Server-Supported Decryption for Mobile Devices
STM 2022: Security and Trust Management pp 71–81
STM 2022: Security and Trust Management pp 71–81
ESORICS 2022: Computer Security. ESORICS 2022 International Workshops pp 625–644
PhD thesis. University of Tartu, 2023.
Cybernetica research report, D-2-384, 2022.
Cybernetica research report, D-2-385, 2022.
Cybernetica research report, D-2-391, 2022.
PhD thesis. University of Tartu, 2022.
PhD thesis. Tallinn University of Technology, 2022.
IET Information Security 1– 17 (2022).
Applied Cryptography and Network Security. ACNS 2022. Rome, Italy, June, 20-23, 2022, LNCS, volume 13269
Government Information Quarterly
In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 37-47, 2022
Computers & Security, Volume 117, June 2022, Pages 102689
MSc thesis. University of Tartu, 2022.
MSc thesis. University of Tartu, 2022.
2022 IEEE 35th Computer Security Foundations Symposium (CSF)
SN COMPUT. SCI. 3, 448 (2022)
In Proceedings of the 2022 European Interdisciplinary Cybersecurity Conference (EICC '22). Association for Computing Machinery, New York, NY, USA, 29–35.
In eJournal of eDemocracy and Open Government (JeDEM), vol. 14, no. 1 (2022), pages 72-85
In APF 2022: Privacy Technologies and Policy pp 88-96, Springer LNSC,volume 13279.
Cybernetica research report D-2-456, 2022.
Cybernetica research report D-2-457, 2022.
PhD thesis. University of Tartu, 2022.
MSc thesis. Aarhus University Department of Computer Science, 2022.
Cybernetica reseach report D-2-499, 2022.
The 24th Annual International Conference on Information Security and Cryptology; December 1-3 2021, Seoul, Korea
ACM International Conference Proceeding Series. ACM Digital Library, 90−97
Transactions on Emerging Telecommunications Technologies, 33 (6), ARTN e4130
Communications of the ACM, 65 (9), 48−57
Cybernetica research report, D-2-501, 2022.
Cybernetica research report, D-2-502, 2022
Cybernetica research report D-2-116. 2021.
29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, April 2021
In Proceedings of the 7th International Conference on Information Systems Security and Privacy - ICISSP 2021, SCITEPRESS ISBN 978-989-758-491-6, pages 181-190.
Proceedings of the 36th Annual ACM Symposium on Applied Computing, March 2021, Pages 1607–1616
Computers and Security, Volume 105, June 2021
Computers and Security, Volume 78, October 2021
IEEE Access ( Volume: 9), March 2021, Pages 56020 - 56030
Sensors 2021, 21(15), 5096
Cryptography 5, no. 3: 22.
International Journal on Software Tools for Technology Transfer.
Frontiers in Digital Health.
In: Caj Södergård, Tomas Mildorf, Ephrem Habyarimana, Arne J. Berre, Jose A. Fernandes, Christian Zinke-Wehlmann (Ed.). Big Data in Bioeconomy (157−168). Cham: Springer. DOI: 10.1007/978-3-030-71069-9_12.
Entropy 2021, 23(8), 989
International Joint Conference on Electronic Voting E-Vote-ID 2021: Electronic Voting pp 140-154
6th Workshop on Advances in Secure Electronic Voting, A Workshop Associated with Financial Crypto 2021
Cryptography, 5 (4), 27:1−27:29
CRYPTOGRAPHY, 5 (3), ARTN 21
MSc thesis. University of Tartu, 2021.
MSc thesis. Tallinn University of Technology, 2021.
MSc thesis. Tallinn Univesity of Technology, 2021.
Conference Emerging Technologies for Authorization and Authentication. ETAA 2021
IEEE European Symposium on Security and Privacy Workshops 2021
IC3 '21: 2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)
2021 3rd International Conference on Process Mining (ICPM)
IC3 '21: 2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)
ICN '21: Proceedings of the 8th ACM Conference on Information-Centric Networking
Security and Trust Management. STM 2021.
Cryptology and Network Security. CANS 2021.
2021 IEEE Symposium on Visualization for Cyber Security (VizSec)
Uuring Riigi Infosüsteemi Ametile 2021
Aruanne Riigi Infosüsteemi Ametile 2021
Sensors 2021, 21(14), 4933
IEEE Access, vol. 9, pp. 110011-110025, 2021
United Nations Economic Commission for Europe/Eurostat Expert Meeting on Statistical Data Confidentiality 2021
MSc thesis. Tallinn University of Technology, 2020
MSc thesis. Tallinn University of Technology, 2020
MSc thesis. Tallinn University of Technology, 2020
MSc thesis. Tallinn University of Technology, 2020
MSc thesis. University of Tartu, 2020
The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology, ARTN 1548512920956383, September 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy: ICISSP 2020, 6th International Conference on Information Systems Security and Privacy, Valetta, Malta, 25.-27.02.2020. SciTePress, 176−184.
FORMALISE 2020 8th Conference on Formal Methods in Software Engineering, May 25-26 2020, Seoul, South Korea. ACM Digital Library
Juridica, 2020/6, lk 474-481. Tartu Ülikool
1st Conference on Information-Theoretic Cryptography (ITC 2020)
BPM 2020 co-located with the 18th International Conference on Business Process Management (BPM 2020), Sevilla, Spain, September 13-18, 2020. CEUR, 72−76. (CEUR Workshop Proceedings; 2673)
Grenoble, France, 8.-9.06.2020. Springer. (Lecture Notes in Business Information Processing (LNBIP))
IT Professional, Volume: 22 , Issue: 3 , May-June 1 2020
Business Process Management Journal, 26 (2), 548−569.
In Robert Krimmer, Melanie Volkamer, Bernhard Beckert, Ardita Driza Maurer, David Dueñas-Cid, Stéphane Glondu, Iuliia Krivonosova, Oksana Kulyk, Ralf Küsters, Beata Martin-Rozumilowicz, Peter Rønne, Mihkel Solvak, Oliver Spycher, Proceedings of the Fifth International Joint Conference on Electronic Voting, E-Vote-ID 2020. TALTECH Press 2020, pp. 82-97.
Electronics 2020, Volume 9, Issue 5, 716
Hindawi Wireless Communications and Mobile Computing Volume 2020, Article ID 8416823, 18 pages
Journal of Software: Practice and Experience, 12.04.2020
Technologies, October 2020, ARTN e4130
IEEE Consumer Electronics Magazine (Early Access)
Sõjateadlane (Estonian Journal of Military Studies), köide 15, lk 207-237
Proceedings on Privacy Enhancing Technologies, 2020 (2), 176-208
Proceedings of the 6th International Conference on Information Systems Security and Privacy: ICISSP 2020, 6th International Conference on Information Systems Security and Privacy, Valetta, Malta, 25.-27.02.2020. SciTePress, 176−184.
