BibTeX records: Jan Willemson

download as .bib file

@article{DBLP:journals/iet-ifs/FarzaliyevWK23,
  author       = {Valeh Farzaliyev and
                  Jan Willemson and
                  Jaan Kristjan Kaasik},
  title        = {Improved lattice-based mix-nets for electronic voting},
  journal      = {{IET} Inf. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {18--34},
  year         = {2023},
  url          = {https://doi.org/10.1049/ise2.12089},
  doi          = {10.1049/ISE2.12089},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/FarzaliyevWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Willemson23,
  author       = {Jan Willemson},
  title        = {Creating a Decryption Proof Verifier for the Estonian Internet Voting
                  System},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {58:1--58:7},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605467},
  doi          = {10.1145/3600160.3605467},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Willemson23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KripsSVW23,
  author       = {Kristjan Krips and
                  Nikita Snetkov and
                  Jelizaveta Vakarjuk and
                  Jan Willemson},
  editor       = {Sokratis K. Katsikas and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Rita Maria Ugarelli and
                  Isabel Pra{\c{c}}a and
                  Wenjuan Li and
                  Weizhi Meng and
                  Steven Furnell and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla and
                  Michele Ianni and
                  Mila Dalla Preda and
                  Kim{-}Kwang Raymond Choo and
                  Miguel Pupo Correia and
                  Abhishta Abhishta and
                  Giovanni Sileno and
                  Mina Alishahi and
                  Harsha K. Kalutarage and
                  Naoto Yanai},
  title        = {Trust Assumptions in Voting Systems},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP,
                  ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The
                  Netherlands, September 25-29, 2023, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14399},
  pages        = {309--329},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54129-2\_18},
  doi          = {10.1007/978-3-031-54129-2\_18},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KripsSVW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/Willemson23,
  author       = {Jan Willemson},
  editor       = {Kurt Schneider and
                  Fabiano Dalpiaz and
                  Jennifer Horkoff},
  title        = {Analysis of Information Security Measures Embedded in the {GDPR}},
  booktitle    = {31st {IEEE} International Requirements Engineering Conference, {RE}
                  2023 - Workshops, Hannover, Germany, September 4-5, 2023},
  pages        = {214--217},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/REW57809.2023.00043},
  doi          = {10.1109/REW57809.2023.00043},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/Willemson23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Willemson23,
  author       = {Jan Willemson},
  editor       = {Ruben Rios and
                  Joachim Posegga},
  title        = {Analyzing and Improving Eligibility Verifiability of the Proposed
                  Belgian Remote Voting System},
  booktitle    = {Security and Trust Management - 19th International Workshop, {STM}
                  2023, The Hague, The Netherlands, September 28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14336},
  pages        = {126--135},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47198-8\_8},
  doi          = {10.1007/978-3-031-47198-8\_8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/Willemson23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ubisec/MuzikantW23,
  author       = {Petr Muzikant and
                  Jan Willemson},
  editor       = {Guojun Wang and
                  Haozhe Wang and
                  Geyong Min and
                  Nektarios Georgalas and
                  Weizhi Meng},
  title        = {Deploying Post-quantum Algorithms in Existing Applications and Embedded
                  Devices},
  booktitle    = {Ubiquitous Security - Third International Conference, UbiSec 2023,
                  Exeter, UK, November 1-3, 2023, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {2034},
  pages        = {147--162},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-1274-8\_10},
  doi          = {10.1007/978-981-97-1274-8\_10},
  timestamp    = {Wed, 17 Apr 2024 16:38:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ubisec/MuzikantW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-09411,
  author       = {Jan Willemson},
  title        = {Analyzing and Improving Eligibility Verifiability of the Proposed
                  Belgian Remote Voting System},
  journal      = {CoRR},
  volume       = {abs/2305.09411},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.09411},
  doi          = {10.48550/ARXIV.2305.09411},
  eprinttype    = {arXiv},
  eprint       = {2305.09411},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-09411.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-10391,
  author       = {Kristjan Krips and
                  Nikita Snetkov and
                  Jelizaveta Vakarjuk and
                  Jan Willemson},
  title        = {Trust assumptions in voting systems},
  journal      = {CoRR},
  volume       = {abs/2309.10391},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.10391},
  doi          = {10.48550/ARXIV.2309.10391},
  eprinttype    = {arXiv},
  eprint       = {2309.10391},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-10391.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/giq/EhinSWV22,
  author       = {Piret Ehin and
                  Mihkel Solvak and
                  Jan Willemson and
                  Priit Vinkel},
  title        = {Internet voting in Estonia 2005-2019: Evidence from eleven elections},
  journal      = {Gov. Inf. Q.},
  volume       = {39},
  number       = {4},
  pages        = {101718},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.giq.2022.101718},
  doi          = {10.1016/J.GIQ.2022.101718},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/giq/EhinSWV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PankovaW22,
