Folgen
Peeter Laud
Peeter Laud
Cybernetica AS
Bestätigte E-Mail-Adresse bei cyber.ee - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Time-stamping with binary linking schemes
A Buldas, P Laud, H Lipmaa, J Villemson
Advances in Cryptology—CRYPTO'98, 486-501, 1998
2071998
Semantics and program analysis of computationally secure information flow
P Laud
Programming Languages and Systems: 10th European Symposium on Programming …, 2001
1722001
Accountable certificate management using undeniable attestations
A Buldas, P Laud, H Lipmaa
Proceedings of the 7th ACM Conference on Computer and Communications …, 2000
1292000
Symmetric encryption in automatic analyses for confidentiality against active adversaries
P Laud
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 71-85, 2004
1222004
Rational choice of security measures via multi-parameter attack trees
A Buldas, P Laud, J Priisalu, M Saarepera, J Willemson
Critical Information Infrastructures Security: First International Workshop …, 2006
1192006
Combining differential privacy and secure multiparty computation
M Pettai, P Laud
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
832015
The application of i-voting for Estonian parliamentary elections of 2011
S Heiberg, P Laud, J Willemson
E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn …, 2012
812012
Handling encryption in an analysis for secure information flow
P Laud
Programming Languages and Systems: 12th European Symposium on Programming …, 2003
772003
Secrecy types for a simulatable cryptographic library
P Laud
Proceedings of the 12th ACM conference on Computer and communications …, 2005
752005
Computationally sound secrecy proofs by mechanized flow analysis
M Backes, P Laud
Proceedings of the 13th ACM conference on Computer and communications …, 2006
712006
Eliminating counterevidence with applications to accountable certificate management
A Buldas, P Laud, H Lipmaa
Journal of Computer Security 10 (3), 273-296, 2002
582002
Domain-polymorphic programming of privacy-preserving applications
D Bogdanov, P Laud, J Randmets
Proceedings of the Ninth Workshop on Programming Languages and Analysis for …, 2014
562014
New linking schemes for digital time-stamping.
A Buldas, P Laud
ICISC 98, 3-14, 1998
541998
A type system for computationally secure information flow
P Laud, V Vene
FCT 5, 365-377, 2005
532005
On the computational soundness of cryptographically masked flows
P Laud
Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2008
442008
Sound computational interpretation of formal encryption with composed keys
P Laud, R Corin
Lecture notes in computer science, 55-66, 2004
402004
Encryption cycles and two views of cryptography
P Laud
Proceedings of the 7th Nordic Workshop on Secure IT Systems (NORDSEC) 31, 85-100, 2002
342002
Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees.
P Laud
Proc. Priv. Enhancing Technol. 2015 (2), 188-205, 2015
332015
A domain-specific language for low-level secure multiparty computation protocols
P Laud, J Randmets
Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications …, 2015
312015
From input private to universally composable secure multi-party computation primitives
D Bogdanov, P Laud, S Laur, P Pullonen
2014 IEEE 27th Computer Security Foundations Symposium, 184-198, 2014
312014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20