Journal of Software: Practice and Experience, 31.05.2020
IEEE Consumer Electronics Magazine, 9 (6), 9−14.
Keynote paper at Baltic DB&IS 2020. Communications in Computer and Information Science vol. 1243, pp. 13-20, Springer 2020.
Proceedings of the 15th Workshop on Programming Languages and Analysis for SecurityNovember 2020 Pages 3–7
Information Sciences Volume 539, October 2020, Pages 229-249
IEEE Internet of Things Journal Volume: 7 , Issue: 7 , 6132−6142, July 2020
In: Computer Security (111−121) 2020. Springer. (Lecture Notes in Computer Science).
MSc thesis, Technical University of Berlin, 2020.
PhD thesis. University of Tartu. 2019.
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019, Lecture Notes in Computer Science, vol. 11980, pp. 111--121, Springer, 2020.
Cybernetica research report A-116-1. 2019
MSc thesis. Tallinn University of Technology, 2019
Computers & Security, vol. 82, 2019, pp: 99-117.
1: the 5th International Conference on Information Systems Security and Privacy,February 23-25, 2019, in Prague, Czech Republic. Ed. Paolo Mori; Steven Furnell; and Olivier Camp. Citepress Digital Library , 238−245.
Sustainable cities and society, vol. 45, 2019.
IEEE Transactions on Cloud Computing, Feb 14, 2019.
Computers & Security, 88, 101630, 1−17.10.1016/j.cose.2019.101630.
Proceedings of GraMSec 2018 The Fifth International Workshop on Graphical Models for Security: GraMSec 2018 The Fifth International Workshop on Graphical Models for Security. Oxford, UK. July 8, 2018. Springer.
EURASIP Journal on Wireless Communications and Networking, Mar. 2019.
In 4th IEEE European Symposium on Security and Privacy, June 17-19, 2019, Stockholm, Sweden, IEEE, pp. 621-634.
In: Krimmer R. et al. (eds) Electronic Voting. E-Vote-ID 2019. Lecture Notes in Computer Science, vol 11759. Springer, Cham
Software & Systems Modeling, Springer 2019.
In: R. Hahnle and W. van der Aalst (Ed.). Fundamental Approaches to Software Engineering (306−312). Springer Nature Switzerland AG. (Lecture Notes in Computer Science). https://link.springer.com/chapter/10.1007%2F978-3-030-16722-6_18 https://link.springer.com/article/10.1007/s00287-019-01204-y
In Computer Security (CyberICPS 2019, SECPRE 2019, SPOSE 2019, ADIoT 2019, 26-27 September, 2019, Luxembourg), Lecture Notes in Computer Science, volume 11980, pp. 111-121, Springer 2020.
BMC Medical Genomics, Volume 11, Supplement 4, 35–55, 2018.
In Proceedings of WAHC 2018 – 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 37-48, 2018.
IEEE/ACM Transactions on Computational Biology and Bioinformatics, Volume 15, Issue 5, 1427-1432, 2018.
The Computer Journal, Volume 61, Issue 12, 1 December 2018, Pages 1749–1771.
MSc thesis. Tallinn University of Technology, 2018
The Computer Journal. https://academic.oup.com/comjnl/article/61/12/1749/5095655
IEEE / ACM Transactions on Computational Biology and Bioinformatics, 1−8.
Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings. Ed. Gruschka, Nils. Cham: Springer, 138−153.
In: Cybenko G., Pym D., Fila B. (eds) Graphical Models for Security. GraMSec 2018. Lecture Notes in Computer Science, vol 11086. Springer, Cham.
In Robert Krimmer, Melanie Volkamer, Véronique Cortier, David Duenas-Cid, Rajeev Goré, Manik Hapsara, Reto Koenig, Steven Martin, Ronan McDermott, Peter Roenne, Uwe Serdült, Tomasz Truderung, editors, proceedings of the Third International Joint Conference on Electronic Voting E-Vote-ID 2018, 2–5 October 2018, Lochau/Bregenz, Austria, TUT press, pp. 259-276.
In Robert Krimmer, Melanie Volkamer, Véronique Cortier, David Duenas-Cid, Rajeev Goré, Manik Hapsara, Reto Koenig, Steven Martin, Ronan McDermott, Peter Roenne, Uwe Serdült, Tomasz Truderung, editors, proceedings of the Third International Joint Conference on Electronic Voting E-Vote-ID 2018, 2–5 October 2018, Lochau/Bregenz, Austria, TUT press, pp. 128-146
In Robert Krimmer, Melanie Volkamer, Véronique Cortier, Rajeev Goré, Manik Hapsara, Uwe Serdült, David Duenas-Cid, editors, Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings, Springer LNCS, volume 11143, pp. 132-145.
Proceedings of WAHC 2018 – 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, January 2018 Pages 37–48.
BMC Medical Genomics, 2018. BMC Med Genomics 11, 84 (2018). https://bmcmedgenomics.biomedcentral.com/articles/10.1186/s12920-018-0400-8
PLAS ‘18: Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, January 2018 Pages 2–12. https://dl.acm.org/doi/10.1145/3264820.3264825
In Proceedings on Privacy Enhancing Technologies, Volume 2017, Issue 4, 23-76, 2017.
In proceedings of USENIX Security Symposium. USENIX Association, Vancouver, BC, 1217–1234. 2017.
PhD thesis. University of Tartu. 2017.
PhD thesis. University of Tartu. 2017.
Cybernetica research report T-4-24. 2017
MSc thesis. University of Tartu, 2017
Proceedings of the 26th USENIX Security Symposium. Vancouver, BC: USENIX Association, 1217−1234.
In: Obana S., Chida K. (eds) Advances in Information and Computer Security. IWSEC 2017. Lecture Notes in Computer Science, vol 10418. Springer, Cham
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Ed. Tryfonas,Theo. Springer, 451−463. (Lecture Notes in Computer Science ; 10292).
Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Ed. Pieprzyk, Josef; Suriadi, Suriadi. Cham: Springer, 65−81. (Lecture Notes in Computer Science; 10342).10.1007/978-3-319-60055-0_4.
Computer Security – ESORICS 2017 – 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I: Oslo, Norway, 11.-15.09.2017. Ed. Foley, S.N. et al. Springer,. (Lecture Notes in Computer Science; 10492).
