Pille Pullonen

According to our database1, Pille Pullonen authored at least 13 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Multi-level privacy analysis of business processes: the Pleak toolset.
Int. J. Softw. Tools Technol. Transf., 2022

2021
Foundations of Programmable Secure Computation.
Cryptogr., 2021

2020
Verification of Privacy-Enhanced Collaborations.
Proceedings of the FormaliSE@ICSE 2020: 8th International Conference on Formal Methods in Software Engineering, 2020

Use Your Brain! Arithmetic 3PC for Any Modulus with Active Security.
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020

2019
Privacy-enhanced BPMN: enabling data privacy analysis in business processes models.
Softw. Syst. Model., 2019

Business Process Privacy Analysis in Pleak - (Extended Abstract).
Inform. Spektrum, 2019

Use your Brain! Arithmetic 3PC For Any Modulus with Active Security.
IACR Cryptol. ePrint Arch., 2019

Business Process Privacy Analysis in Pleak.
Proceedings of the Fundamental Approaches to Software Engineering, 2019

2017
PE-BPMN: Privacy-Enhanced Business Process Model and Notation.
Proceedings of the Business Process Management - 15th International Conference, 2017

2016
Maturity and Performance of Programmable Secure Computation.
IEEE Secur. Priv., 2016

2014
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations.
IACR Cryptol. ePrint Arch., 2014

From Input Private to Universally Composable Secure Multiparty Computation Primitives.
IACR Cryptol. ePrint Arch., 2014

From Input Private to Universally Composable Secure Multi-party Computation Primitives.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014


  Loading...