Searched for: author%3A%22Spini%2C+G.%22
(1 - 9 of 9)
document
Amadori, A. (author), Duarte, J.D. (author), Spini, G. (author)
This document provides an overview of the core concepts, usage, applications, and normative frameworks of public-key infrastructures. Moreover, special attention is devoted to the state-of-the-art research on quantum-safe public-key infrastructures, and to hybrid solutions that safeguard compatibility with legacy systems and that remain secure...
report 2022
document
Spini, G. (author), Mancini, E. (author), Attema, T. (author), Abspoel, M. (author), de Gier, J. (author), Fehr, S. (author), Veugen, T. (author), van Heesch, M. (author), Worm, D. (author), de Luca, A. (author), Cramer, R. (author), Sloot, P.M.A. (author)
BackgroundHIV treatment prescription is a complex process. Clinical decision support systems (CDSS) are a category of health information technologies that can assist clinicians to choose optimal treatments based on clinical trials and expert knowledge. The usability of some CDSSs for HIV treatment would be significantly improved by using the...
article 2022
document
Spini, G. (author), Sangers, A. (author)
article 2021
document
Attema, T. (author), Gervasoni, N. (author), Marcus, M.J.H. (author), Spini, G. (author)
The advent of a full-scale quantum computer will severely impact most currently-used cryptographic systems. The most well-known aspect of this impact lies in the computational-hardness assumptions that underpin the security of most current public-key cryptographic systems: a quantum computer can factor integers and compute discrete logarithms in...
article 2021
document
Attema, T. (author), Gervasoni, N. (author), Marcus, M.J.H. (author), Spini, G. (author)
article 2021
document
van Egmond, M.B. (author), Spini, G. (author), van der Galien, O. (author), IJpma, A. (author), Veugen, P.J.M. (author), Kaaij, W. (author), Sangers, A. (author), Rooijakkers, T. (author), Langenkamp, P. (author), Kamphorst, B. (author), van de L'Isle, N. (author), Kooij-Janic, M. (author)
Background: Recent developments in machine learning have shown its potential impact for clinical use such as risk prediction, prognosis, and treatment selection. However, relevant data are often scattered across diferent stakehold ers and their use is regulated, e.g. by GDPR or HIPAA. As a concrete use-case, hospital Erasmus MC and health...
article 2021
document
Spini, G. (author), Zemor, G. (author)
article 2020
document
Veugen, P.J.M. (author), Attema, T. (author), Spini, G. (author)
We consider the problem of securely generating the keys of the Paillier crypto system [11] with (t; n) threshold decryption, without a trusted dealer. Nishide and Sakurai [10] describe a solution, secure in the malicious model. We use their ideas to make a simpler solution for the semi-honest model, and further introduce a few optimisations. We...
article 2019
document
Spini, G. (author), van Heesch, M.P.P. (author), Veugen, P.J.M. (author), Chatterjea, S. (author)
Optimizing the workflow of a complex organization such as a hospital is a difficult task. An accurate option is to use a real-time locating system to track locations of both patients and staff. However, privacy regulations forbid hospital management to assess location data of their staff members. In this exploratory work, we propose a secure...
article 2019
Searched for: author%3A%22Spini%2C+G.%22
(1 - 9 of 9)