Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jan Willemson
@article{DBLP:journals/iet-ifs/FarzaliyevWK23, author = {Valeh Farzaliyev and Jan Willemson and Jaan Kristjan Kaasik}, title = {Improved lattice-based mix-nets for electronic voting}, journal = {{IET} Inf. Secur.}, volume = {17}, number = {1}, pages = {18--34}, year = {2023}, url = {https://doi.org/10.1049/ise2.12089}, doi = {10.1049/ISE2.12089}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/FarzaliyevWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Willemson23, author = {Jan Willemson}, title = {Creating a Decryption Proof Verifier for the Estonian Internet Voting System}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {58:1--58:7}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605467}, doi = {10.1145/3600160.3605467}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Willemson23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KripsSVW23, author = {Kristjan Krips and Nikita Snetkov and Jelizaveta Vakarjuk and Jan Willemson}, editor = {Sokratis K. Katsikas and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Rita Maria Ugarelli and Isabel Pra{\c{c}}a and Wenjuan Li and Weizhi Meng and Steven Furnell and Basel Katt and Sandeep Pirbhulal and Ankur Shukla and Michele Ianni and Mila Dalla Preda and Kim{-}Kwang Raymond Choo and Miguel Pupo Correia and Abhishta Abhishta and Giovanni Sileno and Mina Alishahi and Harsha K. Kalutarage and Naoto Yanai}, title = {Trust Assumptions in Voting Systems}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14399}, pages = {309--329}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54129-2\_18}, doi = {10.1007/978-3-031-54129-2\_18}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KripsSVW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/Willemson23, author = {Jan Willemson}, editor = {Kurt Schneider and Fabiano Dalpiaz and Jennifer Horkoff}, title = {Analysis of Information Security Measures Embedded in the {GDPR}}, booktitle = {31st {IEEE} International Requirements Engineering Conference, {RE} 2023 - Workshops, Hannover, Germany, September 4-5, 2023}, pages = {214--217}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/REW57809.2023.00043}, doi = {10.1109/REW57809.2023.00043}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/Willemson23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Willemson23, author = {Jan Willemson}, editor = {Ruben Rios and Joachim Posegga}, title = {Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System}, booktitle = {Security and Trust Management - 19th International Workshop, {STM} 2023, The Hague, The Netherlands, September 28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14336}, pages = {126--135}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47198-8\_8}, doi = {10.1007/978-3-031-47198-8\_8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/Willemson23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/MuzikantW23, author = {Petr Muzikant and Jan Willemson}, editor = {Guojun Wang and Haozhe Wang and Geyong Min and Nektarios Georgalas and Weizhi Meng}, title = {Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices}, booktitle = {Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {2034}, pages = {147--162}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-1274-8\_10}, doi = {10.1007/978-981-97-1274-8\_10}, timestamp = {Wed, 17 Apr 2024 16:38:38 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/MuzikantW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-09411, author = {Jan Willemson}, title = {Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System}, journal = {CoRR}, volume = {abs/2305.09411}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.09411}, doi = {10.48550/ARXIV.2305.09411}, eprinttype = {arXiv}, eprint = {2305.09411}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-09411.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-10391, author = {Kristjan Krips and Nikita Snetkov and Jelizaveta Vakarjuk and Jan Willemson}, title = {Trust assumptions in voting systems}, journal = {CoRR}, volume = {abs/2309.10391}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.10391}, doi = {10.48550/ARXIV.2309.10391}, eprinttype = {arXiv}, eprint = {2309.10391}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-10391.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/giq/EhinSWV22, author = {Piret Ehin and Mihkel Solvak and Jan Willemson and Priit Vinkel}, title = {Internet voting in Estonia 2005-2019: Evidence from eleven elections}, journal = {Gov. Inf. Q.