Meilof Veeningen

According to our database1, Meilof Veeningen authored at least 16 papers between 2010 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification.
IACR Cryptol. ePrint Arch., 2018

Enabling Analytics on Sensitive Medical Data with Secure Multi-Party Computation.
Proceedings of the Building Continents of Knowledge in Oceans of Data: The Future of Co-Created eHealth, 2018

2017
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation.
IACR Cryptol. ePrint Arch., 2017

2016
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation.
IACR Cryptol. ePrint Arch., 2015

Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation.
IACR Cryptol. ePrint Arch., 2015

Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems.
IACR Cryptol. ePrint Arch., 2015

Secure distributed key generation in attribute based encryption systems.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

2014
Data minimisation in communication protocols: a formal analysis framework and application to identity management.
Int. J. Inf. Sec., 2014

2013
Symbolic Privacy Analysis through Linkability and Detectability.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Are On-Line Personae Really Unlinkable?
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

TRIPLEX: verifying data minimisation in communication systems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

2011
Formal Privacy Analysis of Communication Protocols for Identity Management.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2010
Modeling Identity-Related Properties and Their Privacy Strength.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010


  Loading...