Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Privacy-preserving Services On The Internet

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Publicaciones

Linear-Complexity Private Function Evaluation is Practical (se abrirá en una nueva ventana)

Autores: Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider
Publicado en: Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II, Edición 12309, 2020, Página(s) 401-420, ISBN 978-3-030-59012-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-59013-0_20

Griffin: Towards Mixed Multi-Key Homomorphic Encryption (se abrirá en una nueva ventana)

Autores: Thomas Schneider, Hossein Yalame, Michael Yonli
Publicado en: 20. International Conference on Security and Cryptography (SECRYPT'23), 2023
Editor: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0012090200003555

Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage (se abrirá en una nueva ventana)

Autores: Leonie Reichert, Gowri R Chandran, Phillipp Schoppmann, Thomas Schneider, Björn Scheuermann
Publicado en: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024, Página(s) 1675-1690
Editor: ACM
DOI: 10.1145/3634737.3657005

Engineering Privacy-Preserving Machine Learning Protocols (se abrirá en una nueva ventana)

Autores: Thomas Schneider
Publicado en: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020, Página(s) 3-4, ISBN 9781450380881
Editor: ACM
DOI: 10.1145/3411501.3418607

Offline Model Guard: Secure and Private ML on Mobile Devices (se abrirá en una nueva ventana)

Autores: Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, Christian Weinert
Publicado en: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2020, Página(s) 460-465, ISBN 978-3-9819263-4-7
Editor: IEEE
DOI: 10.23919/date48585.2020.9116560

FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation (se abrirá en una nueva ventana)

Autores: Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko
Publicado en: 18. ACM ASIA Conference on Computer and Communications Security (ASIACCS'23), 2023
Editor: ACM
DOI: 10.1145/3579856.3590340

Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies

Autores: Amos Treiber, Dirk Mullmann, Thomas Schneider, Indra Spiecker genannt Dohmann
Publicado en: 21. Workshop on Privacy in the Electronic Society (WPES'22), 2022
Editor: ACM

SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation (se abrirá en una nueva ventana)

Autores: Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
Publicado en: 14. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'21), 2022, Página(s) 147-157, ISBN 978-1-6654-1357-2
Editor: IEEE
DOI: 10.1109/host49136.2021.9702293

GPU-accelerated PIR with client-independent preprocessing for large-scale applications

Autores: Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider
Publicado en: USENIX Security Symposium (USENIX Security'22), Edición 31, 2022
Editor: USENIX

ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation

Autores: Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
Publicado en: USENIX Security Symposium (USENIX Security'21), Edición 30, 2021, Página(s) 2165-2182
Editor: USENIX

POSTER: Secure and Differentially Private K-th Ranked Element

Autores: Gowri R Chandran, Philipp-Florens Lehwalder, Leandro Rometsch, Thomas Schneider
Publicado en: ACM Conference on Computer and Communications Security (CCS'23) Posters/Demos, Edición 30, 2023
Editor: ACM

HyCaMi: High-level synthesis for cache side mitigation

Autores: Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel, Hossein Yalame
Publicado en: Design Automation Conference (DAC'24), Edición 61, 2024
Editor: ACM

SafeFL: MPC-friendly framework for Private and Robust Federated Learning

Autores: Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame
Publicado en: 6. Deep Learning Security and Privacy Workshop (DLSP'23), 2023
Editor: IEEE

CryptoSPN: Privacy-preserving Sum-Product Network Inference (se abrirá en una nueva ventana)

Autores: Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, Kristian Kersting
Publicado en: 24. European Conference on Artificial Intelligence (ECAI'20), 2020, Página(s) 1946-1953
Editor: IOS Press
DOI: 10.3233/faia200313

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop

Autores: Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
Publicado en: USENIX Security Symposium (USENIX Security'21), Edición 30, 2021, Página(s) 3577-3594
Editor: USENIX

Balancing Quality and Efficiency in Private Clustering with Affinity Propagation (se abrirá en una nueva ventana)

Autores: Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame
Publicado en: Proceedings of the 18th International Conference on Security and Cryptography, 2021, Página(s) 173-184, ISBN 978-989-758-524-1
Editor: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0010547801730184

SAFE: A Secure and Efficient Long-Term Distributed Storage System (se abrirá en una nueva ventana)

Autores: Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Agnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni
Publicado en: 8. ACM International Workshop on Security in Blockchain and Cloud Computing (SBC@ASIACCS'20), 2020, Página(s) 8-13
Editor: ACM
DOI: 10.1145/3384942.3406868

