Dan Bogdanov

Orcid: 0000-0002-9296-9120

Affiliations:
  • Cybernetica AS, Tallinn, Estonia


According to our database1, Dan Bogdanov authored at least 32 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-friendly evaluation of patient data with secure multiparty computation in a European pilot study.
npj Digit. Medicine, 2024

Artificial Intelligence System Risk Management Methodology Based on Generalized Blueprints.
Proceedings of the 16th International Conference on Cyber Conflict: Over the Horizon, 2024

ZK-SecreC: a Domain-Specific Language for Zero-Knowledge Proofs.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2023
UN Handbook on Privacy-Preserving Computation Techniques.
CoRR, 2023

Blueprints for Deploying Privacy Enhancing Technologies in E-Government.
Proceedings of the Privacy and Identity Management. Sharing in a Digital World, 2023

2022
ZK-SecreC: a Domain-Specific Language for Zero Knowledge Proofs.
CoRR, 2022

Deploying decentralized, privacy-preserving proximity tracing.
Commun. ACM, 2022

2021
Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications.
Frontiers Digit. Health, 2021

2020
Towards a common performance and effectiveness terminology for digital proximity tracing applications.
CoRR, 2020

2018
Rmind: A Tool for Cryptographically Secure Statistical Analysis.
IEEE Trans. Dependable Secur. Comput., 2018

Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018

From Keys to Databases - Real-World Applications of Secure Multi-Party Computation.
Comput. J., 2018

2017
PE-BPMN: Privacy-Enhanced Business Process Model and Notation.
Proceedings of the Business Process Management - 15th International Conference, 2017

2016
Students and Taxes: a Privacy-Preserving Study Using Secure Computation.
Proc. Priv. Enhancing Technol., 2016

Maturity and Performance of Programmable Secure Computation.
IEEE Secur. Priv., 2016

2015
Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation.
IACR Cryptol. ePrint Arch., 2015

How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
From Input Private to Universally Composable Secure Multiparty Computation Primitives.
IACR Cryptol. ePrint Arch., 2014

A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

From Input Private to Universally Composable Secure Multi-party Computation Primitives.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Privacy-Preserving Statistical Data Analysis on Federated Databases.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
Domain-Polymorphic Programming of Privacy-Preserving Applications.
IACR Cryptol. ePrint Arch., 2013

Secure multi-party data analysis: end user validation and practical experiments.
IACR Cryptol. ePrint Arch., 2013

A new way to protect privacy in large-scale genome-wide association studies.
Bioinform., 2013

Domain-polymorphic language for privacy-preserving applications.
Proceedings of the PETShop'13, 2013

2012
High-performance secure multi-party computation for data mining applications.
Int. J. Inf. Sec., 2012

A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Deploying secure multi-party computation for financial data analysis.
IACR Cryptol. ePrint Arch., 2011

2009
VirtualLife: Secure Identity Management in Peer-to-Peer Systems.
Proceedings of the User Centric Media - First International Conference, 2009

2008
Sharemind: a framework for fast privacy-preserving computations.
IACR Cryptol. ePrint Arch., 2008


  Loading...