In Pooya Farshim, Emil Simion, editors, SecITC 2017: Innovative Security Solutions for Information Technology and Communications, June 8-9 2017, Bucharest, Romania, Springer LNCS 10543, pp. 104-114
In Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann, editors, Proceedings of the Second International Joint Conference E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, LNCS, volume 10615, pp. 306-317, Springer 2017.
Proceedings on Privacy Enhancing Technologies. Volume 2017, Issue 4, Pages 19-72. Presented at the 17th Privacy Enhancing Technologies Symposium, PETS 2017, Minneapolis, MN, USA, July 18-21, 2017. https://content.sciendo.com/view/journals/popets/2017/4/article-p23.xml
In proceedings of the 6th International Conference on Principles of Security and Trust (POST), Uppsala, Sweden, April 24-25, 2017. © Springer.
International Conference on Business Process Management (BPM 2017), 10445: International Conference on Business Process Management (BPM 2017), Barcelona. Ed. Carmona J., Engels G., Kumar A. Springer, 40−56.
In Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann, editors, Proceedings of the Second International Joint Conference E-Vote-ID 2017, LNCS, volume 10615, pp. 292-305, Springer 2017
Cybernetica researchers.
In Proceedings of 18th International Conference on Information and Communications Security. 2017.
Proceedings of the 3rd International Workshop on Genome Privacy and Security.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS).
IEEE Security and Privacy. 2016.
Cybernetica research report T-4-24. 2016.
IEEE Transactions on Dependable and Secure Computing. 2016.
Financial Cryptography and Data Security - Workshops, BITCOIN, VOTING, and WAHC. 2016.
In Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016.
Master's Thesis. University of Tartu. 2016.
Master's Thesis. University of Tartu. 2016.
In Proceedings on Privacy Enhancing Technologies, PoPETs, 2016 (3), pp 117–135, 2016.
In Foundations and Practice of Security: 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, LNCS, vol. 9482, pp. 66--82, Springer 2016.
PhD thesis. University of Tartu. 2016.
PhD thesis. University of Tartu, 2016
PhD thesis. Tallinn University of Technology, 2016
MSc thesis. University of Tartu, 2016
In IEEE Security & Privacy, vol. 14, no. 5, pp. 48-56, Sept.-Oct. 2016.
In Proceedings on Privacy Enhancing Technologies, PoPETs, 2016 (3), pp 117–135, 2016.
In Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi’an, China, May 30 – June 03, 2016, pp 11-20. ACM, 2016
In Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi, editors, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), Vienna, Austria, October 24-28, 2016, pp. 553-564, ACM 2016
In proceedings of the Third International Workshop on Graphical Models for Security (GraMSec 2016) Lisbon, Portugal, June 27th, 2016. © Springer.
In: Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole Goodman, Peter Y.A. Ryan, Oliver Spycher, Vanessa Teague, Gregor Wenda (Eds.), The International Conference on Electronic Voting E-Vote-ID 2016, 18-21 October 2016, Lochau/Bregenz, Austria, TUT Press, pp. 213-229, ISBN 978-9949-83-022-0
In proceedings of the 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC 2016), Barbados, February 26th, 2016. © Springer.
In Sjouke Mauw, Barbara Kordy, Sushil Jajodia, editors, Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Volume 9390 of LNCS, Springer, 2016, pp. 1-17.
In Joaquin Garcia-Alfaro, Evangelos Kranakis and Guillaume Bonfante, editors, oundations and Practice of Security: 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers. Volume 9482 of the Lecture Notes in Computer Science, Springer 2016, pp. 66-82. 8
In proceedings of the 11th DPM International Workshop on Data Privacy Management (DPM 2016), Heraklion, Greece, September 26-27, 2016. © Springer.
In proceedings of the 18th International Conference on Information and Communications Security (ICICS2016), Singapore, November 29th — December 2nd, 2016. © Springer
In proceedings of the 21st Nordic Conference on Secure IT Systems (NordSec 2016), Oulu, Finland, November 2-4, 2016. © Springer.
IEEE Transactions on Dependable and Secure Computing 13(3): 369-380 (2016)
Cybernetica researchers (procured by RIA)
International Journal of Information Security. 2015.
In Proceedings of the 31st Annual Computer Security Applications Conference. 2015.
In Proceedings of 22nd ACM Conference on Computer and Communications Security. 2015.
In Proceedings of the 28th IEEE Computer Security Foundations Symposium. 2015.
In Proceedings of Privacy Enhancing Technologies. 2015.
Cryptology ePrint Archive: Report 2015/1039. 2015.
Diploma Thesis. Estonian Aviation Academy. 2015.
Master's Thesis. University of Tartu. 2015.
Financial Cryptography and Data Security - Workshops on BITCOIN, WAHC and Wearable. 2015.
Financial Cryptography and Data Security - 19th International Conference. 2015.
PhD thesis. University of Tartu. 2015.
PhD thesis. Tallinn University of Technology, 2015
Financial Cryptography and Data Security – 19th International Conference, 2015, San Juan, Puerto Rico, January 26-30, 2015
Science of Computer Programming, Volume 114, 15 December 2015, Pages 85-91, ISSN 0167-6423
13th Annual Conference on Privacy, Security and Trust, Izmir, Turkey, July 21-23, 2015. IEEE Computer Society Press, 36 – 43.
In Rolf Haenni, Reto E. Koenig and Douglas Wikström (editors) E-Voting and Identity, Lecture Notes in Computer Science Volume 9269, pp 19-34, Springer 2015.
in International Journal of Information Security, November 2015, Volume 14, Issue 6, pp 531-548, Springer (link.springer.com)
Proceedings on Privacy Enhancing Technologies, 2015(2), 188–205.
IOS Press 2015 (ebooks/iospress)
22nd ACM Conference on Computer and Communications Security, Denver, CO, USA, October 12th–16th, 2015. (Toim.) Kruegel, Christopher; Li, Ninghui. ACM, 1492 – 1503.
In Frdédéric Cuppens, Joaquin Garcia-Alfaro, Nur Zincir Heywood and Philip W. L. Fong (editors) Foundations and Practice of Security, Lecture Notes in Computer Science Volume 8930, pp 294-310, Springer 2015
In Khouzani, MHR, Panaousis, Emmanouil, Theodorakopoulos, George, editors, Decision and Game Theory for Security, 6th International Conference, GameSec 2015, Lecture Notes in Computer Science Volume 9406, pp 311-321, Springer 2015.
28th IEEE Computer Security Foundations Symposium, Verona, Italy, July 13th–17th, 2015. (Toim.) Fournet, Cedric; Hicks, Michael. IEEE Computer Society Press, 75–89.
Financial Cryptography and Data Security – 2015 Workshops, San Juan, Puerto Rico, January 30, 2015
Seminar “E-Narnia is a fairytale: The real cyber security resides in Estonia”, Tallinn, 13. mai 2015
Cybernetica researchers.
In Proceedings of 16th International Conference on Information and Communications Security. 2014.
In Proceedings of the 7th International Symposium on Foundations and Practice of Security. 2014.
In Proceedings of the 8th International Conference on Provable Security. 2014.
In Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS'14, ACM Digital Library. 2014.
In Proceedings of the 27th IEEE Computer Security Foundations Symposium, CSF 2014, pp. 184-198. 2014.
In Proceedings of the 17th International Information Security Conference, ISC 2014, LNCS, vol. 8783, pp. 179-197. Springer. 2014.
Master's thesis. University of Tartu. 2014.
Cryptology ePrint Archive, Report 2014/512. 2014.
Cybernetica research report T-4-22. 2014.
Proceedings of the STO-MP-SAS-106 - Analysis Support to Decision Making in Cyber Defence and Security. NATO STO. 2014.
In Proceedings of the 8th International Workshop on Information Security Theory and Practice, WISTP 2014, LNCS, vol 8501, pp. 108-123. Springer. 2014.
In Proceedings of the 2nd Annual Privacy Forum 2014, APF 2014, LNCS, vol. 8450, pp. 30-55. Springer. 2014.
Cybernetica research report T-4-21. 2014.
In Proceedings of the 19th Nordic Conference on Secure IT Systems, NordSec 2014, LNCS, vol. 8788, pp. 59-74. Springer (2014).
Master's thesis. University of Tartu. 2014.
In David Naccache and Damien Sauveron, editors, Information Security Theory and Practice, 8th IFIP WG 11.2 International Workshop, WISTP 2014, June 30 – July 2 2014; Heraklion, Greece, LNCS 8501, pp. 108-123, Springer 2014.
2014 IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, July 19-22, 2014. (Toim.) Datta, Anupam; Fournet, Cedric. IEEE Computer Society, 2014, lk 184-198.
In Karin Bernsmed, Simone Fischer-Hübner (editors), Secure IT Systems. 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, LNCS 8788, pp. 59-74, Springer 2014.
In Bart Preneel, Demosthenes Ikonomou (Editors), Privacy Technologies and Policy. Second Annual Privacy Forum APF 2014, May 20-21, Athens, Greece, LNCS 8450, pp. 30-55, Springer 2014.
Proceedings of the STO-MP-SAS-106 – Analysis Support to Decision Making in Cyber Defence and Security. NATO STO. 2014
In: Provable Security, 8th International Conference: ProvSec 2014, Hong Kong, 09.10-10.10.2014. Springer, 2014, (Lecture Notes in Computer Science; 8782), 130 – 145.
In: Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on: Twelfth Annual International Conference on Privacy, Security and Trust (PST), Toronto, Canada, 23.-24.07.2014. IEEE, 2014, 112 – 120.
Chapter 7 of Dimitrios Zissis and Dimitrios Lekkas (editors) Design, Development, and Use of Secure Electronic Voting Systems. IGI Global, 2014, pages 128-148.
In: Krimmer, R., Volkamer, M.: Proceedings of Electronic Voting 2014 (EVOTE2014), TUT Press, Tallinn, p. 23-29.
International Journal of Information Security. 2014.
In Proceedings of ISC 2014, LNCS 8783, pp. 179-197, Springer 2014.
In: ICICS 2014: The 16th International Conference on Information and Communications Security, Hong Kong, 16.-17.12.2014. (Toim.) Shi, Elaine; Yiu, S.M. Springer, 2014, (Lecture Notes in Computer Science). [ilmumas]
In: Provable Security, 8th International Conference: ProvSec 2014, Hong Kong, 09.10-10.10.2014. (Toim.) Lucas C.K. Hui, S.M. Yiu, Sherman S. M. Chow, Joseph K. Liu. Springer, 2014, (Lecture Notes in Computer Science; 8782), 146 – 161.
In Decision and Game Theory for Security – 5th International Conference, GameSec 2014,Los Angeles, CA, USA, November 6-7, 2014. Proceedings, pages 153–172, 2014.
In Karin Bernsmed and Simone Fischer-Hübner, editors, Secure IT Systems, 19th Nordic Conference, NordSec 2014, LNCS 8988, pp. 199-212, Springer 2014.
Proceedings of the 35th IEEE Symposium on Security and Privacy, San Jose, CA, 2014.
Cryptology ePrint Archive, Report 2013/850. 2013.
Cryptology ePrint Archive, Report 2013/826. 2013.
Cybernetica research report T-4-19. 2013.
In Proceedings of the First ACM Workshop on Language Support for Privacy-enhancing Technologies, PETShop 2013, ACM Digital Library. 2013.
In Proceedings of the First ACM Workshop on Language Support for Privacy-enhancing Technologies, PETShop 2013, ACM Digital Library. 2013.
Master's thesis. University of Tartu. 2013.
ISACA Journal, Issue 3 - Big Data, 49 - 51, 2013.
Bioinformatics 29 (7): 886-893, 2013.
In Proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, LNCS, vol. 7954, pp. 84-101. Springer. 2013.
PhD thesis. University of Tartu. 2013.
Cybernetica research report T-4-20 / 2013
Cybernetica research report T-4-18 / 2013
PhD thesis. University of Tartu, 2013
MSc thesis. University of Tartu, 2013
MSc thesis. University of Tartu, 2013
In Hanne Riis Nielson and Dieter Gollmann, editors, Secure IT Systems. 18th Nordic Conference, NordSec 2013, LNCS 8208, pp. 123-138, Springer 2013.
CRITIS 2013, LNCS 8328, pp 26-37, Springer 2013.
ISACA Journal, Volume 3, 2013, 49-51. (isaca.org/journal)
Proceedings of the 18th Australasian Conference, ACIP 2013, LNCS 7959, pp 235-250. Springer 2013.
M. Kantarcioglu, C. Nita-Rotaru (Eds.), GameSec 2013.
Proceedings of the 18th Australasian Conference, ACIP 2013, LNCS 7959, pp 152-167. Springer 2013
Business Process Management Workshops. Lecture Notes in Business Information Processing Volume 132, 2013, pp 630-635. Springer 2013
Bioinformatics 29 (7): 886-893, 2013. (oxfordjournals.org)
In proceedings of the 2013 ACM Cloud Computing Security Workshop (CCSW), November 8th, 2013, Berlin, Germany
PETShop: The Workshop on Language Support for Privacy Enhancing Technologies, Berlin, Germany, November 4th, 2013. Association for Computing Machinery (ACM) , 2013, 19 – 21.
