| 11062215 |
Using different data sources for a predictive model |
Kim Laine, Ran Gilad-Bachrach, Kristin E. Lauter, Peter Rindal |
2021-07-13 |
| 10977384 |
Hardware protection for differential privacy |
Josh Benaloh, Harsha Prasad Nori, Janardhan Dattatreya KULKARNI, Joshua Stanley Allen, Jacob R. Lorch +4 more |
2021-04-13 |
| 10243738 |
Adding privacy to standard credentials |
Payman Mohassel, Chaya Ganesh |
2019-03-26 |
| 9768962 |
Minimal disclosure credential verification and revocation |
Tolga Acar, Christian Paquin, Duy Lan Nguyen |
2017-09-19 |
| 9077525 |
User-controlled data encryption with obfuscated policy |
Nishanth Chandran, Kristin E. Lauter, Vinod Vaikuntanathan |
2015-07-07 |
| 8874930 |
Graph encryption |
Seny F. Kamara |
2014-10-28 |
| 8837718 |
User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store |
Kristin E. Lauter, Mihir Bellare, Josh Benaloh, Erik J. Horvitz, Chris Demetrios Karkanias |
2014-09-16 |
| 8762741 |
Privacy-preserving communication |
Sze Ming Chow, Seny F. Kamara |
2014-06-24 |
| 8527766 |
Reducing leakage of information from cryptographic systems |
Adam M. O'Neill |
2013-09-03 |
| 8429421 |
Server-side encrypted pattern matching |
Emily H. Shen |
2013-04-23 |