}, volume = {39}, number = {4}, pages = {101718}, year = {2022}, url = {https://doi.org/10.1016/j.giq.2022.101718}, doi = {10.1016/J.GIQ.2022.101718}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/giq/EhinSWV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PankovaW22, author = {Alisa Pankova and Jan Willemson}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {313--333}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_16}, doi = {10.1007/978-3-031-09234-3\_16}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/PankovaW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/Willemson22, author = {Jan Willemson}, editor = {Agnieszka Gryszczynska and Przemyslaw Polanski and Nils Gruschka and Kai Rannenberg and Monika Adamczyk}, title = {Fifty Shades of Personal Data - Partial Re-identification and {GDPR}}, booktitle = {Privacy Technologies and Policy - 10th Annual Privacy Forum, {APF} 2022, Warsaw, Poland, June 23-24, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13279}, pages = {88--96}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07315-1\_6}, doi = {10.1007/978-3-031-07315-1\_6}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apf/Willemson22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eicc/VakarjukSW22, author = {Jelizaveta Vakarjuk and Nikita Snetkov and Jan Willemson}, editor = {David Meg{\'{\i}}as and Roberto Di Pietro and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Russian Federal Remote E-voting Scheme of 2021 - Protocol Description and Analysis}, booktitle = {{EICC} 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15 - 16, 2022}, pages = {29--35}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3528580.3528586}, doi = {10.1145/3528580.3528586}, timestamp = {Sun, 12 Nov 2023 02:15:04 +0100}, biburl = {https://dblp.org/rec/conf/eicc/VakarjukSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/VakarjukSW21, author = {Jelizaveta Vakarjuk and Nikita Snetkov and Jan Willemson}, title = {DiLizium: {A} Two-Party Lattice-Based Signature Scheme}, journal = {Entropy}, volume = {23}, number = {8}, pages = {989}, year = {2021}, url = {https://doi.org/10.3390/e23080989}, doi = {10.3390/E23080989}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/VakarjukSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etaa/HeibergKWV21, author = {Sven Heiberg and Kristjan Krips and Jan Willemson and Priit Vinkel}, editor = {Andrea Saracino and Paolo Mori}, title = {Facial Recognition for Remote Electronic Voting - Missing Piece of the Puzzle or Yet Another Liability?}, booktitle = {Emerging Technologies for Authorization and Authentication - 4th International Workshop, {ETAA} 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13136}, pages = {77--93}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93747-8\_6}, doi = {10.1007/978-3-030-93747-8\_6}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/etaa/HeibergKWV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/KoitmaeWV21, author = {Arne Koitm{\"{a}}e and Jan Willemson and Priit Vinkel}, editor = {Robert Krimmer and Melanie Volkamer and David Duenas{-}Cid and Oksana Kulyk and Peter B. R{\o}nne and Mihkel Solvak and Micha Germann}, title = {Vote Secrecy and Voter Feedback in Remote Voting - Can We Have Both?}, booktitle = {Electronic Voting - 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12900}, pages = {140--154}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86942-7\_10}, doi = {10.1007/978-3-030-86942-7\_10}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/KoitmaeWV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HeibergKW21, author = {Sven Heiberg and Kristjan Krips and Jan Willemson}, editor = {Matthew Bernhard and Andrea Bracciali and Lewis Gudgeon and Thomas Haines and Ariah Klages{-}Mundt and Shin'ichiro Matsuo and Daniel Perez and Massimiliano Sala and Sam Werner}, title = {Mobile Voting - Still Too Risky?}, booktitle = {Financial Cryptography and Data Security. {FC} 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12676}, pages = {263--278}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-63958-0\_23}, doi = {10.1007/978-3-662-63958-0\_23}, timestamp = {Wed, 27 Oct 2021 09:25:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/HeibergKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/FarzaliyevWK21, author = {Valeh Farzaliyev and Jan Willemson and Jaan Kristjan Kaasik}, editor = {Jong Hwan Park and Seung{-}Hyun Seo}, title = {Improved Lattice-Based Mix-Nets for Electronic Voting}, booktitle = {Information Security and Cryptology - {ICISC} 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13218}, pages = {119--136}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-08896-4\_6}, doi = {10.1007/978-3-031-08896-4\_6}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/FarzaliyevWK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/FarzaliyevKW21, author = {Valeh Farzaliyev and Kristjan Krips and Jan Willemson}, editor = {Chih{-}Cheng Hung and Jiman Hong and Alessio Bechini and Eunjee Song}, title = {Developing a Personal Voting Machine for the Estonian Internet Voting System}, booktitle = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}, pages = {1607--1616}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3412841.3442034}, doi = {10.1145/3412841.3442034}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/FarzaliyevKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-01994, author = {Bingsheng Zhang and Zengpeng Li and Jan Willemson}, title = {{UC} Modelling and Security Analysis of the Estonian {IVXV} Internet Voting System}, journal = {CoRR}, volume = {abs/2109.01994}, year = {2021}, url = {https://arxiv.org/abs/2109.01994}, eprinttype = {arXiv}, eprint = {2109.01994}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-01994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeibergKW21, author = {Sven Heiberg and Kristjan Krips and Jan Willemson}, title = {Mobile Voting - Still Too Risky?