From keys to databases—real-world applications of secure multi-party computation DW Archer, D Bogdanov, Y Lindell, L Kamm, K Nielsen, JI Pagter, ... The Computer Journal 61 (12), 1749-1771, 2018 | 188 | 2018 |
A new way to protect privacy in large-scale genome-wide association studies L Kamm, D Bogdanov, S Laur, J Vilo Bioinformatics 29 (7), 886-893, 2013 | 177 | 2013 |
Secure floating point arithmetic and private satellite collision analysis L Kamm, J Willemson International Journal of Information Security 14 (6), 531-548, 2015 | 139 | 2015 |
Students and taxes: a privacy-preserving study using secure computation D Bogdanov, L Kamm, B Kubo, R Rebane, V Sokk, R Talviste Proceedings on Privacy Enhancing Technologies, 2016 | 118 | 2016 |
Rmind: a tool for cryptographically secure statistical analysis D Bogdanov, L Kamm, S Laur, V Sokk IEEE Transactions on Dependable and Secure Computing 15 (3), 481-495, 2016 | 94 | 2016 |
Privacy-preserving statistical data analysis on federated databases D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt, R Talviste, ... Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014 | 59 | 2014 |
Implementation and evaluation of an algorithm for cryptographically private principal component analysis on genomic data D Bogdanov, L Kamm, S Laur, V Sokk IEEE/ACM transactions on computational biology and bioinformatics 15 (5 …, 2018 | 43 | 2018 |
Privacy-preserving statistical analysis using secure multi-party computation L Kamm Ph. D. dissertation, 2015 | 37 | 2015 |
Secure multi-party data analysis: end user validation and practical experiments D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt Cryptology ePrint Archive, 2013 | 25 | 2013 |
Applications of secure multiparty computation P Laud, L Kamm Ios Press, 2015 | 21 | 2015 |
Implementing privacy-preserving genotype analysis with consideration for population stratification A Ostrak, J Randmets, V Sokk, S Laur, L Kamm Cryptography 5 (3), 21, 2021 | 10 | 2021 |
Stateful abstractions of secure multiparty computation P Laud Applications of secure multiparty computation, 26-42, 2015 | 10 | 2015 |
Practical applications of secure multiparty computation R Talviste Applications of secure multiparty computation, 246-251, 2015 | 9 | 2015 |
Flexible database platform for biomedical research with multiple user interfaces and a universal query engine M Jäger, L Kamm, D Krushevskaja, HA Talvik, J Veldemann, A Vilgota, ... Databases and Information Systems V, 301-310, 2009 | 7 | 2009 |
Integrating and validating maritime transport security services: Initial results from the cs4eu demonstrator C Grigoriadis, S Papastergiou, P Kotzanikolaou, C Douligeris, ... Proceedings of the 2021 Thirteenth International Conference on Contemporary …, 2021 | 4 | 2021 |
Basic constructions of secure multiparty computation P Laud, A Pankova, L Kamm, M Veeningen Applications of Secure Multiparty Computation, 1-25, 2015 | 4 | 2015 |
Modeling texas hold’em poker strategies with bayesian networks K Tretyakov, L Kamm tech. rep, techreport, 2009 | 4 | 2009 |
Homological classification of commitment schemes L Kamm Master’s thesis, University of Tartu, Institute of Computer Science, 2007 | 3 | 2007 |
MPCFL: Towards Multi-party Computation for Secure Federated Learning Aggregation H Kaminaga, FM Awaysheh, S Alawadi, L Kamm Proceedings of the IEEE/ACM 16th International Conference on Utility and …, 2023 | 2 | 2023 |
Constructing privacy-preserving information systems using secure multiparty computation D Bogdanov, L Kamm Cybernetica Research Report T-4-13, 2011 | 2 | 2011 |