Alisa Pankova

According to our database1, Alisa Pankova authored at least 32 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy-preserving server-supported decryption.
CoRR, 2024

2023
Differentially private release of event logs for process mining.
Inf. Syst., May, 2023

2022
Multi-level privacy analysis of business processes: the Pleak toolset.
Int. J. Softw. Tools Technol. Transf., 2022

Amun: A tool for Differentially Private Release of Event Logs for Process Mining (Extended Abstract).
Proceedings of the ICPM Doctoral Consortium and Demo Track 2022 co-located with 4th International Conference on Process Mining (ICPM 2022), 2022

Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
Differentially Private Release of Event Logs for Process Mining.
Dataset, October, 2021

Differentially Private Event Logs for Process Mining: Supplementary Material.
Dataset, March, 2021

Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols.
IACR Cryptol. ePrint Arch., 2021

Utility-aware Event Log Anonymization for Privacy-Preserving Process Mining.
EMISA Forum, 2021

Decision Support for Sharing Data using Differential Privacy.
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2021

PrivaLog: a Privacy-aware Logic Programming Language.
Proceedings of the PPDP 2021: 23rd International Symposium on Principles and Practice of Declarative Programming, 2021

Mine Me but Don't Single Me Out: Differentially Private Event Logs for Process Mining.
Proceedings of the 3rd International Conference on Process Mining, 2021

2020
A Framework of Metrics for Differential Privacy from Local Sensitivity.
Proc. Priv. Enhancing Technol., 2020

Privacy-Preserving Directly-Follows Graphs: Balancing Risk and Utility in Process Mining.
CoRR, 2020

Short Paper: Secure Multiparty Logic Programming.
Proceedings of the PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for Security, 2020

Secure Multi-party Computation for Inter-organizational Process Mining.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2020

Shareprom: A Tool for Privacy-Preserving Inter-Organizational Process Mining.
Proceedings of the Best Dissertation Award, 2020

2019
Business Process Privacy Analysis in Pleak - (Extended Abstract).
Inform. Spektrum, 2019

Business Process Privacy Analysis in Pleak.
Proceedings of the Fundamental Approaches to Software Engineering, 2019

2018
Achieving Differential Privacy using Methods from Calculus.
CoRR, 2018

Bit Decomposition Protocols in Secure Multiparty Computation.
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018

2017
Preprocessing Based Verification of Multiparty Protocols with Honest Majority.
Proc. Priv. Enhancing Technol., 2017

2016
Optimizing Secure Computation Programs with Private Conditionals.
IACR Cryptol. ePrint Arch., 2016

Securing Multiparty Protocols against the Exposure of Data to Honest Parties.
IACR Cryptol. ePrint Arch., 2016

2015
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority.
IACR Cryptol. ePrint Arch., 2015

Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data.
IACR Cryptol. ePrint Arch., 2015

Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers.
IACR Cryptol. ePrint Arch., 2015

2014
Verifiable Computation in Multiparty Protocols with Honest Majority.
IACR Cryptol. ePrint Arch., 2014

2013
New Attacks against Transformation-Based Privacy-Preserving Linear Programming.
IACR Cryptol. ePrint Arch., 2013

Specifying sharemind's arithmetic black box.
Proceedings of the PETShop'13, 2013

On the (Im)possibility of privately outsourcing linear programming.
Proceedings of the CCSW'13, 2013

2012
Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012


  Loading...