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {787}, year = {2021}, url = {https://eprint.iacr.org/2021/787}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeibergKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeibergKWV21, author = {Sven Heiberg and Kristjan Krips and Jan Willemson and Priit Vinkel}, title = {Facial Recognition for Remote Electronic Voting {\^{a}}{\mbox{\texteuro}}" Missing Piece of the Puzzle or Yet Another Liability?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1143}, year = {2021}, url = {https://eprint.iacr.org/2021/1143}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeibergKWV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VakarjukSW21, author = {Jelizaveta Vakarjuk and Nikita Snetkov and Jan Willemson}, title = {Russian Federal Remote E-voting Scheme of 2021 - Protocol Description and Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1454}, year = {2021}, url = {https://eprint.iacr.org/2021/1454}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/VakarjukSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarzaliyevWK21, author = {Valeh Farzaliyev and Jan Willemson and Jaan Kristjan Kaasik}, title = {Improved Lattice-Based Mix-Nets for Electronic Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1499}, year = {2021}, url = {https://eprint.iacr.org/2021/1499}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FarzaliyevWK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PankovaW21, author = {Alisa Pankova and Jan Willemson}, title = {Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1501}, year = {2021}, url = {https://eprint.iacr.org/2021/1501}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PankovaW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/balt/OruaasW20, author = {Mart Oruaas and Jan Willemson}, editor = {Tarmo Robal and Hele{-}Mai Haav and Jaan Penjam and Raimundas Matulevicius}, title = {Developing Requirements for the New Encryption Mechanisms in the Estonian eID Infrastructure}, booktitle = {Databases and Information Systems - 14th International Baltic Conference, DB{\&}IS 2020, Tallinn, Estonia, June 16-19, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1243}, pages = {13--20}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57672-1\_2}, doi = {10.1007/978-3-030-57672-1\_2}, timestamp = {Thu, 13 Aug 2020 16:27:57 +0200}, biburl = {https://dblp.org/rec/conf/balt/OruaasW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Willemson19, author = {Jan Willemson}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {How Not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Application}, booktitle = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, pages = {111--121}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42048-2\_8}, doi = {10.1007/978-3-030-42048-2\_8}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Willemson19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KripsWV19, author = {Kristjan Krips and Jan Willemson and Sebastian V{\"{a}}rv}, title = {Is Your Vote Overheard? {A} New Scalable Side-Channel Attack Against Paper Voting}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {621--634}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00051}, doi = {10.1109/EUROSP.2019.00051}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/KripsWV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/KripsW19, author = {Kristjan Krips and Jan Willemson}, editor = {Robert Krimmer and Melanie Volkamer and V{\'{e}}ronique Cortier and Bernhard Beckert and Ralf K{\"{u}}sters and Uwe Serd{\"{u}}lt and David Duenas{-}Cid}, title = {On Practical Aspects of Coercion-Resistant Remote Voting Systems}, booktitle = {Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11759}, pages = {216--232}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30625-0\_14}, doi = {10.1007/978-3-030-30625-0\_14}, timestamp = {Sun, 02 Oct 2022 16:16:57 +0200}, biburl = {https://dblp.org/rec/conf/voteid/KripsW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Willemson18, author = {Jan Willemson}, title = {Bits or paper: Which should get to carry your vote?}, journal = {J. Inf. Secur. Appl.}, volume = {38}, pages = {124--131}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2017.11.007}, doi = {10.1016/J.JISA.2017.11.007}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Willemson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/KripsWV18, author = {Kristjan Krips and Jan Willemson and Sebastian V{\"{a}}rv}, editor = {Robert Krimmer and Melanie Volkamer and V{\'{e}}ronique Cortier and Rajeev Gor{\'{e}} and Manik Hapsara and Uwe Serd{\"{u}}lt and David Duenas{-}Cid}, title = {Implementing an Audio Side Channel for Paper Voting}, booktitle = {Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11143}, pages = {132--145}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00419-4\_9}, doi = {10.1007/978-3-030-00419-4\_9}, timestamp = {Sun, 02 Oct 2022 16:16:57 +0200}, biburl = {https://dblp.org/rec/conf/voteid/KripsWV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeibergKSW18, author = {Sven Heiberg and Ivo Kubjas and Janno Siim and Jan Willemson}, title = {On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {685}, year = {2018}, url = {https://eprint.iacr.org/2018/685}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeibergKSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BuldasLWC17, author = {Ahto Buldas and Aleksandr Lenin and