Sharemind: A framework for fast privacy-preserving computations D Bogdanov, S Laur, J Willemson Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008 | 949 | 2008 |
High-performance secure multi-party computation for data mining applications D Bogdanov, M Niitsoo, T Toft, J Willemson International Journal of Information Security 11, 403-418, 2012 | 257 | 2012 |
From keys to databases—real-world applications of secure multi-party computation DW Archer, D Bogdanov, Y Lindell, L Kamm, K Nielsen, JI Pagter, ... The Computer Journal 61 (12), 1749-1771, 2018 | 178 | 2018 |
Deploying Secure Multi-Party Computation for Financial Data Analysis: (Short Paper) D Bogdanov, R Talviste, J Willemson Financial Cryptography and Data Security: 16th International Conference, FC …, 2012 | 173 | 2012 |
A new way to protect privacy in large-scale genome-wide association studies L Kamm, D Bogdanov, S Laur, J Vilo Bioinformatics 29 (7), 886-893, 2013 | 172 | 2013 |
Students and taxes: a privacy-preserving study using secure computation D Bogdanov, L Kamm, B Kubo, R Rebane, V Sokk, R Talviste Proceedings on Privacy Enhancing Technologies, 2016 | 114 | 2016 |
How the estonian tax and customs board evaluated a tax fraud detection system based on secure multi-party computation D Bogdanov, M Jõemets, S Siim, M Vaht International conference on financial cryptography and data security, 227-234, 2015 | 103 | 2015 |
Rmind: a tool for cryptographically secure statistical analysis D Bogdanov, L Kamm, S Laur, V Sokk IEEE Transactions on Dependable and Secure Computing 15 (3), 481-495, 2016 | 93 | 2016 |
Sharemind: programmable secure computations with practical applications D Bogdanov University of Tartu, 2013 | 93 | 2013 |
Maturity and performance of programmable secure computation DW Archer, D Bogdanov, B Pinkas, P Pullonen IEEE security & privacy 14 (5), 48-56, 2016 | 73 | 2016 |
Privacy-preserving statistical data analysis on federated databases D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt, R Talviste, ... Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014 | 58 | 2014 |
Foundations and properties of Shamir’s secret sharing scheme research seminar in cryptography D Bogdanov University of Tartu, Institute of Computer Science 1, 2007 | 56 | 2007 |
Domain-polymorphic programming of privacy-preserving applications D Bogdanov, P Laud, J Randmets Proceedings of the Ninth Workshop on Programming Languages and Analysis for …, 2014 | 55 | 2014 |
A practical analysis of oblivious sorting algorithms for secure multi-party computation D Bogdanov, S Laur, R Talviste Nordic Conference on Secure IT Systems, 59-74, 2014 | 51 | 2014 |
PE-BPMN: privacy-enhanced business process model and notation P Pullonen, R Matulevičius, D Bogdanov Business Process Management: 15th International Conference, BPM 2017 …, 2017 | 46 | 2017 |
Implementation and evaluation of an algorithm for cryptographically private principal component analysis on genomic data D Bogdanov, L Kamm, S Laur, V Sokk IEEE/ACM transactions on computational biology and bioinformatics 15 (5 …, 2018 | 40 | 2018 |
A universal toolkit for cryptographically secure privacy-preserving data mining D Bogdanov, R Jagomägis, S Laur Pacific-asia workshop on intelligence and security informatics, 112-126, 2012 | 37 | 2012 |
The magazine archive includes every article published in Communications of the ACM for over the past 50 years. MY Vardi Communications of the ACM 54 (5), 5, 2011 | 35* | 2011 |
From input private to universally composable secure multi-party computation primitives D Bogdanov, P Laud, S Laur, P Pullonen 2014 IEEE 27th Computer Security Foundations Symposium, 184-198, 2014 | 34 | 2014 |
The design and implementation of a two-party protocol suite for Sharemind 3 P Pullonen, D Bogdanov, T Schneider CYBERNETICA Institute of Information Security, Tech. Rep 4, 17, 2012 | 27 | 2012 |