- document
-
Amadori, A. (author), Duarte, J.D. (author), Spini, G. (author)This document provides an overview of the core concepts, usage, applications, and normative frameworks of public-key infrastructures. Moreover, special attention is devoted to the state-of-the-art research on quantum-safe public-key infrastructures, and to hybrid solutions that safeguard compatibility with legacy systems and that remain secure...report 2022
- document
-
Spini, G. (author), Mancini, E. (author), Attema, T. (author), Abspoel, M. (author), de Gier, J. (author), Fehr, S. (author), Veugen, T. (author), van Heesch, M. (author), Worm, D. (author), de Luca, A. (author), Cramer, R. (author), Sloot, P.M.A. (author)BackgroundHIV treatment prescription is a complex process. Clinical decision support systems (CDSS) are a category of health information technologies that can assist clinicians to choose optimal treatments based on clinical trials and expert knowledge. The usability of some CDSSs for HIV treatment would be significantly improved by using the...article 2022
- document
- Spini, G. (author), Sangers, A. (author) article 2021
- document
-
Attema, T. (author), Gervasoni, N. (author), Marcus, M.J.H. (author), Spini, G. (author)The advent of a full-scale quantum computer will severely impact most currently-used cryptographic systems. The most well-known aspect of this impact lies in the computational-hardness assumptions that underpin the security of most current public-key cryptographic systems: a quantum computer can factor integers and compute discrete logarithms in...article 2021
- document
- Attema, T. (author), Gervasoni, N. (author), Marcus, M.J.H. (author), Spini, G. (author) article 2021
- document
-
van Egmond, M.B. (author), Spini, G. (author), van der Galien, O. (author), IJpma, A. (author), Veugen, P.J.M. (author), Kaaij, W. (author), Sangers, A. (author), Rooijakkers, T. (author), Langenkamp, P. (author), Kamphorst, B. (author), van de L'Isle, N. (author), Kooij-Janic, M. (author)Background: Recent developments in machine learning have shown its potential impact for clinical use such as risk prediction, prognosis, and treatment selection. However, relevant data are often scattered across diferent stakehold ers and their use is regulated, e.g. by GDPR or HIPAA. As a concrete use-case, hospital Erasmus MC and health...article 2021
- document
- Spini, G. (author), Zemor, G. (author) article 2020
- document
-
Veugen, P.J.M. (author), Attema, T. (author), Spini, G. (author)We consider the problem of securely generating the keys of the Paillier crypto system [11] with (t; n) threshold decryption, without a trusted dealer. Nishide and Sakurai [10] describe a solution, secure in the malicious model. We use their ideas to make a simpler solution for the semi-honest model, and further introduce a few optimisations. We...article 2019
- document
-
Spini, G. (author), van Heesch, M.P.P. (author), Veugen, P.J.M. (author), Chatterjea, S. (author)Optimizing the workflow of a complex organization such as a hospital is a difficult task. An accurate option is to use a real-time locating system to track locations of both patients and staff. However, privacy regulations forbid hospital management to assess location data of their staff members. In this exploratory work, we propose a secure...article 2019