18th Nordic Conference on Secure IT Systems (Nordsec 2013), Ilulissat, Greenland, October 18-21, 2013. (Toim.) Gollmann, Dieter; Nielson, Hanne Riis. Springer, 2013, (Lecture Notes in Computer Science; 8208), 100 – 115.
11th International Conference on Applied Cryptography and Network Security (ACNS 2013), LNCS 7954, pp. 84-101. Springer, 2013
Cybernetica researchers.
Cybernetica research report T-4-17. 2012.
International Journal of Information Security 11(6), pp 403-418. Springer. 2012.
Master's thesis. University of Tartu. 2012.
In Proceedings of the Sixteenth International Conference on Financial Cryptography and Data Security 2012, FC 2012, LNCS, vol 7397, pp 57-64. Springer. 2012.
In Proceedings of Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, LNCS, vol. 7299, pp. 112-126. Springer. 2012.
Cybernetica research report T-4-16 / 2012
MSc thesis. Tallinn University of Technology, 2012
MSc thesis. Tallinn University of Technology, 2012
MSc thesis. University of Tartu, 2012
Michael Chau et al (Toim.). Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2012 (112 – 126). Heidelberg: Springer
In Angelos Keromytis, editor, Financial Cryptography and Data Security, LNCS 7397, pp. 57-64. Springer, 2012.
In International Journal of Information Security, Springer, 2012, DOI: 10.1007/s10207-012-0177-2.
Proceedings of the Third International Conference, Gamesec 2012. LNCS 7638, pp 98-117. Springer 2012.
In: Proceedings of the 13th Biennial Baltic Electronic Conference: 2012 13th Biennial Baltic Electronics Conference (BEC2012), Tallinn, Estonia, October 3-5, 2012. IEEE, 2012, 127 – 130.
In: Proceedings ELMAR-2012: 54th International Symposium ELMAR-2012, 12-14 September 2012, Zadar, Croatia. (Toim.) Jelena Bozek, Mislav Grgic. Zagreb, Coratia: Croatian Society Electronics in Marine, 2012, 109 – 112.
In: Proceedings: SOFSEM 2012: 38th International Conference on Current Trends in Theory and Practice of Computer Science,Špindlerův Mlýn, Czech Rep., January 21-27, 2012. (Toim.) Gottlob, Georg; Turán, György; Bieliková, Mária; Katzenbeisser, Stefan; Friedrich, Gerhard. Springer, 2012, (Lecture Notes in Computer Science; 7147), 576 – 587.
Bachelor's thesis. University of Tartu. 2011.
Master's thesis. University of Tartu. 2011.
Cybernetica research report T-4-13. 2011.
In Proceedings of the 14th International Conference on Information Security, ISC 2011, LNCS, vol. 7001, pp. 262-277. Springer, Heidelberg. 2011.
Master's thesis. University of Tartu. 2011.
Cybernetica research report T-4-15. 2011.
Cryptology ePrint Archive, Report 2011/122. 2011.
Cybernetica research report T-4-14 / 2011
Cybernetica research report T-4-12 / 2011
In proceedings of Nordsec 2011, 16th Nordic Conference in Secure IT Systems (LNCS 7161), Tallinn, Estonia, October 26-28, 2011, pp 1-3. Springer-Verlag
12th Symposium on Programming Languages and Software Tools. October 5-7, 2011, Tallinn, Estonia.
In Proceedings of the 2011 ACM Symposium on Applied Computing (SAC 2011).
In Designs, Codes and Cryptography, pp. 1-9, Springer Netherlands 2011.
In: Postproceedings: 3rd international conference on e-voting and identity, Tallinn, Sep 29th-30th, 2011. (Toim.) Kiyaias, Aggelos; Lipmaa, Helger. Springer-Verlag, 2012, (Lecture Notes in Computer Science; 7187).
In: Proceedings: 5th International Conference on Theory and Practice of Electronic Governance (ICEGOV2011), Tallinn, Sep 26th-28th, 2011. (Toim.) Estevez, Elsa; Janssen, Marijn. ACM, 2011, 363 – 364.
3rd NASA Formal Methods Symposium, Pasadena, CA, April 18th-20th 2011. (Toim.) Bobaru, Mihaela; Havelund, Klaus; Holzmann, Gerard; Joshi, Rajeev. Springer Verlag, 2011, (Lecture Notes in Computer Science; 6617), 267 – 281.
In Xuejia Lai, Jianying Zhou and Hui Li, editors, ISC 2011. Springer LNCS 7001, pp. 262-277
OCEANS ’11 MTS/IEEE KONA, Hilton Waikoloa Village, Kona, Hawai‘i, USA, September 19-22 2011. IEEE, 2011.
Cybernetica research report T-4-10. 2010.
Master's thesis. School of Computer Science and Communication, KTH Royal Institute of Technology. 2010.
Master's thesis. University of Tartu. 2010.
Bachelor's thesis. University of Tartu. 2010.
Master's thesis. University of Tartu. 2010.
In the Collection of AEOLUS theoretical findings. Deliverable D1.0.6. AEOLUS project IP-FP6-015964. 2010.
Cybernetica research report T-4-11 / 2010
Cybernetica research report T-4-9 / 2010
MSc thesis. Tallinn University of Technology, 2010
PhD thesis. Tallinn University of Technology, 2010
MSc thesis. University of Tartu, 2010
MSc thesis.University of Tartu, 2010
MSc thesis. Mainor Business School, 2010
In: Steinfeld, R., Hawkes, P. (Eds.): ACISP 2010. LNCS 6168, pp.318-335, Springer-Verlag 2010.
In: Hawkes, P., Steinfeld, R. (Eds.): ACISP 2010, LNCS 6168, pp. 336-351, Springer-Verlag 2010.
Ieee Software, 2, 65 – 71, 2010
Language Descriptions Tools and Applications, Paphos, Cyprus. March 27-28, 2010.
In: Lee, D., Hong, S. (Eds.): ICISC 2009, LNCS 5984, pp. 362-373, Springer-Verlag 2010.
In Phong Q. Nguyen and David Pointcheval, editors, PKC 2010, volume 6056 of Lecture Notes in Computer Science, pages 107–123, Paris, France, May 26–28, 2010. Springer-Verlag.
In: Information Security Summit, From Technology to Management: Information Security Summit, 11th International Conference, Prague, 26.03 – 27.03 2010. Praha: Tate International, S.R.O., 2010, 133 – 138.
In: Gritzalis, D., Preneel, B., Theoharidou, M. (Eds.): ESORICS 2010, LNCS 6345, pp. 373-388, Springer-Verlag 2010.
In: Kwak, J. et al. (Eds.): ISPEC 2010, LNCS 6047, pp. 56-66, Springer-Verlag 2010.
