default search action
Alisa Pankova
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i17]Peeter Laud, Alisa Pankova, Jelizaveta Vakarjuk:
Privacy-preserving server-supported decryption. CoRR abs/2410.19338 (2024) - 2023
- [j6]Gamal Elkoumy, Alisa Pankova, Marlon Dumas:
Differentially private release of event logs for process mining. Inf. Syst. 115: 102161 (2023) - 2022
- [j5]Marlon Dumas, Luciano García-Bañuelos, Joosep Jääger, Peeter Laud, Raimundas Matulevicius, Alisa Pankova, Martin Pettai, Pille Pullonen-Raudvere, Aivo Toots, Reedik Tuuling, Maksym Yerokhin:
Multi-level privacy analysis of business processes: the Pleak toolset. Int. J. Softw. Tools Technol. Transf. 24(2): 183-203 (2022) - [c19]Alisa Pankova, Jan Willemson:
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols. ACNS 2022: 313-333 - [c18]Alisa Pankova, Peeter Laud:
Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes. CSF 2022: 96-111 - [c17]Gamal Elkoumy, Alisa Pankova, Marlon Dumas:
Amun: A tool for Differentially Private Release of Event Logs for Process Mining (Extended Abstract). ICPM Doctoral Consortium / Demo 2022: 56-60 - [i16]Gamal Elkoumy, Alisa Pankova, Marlon Dumas:
Differentially Private Release of Event Logs for Process Mining. CoRR abs/2201.03010 (2022) - 2021
- [j4]Gamal Elkoumy, Alisa Pankova, Marlon Dumas:
Utility-aware Event Log Anonymization for Privacy-Preserving Process Mining. EMISA Forum 41(1): 37-38 (2021) - [c16]Gamal Elkoumy, Alisa Pankova, Marlon Dumas:
Mine Me but Don't Single Me Out: Differentially Private Event Logs for Process Mining. ICPM 2021: 80-87 - [c15]Joosep Jääger, Alisa Pankova:
PrivaLog: a Privacy-aware Logic Programming Language. PPDP 2021: 15:1-15:14 - [c14]Mark F. St. John, Grit Denker, Peeter Laud, Karsten Martiny, Alisa Pankova, Dusko Pavlovic:
Decision Support for Sharing Data using Differential Privacy. VizSec 2021: 26-35 - [d2]Gamal Elkoumy, Alisa Pankova, Marlon Dumas:
Differentially Private Event Logs for Process Mining: Supplementary Material. Zenodo, 2021 - [d1]Gamal Elkoumy, Alisa Pankova, Marlon Dumas:
Differentially Private Release of Event Logs for Process Mining. Zenodo, 2021 - [i15]Gamal Elkoumy, Alisa Pankova, Marlon Dumas:
Mine Me but Don't Single Me Out: Differentially Private Event Logs for Process Mining. CoRR abs/2103.11739 (2021) - [i14]Alisa Pankova, Jan Willemson:
Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols. IACR Cryptol. ePrint Arch. 2021: 1501 (2021) - 2020
- [j3]Peeter Laud, Alisa Pankova, Martin Pettai:
A Framework of Metrics for Differential Privacy from Local Sensitivity. Proc. Priv. Enhancing Technol. 2020(2): 175-208 (2020) - [c13]Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Marlon Dumas, Peeter Laud, Alisa Pankova, Matthias Weidlich:
Shareprom: A Tool for Privacy-Preserving Inter-Organizational Process Mining. BPM (PhD/Demos) 2020: 72-76 - [c12]Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Marlon Dumas, Peeter Laud, Alisa Pankova, Matthias Weidlich:
Secure Multi-party Computation for Inter-organizational Process Mining. BPMDS/EMMSAD@CAiSE 2020: 166-181 - [c11]Alisa Pankova, Joosep Jääger:
Short Paper: Secure Multiparty Logic Programming. PLAS@CCS 2020: 3-7 - [i13]Joosep Jääger, Alisa Pankova:
PrivaLog: a privacy-aware logic programming language. CoRR abs/2010.07057 (2020) - [i12]Gamal Elkoumy, Alisa Pankova, Marlon Dumas:
Privacy-Preserving Directly-Follows Graphs: Balancing Risk and Utility in Process Mining. CoRR abs/2012.01119 (2020)
2010 – 2019
- 2019
