Segui
Meilof Veeningen
Meilof Veeningen
Postdoctoral researcher, Eindhoven University of Technology
Email verificata su tue.nl - Home page
Titolo
Citata da
Citata da
Anno
Universally verifiable multiparty computation from threshold homomorphic cryptosystems
B Schoenmakers, M Veeningen
International Conference on Applied Cryptography and Network Security, 3-22, 2015
432015
Minimising communication in honest-majority MPC by batchwise multiplication verification
PS Nordholt, M Veeningen
International Conference on Applied Cryptography and Network Security, 321-339, 2018
352018
Trinocchio: Privacy-preserving outsourcing by distributed verifiable computation
B Schoenmakers, M Veeningen, N Vreede
International Conference on Applied Cryptography and Network Security, 346-366, 2016
292016
Pinocchio-based adaptive zk-SNARKs and secure/correct adaptive function evaluation
M Veeningen
International Conference on Cryptology in Africa, 21-39, 2017
222017
Modeling identity-related properties and their privacy strength
M Veeningen, B Weger, N Zannone
International Workshop on Formal Aspects in Security and Trust, 126-140, 2010
212010
Formal privacy analysis of communication protocols for identity management
M Veeningen, B Weger, N Zannone
International Conference on Information Systems Security, 235-249, 2011
172011
Formal modelling of (De) pseudonymisation: a case study in health care privacy
M Veeningen, B Weger, N Zannone
International Workshop on Security and Trust Management, 145-160, 2012
112012
Certificate validation in secure computation and its use in verifiable linear programming
S Hoogh, B Schoenmakers, M Veeningen
International Conference on Cryptology in Africa, 265-284, 2016
92016
Data minimisation in communication protocols: a formal analysis framework and application to identity management
M Veeningen, B De Weger, N Zannone
International journal of information security 13 (6), 529-569, 2014
82014
Multi-party computation system for learning a classifier
MG Veeningen
US Patent 11,100,427, 2021
72021
Enabling Analytics on Sensitive Medical Data with Secure Multi-Party Computation.
M Veeningen, S Chatterjea, AZ Horvßth, G Spindler, E Boersma, ...
MIE, 76-80, 2018
72018
Secure distributed key generation in attribute based encryption systems
D Pletea, S Sedghi, M Veeningen, M Petkovic
2015 10th International Conference for Internet Technology and Securedá…, 2015
62015
Are on-line personae really unlinkable?
M Veeningen, A Piepoli, N Zannone
Data Privacy Management and Autonomous Spontaneous Security, 369-379, 2013
62013
A formal privacy analysis of identity management systems
M Veeningen, B de Weger, N Zannone
arXiv preprint arXiv:1206.7111, 2012
52012
POSTER: TRIPLEX: verifying data minimisation in communication systems
M Veeningen, M Brus˛, J Den Hartog, N Zannone
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
42013
Symbolic privacy analysis through linkability and detectability
M Veeningen, B Weger, N Zannone
IFIP International Conference on Trust Management, 1-16, 2013
42013
Batch-wise distributed preprocessing information verification
MG Veeningen
US Patent 11,368,311, 2022
32022
Distributed privacy-preserving verifiable computation
MG Veeningen
US Patent 11,362,829, 2022
32022
Basic constructions of secure multiparty computation
AS aCybernetica
Applications of Secure Multiparty Computation 13, 1, 2015
32015
Guaranteeing correctness in privacy-friendly outsourcing by certificate validation
B Schoenmakers, MG Veeningen
Cryptology ePrint Archive 2015, 2015
22015
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20