  author       = {Alisa Pankova and
                  Jan Willemson},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance
                  in Voting Protocols},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {313--333},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_16},
  doi          = {10.1007/978-3-031-09234-3\_16},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/PankovaW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/Willemson22,
  author       = {Jan Willemson},
  editor       = {Agnieszka Gryszczynska and
                  Przemyslaw Polanski and
                  Nils Gruschka and
                  Kai Rannenberg and
                  Monika Adamczyk},
  title        = {Fifty Shades of Personal Data - Partial Re-identification and {GDPR}},
  booktitle    = {Privacy Technologies and Policy - 10th Annual Privacy Forum, {APF}
                  2022, Warsaw, Poland, June 23-24, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13279},
  pages        = {88--96},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07315-1\_6},
  doi          = {10.1007/978-3-031-07315-1\_6},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apf/Willemson22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eicc/VakarjukSW22,
  author       = {Jelizaveta Vakarjuk and
                  Nikita Snetkov and
                  Jan Willemson},
  editor       = {David Meg{\'{\i}}as and
                  Roberto Di Pietro and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Russian Federal Remote E-voting Scheme of 2021 - Protocol Description
                  and Analysis},
  booktitle    = {{EICC} 2022: European Interdisciplinary Cybersecurity Conference,
                  Barcelona, Spain, June 15 - 16, 2022},
  pages        = {29--35},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3528580.3528586},
  doi          = {10.1145/3528580.3528586},
  timestamp    = {Sun, 12 Nov 2023 02:15:04 +0100},
  biburl       = {https://dblp.org/rec/conf/eicc/VakarjukSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/VakarjukSW21,
  author       = {Jelizaveta Vakarjuk and
                  Nikita Snetkov and
                  Jan Willemson},
  title        = {DiLizium: {A} Two-Party Lattice-Based Signature Scheme},
  journal      = {Entropy},
  volume       = {23},
  number       = {8},
  pages        = {989},
  year         = {2021},
  url          = {https://doi.org/10.3390/e23080989},
  doi          = {10.3390/E23080989},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/VakarjukSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etaa/HeibergKWV21,
  author       = {Sven Heiberg and
                  Kristjan Krips and
                  Jan Willemson and
                  Priit Vinkel},
  editor       = {Andrea Saracino and
                  Paolo Mori},
  title        = {Facial Recognition for Remote Electronic Voting - Missing Piece of
                  the Puzzle or Yet Another Liability?},
  booktitle    = {Emerging Technologies for Authorization and Authentication - 4th International
                  Workshop, {ETAA} 2021, Darmstadt, Germany, October 8, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13136},
  pages        = {77--93},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93747-8\_6},
  doi          = {10.1007/978-3-030-93747-8\_6},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/etaa/HeibergKWV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/KoitmaeWV21,
  author       = {Arne Koitm{\"{a}}e and
                  Jan Willemson and
                  Priit Vinkel},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  David Duenas{-}Cid and
                  Oksana Kulyk and
                  Peter B. R{\o}nne and
                  Mihkel Solvak and
                  Micha Germann},
  title        = {Vote Secrecy and Voter Feedback in Remote Voting - Can We Have Both?},
  booktitle    = {Electronic Voting - 6th International Joint Conference, E-Vote-ID
                  2021, Virtual Event, October 5-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12900},
  pages        = {140--154},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86942-7\_10},
  doi          = {10.1007/978-3-030-86942-7\_10},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/KoitmaeWV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HeibergKW21,
  author       = {Sven Heiberg and
                  Kristjan Krips and
                  Jan Willemson},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  Lewis Gudgeon and
                  Thomas Haines and
                  Ariah Klages{-}Mundt and
                  Shin'ichiro Matsuo and
                  Daniel Perez and
                  Massimiliano Sala and
                  Sam Werner},
  title        = {Mobile Voting - Still Too Risky?},
  booktitle    = {Financial Cryptography and Data Security. {FC} 2021 International
                  Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March
                  5, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12676},
  pages        = {263--278},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-63958-0\_23},
  doi          = {10.1007/978-3-662-63958-0\_23},
  timestamp    = {Wed, 27 Oct 2021 09:25:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HeibergKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/FarzaliyevWK21,
  author       = {Valeh Farzaliyev and
                  Jan Willemson and
                  Jaan Kristjan Kaasik},
  editor       = {Jong Hwan Park and
                  Seung{-}Hyun Seo},
  title        = {Improved Lattice-Based Mix-Nets for Electronic Voting},
  booktitle    = {Information Security and Cryptology - {ICISC} 2021 - 24th International
                  Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13218},
  pages        = {119--136},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-08896-4\_6},
  doi          = {10.1007/978-3-031-08896-4\_6},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/FarzaliyevWK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/FarzaliyevKW21,
  author       = {Valeh Farzaliyev and
                  Kristjan Krips and
                  Jan Willemson},
  editor       = {Chih{-}Cheng Hung and
