关注
Meilof Veeningen
Meilof Veeningen
Postdoctoral researcher, Eindhoven University of Technology
在 tue.nl 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Universally verifiable multiparty computation from threshold homomorphic cryptosystems
B Schoenmakers, M Veeningen
Applied Cryptography and Network Security: 13th International Conference …, 2015
632015
Minimising communication in honest-majority MPC by batchwise multiplication verification
PS Nordholt, M Veeningen
International Conference on Applied Cryptography and Network Security, 321-339, 2018
522018
Trinocchio: Privacy-preserving outsourcing by distributed verifiable computation
B Schoenmakers, M Veeningen, N de Vreede
Applied Cryptography and Network Security: 14th International Conference …, 2016
452016
Pinocchio-based adaptive zk-SNARKs and secure/correct adaptive function evaluation
M Veeningen
International Conference on Cryptology in Africa, 21-39, 2017
322017
Modeling identity-related properties and their privacy strength
M Veeningen, B De Weger, N Zannone
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011
212011
Enabling analytics on sensitive medical data with secure multi-party computation
M Veeningen, S Chatterjea, AZ Horváth, G Spindler, E Boersma, ...
Building Continents of Knowledge in Oceans of Data: The Future of Co-Created …, 2018
192018
Formal privacy analysis of communication protocols for identity management
M Veeningen, B de Weger, N Zannone
International Conference on Information Systems Security, 235-249, 2011
182011
Formal modelling of (De) pseudonymisation: a case study in health care privacy
M Veeningen, B de Weger, N Zannone
International Workshop on Security and Trust Management, 145-160, 2012
112012
Certificate validation in secure computation and its use in verifiable linear programming
S de Hoogh, B Schoenmakers, M Veeningen
Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016
102016
Trinocchio: Privacy-friendly outsourcing by distributed verifiable computation
B Schoenmakers, M Veeningen, N de Vreede
Cryptology ePrint Archive, 2015
102015
Data minimisation in communication protocols: a formal analysis framework and application to identity management
M Veeningen, B De Weger, N Zannone
International journal of information security 13, 529-569, 2014
92014
Location tracking enabling privacy protection
PP van Liesdonk, MG VEENINGEN, S Chatterjea
US Patent 11,188,672, 2021
82021
Are on-line personae really unlinkable?
M Veeningen, A Piepoli, N Zannone
Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014
72014
Secure distributed key generation in attribute based encryption systems
D Pletea, S Sedghi, M Veeningen, M Petkovic
2015 10th International Conference for Internet Technology and Secured …, 2015
52015
Nodes and methods of operating the same
MG Veeningen, PP van Liesdonk
US Patent 11,818,249, 2023
42023
Batch-wise verification of multiparty computations
MG Veeningen
US Patent 11,818,255, 2023
42023
Distributing a computation output
MG Veeningen, SJA De Hoogh
US Patent 11,646,876, 2023
42023
Evaluation of a monitoring function
PP van Liesdonk, MG VEENINGEN
US Patent 11,232,218, 2022
42022
Basic constructions of secure multiparty computation
P Laud, A Pankova, L Kamm, M Veeningen
Applications of Secure Multiparty Computation, 1-25, 2015
42015
Symbolic privacy analysis through linkability and detectability
M Veeningen, B De Weger, N Zannone
IFIP International Conference on Trust Management, 1-16, 2013
42013
系统目前无法执行此操作,请稍后再试。
文章 1–20