Alisa Pankova

According to our database1, Alisa Pankova authored at least 22 papers between 2012 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Mine Me but Don't Single Me Out: Differentially Private Event Logs for Process Mining.
CoRR, 2021

2020
A Framework of Metrics for Differential Privacy from Local Sensitivity.
Proc. Priv. Enhancing Technol., 2020

Privacy-Preserving Directly-Follows Graphs: Balancing Risk and Utility in Process Mining.
CoRR, 2020

PrivaLog: a privacy-aware logic programming language.
CoRR, 2020

Secure Multi-party Computation for Inter-organizational Process Mining.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2020

Shareprom: A Tool for Privacy-Preserving Inter-Organizational Process Mining.
Proceedings of the Best Dissertation Award, 2020

2019
Business Process Privacy Analysis in Pleak - (Extended Abstract).
Inform. Spektrum, 2019

Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes.
CoRR, 2019

Business Process Privacy Analysis in Pleak.
Proceedings of the Fundamental Approaches to Software Engineering, 2019

2018
Achieving Differential Privacy using Methods from Calculus.
CoRR, 2018

Bit Decomposition Protocols in Secure Multiparty Computation.
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018

2017
Preprocessing Based Verification of Multiparty Protocols with Honest Majority.
Proc. Priv. Enhancing Technol., 2017

2016
Optimizing Secure Computation Programs with Private Conditionals.
IACR Cryptol. ePrint Arch., 2016

Securing Multiparty Protocols against the Exposure of Data to Honest Parties.
IACR Cryptol. ePrint Arch., 2016

2015
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority.
IACR Cryptol. ePrint Arch., 2015

Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data.
IACR Cryptol. ePrint Arch., 2015

Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers.
IACR Cryptol. ePrint Arch., 2015

2014
Verifiable Computation in Multiparty Protocols with Honest Majority.
IACR Cryptol. ePrint Arch., 2014

2013
New Attacks against Transformation-Based Privacy-Preserving Linear Programming.
IACR Cryptol. ePrint Arch., 2013

Specifying sharemind's arithmetic black box.
Proceedings of the PETShop'13, 2013

On the (Im)possibility of privately outsourcing linear programming.
Proceedings of the CCSW'13, 2013

2012
Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012


  Loading...