- [j2]Aivo Toots, Reedik Tuuling, Maksym Yerokhin, Marlon Dumas, Luciano García-Bañuelos, Peeter Laud, Raimundas Matulevicius, Alisa Pankova, Martin Pettai, Pille Pullonen, Jake Tom:
Business Process Privacy Analysis in Pleak - (Extended Abstract). Inform. Spektrum 42(5): 354-355 (2019) - [c10]Aivo Toots, Reedik Tuuling, Maksym Yerokhin, Marlon Dumas, Luciano García-Bañuelos, Peeter Laud, Raimundas Matulevicius, Alisa Pankova, Martin Pettai, Pille Pullonen, Jake Tom:
Business Process Privacy Analysis in Pleak. FASE 2019: 306-312 - [i11]Aivo Toots, Reedik Tuuling, Maksym Yerokhin, Marlon Dumas, Luciano García-Bañuelos, Peeter Laud, Raimundas Matulevicius, Alisa Pankova, Martin Pettai, Pille Pullonen, Jake Tom:
Business Process Privacy Analysis in Pleak. CoRR abs/1902.05052 (2019) - [i10]Peeter Laud, Alisa Pankova:
Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes. CoRR abs/1911.12777 (2019) - [i9]Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Marlon Dumas, Peeter Laud, Alisa Pankova, Matthias Weidlich:
Secure Multi-Party Computation for Inter-Organizational Process Mining. CoRR abs/1912.01855 (2019) - 2018
- [c9]Peeter Laud, Alisa Pankova:
Bit Decomposition Protocols in Secure Multiparty Computation. WAHC@CCS 2018: 37-48 - [i8]Peeter Laud, Alisa Pankova, Martin Pettai:
Achieving Differential Privacy using Methods from Calculus. CoRR abs/1811.06343 (2018) - 2017
- [j1]Peeter Laud, Alisa Pankova, Roman Jagomägis:
Preprocessing Based Verification of Multiparty Protocols with Honest Majority. Proc. Priv. Enhancing Technol. 2017(4): 23-76 (2017) - [c8]Peeter Laud, Alisa Pankova:
Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data. NordSec 2017: 139-155 - 2016
- [c7]Peeter Laud, Alisa Pankova:
Securing Multiparty Protocols Against the Exposure of Data to Honest Parties. DPM/QASA@ESORICS 2016: 165-180 - [c6]Peeter Laud, Alisa Pankova:
Optimizing Secure Computation Programs with Private Conditionals. ICICS 2016: 418-430 - [i7]Peeter Laud, Alisa Pankova:
Securing Multiparty Protocols against the Exposure of Data to Honest Parties. IACR Cryptol. ePrint Arch. 2016: 650 (2016) - [i6]Peeter Laud, Alisa Pankova:
Optimizing Secure Computation Programs with Private Conditionals. IACR Cryptol. ePrint Arch. 2016: 942 (2016) - 2015
- [i5]Peeter Laud, Alisa Pankova:
Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers. IACR Cryptol. ePrint Arch. 2015: 322 (2015) - [i4]Peeter Laud, Alisa Pankova:
Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data. IACR Cryptol. ePrint Arch. 2015: 671 (2015) - [i3]Peeter Laud, Alisa Pankova:
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority. IACR Cryptol. ePrint Arch. 2015: 674 (2015) - 2014
- [c5]Peeter Laud, Alisa Pankova:
Verifiable Computation in Multiparty Protocols with Honest Majority. ProvSec 2014: 146-161 - [i2]Peeter Laud, Alisa Pankova:
Verifiable Computation in Multiparty Protocols with Honest Majority. IACR Cryptol. ePrint Arch. 2014: 60 (2014) - 2013
- [c4]Peeter Laud, Alisa Pankova, Martin Pettai, Jaak Randmets:
Specifying sharemind's arithmetic black box. PETShop@CCS 2013: 19-22 - [c3]Peeter Laud, Alisa Pankova:
On the (Im)possibility of privately outsourcing linear programming. CCSW 2013: 55-64 - [c2]Peeter Laud, Alisa Pankova:
New Attacks against Transformation-Based Privacy-Preserving Linear Programming. STM 2013: 17-32 - [i1]Peeter Laud, Alisa Pankova:
New Attacks against Transformation-Based Privacy-Preserving Linear Programming. IACR Cryptol. ePrint Arch. 2013: 355 (2013) - 2012
- [c1]Alisa Pankova, Peeter Laud:
Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings. CSF 2012: 63-77
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint