Anderson C. A. Nascimento
Orcid: 0000-0002-8298-6250
According to our database1,
Anderson C. A. Nascimento
authored at least 97 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Shared OT and Its Applications to Unconditional Secure Integer Equality, Comparison and Bit-Decomposition.
IACR Cryptol. ePrint Arch., 2024
2023
Neural Process. Lett., June, 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Second ACM Data Economy Workshop, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Proc. Priv. Enhancing Technol., 2022
IACR Cryptol. ePrint Arch., 2022
CoRR, 2022
2021
Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy.
IACR Cryptol. ePrint Arch., 2021
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines.
IACR Cryptol. ePrint Arch., 2021
Information-Theoretically Secure String Commitments Based on Packet Reordering Channels.
IEEE Access, 2021
Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms.
Proceedings of the IEEE International Systems Conference, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
2020
Performability evaluation of transport modes for cloud-based inbound logistics: a study based on coffee industry.
Int. J. Manuf. Technol. Manag., 2020
IACR Cryptol. ePrint Arch., 2020
Entropy, 2020
2019
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation.
IEEE Trans. Dependable Secur. Comput., 2019
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection.
IACR Cryptol. ePrint Arch., 2019
IEEE Access, 2019
IEEE Access, 2019
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
A Framework for Network Intrusion Detection using Network Programmability and Data Stream Clustering Machine Learning Algorithms.
Proceedings of the Preprints of Communication Papers of the 2019 Federated Conference on Computer Science and Information Systems, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
IEEE Trans. Inf. Theory, 2018
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Proceedings of the Third Workshop on Evaluation of Human Language Technologies for Iberian Languages (IberEval 2018) co-located with 34th Conference of the Spanish Society for Natural Language Processing (SEPLN 2018), 2018
Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
Proceedings of the Sixth Evaluation Campaign of Natural Language Processing and Speech Tools for Italian. Final Workshop (EVALITA 2018) co-located with the Fifth Italian Conference on Computational Linguistics (CLiC-it 2018), 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability.
IEEE Trans. Inf. Theory, 2017
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM.
IACR Cryptol. ePrint Arch., 2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.
Sensors, 2016
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
2015
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.
Comput. J., 2015
Proceedings of the 2015 IEEE International Conference on Systems, 2015
Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols.
Proceedings of the Provable Security, 2015
Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015
2014
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 5th ACM SIGSPATIAL International Workshop on GeoStreaming, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions.
Proceedings of the Information Theoretic Security - 6th International Conference, 2012
Proceedings of the IEEE Second International Conference on Consumer Electronics - Berlin, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model.
IEEE Trans. Inf. Theory, 2011
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption.
Proceedings of the Information Security - 13th International Conference, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
2008
IEEE Trans. Inf. Theory, 2008
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
2007
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation.
Proceedings of the Information Theoretic Security - Second International Conference, 2007
2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Management of Convergence Networks and Services, 2006
2005
Quantum Inf. Comput., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Topics in Cryptology, 2004
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Applied Algebra, 2003
2002
Proceedings of the 2002 IEEE Information Theory Workshop, 2002
2001
Electron. Notes Discret. Math., 2001