Follow
Meilof Veeningen
Meilof Veeningen
Postdoctoral researcher, Eindhoven University of Technology
Verified email at tue.nl - Homepage
Title
Cited by
Cited by
Year
Universally verifiable multiparty computation from threshold homomorphic cryptosystems
B Schoenmakers, M Veeningen
Applied Cryptography and Network Security: 13th International Conference …, 2015
602015
Minimising communication in honest-majority MPC by batchwise multiplication verification
PS Nordholt, M Veeningen
International Conference on Applied Cryptography and Network Security, 321-339, 2018
512018
Trinocchio: Privacy-preserving outsourcing by distributed verifiable computation
B Schoenmakers, M Veeningen, N de Vreede
Applied Cryptography and Network Security: 14th International Conference …, 2016
432016
Pinocchio-based adaptive zk-SNARKs and secure/correct adaptive function evaluation
M Veeningen
International Conference on Cryptology in Africa, 21-39, 2017
312017
Modeling identity-related properties and their privacy strength
M Veeningen, B De Weger, N Zannone
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011
212011
Formal privacy analysis of communication protocols for identity management
M Veeningen, B de Weger, N Zannone
International Conference on Information Systems Security, 235-249, 2011
182011
Enabling analytics on sensitive medical data with secure multi-party computation
M Veeningen, S Chatterjea, AZ Horváth, G Spindler, E Boersma, ...
Building Continents of Knowledge in Oceans of Data: The Future of Co-Created …, 2018
172018
Formal modelling of (De) pseudonymisation: a case study in health care privacy
M Veeningen, B de Weger, N Zannone
International Workshop on Security and Trust Management, 145-160, 2012
112012
Certificate validation in secure computation and its use in verifiable linear programming
S de Hoogh, B Schoenmakers, M Veeningen
Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016
102016
Trinocchio: Privacy-friendly outsourcing by distributed verifiable computation
B Schoenmakers, M Veeningen, N de Vreede
Cryptology ePrint Archive, 2015
102015
Data minimisation in communication protocols: a formal analysis framework and application to identity management
M Veeningen, B De Weger, N Zannone
International journal of information security 13, 529-569, 2014
92014
Location tracking enabling privacy protection
PP van Liesdonk, MG VEENINGEN, S Chatterjea
US Patent 11,188,672, 2021
82021
Are on-line personae really unlinkable?
M Veeningen, A Piepoli, N Zannone
Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014
72014
Secure distributed key generation in attribute based encryption systems
D Pletea, S Sedghi, M Veeningen, M Petkovic
2015 10th International Conference for Internet Technology and Secured …, 2015
52015
Batch-wise verification of multiparty computations
MG Veeningen
US Patent 11,818,255, 2023
42023
Evaluation of a monitoring function
PP van Liesdonk, MG VEENINGEN
US Patent 11,232,218, 2022
42022
Basic constructions of secure multiparty computation
P Laud, A Pankova, L Kamm, M Veeningen
Applications of Secure Multiparty Computation, 1-25, 2015
42015
A formal privacy analysis of identity management systems
MG Veeningen, BMM de Weger, N Zannone
42012
Computer-implemented method of applying a first function to each data element in a data set, and a worker node for implementing the same
MG Veeningen
US Patent 11,836,273, 2023
32023
Nodes and methods of operating the same
MG Veeningen, PP van Liesdonk
US Patent 11,818,249, 2023
32023
The system can't perform the operation now. Try again later.
Articles 1–20