Follow
Alisa Pankova
Alisa Pankova
Cybernetica AS
Verified email at cyber.ee
Title
Cited by
Cited by
Year
Secure multi-party computation for inter-organizational process mining
G Elkoumy, SA Fahrenkrog-Petersen, M Dumas, P Laud, A Pankova, ...
Enterprise, Business-Process and Information Systems Modeling: 21st …, 2020
392020
Privacy-preserving record linkage in large databases using secure multiparty computation
P Laud, A Pankova
BMC medical genomics 11, 33-46, 2018
262018
Mine me but don’t single me out: Differentially private event logs for process mining
G Elkoumy, A Pankova, M Dumas
2021 3rd International Conference on Process Mining (ICPM), 80-87, 2021
232021
Shareprom: A Tool for Privacy-Preserving Inter-Organizational Process Mining.
G Elkoumy, SA Fahrenkrog-Petersen, M Dumas, P Laud, A Pankova, ...
BPM (PhD/Demos) 2673, 72-76, 2020
232020
A framework of metrics for differential privacy from local sensitivity
P Laud, A Pankova, M Pettai
Proceedings on Privacy Enhancing Technologies, 2020
212020
On the (Im) possibility of privately outsourcing linear programming
P Laud, A Pankova
Proceedings of the 2013 ACM workshop on cloud computing security workshop, 55-64, 2013
172013
Interpreting epsilon of differential privacy in terms of advantage in guessing or approximating sensitive attributes
P Laud, A Pankova
arXiv preprint arXiv:1911.12777, 2019
152019
Symbolic analysis of cryptographic protocols containing bilinear pairings
A Pankova, P Laud
2012 IEEE 25th Computer Security Foundations Symposium, 63-77, 2012
152012
Business Process Privacy Analysis in Pleak
A Toots, R Tuuling, M Yerokhin, M Dumas, L García-Bañuelos, P Laud, ...
Fundamental Approaches to Software Engineering: 22nd International …, 2019
142019
Verifiable computation in multiparty protocols with honest majority
P Laud, A Pankova
Provable Security: 8th International Conference, ProvSec 2014, Hong Kong …, 2014
142014
Decision support for sharing data using differential privacy
MFS John, G Denker, P Laud, K Martiny, A Pankova, D Pavlovic
2021 IEEE Symposium on Visualization for Cyber Security (VizSec), 26-35, 2021
112021
Preprocessing based verification of multiparty protocols with honest majority
P Laud, A Pankova, R Jagomägis
Proceedings on Privacy Enhancing Technologies, 2017
102017
New attacks against transformation-based privacy-preserving linear programming
P Laud, A Pankova
Security and Trust Management: 9th International Workshop, STM 2013, Egham …, 2013
102013
Achieving differential privacy using methods from calculus
P Laud, A Pankova, M Pettai
arXiv preprint arXiv:1811.06343, 2018
82018
Privacy-preserving directly-follows graphs: Balancing risk and utility in process mining
G Elkoumy, A Pankova, M Dumas
arXiv preprint arXiv:2012.01119, 2020
72020
Transitioning from testbeds to ships: an experience study in deploying the TIPPERS Internet of Things platform to the US Navy
D Archer, MA August, G Bouloukakis, C Davison, MH Diallo, D Ghosh, ...
The Journal of Defense Modeling and Simulation 19 (3), 501-517, 2022
62022
Interpreting epsilon of differential privacy in terms of advantage in guessing or approximating sensitive attributes
A Pankova, P Laud
2022 IEEE 35th Computer Security Foundations Symposium (CSF), 96-111, 2022
52022
Multi-level privacy analysis of business processes: the Pleak toolset
M Dumas, L García-Bañuelos, J Jääger, P Laud, R Matulevičius, ...
International Journal on Software Tools for Technology Transfer 24 (2), 183-203, 2022
52022
Transformation-based outsourcing of linear equation systems over real numbers
P Laud, A Pankova
Cryptology ePrint Archive, 2015
42015
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority
R Jagomägis, P Laud, A Pankova
Cryptology ePrint Archive, 2015
42015
The system can't perform the operation now. Try again later.
Articles 1–20