Items where Author is "Pedersen, Thomas Brochmann"

Group by: Item Type | No Grouping
Number of items: 10.

Article

Ersoy, Oğuzhan and Pedersen, Thomas Brochmann and Kaya, Kamer and Selçuk, Ali Aydın and Anarim, Emin (2016) A CRT-based verifiable secret sharing scheme secure against unbounded adversaries. (Accepted/In Press)

Yıldızlı, Can and Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay and Levi, Albert (2011) Distributed privacy preserving clustering via homomorphic secret sharing and its application to (vertically) partitioned spatio-temporal data. International Journal of Data Warehousing and Mining, 7 (1). pp. 46-66. ISSN 1548-3924 (Print) 1548-3932 (Online)

Örencik, Cengiz and Pedersen, Thomas Brochmann and Savaş, Erkay and Keskinöz, Mehmet (2010) Securing fuzzy vault schemes through biometric hashing. Turkish Journal of Electrical Engineering &Computer Sciences, 18 (4). pp. 515-539. ISSN 1300-0632

Kaplan, Emre and Pedersen, Thomas Brochmann and Savaş, Erkay and Saygın, Yücel (2010) Discovering private trajectories using background information. Data and Knowledge Engineering (Sp. Iss. SI), 69 (7). pp. 723-736. ISSN 0169-023X

Pedersen, Thomas Brochmann and Savaş, Erkay (2009) Impossibility of unconditionally secure scalar products. Data and Knowledge Engineering, 68 (10). pp. 1059-1070. ISSN 0169-023X

Durahim, Onur Ahmet and Savaş, Erkay and Sunar, Berk and Pedersen, Thomas Brochmann and Kocabaş, Övünç (2009) Transparent code authentication at the processor level. IET Computers & Digital Techniques, 3 (4). pp. 354-372. ISSN 1751-8601

Kaplan, Emre and Pedersen, Thomas Brochmann and Savaş, Erkay and Saygın, Yücel (2008) Privacy risks in trajectory data publishing: reconstructing private trajectories from continuous properties. Knowledge-Based Intelligent Information and Engineering Systems, 5178 . pp. 642-649. ISSN 0302-9743 (Print) 1611-3349 (Online)

Papers in Conference Proceedings

Örencik, Cengiz and Pedersen, Thomas Brochmann and Savaş, Erkay and Keskinöz, Mehmet (2008) Improved fuzzy vault scheme for fingerprint verification. In: International Conference on Security and Cryptography, Porto, Portugal

Doğanay, Mahir Can and Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay and Levi, Albert (2008) Distributed privacy preserving k-means clustering with additive secret sharing. In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008,, Nantes, France

Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay (2007) Secret charing vs. encryption-based techniques for privacy preserving data mining. In: Joint UNECE/Eurostat Work Session on Statistical Disclosure Control,

This list was generated on Wed Jul 6 07:28:27 2022 +03.