Jan Willemson and Anton Charnamord}, editor = {Satoshi Obana and Koji Chida}, title = {Simple Infeasibility Certificates for Attack Trees}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {39--55}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_3}, doi = {10.1007/978-3-319-64200-0\_3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/BuldasLWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/FreudenthalW17, author = {Margus Freudenthal and Jan Willemson}, editor = {Pooya Farshim and Emil Simion}, title = {Challenges of Federating National Data Access Infrastructures}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {104--114}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_8}, doi = {10.1007/978-3-319-69284-5\_8}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/secitc/FreudenthalW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/Willemson17, author = {Jan Willemson}, editor = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann}, title = {Bits or Paper: Which Should Get to Carry Your Vote?}, booktitle = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10615}, pages = {292--305}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68687-5\_18}, doi = {10.1007/978-3-319-68687-5\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/Willemson17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/KubjasPW17, author = {Ivo Kubjas and Tiit Pikma and Jan Willemson}, editor = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann}, title = {Estonian Voting Verification Mechanism Revisited Again}, booktitle = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10615}, pages = {306--317}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68687-5\_19}, doi = {10.1007/978-3-319-68687-5\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/KubjasPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KubjasPW17, author = {Ivo Kubjas and Tiit Pikma and Jan Willemson}, title = {Estonian Voting Verification Mechanism Revisited Again}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2017}, url = {http://eprint.iacr.org/2017/081}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KubjasPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YiBGSW16, author = {Xun Yi and Athman Bouguettaya and Dimitrios Georgakopoulos and Andy Song and Jan Willemson}, title = {Privacy Protection for Wireless Medical Sensor Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {3}, pages = {369--380}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2406699}, doi = {10.1109/TDSC.2015.2406699}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YiBGSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DimitrovKKRW16, author = {Vassil S. Dimitrov and Liisi Kerik and Toomas Krips and Jaak Randmets and Jan Willemson}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Alternative Implementations of Secure Real Numbers}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {553--564}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978348}, doi = {10.1145/2976749.2978348}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DimitrovKKRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/HeibergMVW16, author = {Sven Heiberg and Tarvi Martens and Priit Vinkel and Jan Willemson}, editor = {Robert Krimmer and Melanie Volkamer and Jordi Barrat and Josh Benaloh and Nicole J. Goodman and Peter Y. A. Ryan and Vanessa Teague}, title = {Improving the Verifiability of the Estonian Internet Voting Scheme}, booktitle = {Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10141}, pages = {92--107}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-52240-1\_6}, doi = {10.1007/978-3-319-52240-1\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/voteid/HeibergMVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DimitrovKKRW16, author = {Vassil S. Dimitrov and Liisi Kerik and Toomas Krips and Jaak Randmets and Jan Willemson}, title = {Alternative Implementations of Secure Real Numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {773}, year = {2016}, url = {http://eprint.iacr.org/2016/773}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DimitrovKKRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KammW15, author = {Liina Kamm and Jan Willemson}, title = {Secure floating point arithmetic and private satellite collision analysis}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {6}, pages = {531--548}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0271-8}, doi = {10.1007/S10207-014-0271-8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KammW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ProbstWP15, author = {Christian W. Probst and Jan Willemson and Wolter Pieters}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {The Attack Navigator}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {1--17}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_1}, doi = {10.1007/978-3-319-29968-6\_1}, timestamp = {Thu, 23 Sep 2021 11:47:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/ProbstWP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/KripsW15, author = {Toomas Krips and Jan Willemson}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Evangelos Kranakis and Guillaume Bonfante}, title = {Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation}, booktitle = {Foundations and Practice of Security - 8th