FAPRIL: Towards faster privacy-preserving fingerprint-based localization

Autores: Christopher van der Beets, Raine Nieminen, Thomas Schneider
Publicado en: Proceedings of the 19th International Conference on Security and Cryptography, 2022
Editor: SCITEPRESS - Science and Technology Publications

VASA: Vector AES Instructions for Security Applications (se abrirá en una nueva ventana)

Autores: Jean-Pierre Münch, Thomas Schneider, Hossein Yalame
Publicado en: Annual Computer Security Applications Conference (ACSAC'21), Edición 37, 2021, Página(s) 131-145
Editor: ACM
DOI: 10.1145/3485832.3485897

Encrypted MultiChannel Communication (EMC2): Johnny Should use Secret Sharing

Autores: Gowri R Chandran, Kilian Demuth, Kasra Edalatnejad, Sebastian Linsner, Christian Reuter, Thomas Schneider
Publicado en: Workshop on Privacy in the Electronic Society (WPES'24), Edición 23, 2024
Editor: ACM

FLAME: Taming backdoors in federated learning

Autores: Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
Publicado en: USENIX Security Symposium (USENIX Security'22), Edición 31, 2022
Editor: USENIX

All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers (se abrirá en una nueva ventana)

Autores: Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
Publicado en: Proceedings 2021 Network and Distributed System Security Symposium, 2021, ISBN 1-891562-66-5
Editor: Internet Society
DOI: 10.14722/ndss.2021.23159

ScionFL: Secure quantized aggregation for federated learning

Autores: Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, and Avishay Yanai
Publicado en: IEEE Conference on Secure and Trustworthy Machine Learning (SaTML'24), Edición 2, 2024
Editor: IEEE

SAFELearn: Secure Aggregation for private FEderated Learning (se abrirá en una nueva ventana)

Autores: Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Mollering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni
Publicado en: 2021 IEEE Security and Privacy Workshops (SPW), 2021, Página(s) 56-62, ISBN 978-1-6654-3732-5
Editor: IEEE
DOI: 10.1109/spw53761.2021.00017

ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion System for Inter-State Relationships (se abrirá en una nueva ventana)

Autores: Thomas Reinhold, Philipp Kuhn, Daniel Gunther, Thomas Schneider, Christian Reuter
Publicado en: IEEE Transactions on Technology and Society, 2023
Editor: IEEE
DOI: 10.1109/tts.2023.3280356

PEA: Practical Private Epistasis Analysis using MPC

Autores: Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko
Publicado en: 27. European Symposium on Research in Computer Security (ESORICS'22), 2022
Editor: Springer

CryptoSPN - Expanding PPML beyond Neural Networks (se abrirá en una nueva ventana)

Autores: Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, Kristian Kersting
Publicado en: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020, Página(s) 9-14, ISBN 9781450380881
Editor: ACM
DOI: 10.1145/3411501.3419417

Breaking the size barrier: Universal circuits meet lookup tables

Autores: Yann Disser, Daniel Günther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt, Hossein Yalame
Publicado en: Advances in Cryptology - ASIACRYPT'23, Edición 29, 2023
Editor: Springer

Concretely Efficient Private Set Union via Circuit-Based PSI

Autores: Gowri R Chandran, Maximilian Stillger, Thomas Schneider, Christian Weinert
Publicado en: ACM ASIA Conference on Computer and Communications Security (ASIACCS'25), Edición 20, 2025
Editor: ACM

Scaling Mobile Private Contact Discovery to Billions of Users

Autores: Laura Hetz, Thomas Schneider, Christian Weinert
Publicado en: 2023
Editor: Springer

Secure Two-Party Computation in a Quantum World (se abrirá en una nueva ventana)

Autores: Niklas Buscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Kramer, Deevashwer Rathee, Thomas Schneider, Patrick Struck
Publicado en: 18. International Conference on Applied Cryptography and Network Security (ACNS'20), 2020, Página(s) 461-480, ISBN 978-3-030-57878-7
Editor: Springer
DOI: 10.1007/978-3-030-57808-4_23

Comparison-based MPC in star topology

Autores: Gowri R Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider
Publicado en: Proceedings of the 19th International Conference on Security and Cryptography, 2022
Editor: SCITEPRESS - Science and Technology Publications

Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine interdisziplinäre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den Geschlechtseintrag

