Thijs Veugen

Orcid: 0000-0002-9898-4698

According to our database1, Thijs Veugen authored at least 47 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Extending the Security of SPDZ with Fairness.
Proc. Priv. Enhancing Technol., 2024

Secure Latent Dirichlet Allocation.
IACR Cryptol. ePrint Arch., 2024

The Trade-off Between Privacy & Quality for Counterfactual Explanations.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2022
Accurate training of the Cox proportional hazards model on vertically-partitioned data while preserving privacy.
BMC Medical Informatics Decis. Mak., 2022

New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment.
J. Medical Syst., 2022

Lightweight Secure Integer Comparison.
IACR Cryptol. ePrint Arch., 2022

Privacy-Preserving Contrastive Explanations with Local Foil Trees.
Cryptogr., 2022

Secure Multi-party Computation and Its Applications.
Proceedings of the Innovations for Community Services - 22nd International Conference, 2022

2021
Secure integer division with a private divisor.
Proc. Priv. Enhancing Technol., 2021

Privacy-preserving dataset combination and Lasso regression for healthcare predictions.
BMC Medical Informatics Decis. Mak., 2021

Privacy Preserving Computation - Introduction to the Special Theme.
ERCIM News, 2021

Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2020
Private Hospital Workflow Optimization via Secure k-Means Clustering.
J. Medical Syst., 2020

Efficient coding for secure computing with additively-homomorphic encrypted data.
Int. J. Appl. Cryptogr., 2020

2019
An implementation of the Paillier crypto system with threshold decryption without a trusted dealer.
IACR Cryptol. ePrint Arch., 2019

Towards Quantum-Safe VPNs and Internet.
IACR Cryptol. ePrint Arch., 2019

Approximating Eigenvectors with Fixed-Point Arithmetic: A Step Towards Secure Spectral Clustering.
Proceedings of the Numerical Mathematics and Advanced Applications ENUMATH 2019 - European Conference, Egmond aan Zee, The Netherlands, September 30, 2019

2018
Correction to "Improving the DGK comparison protocol".
IACR Cryptol. ePrint Arch., 2018

Secure multiparty PageRank algorithm for collaborative fraud detection.
IACR Cryptol. ePrint Arch., 2018

Preparing Ourselves for the Threats of the Post-Quantum Era.
ERCIM News, 2018

Enabling Analytics on Sensitive Medical Data with Secure Multi-Party Computation.
Proceedings of the Building Continents of Knowledge in Oceans of Data: The Future of Co-Created eHealth, 2018

Secure Equality Testing Protocols in the Two-Party Setting.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Improved privacy of dynamic group services.
EURASIP J. Inf. Secur., 2017

A Quantum Algorithm for Minimising the Effective Graph Resistance upon Edge Addition.
Proceedings of the Quantum Technology and Optimization Problems, 2017

2016
Client-Server Framework for Securely Outsourcing Computations.
ERCIM News, 2016

Secure matching of dutch car license plates.
Proceedings of the 24th European Signal Processing Conference, 2016

2015
A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations.
IEEE Trans. Inf. Forensics Secur., 2015

Linear Round Bit-Decomposition of Secret-Shared Values.
IEEE Trans. Inf. Forensics Secur., 2015

Secure Comparison Protocols in the Semi-Honest Model.
IEEE J. Sel. Top. Signal Process., 2015

Content-based recommendations with approximate integer division.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

2014
Encrypted integer division and secure comparison.
Int. J. Appl. Cryptogr., 2014

Privacy Enhanced Personal Services for Smart Grids.
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014

2013
Privacy-preserving distributed clustering.
EURASIP J. Inf. Secur., 2013

Privacy-preserving recommender systems in dynamic environments.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Transparency Enhancing Tools (TETs): An Overview.
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

2012
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing.
IEEE Trans. Inf. Forensics Secur., 2012

Improving the DGK comparison protocol.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Privacy-preserving content-based recommender system.
Proceedings of the Multimedia and Security Workshop, 2012

2011
Recurrent Multiple-Repetition Coding for Channels With Feedback.
IEEE Trans. Inf. Theory, 2011

Improved Anonymity for Key-Trees.
IACR Cryptol. ePrint Arch., 2011

Anonymity for Key-Trees with Adaptive Adversaries.
Proceedings of the Security and Privacy in Communication Networks, 2011

Efficiently computing private recommendations.
Proceedings of the IEEE International Conference on Acoustics, 2011

Generating private recommendations in a social trust network.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

2010
Encrypted integer division.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

2009
Privacy-preserving user clustering in a social network.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Processing in the encrypted domain using a composite signal representation: Pros and cons.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

2007
Information Theory Choosing the parameters of multiple-repetition strategies.
Eur. Trans. Telecommun., 2007


  Loading...