Sharemind: A framework for fast privacy-preserving computations D Bogdanov, S Laur, J Willemson Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008 | 949 | 2008 |
High-performance secure multi-party computation for data mining applications D Bogdanov, M Niitsoo, T Toft, J Willemson International Journal of Information Security 11, 403-418, 2012 | 257 | 2012 |
Time-stamping with binary linking schemes A Buldas, P Laud, H Lipmaa, J Villemson Annual International Cryptology Conference, 486-501, 1998 | 211 | 1998 |
Deploying Secure Multi-Party Computation for Financial Data Analysis: (Short Paper) D Bogdanov, R Talviste, J Willemson Financial Cryptography and Data Security: 16th International Conference, FC …, 2012 | 173 | 2012 |
Improved monte-carlo search L Kocsis, C Szepesvári, J Willemson Univ. Tartu, Estonia, Tech. Rep 1, 1-22, 2006 | 167 | 2006 |
Secure floating point arithmetic and private satellite collision analysis L Kamm, J Willemson International Journal of Information Security 14 (6), 531-548, 2015 | 141 | 2015 |
Round-efficient oblivious database manipulation S Laur, J Willemson, B Zhang Information Security: 14th International Conference, ISC 2011, Xi’an, China …, 2011 | 134 | 2011 |
Rational choice of security measures via multi-parameter attack trees A Buldas, P Laud, J Priisalu, M Saarepera, J Willemson International Workshop on Critical Information Infrastructures Security, 235-248, 2006 | 134 | 2006 |
Privacy protection for wireless medical sensor data X Yi, A Bouguettaya, D Georgakopoulos, A Song, J Willemson IEEE transactions on dependable and secure computing 13 (3), 369-380, 2015 | 118 | 2015 |
Verifiable internet voting in Estonia S Heiberg, J Willemson 2014 6th international conference on electronic voting: Verifying the vote …, 2014 | 111 | 2014 |
On the Gordon & Loeb model for information security investment. J Willemson WEIS, 2006 | 105 | 2006 |
The application of i-voting for Estonian parliamentary elections of 2011 S Heiberg, P Laud, J Willemson International Conference on E-Voting and Identity, 208-223, 2011 | 90 | 2011 |
Computing exact outcomes of multi-parameter attack trees A Jürgenson, J Willemson OTM Confederated International Conferences" On the Move to Meaningful …, 2008 | 82 | 2008 |
From oblivious AES to efficient and secure database join in the multiparty setting S Laur, R Talviste, J Willemson Applied Cryptography and Network Security: 11th International Conference …, 2013 | 76 | 2013 |
Improved monte-carlo search. Univ. Tartu L Kocsis, C Szepesvári, J Willemson Estonia, Tech. Rep, 1, 2006 | 75 | 2006 |
Internet voting in Estonia 2005–2019: Evidence from eleven elections P Ehin, M Solvak, J Willemson, P Vinkel Government Information Quarterly 39 (4), 101718, 2022 | 65 | 2022 |
Serial model for attack tree computations A Jürgenson, J Willemson International Conference on Information Security and Cryptology, 118-128, 2009 | 65 | 2009 |
Improving the verifiability of the Estonian Internet Voting scheme S Heiberg, T Martens, P Vinkel, J Willemson International Joint Conference on Electronic Voting, 92-107, 2016 | 58 | 2016 |
Privacy-preserving statistical data analysis on federated databases D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt, R Talviste, ... Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014 | 58 | 2014 |
Method and apparatus for validating a digital signature A Ansper, A Buidas, M Roos, J Villemson US Patent 7,178,029, 2007 | 52 | 2007 |