Подписаться
Meilof Veeningen
Meilof Veeningen
Postdoctoral researcher, Eindhoven University of Technology
Подтвержден адрес электронной почты в домене tue.nl - Главная страница
Название
Процитировано
Процитировано
Год
Universally verifiable multiparty computation from threshold homomorphic cryptosystems
B Schoenmakers, M Veeningen
Applied Cryptography and Network Security: 13th International Conference …, 2015
602015
Minimising communication in honest-majority MPC by batchwise multiplication verification
PS Nordholt, M Veeningen
International Conference on Applied Cryptography and Network Security, 321-339, 2018
502018
Trinocchio: privacy-preserving outsourcing by distributed verifiable computation
B Schoenmakers, M Veeningen, N de Vreede
Applied Cryptography and Network Security: 14th International Conference …, 2016
392016
Pinocchio-based adaptive zk-SNARKs and secure/correct adaptive function evaluation
M Veeningen
International Conference on Cryptology in Africa, 21-39, 2017
312017
Modeling identity-related properties and their privacy strength
M Veeningen, B De Weger, N Zannone
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011
212011
Formal privacy analysis of communication protocols for identity management
M Veeningen, B de Weger, N Zannone
International Conference on Information Systems Security, 235-249, 2011
182011
Enabling Analytics on Sensitive Medical Data with Secure Multi-Party Computation.
M Veeningen, S Chatterjea, AZ Horváth, G Spindler, E Boersma, ...
MIE, 76-80, 2018
162018
Formal modelling of (De) pseudonymisation: a case study in health care privacy
M Veeningen, B de Weger, N Zannone
International Workshop on Security and Trust Management, 145-160, 2012
112012
Multi-party computation system for learning a classifier
MG Veeningen
US Patent 11,100,427, 2021
92021
Certificate validation in secure computation and its use in verifiable linear programming
S de Hoogh, B Schoenmakers, M Veeningen
Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016
92016
Trinocchio: Privacy-friendly outsourcing by distributed verifiable computation
B Schoenmakers, M Veeningen, N de Vreede
Cryptology ePrint Archive, 2015
92015
Data minimisation in communication protocols: a formal analysis framework and application to identity management
M Veeningen, B De Weger, N Zannone
International journal of information security 13, 529-569, 2014
92014
Are on-line personae really unlinkable?
M Veeningen, A Piepoli, N Zannone
Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014
72014
Secure distributed key generation in attribute based encryption systems
D Pletea, S Sedghi, M Veeningen, M Petkovic
2015 10th International Conference for Internet Technology and Secured …, 2015
52015
Batch-wise verification of multiparty computations
MG Veeningen
US Patent 11,818,255, 2023
42023
Basic constructions of secure multiparty computation
AS aCybernetica
Applications of Secure Multiparty Computation 13, 1, 2015
42015
A formal privacy analysis of identity management systems
MG Veeningen, BMM de Weger, N Zannone
42012
Multiparty computation scheduling
MG Veeningen, PP van Liesdonk, SJA DE HOOGH
US Patent 11,922,210, 2024
32024
Computer-implemented method of applying a first function to each data element in a data set, and a worker node for implementing the same
MG Veeningen
US Patent 11,836,273, 2023
32023
Nodes and methods of operating the same
MG Veeningen, PP van Liesdonk
US Patent 11,818,249, 2023
32023
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20