Follow
Meilof Veeningen
Meilof Veeningen
Postdoctoral researcher, Eindhoven University of Technology
Verified email at tue.nl - Homepage
Title
Cited by
Cited by
Year
Universally verifiable multiparty computation from threshold homomorphic cryptosystems
B Schoenmakers, M Veeningen
Applied Cryptography and Network Security: 13th International Conference …, 2015
602015
Minimising communication in honest-majority MPC by batchwise multiplication verification
PS Nordholt, M Veeningen
International Conference on Applied Cryptography and Network Security, 321-339, 2018
502018
Trinocchio: privacy-preserving outsourcing by distributed verifiable computation
B Schoenmakers, M Veeningen, N de Vreede
Applied Cryptography and Network Security: 14th International Conference …, 2016
392016
Pinocchio-based adaptive zk-SNARKs and secure/correct adaptive function evaluation
M Veeningen
International Conference on Cryptology in Africa, 21-39, 2017
312017
Modeling identity-related properties and their privacy strength
M Veeningen, B De Weger, N Zannone
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011
212011
Formal privacy analysis of communication protocols for identity management
M Veeningen, B de Weger, N Zannone
International Conference on Information Systems Security, 235-249, 2011
182011
Enabling Analytics on Sensitive Medical Data with Secure Multi-Party Computation.
M Veeningen, S Chatterjea, AZ Horváth, G Spindler, E Boersma, ...
MIE, 76-80, 2018
162018
Formal modelling of (De) pseudonymisation: a case study in health care privacy
M Veeningen, B de Weger, N Zannone
International Workshop on Security and Trust Management, 145-160, 2012
112012
Multi-party computation system for learning a classifier
MG Veeningen
US Patent 11,100,427, 2021
92021
Certificate validation in secure computation and its use in verifiable linear programming
S de Hoogh, B Schoenmakers, M Veeningen
Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016
92016
Trinocchio: Privacy-friendly outsourcing by distributed verifiable computation
B Schoenmakers, M Veeningen, N de Vreede
Cryptology ePrint Archive, 2015
92015
Data minimisation in communication protocols: a formal analysis framework and application to identity management
M Veeningen, B De Weger, N Zannone
International journal of information security 13, 529-569, 2014
92014
Are on-line personae really unlinkable?
M Veeningen, A Piepoli, N Zannone
Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014
72014
Secure distributed key generation in attribute based encryption systems
D Pletea, S Sedghi, M Veeningen, M Petkovic
2015 10th International Conference for Internet Technology and Secured …, 2015
52015
Batch-wise verification of multiparty computations
MG Veeningen
US Patent 11,818,255, 2023
42023
Basic constructions of secure multiparty computation
AS aCybernetica
Applications of Secure Multiparty Computation 13, 1, 2015
42015
A formal privacy analysis of identity management systems
MG Veeningen, BMM de Weger, N Zannone
42012
Multiparty computation scheduling
MG Veeningen, PP van Liesdonk, SJA DE HOOGH
US Patent 11,922,210, 2024
32024
Computer-implemented method of applying a first function to each data element in a data set, and a worker node for implementing the same
MG Veeningen
US Patent 11,836,273, 2023
32023
Nodes and methods of operating the same
MG Veeningen, PP van Liesdonk
US Patent 11,818,249, 2023
32023
The system can't perform the operation now. Try again later.
Articles 1–20