Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Follow
Liina Kamm
Liina Kamm
Senior researcher at Cybernetica AS
Verified email at cyber.ee
Title
Cited by
Cited by
Year
From keys to databases—real-world applications of secure multi-party computation
DW Archer, D Bogdanov, Y Lindell, L Kamm, K Nielsen, JI Pagter, ...
The Computer Journal 61 (12), 1749-1771, 2018
1872018
A new way to protect privacy in large-scale genome-wide association studies
L Kamm, D Bogdanov, S Laur, J Vilo
Bioinformatics 29 (7), 886-893, 2013
1742013
Secure floating point arithmetic and private satellite collision analysis
L Kamm, J Willemson
International Journal of Information Security 14 (6), 531-548, 2015
1392015
Students and taxes: a privacy-preserving study using secure computation
D Bogdanov, L Kamm, B Kubo, R Rebane, V Sokk, R Talviste
Proceedings on Privacy Enhancing Technologies, 2016
1182016
Rmind: a tool for cryptographically secure statistical analysis
D Bogdanov, L Kamm, S Laur, V Sokk
IEEE Transactions on Dependable and Secure Computing 15 (3), 481-495, 2016
942016
Privacy-preserving statistical data analysis on federated databases
D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt, R Talviste, ...
Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014
592014
Implementation and evaluation of an algorithm for cryptographically private principal component analysis on genomic data
D Bogdanov, L Kamm, S Laur, V Sokk
IEEE/ACM transactions on computational biology and bioinformatics 15 (5 …, 2018
432018
Privacy-preserving statistical analysis using secure multi-party computation
L Kamm
Ph. D. dissertation, 2015
372015
Secure multi-party data analysis: end user validation and practical experiments
D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt
Cryptology ePrint Archive, 2013
242013
Applications of secure multiparty computation
P Laud, L Kamm
Ios Press, 2015
212015
Implementing privacy-preserving genotype analysis with consideration for population stratification
A Ostrak, J Randmets, V Sokk, S Laur, L Kamm
Cryptography 5 (3), 21, 2021
102021
Stateful abstractions of secure multiparty computation
P Laud
Applications of secure multiparty computation, 26-42, 2015
102015
Practical applications of secure multiparty computation
R Talviste
Applications of secure multiparty computation, 246-251, 2015
92015
Flexible database platform for biomedical research with multiple user interfaces and a universal query engine
M Jäger, L Kamm, D Krushevskaja, HA Talvik, J Veldemann, A Vilgota, ...
Databases and Information Systems V, 301-310, 2009
72009
Integrating and validating maritime transport security services: Initial results from the cs4eu demonstrator
C Grigoriadis, S Papastergiou, P Kotzanikolaou, C Douligeris, ...
Proceedings of the 2021 Thirteenth International Conference on Contemporary …, 2021
42021
Basic constructions of secure multiparty computation
P Laud, A Pankova, L Kamm, M Veeningen
Applications of Secure Multiparty Computation, 1-25, 2015
42015
Modeling texas hold’em poker strategies with bayesian networks
K Tretyakov, L Kamm
tech. rep, techreport, 2009
42009
Homological classification of commitment schemes
L Kamm
Master’s thesis, University of Tartu, Institute of Computer Science, 2007
32007
MPCFL: Towards Multi-party Computation for Secure Federated Learning Aggregation
H Kaminaga, FM Awaysheh, S Alawadi, L Kamm
Proceedings of the IEEE/ACM 16th International Conference on Utility and …, 2023
22023
Constructing privacy-preserving information systems using secure multiparty computation
D Bogdanov, L Kamm
Cybernetica Research Report T-4-13, 2011
22011
The system can't perform the operation now. Try again later.
Articles 1–20