In: Zhou, J., Young, M. (Eds.): ACNS 2010, LNCS 6123, pp.438-455, Springer-Verlag 2010.
In: Nguyen, P.Q., Pointcheval, D. (Eds.): PKC 2010, LNCS 6056, pp. 88-106, Springer-Verlag 2010.
In Xuejia Lai, Moti Yung and Dongdai Lin, editors, Inscrypt 2010, volume 6584 of Lecture Notes in Computer Science, pages 18–35, Shanghai, China, October 20–23, 2010. Springer-Verlag.
IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control, 57(3), 721 – 727, 2010.
In: Proceedings of the 12th Biennial Baltic Electronic Conference BEC2010: Tallinn: TTU Press, 2010, 357 – 360.
OCEANS 2010 MTS/IEEE Seattle, Seattle, Washington, USA September 20-23, 2010. IEEE, 2010.
In: IWSEC 2010: IWSEC 2010, 22-24. Nov. Kobe, Jaapan. (Toim.) Echizen, I., Kunihiro. Springer, 2010, (LNCS).
In: ARES 2010. IEEE Computer Society Press, pp. 258-261, 2010.
Master's thesis. University of Tartu. 2009.
Cybernetica research report T-4-5. 2009.
Bachelor's thesis. University of Tartu. 2009.
Cybernetica research report T-4-8. 2009.
In Proceedings of Third Baltic Conference on Advanced Topics in Telecommunication, Tartu, Estonia 2009 (61 - 71). Rostock: Universität Rostock, Wissenschaftsverbund Iu. 2009.
Cybernetica research report T-4-7 / 2009
Cybernetica research report T-4-6 / 2009
Cybernetica research report T-4-4 / 2009
MSc thesis. University of Tartu, 2009
MSc thesis, Tallinn University of Technology, 2009
In: Jøsang, A., Maseng, T., Knapskog, S.J. (Eds.): NordSec 2009, LNCS 5838, pp. 207-222, 4th Nordic Conference on Secure IT Systems, NordSec 2009, Springer-Verlag 2009.
In C. Boyd, J. González Nieto, eds., Proc. of 14th Australasian Conf. on Information Security and Privacy, ACISP 2009 (Brisbane, July 2009), v. 5594 of Lect. Notes in Comput. Sci., pp. 264-275. Springer, 2009.
In Proc. of 3rd Int. Conf. on Provable Security, ProvSec 2009. November 11-13, 2009, Guangzhou, China. LNCS 5848, pp. 230-244, 2009.
In D. Lee and S. Hong (Eds.): ICISC 2009, Lecture Notes in Computer Science, volume 5984, pp. 118-128, Springer 2010.
In proceedings of Nordsec 2009, 14th Nordic Workshop on Secure IT Systems (LNCS 5838), Oslo, Norway, October 15-16, 2009, pp. 271-286. Springer-Verlag.
In proceedings of the sixth International Workshop on Formal Aspects in Security and Trust (FAST2009), Eindhoven, Netherlands, November 5-6, 2009.
In: Bao, F., Young, M. (Eds.): Inscrypt 2009, LNCS 6151, pp.154-163, Inscrypt 2009, Springer-Verlag 2009.
In Donghoon Lee and Seokhie Hong, editors, ICISC 2009, volume 5984 of Lecture Notes in Computer Science, pages 193–210, Seoul, Korea, December 2–4, 2009. Springer-Verlag.
In: Garay, J.A., Miyaji, A., Otsuka, A. (Eds.): CANS 2009, LNCS 5888, pp. 58-75, Springer-Verlag 2009.
IALA Bulletin 2009/2, p.38-40
Cybernetica research report T-4-2. 2008.
Bachelor's thesis. University of Tartu. 2008.
Master's thesis. University of Tartu. 2008.
In Proceedings of 13th European Symposium on Research in Computer Security, ESORICS 2008, LNCS, vol. 5283, pp. 192-206. Springer, Heidelberg. 2008.
MSc thesis. Tallinn University of Technology, 2008
MSc thesis. University of Tartu, 2008
MSc thesis. Tallinn University of Technology, 2008
MSc thesis. University of Tartu, 2008
MSc thesis. Tallinn University of Technology, 2008
In Esorics 2008.
Joonsang Baek, Feng Bao, Kefei Chen (Toim.). Provable Security – Second International Conference, ProvSec 2008 (254 – 267).Springer
In Arnold Beckmann, Costas Dimitracopoulos and Benedikt Löwe, editors, Computability in Europe, volume 5028 of Lecture Notes in Computer Science, pages 175–185, Athens, Greece, June 15–20, 2008. Springer-Verlag.
In Seok-Hee Hong, Hiroshi Nagamochi and Takuro Fukunaga, editors, The 19th International Symposium on Algorithm and Computation, ISAAC 2008, volume 5369 of Lecture Notes in Computer Science, pages 616–628, Gold Coast, Australia, December 15–17, 2008. Springer-Verlag.
Barthe, Gilles; Fournet, Cedric (Toim.). Trustworthy Global Computing (TGC 2007), Post-proceedings, lk. 294 – 311.
In NordSec 2008.
Shahbasian, Elisa; Rogova, Galina; J. de Weert, Michael (Toim.). Harbour Protection Through Data Fusion Technologies (53 – 60), 2008. Springer
Jong Hyuk Park, Bart Preneel, Ravi Sandhu, André Zúquete (Toim.). Proc. of 3rd Int. Symp. on Information Security, IS 2008 (1036 – 1051).Springer
In: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2008), 10.-12.01.2008, San Francisco, CA, USA. (Toim.) George C. Necula, Philip Wadler. ACM, 2008, lk. 337 – 348.
In ProvSec 2008.
POPL 2008: 337-348
In Tzong-Chen Wu and Chin-Laung Lei, editors, 11th Information Security Conference, ISC 2008, volume 5222 of Lecture Notes in Computer Science, pages 441–454, Taipei, Taiwan, September 15–18, 2008. Springer-Verlag.
E.Kranakis, E.Haroutunian and E.Shahbasian (Toim.). Aspects of Network and Information Security (110 – 118) 2008. Holland: IOS Press
In: Proceedings of The Third International Multi-Conference on Computing in the Global Information Technology (ICCGI 2008): Third International Multi-Conference on Computing in the Global Information Technology (ICCGI 2008). IEEE, 2008, 62 – 67.
In The Third International Conference on Availability, Reliability and Security, ARES 2008.
Master's thesis. University of Tartu. 2007.