                  Jiman Hong and
                  Alessio Bechini and
                  Eunjee Song},
  title        = {Developing a Personal Voting Machine for the Estonian Internet Voting
                  System},
  booktitle    = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual
                  Event, Republic of Korea, March 22-26, 2021},
  pages        = {1607--1616},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3412841.3442034},
  doi          = {10.1145/3412841.3442034},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/FarzaliyevKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-01994,
  author       = {Bingsheng Zhang and
                  Zengpeng Li and
                  Jan Willemson},
  title        = {{UC} Modelling and Security Analysis of the Estonian {IVXV} Internet
                  Voting System},
  journal      = {CoRR},
  volume       = {abs/2109.01994},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.01994},
  eprinttype    = {arXiv},
  eprint       = {2109.01994},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-01994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeibergKW21,
  author       = {Sven Heiberg and
                  Kristjan Krips and
                  Jan Willemson},
  title        = {Mobile Voting - Still Too Risky?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {787},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/787},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeibergKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeibergKWV21,
  author       = {Sven Heiberg and
                  Kristjan Krips and
                  Jan Willemson and
                  Priit Vinkel},
  title        = {Facial Recognition for Remote Electronic Voting {\^{a}}{\mbox{\texteuro}}"
                  Missing Piece of the Puzzle or Yet Another Liability?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1143},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1143},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeibergKWV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VakarjukSW21,
  author       = {Jelizaveta Vakarjuk and
                  Nikita Snetkov and
                  Jan Willemson},
  title        = {Russian Federal Remote E-voting Scheme of 2021 - Protocol Description
                  and Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1454},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1454},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/VakarjukSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarzaliyevWK21,
  author       = {Valeh Farzaliyev and
                  Jan Willemson and
                  Jaan Kristjan Kaasik},
  title        = {Improved Lattice-Based Mix-Nets for Electronic Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1499},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1499},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FarzaliyevWK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PankovaW21,
  author       = {Alisa Pankova and
                  Jan Willemson},
  title        = {Relations between Privacy, Verifiability, Accountability and Coercion-Resistance
                  in Voting Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1501},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1501},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PankovaW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/balt/OruaasW20,
  author       = {Mart Oruaas and
                  Jan Willemson},
  editor       = {Tarmo Robal and
                  Hele{-}Mai Haav and
                  Jaan Penjam and
                  Raimundas Matulevicius},
  title        = {Developing Requirements for the New Encryption Mechanisms in the Estonian
                  eID Infrastructure},
  booktitle    = {Databases and Information Systems - 14th International Baltic Conference,
                  DB{\&}IS 2020, Tallinn, Estonia, June 16-19, 2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1243},
  pages        = {13--20},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57672-1\_2},
  doi          = {10.1007/978-3-030-57672-1\_2},
  timestamp    = {Thu, 13 Aug 2020 16:27:57 +0200},
  biburl       = {https://dblp.org/rec/conf/balt/OruaasW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Willemson19,
  author       = {Jan Willemson},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Weizhi Meng and
                  Steven Furnell and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {How Not to Use a Privacy-Preserving Computation Platform: Case Study
                  of a Voting Application},
  booktitle    = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS,
                  SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27,
                  2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11980},
  pages        = {111--121},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42048-2\_8},
  doi          = {10.1007/978-3-030-42048-2\_8},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Willemson19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KripsWV19,
  author       = {Kristjan Krips and
                  Jan Willemson and
                  Sebastian V{\"{a}}rv},
  title        = {Is Your Vote Overheard? {A} New Scalable Side-Channel Attack Against
                  Paper Voting},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {621--634},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00051},
  doi          = {10.1109/EUROSP.2019.00051},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/KripsWV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/KripsW19,
  author       = {Kristjan Krips and
                  Jan Willemson},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  V{\'{e}}ronique Cortier and
                  Bernhard Beckert and
                  Ralf K{\"{u}}sters and
                  Uwe Serd{\"{u}}lt and
                  David Duenas{-}Cid},
  title        = {On Practical Aspects of Coercion-Resistant Remote Voting Systems},
  booktitle    = {Electronic Voting - 4th International Joint Conference, E-Vote-ID
                  2019, Bregenz, Austria, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11759},
  pages        = {216--232},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30625-0\_14},