International Symposium, {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9482}, pages = {66--82}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30303-1\_5}, doi = {10.1007/978-3-319-30303-1\_5}, timestamp = {Fri, 27 Dec 2019 21:23:06 +0100}, biburl = {https://dblp.org/rec/conf/fps/KripsW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LeninWC15, author = {Aleksandr Lenin and Jan Willemson and Anton Charnamord}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Genetic Approximations for the Failure-Free Security Games}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {311--321}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_17}, doi = {10.1007/978-3-319-25594-1\_17}, timestamp = {Thu, 17 Sep 2020 10:44:10 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LeninWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/HeibergPW15, author = {Sven Heiberg and Arnis Parsovs and Jan Willemson}, editor = {Rolf Haenni and Reto E. Koenig and Douglas Wikstr{\"{o}}m}, title = {Log Analysis of Estonian Internet Voting 2013-2014}, booktitle = {E-Voting and Identity - 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9269}, pages = {19--34}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22270-7\_2}, doi = {10.1007/978-3-319-22270-7\_2}, timestamp = {Thu, 27 Feb 2020 12:57:39 +0100}, biburl = {https://dblp.org/rec/conf/voteid/HeibergPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeibergPW15, author = {Sven Heiberg and Arnis Parsovs and Jan Willemson}, title = {Log Analysis of Estonian Internet Voting 2013-2015}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1211}, year = {2015}, url = {http://eprint.iacr.org/2015/1211}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeibergPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/BogdanovKLPTW14, author = {Dan Bogdanov and Liina Kamm and Sven Laur and Pille Pruulmann{-}Vengerfeldt and Riivo Talviste and Jan Willemson}, editor = {Bart Preneel and Demosthenes Ikonomou}, title = {Privacy-Preserving Statistical Data Analysis on Federated Databases}, booktitle = {Privacy Technologies and Policy - Second Annual Privacy Forum, {APF} 2014, Athens, Greece, May 20-21, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8450}, pages = {30--55}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06749-0\_3}, doi = {10.1007/978-3-319-06749-0\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apf/BogdanovKLPTW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/HeibergW14, author = {Sven Heiberg and Jan Willemson}, editor = {Robert Krimmer and Melanie Volkamer}, title = {Verifiable internet voting in Estonia}, booktitle = {6th International Conference on Electronic Voting: Verifying the Vote, {EVOTE} 2014, Lochau / Bregenz, Austria, October 29-31, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/EVOTE.2014.7001135}, doi = {10.1109/EVOTE.2014.7001135}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/HeibergW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/LaudW14, author = {Peeter Laud and Jan Willemson}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood and Philip W. L. Fong}, title = {Composable Oblivious Extended Permutations}, booktitle = {Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8930}, pages = {294--310}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17040-4\_19}, doi = {10.1007/978-3-319-17040-4\_19}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/LaudW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KripsW14, author = {Toomas Krips and Jan Willemson}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {179--197}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_11}, doi = {10.1007/978-3-319-13257-0\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/KripsW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LeninWS14, author = {Aleksandr Lenin and Jan Willemson and Dyan Permata Sari}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Attacker Profiling in Quantitative Security Assessment Based on Attack Trees}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {199--212}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_12}, doi = {10.1007/978-3-319-11599-3\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/LeninWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BogdanovEJKMW14, author = {Dan Bogdanov and Keita Emura and Roman Jagom{\"{a}}gis and Akira Kanaoka and Shin'ichiro Matsuo and Jan Willemson}, editor = {David Naccache and Damien Sauveron}, title = {A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {108--123}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_8}, doi = {10.1007/978-3-662-43826-8\_8}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BogdanovEJKMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KripsW14, author = {Toomas Krips and Jan Willemson}, title = {Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2014}, url = {http://eprint.iacr.org/2014/221}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KripsW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaudW14, author = {Peeter Laud and Jan Willemson}, title = {Composable Oblivious Extended Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2014}, url = {http://eprint.iacr.org/2014/400}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaudW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LaurTW13, author = {Sven Laur and Riivo Talviste and Jan Willemson}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {From Oblivious {AES} to Efficient and Secure Database Join in the Multiparty Setting}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {84--101}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_6}, doi = {10.1007/978-3-642-38980-1\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LaurTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/AnsperBFW13, author = {Arne Ansper and Ahto Buldas and Margus Freudenthal and Jan Willemson}, editor = {Eric A. M. Luiijf and Pieter H. Hartel}, title = {Protecting a Federated Database Infrastructure against Denial-of-Service Attacks}, booktitle = {Critical Information Infrastructures Security - 8th International Workshop, {CRITIS} 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8328}, pages = {26--37}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03964-0\_3}, doi = {10.1007/978-3-319-03964-0\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/AnsperBFW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/YiMBW13, author = {Xun Yi and Yuan Miao and Elisa Bertino and Jan Willemson}, title = {Multiparty privacy protection for electronic health records}, booktitle = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta, GA, USA, December 9-13, 2013}, pages = {2730--2735}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GLOCOM.2013.6831487}, doi = {10.1109/GLOCOM.2013.6831487}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/YiMBW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AnsperBFW13, author = {Arne Ansper and Ahto Buldas and Margus Freudenthal and Jan Willemson}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {High-Performance Qualified Digital Signatures for X-Road}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {123--138}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_9}, doi = {10.1007/978-3-642-41488-6\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AnsperBFW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YiWN13, author = {Xun Yi and Jan Willemson and Farid Na{\"{\i}}t{-}Abdesselam}, title = {Privacy-Preserving Wireless Medical Sensor Network}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {118--125}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.19}, doi = {10.1109/TRUSTCOM.2013.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YiWN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaurTW13, author = {Sven Laur and Riivo Talviste and Jan Willemson}, title = {From oblivious {AES} to efficient and secure database join in the multiparty setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2013}, url = {http://eprint.iacr.org/2013/203}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaurTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaudW13, author = {Peeter Laud and Jan Willemson}, title = {Universally composable privacy preserving finite automata execution with low online and offline complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {678}, year = {2013}, url = {http://eprint.iacr.org/2013/678}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaudW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KammW13, author = {Liina Kamm and Jan Willemson}, title = {Secure Floating-Point Arithmetic and Private Satellite Collision Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {850}, year = {2013}, url = {http://eprint.iacr.org/2013/850}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KammW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BogdanovNTW12, author = {Dan Bogdanov and Margus Niitsoo and Tomas Toft and Jan Willemson}, title = {High-performance secure multi-party computation for data mining applications}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {6}, pages = {403--418}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0177-2}, doi = {10.1007/S10207-012-0177-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BogdanovNTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BogdanovTW12, author = {Dan Bogdanov and Riivo Talviste and Jan Willemson}, editor = {Angelos D. Keromytis}, title = {Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {57--64}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_5}, doi = {10.1007/978-3-642-32946-3\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BogdanovTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egov/Willemson11, author = {Jan Willemson}, editor = {Kim Normann Andersen and Enrico Francesconi and {\AA}ke Gr{\"{o}}nlund and Tom M. van Engers}, title = {Pseudonymization Service for X-Road eGovernment Data Exchange Layer}, booktitle = {Electronic Government and the Information Systems Perspective - Second International Conference, {EGOVIS} 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6866}, pages = {135--145}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22961-9\_11}, doi = {10.1007/978-3-642-22961-9\_11}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/egov/Willemson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LaurWZ11, author = {Sven Laur and Jan Willemson and Bingsheng Zhang}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {Round-Efficient Oblivious Database Manipulation}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {262--277}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_18}, doi = {10.1007/978-3-642-24861-0\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/LaurWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/HeibergLW11, author = {Sven Heiberg and Peeter Laud and Jan Willemson}, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {The Application of I-Voting for Estonian Parliamentary Elections of 2011}, booktitle = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, pages = {208--223}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32747-6\_13}, doi = {10.1007/978-3-642-32747-6\_13}, timestamp = {Thu, 27 Feb 2020 12:57:38 +0100}, biburl = {https://dblp.org/rec/conf/voteid/HeibergLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaurWZ11, author = {Sven Laur and Jan Willemson and Bingsheng Zhang}, title = {Round-efficient Oblivious Database Manipulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {429}, year = {2011}, url = {http://eprint.iacr.org/2011/429}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaurWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovTW11, author = {Dan Bogdanov and Riivo Talviste and Jan Willemson}, title = {Deploying secure multi-party computation for financial data analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {662}, year = {2011}, url = {http://eprint.iacr.org/2011/662}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Willemson10, author = {Jan Willemson}, title = {Extending the Gordon and Loeb Model for Information Security Investment}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {258--261}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.37}, doi = {10.1109/ARES.2010.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Willemson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JurgensonW10, author = {Aivo J{\"{u}}rgenson and Jan Willemson}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {On Fast and Approximate Attack Tree Computations}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {56--66}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_5}, doi = {10.1007/978-3-642-12827-1\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/JurgensonW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/JurgensonW09, author = {Aivo J{\"{u}}rgenson and Jan Willemson}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Serial Model for Attack Tree Computations}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {118--128}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_9}, doi = {10.1007/978-3-642-14423-3\_9}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/JurgensonW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/WillemsonA08, author = {Jan Willemson and Arne Ansper}, title = {A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {572--577}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.90}, doi = {10.1109/ARES.2008.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/WillemsonA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BogdanovLW08, author = {Dan Bogdanov and Sven Laur and Jan Willemson}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Sharemind: {A} Framework for Fast Privacy-Preserving Computations}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {192--206}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_13}, doi = {10.1007/978-3-540-88313-5\_13}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BogdanovLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/JurgensonW08, author = {Aivo J{\"{u}}rgenson and Jan Willemson}, editor = {Robert Meersman and Zahir Tari}, title = {Computing Exact Outcomes of Multi-parameter Attack Trees}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5332}, pages = {1036--1051}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88873-4\_8}, doi = {10.1007/978-3-540-88873-4\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/JurgensonW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovLW08, author = {Dan Bogdanov and Sven Laur and Jan Willemson}, title = {Sharemind: a framework for fast privacy-preserving computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2008}, url = {http://eprint.iacr.org/2008/289}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JurgensonW07, author = {Aivo J{\"{u}}rgenson and Jan Willemson}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Processing Multi-parameter Attacktrees with Estimated Parameter Values}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {308--319}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_21}, doi = {10.1007/978-3-540-75651-4\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JurgensonW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/BuldasLPSW06, author = {Ahto Buldas and Peeter Laud and Jaan Priisalu and M{\"{a}}rt Saarepera and Jan Willemson}, editor = {Javier L{\'{o}}pez}, title = {Rational Choice of Security Measures Via Multi-parameter Attack Trees}, booktitle = {Critical Information Infrastructures Security, First International Workshop, {CRITIS} 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {4347}, pages = {235--248}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11962977\_19}, doi = {10.1007/11962977\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/BuldasLPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/Willemson06, author = {Jan Willemson}, title = {On the Gordon {\&} Loeb Model for