MSc thesis. University of Tartu, 200
MSc thesis. University of Tartu, 2007
MSc thesis. Tallinn University of Technology, 2007
MSc thesis. University of Tartu, 2007
In W. Susilo, J. K. Liu, Y. Mu, eds., Proc. of 1st Int. Conf. on Provable Security, ProvSec 2007 (Wollongong, Oct/Nov. 2007), v. 4784 of Lect. Notes in Comput. Sci., pp. 138-150. Springer, 2007.
In T. Okamoto, X. Wang, eds., Proc. of 10th Int. Conf. on Practice and Theory in Public-Key Cryptography, PKC 2007 (Beijing, Apr. 2007), v. 4450 of Lect. Notes in Comput. Sci., pp. 150-165. Springer, 2007.
In A. Miyaji, H. Kikuchi, K. Rannenberg, eds., Proc. of 2nd Int. Wksh. on Security, IWSEC 2007 (Nara, Oct. 2007), v. 4752 of Lect. Notes in Comput. Sci., pp. 320-335. Springer, 2007.
Discr. Math. and Theor. Comput. Sci., v. 9, n. 1, pp. 247-274, 2007.
In A. Miyaji, H. Kikuchi, K. Rannenberg, eds., Proc. of 2nd Int. Wksh. on Security, IWSEC 2007 (Nara, Oct. 2007), v. 4752 of Lect. Notes in Comput. Sci., pp. 308-319. Springer, 2007.
In M. Weske, M.-S. Hacid, C. Godart, eds., Proc. of Web Information Systems Engineering, WISE 2007, Int.\ Wkshs. (Nancy, Dec. 2007), v. 4832 of Lect. Notes in Comput. Sci., pp. 154-165. Springer, 2007.
In J. Katz, M. Yung, eds., Proc. of 5th Int. Conf. on Applied Cryptography and Network Security, ACNS 2007 (Zhuhai, June 2007), v. 4521 of Lect. Notes in Comput. Sci., pp. 207-225. Springer, 2007.
In S. Li, D. Wang, J.-Z. Zhang, eds., Symbolic Computation and Education, pp. 174-191. World Scientific, 2007.
In G. Barthe, C. Fournet, eds., Proc. of 3rd Symp. on Trustworthy Global Computing, TGC 2007 (Sophia Antipolis, Nov. 2007).
Cybernetica research report T-4-1. 2006.
PhD thesis. University of Tartu, 2006
In Jana Dittmann, editor, Sicherheit 2006: Sicherheit – Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), volume 77 of Lecture Notes in Informatics, pages 270-278, Magdeburg, Germany, February 20–22, 2006. Gesellschaft für Informatik e.v.
In 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, pages 370-379, October 30th – November 3rd, 2006.
In 2nd workshop on Formal and Computational Cryptography, pages 1-6, July 9th, 2006, Venice, Italy.
In Jianying Zhou, Moti Yung, Feng Bao, editors, 4th International Conference on Applied Cryptography and Network Security – ACNS’06, volume 3989 of Lecture Notes in Computer Science, pages 50–65, Singapore, 2006. Springer-Verlag.
In 1st International Workshop on Critical Information Infrastructures Security (CRITIS’06), August 30 – September 2, 2006, Samos Island, Greece.
Theoretical Computer Science, vol 364, no. 3, pages 292-310, 2006.
In Mark Craven and Dimitrios Gunopulos, editors, The Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006, Philadelphia, USA, August 20-23, 2006. ACM.
Maths, Stats and OR Network. Maths CAA Series: March 2006.
V.N. Alexandrov et al. (Eds.): ICCS 2006, Part I, LNCS 3991, pp. 928-931, Springer-Verlag Berlin Heidelberg 2006.
Accepted to 3rd IEEE Conference on Intelligent Systems, 4-6 September 2006, University of Westminster, London, UK.
Accepted to The Fifth Workshop on the Economics of Information Security (WEIS 2006), University of Cambridge, England, UK, 26-28 June 2006.
In Jianying Zhou and Javier Lopez, editors, The 8th Information Security Conference (ISC’05), volume 3650 of Lecture Notes in Computer Science, pages 359-373, Singapore, September 20-23, 2005. Springer-Verlag.
In Xiaotie Deng and Dingzhu Du, editors, The 16th Annual International Symposium on Algorithms and Computation, ISAAC 2005, volume 3827 of Lecture Notes in Computer Science, pages 206-215, Sanya, Hainan, China, December 19-21, 2005. Springer-Verlag
In Andrew Patrick and Moti Yung, editors, Financial Cryptography and Data Security — Ninth International Conference, volume 3570 of Lecture Notes in Computer Science, pages 285–297, Roseau, The Commonwealth Of Dominica, February 28-March 3, 2005. Springer-Verlag.
In Proc. of the 2nd European Conference on Mobile Robots (ECMR05), Sept. 7-10, 2005, Ancona, Italy, pp. 152-157.
Int. Journal of Robots and Autonomous Systems, pp. 209 – 222, Vol. 2, No.3, (2005).
In Maciej Liskiewicz, Rüdiger Reischuk, editors, Fundamentals of Computation Theory: 15th International Symposium, FCT 2005, volume 3623 of Lecture Notes in Computer Science, pages 365-377. Lübeck, Germany, August 17-20, 2005. Springer-Verlag
In Vijay Aluri, Catherine Meadows and Ari Juels, editors, proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, pages 26-35, Alexandria, VA, USA, November 7-11, 2005. ACM.
In Martin Hofmann, editor, In proceedings of the Third Workshop on Applied Semantics (APPSEM05), Frauenchiemsee, Germany, Septermber 12-15, 2005.
In Sihan Qing, Wenbo Mao, Javier Lopez and Guilin Wang, editors, Information and Communications Security: 7th International Conference, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 97-111, Beijing, China, December 10-13, 2005. Springer-Verlag.
In Sihan Qing, Wenbo Mao, Javier Lopez and Guilin Wang, editors, Information and Communications Security: 7th International Conference, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 61-71, Beijing, China, December 10-13, 2005. Springer-Verlag.
Chapter in The Handbook of Information Security, Hossein Bidgoli, Editor-in-Chief. John Wiley & Sons, Inc., 2005.
In Jianying Zhou and Javier Lopez, editors, The 8th Information Security Conference (ISC’05), volume 3650 of Lecture Notes in Computer Science, pages 314-328, Singapore, September 20-23, 2005. Springer-Verlag.
In Moti Yung, editor, The 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, volume 3580 of Lecture Notes in Computer Science, pages 459–471, Lisboa, Portugal, July 11-15, 2005. Springer-Verlag. Accepted (Track C).
In Helger Lipmaa and Dieter Gollmann, editors, proceedings of Nordsec 2005, 10th Nordic Workshop on Secure IT Systems, pages 29-41, Tartu, Estonia, October 20-21, 2005.
