Private evaluation of decision trees using sublinear cost A Tueno, F Kerschbaum, S Katzenbeisser Proceedings on Privacy Enhancing Technologies, 2019 | 72 | 2019 |
An efficiently searchable encrypted data structure for range queries F Kerschbaum, A Tueno Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 50 | 2019 |
Non-interactive private decision tree evaluation A Tueno, Y Boev, F Kerschbaum Data and Applications Security and Privacy XXXIV: 34th Annual IFIP WG 11.3 …, 2020 | 41 | 2020 |
Efficient secure computation of order-preserving encryption A Tueno, F Kerschbaum Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 19 | 2020 |
Secure Computation of the-Ranked Element in a Star Network A Tueno, F Kerschbaum, S Katzenbeisser, Y Boev, M Qureshi International Conference on Financial Cryptography and Data Security, 386-403, 2020 | 16 | 2020 |
Oblivious order-preserving encryption AK Tueno, F Kerschbaum US Patent 10,360,390, 2019 | 11 | 2019 |
Privacy-preserving condition-based forecasting using machine learning F Taigel, AK Tueno, R Pibernik Journal of Business Economics 88, 563-592, 2018 | 11 | 2018 |
Non-Interactive Private Decision Tree Evaluation AK Tueno, Y Boev, F Kerschbaum US Patent App. 16/573,813, 2021 | 8 | 2021 |
Selective access for supply chain management in the cloud A Tueno, F Kerschbaum, D Bernau, S Foresti 2017 IEEE Conference on Communications and Network Security (CNS), 476-482, 2017 | 6 | 2017 |
Private decision tree evaluation using an arithmetic circuit AK Tueno, Y Boev, F Kerschbaum US Patent 11,750,362, 2023 | 5 | 2023 |
Secure range queries for multiple users A Tueno, F Kerschbaum arXiv preprint arXiv:1802.01138, 2018 | 4 | 2018 |
A method for securely comparing integers using binary trees A Tueno, J Janneck, D Boehm Proceedings on Privacy Enhancing Technologies, 2023 | 3 | 2023 |
Private computation on set intersection with sublinear communication J Janneck, A Tueno, J Kußmaul, M Akram Cryptology ePrint Archive, 2022 | 2 | 2022 |
Secure computation of the kth-ranked element in a star network A Tueno, F Kerschbaum, S Katzenbeisser, Y Boev, M Qureshi arXiv preprint arXiv:1909.08347, 2019 | 2 | 2019 |
Zwei Anwendungen des Paillier-Kryptosystems: Blinde Signatur und Three-Pass-Protocol T Anselme arXiv preprint arXiv:1206.1078, 2012 | 2 | 2012 |
Secure integer comparison using binary trees A Tueno, J Janneck US Patent App. 17/525,372, 2023 | 1 | 2023 |
Secure Branching Program Evaluation J Janneck, A Boudi, A Tueno, M Akram Cryptology ePrint Archive, 2022 | 1 | 2022 |
Private decision tree evaluation using an arithmetic circuit A Tueno, Y Boev, F Kerschbaum US Patent 12,069,156, 2024 | | 2024 |
SECURE COMPUTATION OF SHARED DATA INTERSECTIONS J Kussmaul, A Tueno US Patent App. 18/069,017, 2024 | | 2024 |
QUANTUM SAFE DIGITAL SIGNATURE SERVICE A Naduvath, BR Philip, A Tueno, A Hoursanov, T Rausch, D Boehm, ... US Patent App. 18/081,225, 2024 | | 2024 |