Autores: Linda Seyda, Andreas Brüggemann, Gerrit Hornung, Thomas Schneider
Publicado en: Recht und Technik: Datenschutz im Diskurs (RuT'24), 2024
Editor: Gesellschaft für Informatik

FLUTE: Fast and Secure Lookup Table Evaluations (se abrirá en una nueva ventana)

Autores: Andreas Bruggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame
Publicado en: 44. IEEE Symposium on Security and Privacy (S&P'23), 2023
Editor: IEEE
DOI: 10.1109/sp46215.2023.00157

Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation (se abrirá en una nueva ventana)

Autores: Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert
Publicado en: Proceedings of the 18th International Conference on Security and Cryptography, 2021, Página(s) 444-451, ISBN 978-989-758-524-1
Editor: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0010540504440451

RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation (se abrirá en una nueva ventana)

Autores: Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert, Tim Weißmantel
Publicado en: Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings, Edición 12579, 2020, Página(s) 505-525, ISBN 978-3-030-65410-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-65411-5_25

Secure Maximum Weight Matching Approximation on General Graphs

Autores: Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer
Publicado en: 21. Workshop on Privacy in the Electronic Society (WPES'22), 2022
Editor: ACM

Attesting distributional properties of training data for machine learning

Autores: Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan
Publicado en: European Symposium on Research in Computer Security (ESORICS'24), Edición 29, 2024
Editor: Springer

Too close for comfort? Measuring success of sampled-data leakage attacks against encrypted search

Autores: Dominique Dittert, Thomas Schneider, Amos Treiber
Publicado en: ACM Cloud Computing Security Workshop (CCSW'23), Edición 15, 2023
Editor: ACM

FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation

Autores: Daniel Günther, Joachim Schmidt, Thomas Schneider, Hossein Yalame
Publicado en: Annual Computer Security Applications Conference (ACSAC'24), Edición 40, 2024
Editor: ACM

SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data

Autores: Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
Publicado en: European Symposium on Security and Privacy (EuroS&P'22), Edición 7, 2022
Editor: IEEE

Evaluating Leakage Attacks Against Relational Encrypted Search

Autores: Patrick Ehrler, Abdelkarim Kati, Thomas Schneider, Amos Treiber
Publicado en: ACM Cloud Computing Security Workshop (CCSW'24), Edición 16, 2024
Editor: ACM

MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (se abrirá en una nueva ventana)

Autores: Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame
Publicado en: 15. International Conference on Availability, Reliability and Security (ARES'20), 2020
Editor: ACM
DOI: 10.1145/3411501.3419425

BOLT: Privacy-preserving, accurate and efficient inference for transformers

Autores: Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, Thomas Schneider
Publicado en: IEEE Symposium on Security and Privacy (IEEE S&P'24), Edición 45, 2024
Editor: IEEE

Secure noise sampling for DP in MPC with finite precision

Autores: Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, Liang Zhao
Publicado en: International Conference on Availability, Reliability and Security (ARES'24), Edición 19, 2024
Editor: ACM

Don't eject the impostor: Fast three-party computation with a known cheater

Autores: Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, Hossein Yalame
Publicado en: IEEE Symposium on Security and Privacy (IEEE S&P'24), Edición 45, 2024
Editor: IEEE

Privacy-preserving Density-based Clustering (se abrirá en una nueva ventana)

Autores: Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider
Publicado en: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021, Página(s) 658-671, ISBN 9781450382878
Editor: ACM
DOI: 10.1145/3433210.3453104

Graphiti: Secure Graph Computation Made More Scalable

Autores: Nishat Koti, Varsha Bhat Kukkala ,Arpita Patra, Bhavish Raj Gopal
Publicado en: ACM SIGSAC Conference on Computer and Communications Security (CCS'24), 2024
Editor: ACM

LLVM-Based Circuit Compilation for Practical Secure Computation (se abrirá en una nueva ventana)

Autores: Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, Hossein Yalame
Publicado en: Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II, Edición 12727, 2021, Página(s) 99-121, ISBN 978-3-030-78374-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-78375-4_5

Tetrad: Actively Secure 4PC for Secure Training and Inference

Autores: Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh
Publicado en: Network and Distributed System Security Symposium (NDSS'22), Edición 29, 2022
Editor: Internet Society

PrivMail: A privacy-preserving framework for secure emails

Autores: Gowri R Chandran, Raine Nieminen, Thomas Schneider, Ajith Suresh
Publicado en: European Symposium on Research in Computer Security (ESORICS'23), Edición 28, 2023
Editor: Springer

