Universally verifiable multiparty computation from threshold homomorphic cryptosystems B Schoenmakers, M Veeningen Applied Cryptography and Network Security: 13th International Conference …, 2015 | 63 | 2015 |
Minimising communication in honest-majority MPC by batchwise multiplication verification PS Nordholt, M Veeningen International Conference on Applied Cryptography and Network Security, 321-339, 2018 | 52 | 2018 |
Trinocchio: Privacy-preserving outsourcing by distributed verifiable computation B Schoenmakers, M Veeningen, N de Vreede Applied Cryptography and Network Security: 14th International Conference …, 2016 | 45 | 2016 |
Pinocchio-based adaptive zk-SNARKs and secure/correct adaptive function evaluation M Veeningen International Conference on Cryptology in Africa, 21-39, 2017 | 32 | 2017 |
Modeling identity-related properties and their privacy strength M Veeningen, B De Weger, N Zannone Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011 | 21 | 2011 |
Enabling analytics on sensitive medical data with secure multi-party computation M Veeningen, S Chatterjea, AZ Horváth, G Spindler, E Boersma, ... Building Continents of Knowledge in Oceans of Data: The Future of Co-Created …, 2018 | 19 | 2018 |
Formal privacy analysis of communication protocols for identity management M Veeningen, B de Weger, N Zannone International Conference on Information Systems Security, 235-249, 2011 | 18 | 2011 |
Formal modelling of (De) pseudonymisation: a case study in health care privacy M Veeningen, B de Weger, N Zannone International Workshop on Security and Trust Management, 145-160, 2012 | 11 | 2012 |
Certificate validation in secure computation and its use in verifiable linear programming S de Hoogh, B Schoenmakers, M Veeningen Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016 | 10 | 2016 |
Trinocchio: Privacy-friendly outsourcing by distributed verifiable computation B Schoenmakers, M Veeningen, N de Vreede Cryptology ePrint Archive, 2015 | 10 | 2015 |
Data minimisation in communication protocols: a formal analysis framework and application to identity management M Veeningen, B De Weger, N Zannone International journal of information security 13, 529-569, 2014 | 9 | 2014 |
Location tracking enabling privacy protection PP van Liesdonk, MG VEENINGEN, S Chatterjea US Patent 11,188,672, 2021 | 8 | 2021 |
Are on-line personae really unlinkable? M Veeningen, A Piepoli, N Zannone Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014 | 7 | 2014 |
Secure distributed key generation in attribute based encryption systems D Pletea, S Sedghi, M Veeningen, M Petkovic 2015 10th International Conference for Internet Technology and Secured …, 2015 | 5 | 2015 |
Nodes and methods of operating the same MG Veeningen, PP van Liesdonk US Patent 11,818,249, 2023 | 4 | 2023 |
Batch-wise verification of multiparty computations MG Veeningen US Patent 11,818,255, 2023 | 4 | 2023 |
Distributing a computation output MG Veeningen, SJA De Hoogh US Patent 11,646,876, 2023 | 4 | 2023 |
Evaluation of a monitoring function PP van Liesdonk, MG VEENINGEN US Patent 11,232,218, 2022 | 4 | 2022 |
Basic constructions of secure multiparty computation P Laud, A Pankova, L Kamm, M Veeningen Applications of Secure Multiparty Computation, 1-25, 2015 | 4 | 2015 |
Symbolic privacy analysis through linkability and detectability M Veeningen, B De Weger, N Zannone IFIP International Conference on Trust Management, 1-16, 2013 | 4 | 2013 |