Følg
Liina Kamm
Liina Kamm
Senior researcher at Cybernetica AS
Verificeret mail på cyber.ee
Titel
Citeret af
Citeret af
År
From keys to databases—real-world applications of secure multi-party computation
DW Archer, D Bogdanov, Y Lindell, L Kamm, K Nielsen, JI Pagter, ...
The Computer Journal 61 (12), 1749-1771, 2018
1752018
A new way to protect privacy in large-scale genome-wide association studies
L Kamm, D Bogdanov, S Laur, J Vilo
Bioinformatics 29 (7), 886-893, 2013
1712013
Secure floating point arithmetic and private satellite collision analysis
L Kamm, J Willemson
International Journal of Information Security 14 (6), 531-548, 2015
1382015
Students and taxes: a privacy-preserving study using secure computation
D Bogdanov, L Kamm, B Kubo, R Rebane, V Sokk, R Talviste
Proceedings on Privacy Enhancing Technologies, 2016
1092016
Rmind: a tool for cryptographically secure statistical analysis
D Bogdanov, L Kamm, S Laur, V Sokk
IEEE Transactions on Dependable and Secure Computing 15 (3), 481-495, 2016
912016
Privacy-preserving statistical data analysis on federated databases
D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt, R Talviste, ...
Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014
572014
Implementation and evaluation of an algorithm for cryptographically private principal component analysis on genomic data
D Bogdanov, L Kamm, S Laur, V Sokk
IEEE/ACM transactions on computational biology and bioinformatics 15 (5 …, 2018
402018
Privacy-preserving statistical analysis using secure multi-party computation
L Kamm
Ph. D. dissertation, 2015
362015
Secure multi-party data analysis: end user validation and practical experiments
D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt
Cryptology ePrint Archive, 2013
242013
Applications of secure multiparty computation
P Laud, L Kamm
Ios Press, 2015
202015
Stateful abstractions of secure multiparty computation
P Laud, L Kamm
Applications of secure multiparty computation 13, 26-42, 2015
102015
Practical applications of secure multiparty computation
P Laud, L Kamm
Applications of secure multiparty computation 13 (246), 2015
92015
Implementing privacy-preserving genotype analysis with consideration for population stratification
A Ostrak, J Randmets, V Sokk, S Laur, L Kamm
Cryptography 5 (3), 21, 2021
82021
Flexible database platform for biomedical research with multiple user interfaces and a universal query engine
JV TALVIKb, A VILGOTA, J VILO
Databases and Information Systems V: Selected Papers from the Eighth …, 2009
72009
Basic constructions of secure multiparty computation
AS aCybernetica
Applications of Secure Multiparty Computation 13, 1, 2015
42015
Modeling texas hold’em poker strategies with bayesian networks
K Tretyakov, L Kamm
tech. rep, techreport, 2009
42009
Integrating and validating maritime transport security services: Initial results from the cs4eu demonstrator
C Grigoriadis, S Papastergiou, P Kotzanikolaou, C Douligeris, ...
Proceedings of the 2021 Thirteenth International Conference on Contemporary …, 2021
32021
Statistical Analysis Methods Using Secure Multiparty Computation
P Laud, L Kamm
Applications of Secure Multiparty Computation 13, 58, 2015
22015
Constructing privacy-preserving information systems using secure multiparty computation
D Bogdanov, L Kamm
Cybernetica Research Report T-4-13, 2011
22011
Homological Classification of Commitment Schemes
L Kamm
Master’s thesis, University of Tartu, Institute of Computer Science, 2007
22007
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20