Følg
Niek J. Bouman
Niek J. Bouman
Verificeret mail på tue.nl
Titel
Citeret af
Citeret af
År
Sampling in a Quantum Population, and Applications.
NJ Bouman, S Fehr
CRYPTO, 724-741, 2010
652010
An all-but-one entropic uncertainty relation, and application to password-based identification
NJ Bouman, S Fehr, C González-Guillén, C Schaffner
Conference on Quantum Computation, Communication, and Cryptography, 29-44, 2012
242012
Experimental validation of an explicit power-flow primary control in microgrids
L Reyes-Chamorro, A Bernstein, NJ Bouman, E Scolari, AM Kettner, ...
IEEE Transactions on Industrial Informatics 14 (11), 4779-4791, 2018
162018
Efficient Secure Ridge Regression from Randomized Gaussian Elimination.
F Blom, NJ Bouman, B Schoenmakers, N de Vreede
IACR Cryptol. ePrint Arch. 2019, 773, 2019
152019
Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks
M Abspoel, NJ Bouman, B Schoenmakers, N de Vreede
CT-RSA 2019 11405, 2019
152019
Secure authentication from a weak key, without leaking information
NJ Bouman, S Fehr
Annual International Conference on the Theory and Applications of …, 2011
112011
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition.
NJ Bouman, N De Vreede
IACR Cryptol. ePrint Arch. 2018, 703, 2018
92018
A multi-scale approach to directional field estimation
AM Bazen, NJ Bouman, RNJ Veldhuis
Proc. ProRISC, 215-218, 2004
82004
Multiprecision Arithmetic for Cryptology in C++-Compile-Time Computations and Beating the Performance of Hand-Optimized Assembly at Run-Time
NJ Bouman
arXiv preprint arXiv:1804.07236, 2018
62018
A Practical Approach to the Secure Computation of the Moore–Penrose Pseudoinverse over the Rationals
NJ Bouman, N de Vreede
International Conference on Applied Cryptography and Network Security, 398-417, 2020
42020
Real-Time Control of an Ensemble of Heterogeneous Resources
A Bernstein, NJ Bouman, JY LeBoudec
56th IEEE Conference on Decision and Control, 2017
42017
Power and Bandwidth Efficient Coded Modulation for Linear Gaussian Channels
NJ Bouman, HS Cronie
Werkgemeenschap voor Informatie-en Communicatietheorie, 2010
12010
Average Point Pursuit using the Greedy Algorithm: Theory and Applications
A Bernstein, NJ Bouman
arXiv preprint arXiv:1811.07734, 2018
2018
The Amount as a Predictor of Transaction Fraud
NJ Bouman
2017 Symposium on Information Theory and Signal Processing in the Benelux 38 …, 2017
2017
Real-Time Control of Microgrids with Explicit Power Setpoints: an API for Resource Agents
NJ Bouman, A Bernstein, JY LeBoudec
https://infoscience.epfl.ch/record/212794?ln=en, 2015
2015
Cryptography from Quantum Uncertainty in the Presence of Quantum Side Information
NJ Bouman
Mathematical Institute, Leiden University & CWI, 2012
2012
Spectral-Efficient Communication over Linear Gaussian Channels
NJ Bouman
2007
D2. 1 State of the Art Analysis of MPC-Based Big Data Analytics
PSN ALX, NV ALX, MA PHI, MV PHI, FB TUE, NJB TUE, MP TUE
D2. 2 Application-Oriented MPC Protocols
MA PHI, SA PHI, FB TUE, NJB TUE, TKF ALX, P Koster
D2. 3 Use-Case Specific Algorithms
MA PHI, FB TUE, NJB TUE, TF ALX, PK PHI, CO AU, MP TUE, BS TUE
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20