Volgen
Anselme Tueno
Anselme Tueno
SAP Security Research
Geverifieerd e-mailadres voor sap.com
Titel
Geciteerd door
Geciteerd door
Jaar
Private evaluation of decision trees using sublinear cost
A Tueno, F Kerschbaum, S Katzenbeisser
Proceedings on Privacy Enhancing Technologies, 2019
652019
An efficiently searchable encrypted data structure for range queries
F Kerschbaum, A Tueno
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
472019
Non-interactive private decision tree evaluation
A Tueno, Y Boev, F Kerschbaum
Data and Applications Security and Privacy XXXIV: 34th Annual IFIP WG 11.3 …, 2020
362020
Efficient secure computation of order-preserving encryption
A Tueno, F Kerschbaum
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
182020
Secure Computation of the-Ranked Element in a Star Network
A Tueno, F Kerschbaum, S Katzenbeisser, Y Boev, M Qureshi
International Conference on Financial Cryptography and Data Security, 386-403, 2020
132020
Oblivious order-preserving encryption
AK Tueno, F Kerschbaum
US Patent 10,360,390, 2019
112019
Privacy-preserving condition-based forecasting using machine learning
F Taigel, AK Tueno, R Pibernik
Journal of Business Economics 88, 563-592, 2018
112018
Non-Interactive Private Decision Tree Evaluation
AK Tueno, Y Boev, F Kerschbaum
US Patent App. 16/573,813, 2021
62021
Selective access for supply chain management in the cloud
A Tueno, F Kerschbaum, D Bernau, S Foresti
2017 IEEE Conference on Communications and Network Security (CNS), 476-482, 2017
52017
Secure range queries for multiple users
A Tueno, F Kerschbaum
arXiv preprint arXiv:1802.01138, 2018
42018
A method for securely comparing integers using binary trees
A Tueno, J Janneck, D Boehm
Proceedings on Privacy Enhancing Technologies, 2023
32023
Private computation on set intersection with sublinear communication
J Janneck, A Tueno, J Kußmaul, M Akram
Cryptology ePrint Archive, 2022
22022
Secure computation of the kth-ranked element in a star network
A Tueno, F Kerschbaum, S Katzenbeisser, Y Boev, M Qureshi
arXiv preprint arXiv:1909.08347, 2019
22019
Zwei Anwendungen des Paillier-Kryptosystems: Blinde Signatur und Three-Pass-Protocol
T Anselme
arXiv preprint arXiv:1206.1078, 2012
22012
Secure Branching Program Evaluation
J Janneck, A Boudi, A Tueno, M Akram
Cryptology ePrint Archive, 2022
12022
Private set intersection from branching programs
A Tueno, J Janneck
US Patent App. 17/752,326, 2023
2023
Private decision tree evaluation using an arithmetic circuit
A Tueno, Y Boev, F Kerschbaum
US Patent App. 18/221,665, 2023
2023
Private decision tree evaluation using an arithmetic circuit
AK Tueno, Y Boev, F Kerschbaum
US Patent 11,750,362, 2023
2023
Secure integer comparison using binary trees
A Tueno, J Janneck
US Patent App. 17/525,372, 2023
2023
Unbalanced Private Set Intersection from Homomorphic Encryption and Nested Cuckoo Hashing
J Kußmaul, M Akram, A Tueno
Cryptology ePrint Archive, 2023
2023
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20