Information Security Investment}, booktitle = {5th Annual Workshop on the Economics of Information Security, {WEIS} 2006, Robinson College, University of Cambridge, England, UK, June 26-28, 2006}, year = {2006}, url = {http://weis2006.econinfosec.org/docs/12.pdf}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weis/Willemson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BuldasLSW05, author = {Ahto Buldas and Peeter Laud and M{\"{a}}rt Saarepera and Jan Willemson}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Universally Composable Time-Stamping Schemes with Audit}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {359--373}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_26}, doi = {10.1007/11556992\_26}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BuldasLSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuldasLSW05, author = {Ahto Buldas and Peeter Laud and M{\"{a}}rt Saarepera and Jan Willemson}, title = {Universally Composable Time-Stamping Schemes with Audit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2005}, url = {http://eprint.iacr.org/2005/198}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BuldasLSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/KruusmaaW03, author = {Maarja Kruusmaa and Jan Willemson}, title = {Covering the path space: a casebase analysis for mobile robot path planning}, journal = {Knowl. Based Syst.}, volume = {16}, number = {5-6}, pages = {235--242}, year = {2003}, url = {https://doi.org/10.1016/S0950-7051(03)00024-8}, doi = {10.1016/S0950-7051(03)00024-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/KruusmaaW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AnsperBFW03, author = {Arne Ansper and Ahto Buldas and Margus Freudenthal and Jan Willemson}, title = {Scalable and Efficient {PKI} for Inter-Organizational Communication}, booktitle = {19th Annual Computer Security Applications Conference {(ACSAC} 2003), 8-12 December 2003, Las Vegas, NV, {USA}}, pages = {308--318}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSAC.2003.1254335}, doi = {10.1109/CSAC.2003.1254335}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AnsperBFW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/balt/RoosBW02, author = {Meelis Roos and Ahto Buldas and Jan Willemson}, editor = {Hele{-}Mai Haav and Ahto Kalja}, title = {Undeniable Replies for Database Queries}, booktitle = {Proceedings of the Baltic Conference, BalticDB{\&}IS 2002, Tallinn, Estonia, Volume 2}, pages = {215--226}, publisher = {Institute of Cybernetics at Tallin Technical University}, year = {2002}, timestamp = {Sat, 07 Jul 2018 14:03:18 +0200}, biburl = {https://dblp.org/rec/conf/balt/RoosBW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/balt/WillemsonHP02, author = {Jan Willemson and Kristo Heero and Uuno Puus}, editor = {Hele{-}Mai Haav and Ahto Kalja}, title = {{XML} Based Document Management in Estonian Legislative System}, booktitle = {Proceedings of the Baltic Conference, BalticDB{\&}IS 2002, Tallinn, Estonia, Volume 1}, pages = {321--330}, publisher = {Institute of Cybernetics at Tallin Technical University}, year = {2002}, timestamp = {Sat, 07 Jul 2018 14:03:11 +0200}, biburl = {https://dblp.org/rec/conf/balt/WillemsonHP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AnsperBSW01, author = {Arne Ansper and Ahto Buldas and M{\"{a}}rt Saarepera and Jan Willemson}, editor = {Vijay Varadharajan and Yi Mu}, title = {Improving the Availability of Time-Stamping Services}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {360--375}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_29}, doi = {10.1007/3-540-47719-5\_29}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AnsperBSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AnsperBRW01, author = {Arne Ansper and Ahto Buldas and Meelis Roos and Jan Willemson}, editor = {Kwangjo Kim}, title = {Efficient Long-Term Validation of Digital Signatures}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {402--415}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_29}, doi = {10.1007/3-540-44586-2\_29}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AnsperBRW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FreudenthalHW00, author = {Margus Freudenthal and Sven Heiberg and Jan Willemson}, title = {Personal Security Environment on Palm {PDA}}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {366--372}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898891}, doi = {10.1109/ACSAC.2000.898891}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FreudenthalHW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-9909012, author = {Jan Willemson}, title = {Certificate Revocation Paradigms}, journal = {CoRR}, volume = {cs.CR/9909012}, year = {1999}, url = {https://arxiv.org/abs/cs/9909012}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-9909012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BuldasLLV98, author = {Ahto Buldas and Peeter Laud and Helger Lipmaa and Jan Willemson}, editor = {Hugo Krawczyk}, title = {Time-Stamping with Binary Linking Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {486--501}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055749}, doi = {10.1007/BFB0055749}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BuldasLLV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.