Gamze Tillem

According to our database1, Gamze Tillem authored at least 13 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
ZKFlow: Private Transactions in Corda with ZKP.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

2021
How to Share and Own a Secret.
IACR Cryptol. ePrint Arch., 2021

2020
Preserving Confidentiality in Data Analytics-as-a-Service.
PhD thesis, 2020

SwaNN: Switching among Cryptographic Tools for Privacy-preserving Neural Network Predictions.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Solving bin-packing problems under privacy preservation: Possibilities and trade-offs.
Inf. Sci., 2019

Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscation.
Energy Inform., 2019

Privacy-Preserving Multi-Party Access Control.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

2018
Mining Sequential Patterns from Outsourced Data via Encryption Switching.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

2017
A New Method for Computational Private Information Retrieval.
Comput. J., 2017

AHEad: Privacy-preserving online behavioural advertising using homomorphic encryption.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Mining Encrypted Software Logs using Alpha Algorithm.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

2016
Hiding Access Patterns in Range Queries Using Private Information Retrieval and ORAM.
Proceedings of the Financial Cryptography and Data Security, 2016


  Loading...