Aug 18, 2014
Workshop program is now available.
May 21, 2014
The webpage is up and running.


09:00 – 09:05 Welcome. Peeter Laud
09:05 – 10:05 Efficient Two-Party Computations from Oblivious Transfer. Thomas Schneider
10:05 – 10:40 Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC. Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov
10:40 – 11:15 Is it possible to perform statistical analysis in a cryptographically secure manner? Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk
11:45 – 12:20 Minimizing Information Leakage Against Selective Failures in Consistent Multi-party Computation. Aggelos Kiayias, Yiannis Tselekounis, Bingsheng Zhang
12:20 – 12:55 Privacy Preserving Business Process Fusion. Roberto Guanciale, Dilian Gurov
14:00 – 14:35 Practical Universally Verifiable Linear Programming. Meilof Veeningen, Sebastiaan de Hoogh, Berry Schoenmakers, Niels de Vreede
14:35 – 15:10 Transformation-Based Privacy-Preserving Linear Programming. Peeter Laud, Alisa Pankova
15:10 – 15:45 When the users don't know what to want: exploring privacy preserving technology adoption in highly uncertain conditions. Laur Kanger, Pille Pruulmann-Vengerfeldt