Thomas Brochmann Pedersen

Affiliations:
  • Sabanci University, Istanbul, Turkey
  • University of Aarhus, Denmark (former)


According to our database1, Thomas Brochmann Pedersen authored at least 16 papers between 2005 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Homomorphic extensions of CRT-based secret sharing.
Discret. Appl. Math., 2020

2016
A CRT-based verifiable secret sharing scheme secure against unbounded adversaries.
Secur. Commun. Networks, 2016

2015
High performance information reconciliation for QKD with CASCADE.
Quantum Inf. Comput., 2015

2014
How to re-use a one-time pad safely and almost optimally even if P = NP.
Nat. Comput., 2014

2013
A study on CASCADE error correction protocol.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

2012
Comparison of CASCADE error correction protocol and LDPC error correction codes.
Proceedings of the 20th Signal Processing and Communications Applications Conference, 2012

2011
Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data.
Int. J. Data Warehous. Min., 2011

2010
Discovering private trajectories using background information.
Data Knowl. Eng., 2010

2009
Transparent code authentication at the processor level.
IET Comput. Digit. Tech., 2009

Impossibility of unconditionally secure scalar products.
Data Knowl. Eng., 2009

2008
Disclosure Risks of Distance Preserving Data Transformations.
Proceedings of the Scientific and Statistical Database Management, 2008

Improved Fuzzy Vault Scheme for Fingerprint Verification.
Proceedings of the SECRYPT 2008, 2008

Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

Distributed privacy preserving k-means clustering with additive secret sharing.
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008

2007
Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

2005
A Quantum Cipher with Near Optimal Key-Recycling.
Proceedings of the Advances in Cryptology, 2005


  Loading...