AirCollect - efficiently recovering hashed phone numbers leaked via Apple AirDrop (se abrirá en una nueva ventana)

Autores: Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
Publicado en: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, Página(s) 371-373, ISBN 9781450383493
Editor: ACM
DOI: 10.1145/3448300.3468252

Trustworthy AI Inference Systems: An Industry Research View

Autores: Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Agnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler, Huili Chen, Siam Umar Hussain, Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajan Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu, Fateme Sadat Hoss
Publicado en: 2020
Editor: arXiv

POSTER: A Generic Hybrid 2PC Framework with Application to Private Inference of Unmodified Neural Networks (Extended Abstract)

Autores: Lennart Braun, Rosario Cammarota, Thomas Schneider
Publicado en: Privacy in Machine Learning Workshop (PriML@NeurIPS'21), 2021
Editor: NeurIPS

HyFL: A Hybrid Approach For Private Federated Learning (se abrirá en una nueva ventana)

Autores: Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame
Publicado en: 2023
Editor: arXiv
DOI: 10.48550/arxiv.2302.09904

SPIKE: Secure and Private Investigation of the Kidney Exchange problem (se abrirá en una nueva ventana)

Autores: Timm Birka, Kay Hamacher, Tobias Kussel, Helen Möllering, Thomas Schneider
Publicado en: 2022
Editor: arXiv
DOI: 10.48550/arxiv.2204.09937

Improved Universal Circuits using Lookup Tables

Autores: Yann Disser, Daniel Gunther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt, Hossein Yalame
Publicado en: 2022
Editor: Cryptology ePrint Archive

POSTER: PrivForm – A Privacy-Preserving Framework for Online Forms

Autores: Andreas Brüggemann, Tamino Goldan, Thomas Schneider
Publicado en: Annual Computer Security Applications Conference (ACSAC'24) Poster Session, 2024
Editor: ACSAC

Efficient and Scalable Universal Circuits (se abrirá en una nueva ventana)

Autores: Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider
Publicado en: Journal of Cryptology, Edición 33/3, 2020, Página(s) 1216-1271, ISSN 0933-2790
Editor: Springer Verlag
DOI: 10.1007/s00145-020-09346-z

Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations (se abrirá en una nueva ventana)

Autores: Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
Publicado en: ACM Transactions on Privacy and Security (TOPS), 2022, ISSN 2471-2566
Editor: ACM
DOI: 10.1145/3546191

Breaking and Fixing Garbled Circuits when a Gate has Duplicate Input Wires

Autores: Raine Nieminen, Thomas Schneider
Publicado en: Journal of Cryptology (JoC), 2023, ISSN 0933-2790
Editor: Springer Verlag

SoK: Efficient Privacy-preserving Clustering (se abrirá en una nueva ventana)

Autores: Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame
Publicado en: Proceedings on Privacy Enhancing Technologies, Edición 2021/4, 2021, Página(s) 225-248, ISSN 2299-0984
Editor: De Gruyter Open
DOI: 10.2478/popets-2021-0068

Faster privacy‐preserving location proximity schemes for circles and polygons (se abrirá en una nueva ventana)

Autores: Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang
Publicado en: IET Information Security, Edición 14/3, 2020, Página(s) 254-265, ISSN 1751-8709
Editor: Institution of Engineering and Technology
DOI: 10.1049/iet-ifs.2019.0125

MOTION - A Framework for Mixed-Protocol Multi-Party Computation (se abrirá en una nueva ventana)

Autores: Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko
Publicado en: Transactions on Privacy and Security (TOPS), 2022, ISSN 2471-2574
Editor: ACM
DOI: 10.1145/3490390

"Comments on ""Privacy-Enhanced Federated Learning Against Poisoning Adversaries""" (se abrirá en una nueva ventana)

Autores: Thomas Schneider, Ajith Suresh, Hossein Yalame
Publicado en: IEEE Transactions on Information Forensics and Security (TIFS), 2023, ISSN 1556-6013
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2023.3238544

Privacy-Preserving Epidemiological Modeling on Mobile Graphs

Autores: Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh
Publicado en: IEEE Transactions on Information Forensics and Security (TIFS), 2025, ISSN 1556-6013
Editor: Institute of Electrical and Electronics Engineers

MPClan: Protocol Suite for Privacy-Conscious Computations

Autores: Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh
Publicado en: Journal of Cryptology, 2023, ISSN 0933-2790
Editor: Springer Verlag

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0