... Proceedings of the 2021 Thirteenth International Conference on Contemporary …, 2021 | 3 | 2021 |
Statistical Analysis Methods Using Secure Multiparty Computation P Laud, L Kamm Applications of Secure Multiparty Computation 13, 58, 2015 | 2 | 2015 |
Constructing privacy-preserving information systems using secure multiparty computation D Bogdanov, L Kamm Cybernetica Research Report T-4-13, 2011 | 2 | 2011 |
Homological Classification of Commitment Schemes L Kamm Master’s thesis, University of Tartu, Institute of Computer Science, 2007 | 2 | 2007 |