Liina Kamm
Cybernetica
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Liina Kamm.
Bioinformatics | 2013
Liina Kamm; Dan Bogdanov; Sven Laur; Jaak Vilo
Motivation: Increased availability of various genotyping techniques has initiated a race for finding genetic markers that can be used in diagnostics and personalized medicine. Although many genetic risk factors are known, key causes of common diseases with complex heritage patterns are still unknown. Identification of such complex traits requires a targeted study over a large collection of data. Ideally, such studies bring together data from many biobanks. However, data aggregation on such a large scale raises many privacy issues. Results: We show how to conduct such studies without violating privacy of individual donors and without leaking the data to third parties. The presented solution has provable security guarantees. Contact: jaak.vilo@ut.ee Supplementary information: Supplementary data are available at Bioinformatics online.
International Journal of Information Security | 2015
Liina Kamm; Jan Willemson
In this paper, we show that it is possible and, indeed, feasible to use secure multiparty computation (SMC) for calculating the probability of a collision between two satellites. For this purpose, we first describe basic floating point arithmetic operators (addition and multiplication) for multiparty computations. The operators are implemented on the
privacy forum | 2014
Dan Bogdanov; Liina Kamm; Sven Laur; Pille Pruulmann-Vengerfeldt; Riivo Talviste; Jan Willemson
privacy enhancing technologies | 2016
Dan Bogdanov; Liina Kamm; Baldur Kubo; Reimo Rebane; Ville Sokk; Riivo Talviste
{\textsc {Sharemind}}
IEEE Transactions on Dependable and Secure Computing | 2016
Dan Bogdanov; Liina Kamm; Sven Laur; Ville Sokk
The Computer Journal | 2018
David W. Archer; Dan Bogdanov; Yehuda Lindell; Liina Kamm; Kurt Nielsen; Jakob Pagter; Nigel P. Smart; Rebecca N. Wright
SHAREMIND SMC engine. We discuss the implementation details, provide methods for evaluating example elementary functions (inverse, square root, exponentiation of
IACR Cryptology ePrint Archive | 2013
Dan Bogdanov; Liina Kamm; Sven Laur; Pille Pruulmann-Vengerfeldt
IACR Cryptology ePrint Archive | 2014
Dan Bogdanov; Liina Kamm; Sven Laur; Ville Sokk
e
IACR Cryptology ePrint Archive | 2013
Liina Kamm; Jan Willemson
DB&IS | 2008
Margus Jäger; Liina Kamm; Darja Krushevskaja; Harry-Anton Talvik; Janno Veldemann; Andres Vilgota; Jaak Vilo
e, error function). Using these primitives, we implement a satellite conjunction analysis algorithm and give benchmark results for the primitives as well as the conjunction analysis itself.