Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation
De Cock, Martine, Dowsley, Rafael, Horst, Caleb, Katti, Raj, Nascimento, Anderson C. A., Poon, Wing-Sea, Truex, Stacey
Published in IEEE transactions on dependable and secure computing (01.03.2019)
Published in IEEE transactions on dependable and secure computing (01.03.2019)
Get full text
Journal Article
High performance logistic regression for privacy-preserving genome analysis
De Cock, Martine, Dowsley, Rafael, Nascimento, Anderson C A, Railsback, Davis, Shen, Jianwei, Todoki, Ariel
Published in BMC medical genomics (20.01.2021)
Published in BMC medical genomics (20.01.2021)
Get full text
Journal Article
An end-to-end framework for private DGA detection as a service
Maia, Ricardo J M, Ray, Dustin, Pentyala, Sikha, Dowsley, Rafael, De Cock, Martine, Nascimento, Anderson C A, Jacobi, Ricardo
Published in PloS one (28.08.2024)
Published in PloS one (28.08.2024)
Get full text
Journal Article
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
Tonicelli, Rafael, Nascimento, Anderson C. A., Dowsley, Rafael, Müller-Quade, Jörn, Imai, Hideki, Hanaoka, Goichiro, Otsuka, Akira
Published in International journal of information security (01.02.2015)
Published in International journal of information security (01.02.2015)
Get full text
Journal Article
On the Composability of Statistically Secure Random Oblivious Transfer
Dowsley, Rafael, Müller-Quade, Jörn, Nascimento, Anderson C. A.
Published in Entropy (Basel, Switzerland) (01.01.2020)
Published in Entropy (Basel, Switzerland) (01.01.2020)
Get full text
Journal Article
A CCA2 Secure Variant of the McEliece Cryptosystem
Dottling, N., Dowsley, R., Muller-Quade, J., Nascimento, A. C. A.
Published in IEEE transactions on information theory (01.10.2012)
Published in IEEE transactions on information theory (01.10.2012)
Get full text
Journal Article
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra
David, Bernardo, Dowsley, Rafael, van de Graaf, Jeroen, Marques, Davidson, Nascimento, Anderson C. A., Pinto, Adriana C. B.
Published in IEEE transactions on information forensics and security (01.01.2016)
Published in IEEE transactions on information forensics and security (01.01.2016)
Get full text
Journal Article
On the Commitment Capacity of Unfair Noisy Channels
Crepeau, Claude, Dowsley, Rafael, Nascimento, Anderson C. A.
Published in IEEE transactions on information theory (01.06.2020)
Published in IEEE transactions on information theory (01.06.2020)
Get full text
Journal Article
Commitment and Oblivious Transfer in the Bounded Storage Model With Errors
Dowsley, Rafael, Lacerda, Felipe, Nascimento, Anderson C. A.
Published in IEEE transactions on information theory (01.08.2018)
Published in IEEE transactions on information theory (01.08.2018)
Get full text
Journal Article
Protecting Privacy of Users in Brain-Computer Interface Applications
Agarwal, Anisha, Dowsley, Rafael, McKinney, Nicholas D., Wu, Dongrui, Lin, Chin-Teng, De Cock, Martine, Nascimento, Anderson C. A.
Published in IEEE transactions on neural systems and rehabilitation engineering (01.08.2019)
Published in IEEE transactions on neural systems and rehabilitation engineering (01.08.2019)
Get full text
Journal Article
The Commitment Capacity of the Gaussian Channel Is Infinite
Nascimento, A.C.A., Barros, J., Skludarek, S., Imai, H.
Published in IEEE transactions on information theory (01.06.2008)
Published in IEEE transactions on information theory (01.06.2008)
Get full text
Journal Article
Clustering Analysis of Email Malware Campaigns
Zhang, Ruichao, Wang, Shang, Burton, Renee, Hoang, Minh, Hu, Juhua, Nascimento, Anderson C A
Published in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (26.07.2021)
Published in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (26.07.2021)
Get full text
Conference Proceeding