Searched for: subject%3A%22Multiparty%255C%2Bcomputation%22
(1 - 6 of 6)
document
Spini, G. (author), Mancini, E. (author), Attema, T. (author), Abspoel, M. (author), de Gier, J. (author), Fehr, S. (author), Veugen, T. (author), van Heesch, M. (author), Worm, D. (author), de Luca, A. (author), Cramer, R. (author), Sloot, P.M.A. (author)
BackgroundHIV treatment prescription is a complex process. Clinical decision support systems (CDSS) are a category of health information technologies that can assist clinicians to choose optimal treatments based on clinical trials and expert knowledge. The usability of some CDSSs for HIV treatment would be significantly improved by using the...
article 2022
document
Attema, T. (author), Dunning, V.A. (author), Everts, M. (author), Langenkamp, P. (author)
We present a novel compiler for transforming arbitrary, passively secure MPC protocols into efficient protocols with covert security and public verifiability in the honest majority setting. Our compiler works for protocols with any number of parties > 2 and treats the passively secure protocol in a black-box manner. In multi-party computation ...
conference paper 2022
document
Sangers, A. (author), van Heesch, M.P.P. (author), Attema, T. (author), Veugen, P.J.M. (author), Wiggerman, M. (author), Veldsink, J. (author), Bloemen, O. (author), Worm, D.T.H. (author)
Collaboration between financial institutions helps to improve detection of fraud. However, exchange of relevant data between these institutions is often not possible due to privacy constraints and data confidentiality. An important example of relevant data for fraud detection is given by a transaction graph, where the nodes represent bank accounts...
conference paper 2019
document
Sangers, A. (author), van Heesch, M.P.P. (author), Attema, T. (author), Veugen, P.J.M. (author), Wiggerman, M. (author), Veldsink, J. (author), Bloemen, O. (author), Worm, D.T.H. (author)
Collaboration between financial institutions helps to improve detection of fraud. However, exchange of relevant data between these institutions is often not possible due to privacy constraints and data confidentiality. An important example of relevant data for fraud detection is given by a transaction graph, where the nodes represent bank accounts...
public lecture 2019
document
Erkin, Z. (author), Veugen, P.J.M. (author), Toft, T. (author), Lagendijk, R.L. (author)
Recommender systems have become an important tool for personalization of online services. Generating recommendations in online services depends on privacy-sensitive data collected from the users. Traditional data protection mechanisms focus on access control and secure transmission, which provide security only against malicious third parties,...
article 2012
document
TNO Informatie- en Communicatietechnologie (author), Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)
Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we propose to encrypt the privacy sensitive data...
conference paper 2010
Searched for: subject%3A%22Multiparty%255C%2Bcomputation%22
(1 - 6 of 6)