Secure multi-party computation for inter-organizational process mining G Elkoumy, SA Fahrenkrog-Petersen, M Dumas, P Laud, A Pankova, ... Enterprise, Business-Process and Information Systems Modeling: 21st …, 2020 | 40 | 2020 |
Privacy-preserving record linkage in large databases using secure multiparty computation P Laud, A Pankova BMC medical genomics 11, 33-46, 2018 | 26 | 2018 |
Mine me but don’t single me out: Differentially private event logs for process mining G Elkoumy, A Pankova, M Dumas 2021 3rd International Conference on Process Mining (ICPM), 80-87, 2021 | 23 | 2021 |
Shareprom: A Tool for Privacy-Preserving Inter-Organizational Process Mining. G Elkoumy, SA Fahrenkrog-Petersen, M Dumas, P Laud, A Pankova, ... BPM (PhD/Demos) 2673, 72-76, 2020 | 23 | 2020 |
A framework of metrics for differential privacy from local sensitivity P Laud, A Pankova, M Pettai Proceedings on Privacy Enhancing Technologies, 2020 | 21 | 2020 |
On the (Im) possibility of privately outsourcing linear programming P Laud, A Pankova Proceedings of the 2013 ACM workshop on cloud computing security workshop, 55-64, 2013 | 17 | 2013 |
Interpreting epsilon of differential privacy in terms of advantage in guessing or approximating sensitive attributes P Laud, A Pankova arXiv preprint arXiv:1911.12777, 2019 | 15 | 2019 |
Business Process Privacy Analysis in Pleak A Toots, R Tuuling, M Yerokhin, M Dumas, L García-Bañuelos, P Laud, ... Fundamental Approaches to Software Engineering: 22nd International …, 2019 | 15 | 2019 |
Symbolic analysis of cryptographic protocols containing bilinear pairings A Pankova, P Laud 2012 IEEE 25th Computer Security Foundations Symposium, 63-77, 2012 | 15 | 2012 |
Verifiable computation in multiparty protocols with honest majority P Laud, A Pankova Provable Security: 8th International Conference, ProvSec 2014, Hong Kong …, 2014 | 14 | 2014 |
Decision support for sharing data using differential privacy MFS John, G Denker, P Laud, K Martiny, A Pankova, D Pavlovic 2021 IEEE Symposium on Visualization for Cyber Security (VizSec), 26-35, 2021 | 11 | 2021 |
Preprocessing based verification of multiparty protocols with honest majority P Laud, A Pankova, R Jagomägis Proceedings on Privacy Enhancing Technologies, 2017 | 10 | 2017 |
New attacks against transformation-based privacy-preserving linear programming P Laud, A Pankova Security and Trust Management: 9th International Workshop, STM 2013, Egham …, 2013 | 10 | 2013 |
Achieving differential privacy using methods from calculus P Laud, A Pankova, M Pettai arXiv preprint arXiv:1811.06343, 2018 | 8 | 2018 |
Privacy-preserving directly-follows graphs: Balancing risk and utility in process mining G Elkoumy, A Pankova, M Dumas arXiv preprint arXiv:2012.01119, 2020 | 7 | 2020 |
Transitioning from testbeds to ships: an experience study in deploying the TIPPERS Internet of Things platform to the US Navy D Archer, MA August, G Bouloukakis, C Davison, MH Diallo, D Ghosh, ... The Journal of Defense Modeling and Simulation 19 (3), 501-517, 2022 | 6 | 2022 |
Interpreting epsilon of differential privacy in terms of advantage in guessing or approximating sensitive attributes A Pankova, P Laud 2022 IEEE 35th Computer Security Foundations Symposium (CSF), 96-111, 2022 | 5 | 2022 |
Multi-level privacy analysis of business processes: the Pleak toolset M Dumas, L García-Bañuelos, J Jääger, P Laud, R Matulevičius, ... International Journal on Software Tools for Technology Transfer 24 (2), 183-203, 2022 | 5 | 2022 |
Transformation-based outsourcing of linear equation systems over real numbers P Laud, A Pankova Cryptology ePrint Archive, 2015 | 4 | 2015 |
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority R Jagomägis, P Laud, A Pankova Cryptology ePrint Archive, 2015 | 4 | 2015 |