In IC Journal, Vol. 28, No. 1, pp 51-54.
In F.Groen, N. Amoto, A. Bonarini, E. Yoshida and B. Kröse, editors, Proceedings of the 8th Conference on Intelligent Autonomous Systems (IAS8), Amsterdam, The Netherlands, 2004. IOS Press.
In Pil Joong Lee (Ed.): Advances in Cryptology – ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings (LNCS 3329), pp 500-514, 2004.
Tartu Ülikooli Tehnoloogiainstituut, august 2004.
In Information Security and Cryptology – ICISC 2003, 6th International Conference, Seoul, Korea, November 2003, Revised Papers (LNCS 2971), pages 55-66, 2004.
In proceedings of 2004 IEEE Symposium on Security and Privacy, pages 71-85, Oakland, CA, May 9-12, 2004. IEEE Computer Society.
In Jutta Eckstein, Hubert Baumeister (Eds.): Extreme Programming and Agile Processes in Software Engineering, 5th International Conference, XP 2004, Garmisch-Partenkirchen, Germany, June 6-10, 2004, Proceedings (LNCS 3092), pages 246-249, 2004.
In ICGA Journal, Vol. 27, No. 3, September 2004, pg 180.
19th Annual Computer Security Applications Conference ACSAC 2003, Las Vegas, USA, December 8-12, 2003. Proceedings, pages 308-318, 2003.
In proceedings of the 2nd Annual PKI Research Workshop.
In “Extreme Programming and Agile Processes in Software Engineering, 4th International Conference, XP 2003, Genova, Italy, May 2003, Proceedings” (LNCS 2675), pages 215-224, 2003.
ECMR’03 Proceedings of the 1st European Conference on Mobile Robots, September 4-6, 2003, Radziejowice, Poland
In Knowledge Based Systems, Volume 16, Issues 5-6, Pages 235-242 (July 2003), Elsevier.
In “Programming Languages and Systems, 12th European Symposium On Programming, ESOP 2003 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003 Warsaw, Poland, April 7-11, 2003. Proceedings (LNCS 2618), pages 159-173, 2003.
Nordic Workshop on Secure IT Systems NordSec 2003.
UNDP/UNESCO Free and Open Source Software (FOSS) Consultation, UNESCO HQ, Paris, France, November 24-25, 2003.
MSc thesis. University of Tartu, 2002
MSc thesis. University of Tartu, 2002
PhD thesis. University of Saarland, 2002
MSc thesis. University of Tartu, 2002
PhD thesis. University of Tartu, 2002
Journal of Computer Security 10 (2002), pages 273–296, IOS Press
In Proceedings of the Fifth International Baltic Conference on DB and IS, June 2002, Tallinn, Estonia, edited by Hele-Mai Haav and Ahto Kalja, Vol. 2, pp. 215-226.
Presented in Fifth International Baltic Conference on DB and IS, June 2002, Tallinn, Estonia. Proceedings of the Fifth International Baltic Conference, BalticDB&IS 2002. Edited by Hele-Mai Haav and Ahto Kalja.
Research and Development in Intelligent Systems XIX, Proceedings The Twenty-second SGAI International Conference on Knowledge Based Systems and Applied Artificial Intelligence, BCS Conference Series, Springer, pp. 1-16. 200
In NORDSEC 2002 – Proceedings of the 7th Nordic Workshop on Secure IT Systems (Karlstad University Studies 2002:31), pages 85-100, Karlstad, Sweden, November 7-8, 2002.
In the 14th Nordic Workshop on Programming Theory, NWPT’02, pages 63-65, Tallinn, Estonia, November 20-22.
Cybernetica research report nov. 2001.
MSc thesis. Tallinn Technical University, 2001
MSc thesis. Tallinn Technical University, 2001
MSc thesis. University of Tartu, 2001
ACISP 2001, 11.-13. July 2001, Sydney, Australia.
Advances in Cryptology – PKC 2001, Springer-Verlag, LNCS 1992, pp 402-415, presented on PKC 2001, February 2001, Cheju Island, Korea
In “Programming Languages and Systems, 10th European Symposium On Programming, ESOP 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genoa, Italy, April 2-6, 2001 Proceedings” (LNCS 2028), pages 77-91, 2001.
In JOSES: Java Optimization Strategies for Embedded Systems, Genoa, Italy, April 1, 2001.
7th ACM Conference on Computer and Communications Security, pages 9-18, Athens, Greece, November 1-4, 2000.
International Conference “Information Technologies and Telecommunications in the Baltic States – Baltic IT&T ‘2000”, April 6-7, Radisson SAS Daugava Hotel, Riga, Latvia
In Yuliang Zheng and Hideki Imai, editors, Public Key Cryptography ‘2000, volume 1751 of Lecture Notes in Computer Science, pages 293-305, Melbourne, Australia, 18-20 January 2000. Springer Verlag.
Annual Computer Security Applications Conference, 11-15 Dec 2000, Sheraton New Orleans, Louisiana, USA.
PhD thesis. Tallinn University of Technology, 1999
PhD thesis. University of Tartu, 1999
MSc thesis. Universirty of Tartu, 1999
International Conference and Exhibition “Information Technologies and Telecommunications in the Baltic States”, Riga, April 28-30 1999, p.69-72.
Cybernetica, Technical Report DO-UA-X-22-1299
Research Report CS 102/99. Institute of Cybernetics of Tallinn Technical University . Tartu. 15 pages. 1999.
Research Report CS 103/99. Institute of Cybernetics of Tallinn Technical University . Tartu. 15 pages. 1999.
Technical Report. 8 pages, 1999
Survey prepared under UNESCO project “Developing Telematics and Information Networks for On-Line Governance”, June 1999.
Eesti Füüsika Seltsi 9. aastaraamat, 1999. Pp. 102-125 [“Quantum Computing”, Ninth Annual of the Estonian Physical Society]
April 15, 1999.
MSc thesis. University of Tartu 1998.
MSc thesis, Tartu 1998.
Küberneetika AS, Technical Report 1998-21, Jan 1998, 7 pages.
In The 1st International Conference on Information Security and Cryptology, pages 3-14, Seoul, Korea, 18-19 December 1998. © by Korea Institute of Information Security and Cryptology.
In Hugo Krawczyk, editor, Advances in Cryptology – CRYPTO ’98, volume 1462 of Lecture Notes in Computer Science, pages 486-501. Springer-Verlag, 1998.
In Stafford Tavares and Henk Meijer, editors, Selected Areas in Cryptography ’98, volume 1556 of Lecture Notes in Computer Science, pages 248-263, Kingston, Canada, 17–18 August 1998. Springer-Verlag