Personal information

No personal information available

Activities

Works (17)

Lecture Notes in Computer Science - Fairness-Aware Privacy-Preserving Record Linkage

Lecture Notes in Computer Science
2020-12-29 | Book chapter
Contributors: Dinusha Vatsalan; Joyce Yu; Wilko Henecka; Brian Thorne
Source: Self-asserted source
Wilko Henecka via The Lens

Lecture Notes in Computer Science - P-Signature-Based Blocking to Improve the Scalability of Privacy-Preserving Record Linkage

Lecture Notes in Computer Science
2020-12-29 | Book chapter
Contributors: Dinusha Vatsalan; Joyce Yu; Brian Thorne; Wilko Henecka
Source: Self-asserted source
Wilko Henecka via The Lens

6G SUMMIT - A Measure of Personal Information in Mobile Data

2020 2nd 6G Wireless Summit (6G SUMMIT)
2020-03 | Book
Contributors: Ian Oppermann; Jakub Nabaglo; Wilko Henecka
Source: Self-asserted source
Wilko Henecka via The Lens

Boosted and Differentially Private Ensembles of Decision Trees

arXiv: Learning
2020-01-26 | Other
Contributors: Richard Nock; Wilko Henecka
Source: Self-asserted source
Wilko Henecka via The Lens

Entity Resolution and Federated Learning get a Federated Resolution

arXiv: Databases
2018-03-11 | Other
Contributors: Richard Nock; Stephen James Hardy; Wilko Henecka; Hamish Ivey-Law; Giorgio Patrini; Guillaume Smith; Brian Thorne
Source: Self-asserted source
Wilko Henecka via The Lens

Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption.

arXiv: Learning
2017-11-29 | Other
Contributors: Stephen James Hardy; Wilko Henecka; Hamish Ivey-Law; Richard Nock; Giorgio Patrini; Guillaume Smith; Brian Thorne
Source: Self-asserted source
Wilko Henecka via The Lens

Network management in a world of secrets.

2015 | Other
Contributors: Wilko Henecka
Source: Self-asserted source
Wilko Henecka via The Lens

Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases

IEEE Transactions on Dependable and Secure Computing
2015-11-01 | Journal article
Contributors: Wilko Henecka; Matthew Roughan
Source: Self-asserted source
Wilko Henecka via The Lens

FiCloud - Lossy Compression of Dynamic, Weighted Graphs

2015 3rd International Conference on Future Internet of Things and Cloud
2015-08 | Conference paper
Contributors: Wilko Henecka; Matthew Roughan
Source: Self-asserted source
Wilko Henecka via The Lens

AsiaCCS - Faster secure two-party computation with less memory

Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13
2013 | Conference paper
Contributors: Wilko Henecka; Thomas Schneider
Source: Self-asserted source
Wilko Henecka via The Lens

ICNP - STRIP: Privacy-preserving vector-based routing

2013 21st IEEE International Conference on Network Protocols (ICNP)
2013-10 | Conference paper
Contributors: Wilko Henecka; Matthew Roughan
Source: Self-asserted source
Wilko Henecka via The Lens

ICICS - Conversion of real-numbered privacy-preserving problems into the integer domain

Information and Communications Security
2012 | Conference paper
Contributors: Wilko Henecka; Nigel Bean; Matthew Roughan
Source: Self-asserted source
Wilko Henecka via The Lens

ACM Conference on Computer and Communications Security - TASTY: tool for automating secure two-party computations

Proceedings of the 17th ACM conference on Computer and communications security - CCS '10
2010 | Conference paper
Contributors: Wilko Henecka; Stefan K ögl; Ahmad-Reza Sadeghi; Thomas Schneider; Immo Wehrenberg
Source: Self-asserted source
Wilko Henecka via The Lens

CRYPTO - Correcting errors in RSA private keys

Advances in Cryptology – CRYPTO 2010
2010 | Conference paper
Contributors: Wilko Henecka; Alexander May; Alexander Meurer
Source: Self-asserted source
Wilko Henecka via The Lens

EuroPKI - Automatic generation of sigma-protocols

Public Key Infrastructures, Services and Applications
2010 | Conference paper
Contributors: Endre Bangerter; Thomas Briner; Wilko Henecka; Stephan Krenn; Ahmad-Reza Sadeghi; Thomas Schneider
Source: Self-asserted source
Wilko Henecka via The Lens

TASTY: Tool for Automating Secure Two-partY computations.

2010 | Other
Contributors: Wilko Henecka; Stefan Kögl; Ahmad-Reza Sadeghi; Thomas Schneider; Immo Wehrenberg
Source: Self-asserted source
Wilko Henecka via The Lens

TASTY: Tool for Automating Secure Two-partY computations.

IACR Cryptology ePrint Archive
2010 | Other
Contributors: Wilko Henecka; Stefan Kögl; Ahmad-Reza Sadeghi; Thomas Schneider; Immo Wehrenberg
Source: Self-asserted source
Wilko Henecka via The Lens