Author of the publication

Differential Privacy Analysis of Data Processing Workflows.

, , and . GraMSec@CSF, volume 9987 of Lecture Notes in Computer Science, page 62-79. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Laud, Peeter
add a person with the name Laud, Peeter
 

Other publications of authors with the same name

Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries.. IEEE Symposium on Security and Privacy, page 71-85. IEEE Computer Society, (2004)New linking schemes for digital time-stamping., and . ICISC, page 3-13. Korea Institute of Information Security and Cryptology (KIISC), (1998)Computationally secure information flow.. Saarland University, Saarbrücken, Germany, (2002)On the (im)possibility of perennial message recognition protocols without public-key cryptography., and . SAC, page 1510-1515. ACM, (2011)Differential Privacy Analysis of Data Processing Workflows., , and . GraMSec@CSF, volume 9987 of Lecture Notes in Computer Science, page 62-79. Springer, (2016)Domain-Polymorphic Programming of Privacy-Preserving Applications., , and . IACR Cryptology ePrint Archive, (2013)A Type System for Computationally Secure Information Flow., and . FCT, volume 3623 of Lecture Notes in Computer Science, page 365-377. Springer, (2005)Implementing Cryptographic Primitives in the Symbolic Model.. NASA Formal Methods, volume 6617 of Lecture Notes in Computer Science, page 267-281. Springer, (2011)Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data., and . NordSec, volume 10674 of Lecture Notes in Computer Science, page 139-155. Springer, (2017)A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols., and . ACM Conference on Computer and Communications Security, page 1492-1503. ACM, (2015)