Juan Ramón Troncoso-Pastoriza

Orcid: 0000-0001-8764-5570

According to our database1, Juan Ramón Troncoso-Pastoriza authored at least 59 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Scalable and Privacy-Preserving Federated Principal Component Analysis.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies.
Proc. Priv. Enhancing Technol., 2022

Privacy-preserving federated neural network learning for disease-associated cell classification.
Patterns, 2022

Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation.
IACR Cryptol. ePrint Arch., 2022

Orchestrating Collaborative Cybersecurity: A Secure Framework for Distributed Privacy-Preserving Threat Intelligence Sharing.
CoRR, 2022

2021
Multiparty Homomorphic Encryption from Ring-Learning-with-Errors.
Proc. Priv. Enhancing Technol., 2021

Scalable Privacy-Preserving Distributed Learning.
Proc. Priv. Enhancing Technol., 2021

SoK: Privacy-Preserving Collaborative Tree-based Model Learning.
Proc. Priv. Enhancing Technol., 2021

Citizen-centered, auditable and privacy-preserving population genomics.
Nat. Comput. Sci., 2021

Crypt4GH: a file format standard enabling native access to encrypted data.
Bioinform., 2021

Privacy and Integrity Preserving Computations with CRISP.
Proceedings of the 30th USENIX Security Symposium, 2021

POSEIDON: Privacy-Preserving Federated Neural Network Learning.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets.
IEEE Trans. Inf. Forensics Secur., 2020

Cybersecurity of Hospitals: discussing the challenges and working towards mitigating the risks.
BMC Medical Informatics Decis. Mak., 2020

SCOR: A secure international informatics infrastructure to investigate COVID-19.
J. Am. Medical Informatics Assoc., 2020

Multiparty Homomorphic Encryption: From Theory to Practice.
IACR Cryptol. ePrint Arch., 2020

Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys.
IACR Cryptol. ePrint Arch., 2020

Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE.
IACR Cryptol. ePrint Arch., 2020

Revolutionizing Medical Data Sharing Using Advanced Privacy Enhancing Technologies: Technical, Legal and Ethical Synthesis.
CoRR, 2020

Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

SPHN/PHRT - MedCo in Action: Empowering the Swiss Molecular Tumor Board with Privacy-Preserving and Real-Time Patient Discovery.
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020

GenoShare: Supporting Privacy-Informed Decisions for Sharing Individual-Level Genetic Data.
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020

MedCo2: Privacy-Preserving Cohort Exploration and Analysis.
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020

2019
MedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019

Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography.
IACR Cryptol. ePrint Arch., 2019

Computing across Trust Boundaries using Distributed Homomorphic Cryptography.
IACR Cryptol. ePrint Arch., 2019

Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2019

Revisiting Multivariate Lattices for Encrypted Signal Processing.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Camera Attribution Forensic Analyzer in the Encrypted Domain.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

On Enforcing the Digital Immunity of a Large Humanitarian Organization.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Number Theoretic Transforms for Secure Signal Processing.
IEEE Trans. Inf. Forensics Secur., 2017

Multivariate Cryptosystems for Secure Processing of Multidimensional Signals.
CoRR, 2017

ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service.
Proceedings of the 26th USENIX Security Symposium, 2017

Secure genomic susceptibility testing based on lattice encryption.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

2016
WITDOM: Empowering Privacy and Security in Non-trusted Environments.
ERCIM News, 2016

On Ideal Lattices over the Tensor Product of Number Fields and Ring Learning with Errors over Multivariate Rings.
CoRR, 2016

Image denoising in the encrypted domain.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Dynamic Privacy-Preserving Genomic Susceptibility Testing.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Co-creating Security-and-Privacy-by-Design Systems.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Multivariate lattices for encrypted image processing.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

2014
Bootstrap-based proxy reencryption for private multi-user computing.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

2013
Fully Private Noninteractive Face Verification.
IEEE Trans. Inf. Forensics Secur., 2013

Secure Signal Processing in the Cloud: Enabling Technologies for Privacy-Preserving Multimedia Cloud Processing.
IEEE Signal Process. Mag., 2013

Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview.
IEEE Signal Process. Mag., 2013

2012
Fully homomorphic faces.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2011
Secure Adaptive Filtering.
IEEE Trans. Inf. Forensics Secur., 2011

Efficient protocols for secure adaptive filtering.
Proceedings of the IEEE International Conference on Acoustics, 2011

Encrypted Domain Processing for Cloud Privacy - Concept and Practical Experience.
Proceedings of the CLOSER 2011, 2011

2010
CryptoDSPs for Cloud Privacy.
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010

A new model for Gabor coefficients' magnitude in face recognition.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
Skewed log-stable model for natural images pixel block-variance.
Proceedings of the International Conference on Image Processing, 2009

Videosurveillance and privacy: covering the two sides of the mirror with DRM.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009

2007
Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks.
EURASIP J. Inf. Secur., 2007

Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

A secure multidimensional point inclusion protocol.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Privacy preserving error resilient dna searching through oblivious automata.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Watermarking Security: A Survey.
Trans. Data Hiding Multim. Secur., 2006

Zero-knowledge watermark detector robust to sensitivity attacks.
Proceedings of the 8th workshop on Multimedia & Security, 2006


  Loading...