  doi          = {10.1007/978-3-030-30625-0\_14},
  timestamp    = {Sun, 02 Oct 2022 16:16:57 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/KripsW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Willemson18,
  author       = {Jan Willemson},
  title        = {Bits or paper: Which should get to carry your vote?},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {38},
  pages        = {124--131},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2017.11.007},
  doi          = {10.1016/J.JISA.2017.11.007},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Willemson18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/KripsWV18,
  author       = {Kristjan Krips and
                  Jan Willemson and
                  Sebastian V{\"{a}}rv},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  V{\'{e}}ronique Cortier and
                  Rajeev Gor{\'{e}} and
                  Manik Hapsara and
                  Uwe Serd{\"{u}}lt and
                  David Duenas{-}Cid},
  title        = {Implementing an Audio Side Channel for Paper Voting},
  booktitle    = {Electronic Voting - Third International Joint Conference, E-Vote-ID
                  2018, Bregenz, Austria, October 2-5, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11143},
  pages        = {132--145},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00419-4\_9},
  doi          = {10.1007/978-3-030-00419-4\_9},
  timestamp    = {Sun, 02 Oct 2022 16:16:57 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/KripsWV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeibergKSW18,
  author       = {Sven Heiberg and
                  Ivo Kubjas and
                  Janno Siim and
                  Jan Willemson},
  title        = {On Trade-offs of Applying Block Chains for Electronic Voting Bulletin
                  Boards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {685},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/685},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeibergKSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BuldasLWC17,
  author       = {Ahto Buldas and
                  Aleksandr Lenin and
                  Jan Willemson and
                  Anton Charnamord},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Simple Infeasibility Certificates for Attack Trees},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {39--55},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_3},
  doi          = {10.1007/978-3-319-64200-0\_3},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/BuldasLWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/FreudenthalW17,
  author       = {Margus Freudenthal and
                  Jan Willemson},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Challenges of Federating National Data Access Infrastructures},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {104--114},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_8},
  doi          = {10.1007/978-3-319-69284-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/FreudenthalW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/Willemson17,
  author       = {Jan Willemson},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Nadja Braun Binder and
                  Norbert Kersting and
                  Olivier Pereira and
                  Carsten Sch{\"{u}}rmann},
  title        = {Bits or Paper: Which Should Get to Carry Your Vote?},
  booktitle    = {Electronic Voting - Second International Joint Conference, E-Vote-ID
                  2017, Bregenz, Austria, October 24-27, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10615},
  pages        = {292--305},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68687-5\_18},
  doi          = {10.1007/978-3-319-68687-5\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/Willemson17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/KubjasPW17,
  author       = {Ivo Kubjas and
                  Tiit Pikma and
                  Jan Willemson},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Nadja Braun Binder and
                  Norbert Kersting and
                  Olivier Pereira and
                  Carsten Sch{\"{u}}rmann},
  title        = {Estonian Voting Verification Mechanism Revisited Again},
  booktitle    = {Electronic Voting - Second International Joint Conference, E-Vote-ID
                  2017, Bregenz, Austria, October 24-27, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10615},
  pages        = {306--317},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68687-5\_19},
  doi          = {10.1007/978-3-319-68687-5\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/KubjasPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KubjasPW17,
  author       = {Ivo Kubjas and
                  Tiit Pikma and
                  Jan Willemson},
  title        = {Estonian Voting Verification Mechanism Revisited Again},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/081},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KubjasPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YiBGSW16,
  author       = {Xun Yi and
                  Athman Bouguettaya and
                  Dimitrios Georgakopoulos and
                  Andy Song and
                  Jan Willemson},
  title        = {Privacy Protection for Wireless Medical Sensor Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {3},
  pages        = {369--380},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2406699},
  doi          = {10.1109/TDSC.2015.2406699},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/YiBGSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DimitrovKKRW16,
  author       = {Vassil S. Dimitrov and
                  Liisi Kerik and
                  Toomas Krips and
                  Jaak Randmets and
                  Jan Willemson},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Alternative Implementations of Secure Real Numbers},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {553--564},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978348},
  doi          = {10.1145/2976749.2978348},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DimitrovKKRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/HeibergMVW16,
  author       = {Sven Heiberg and
                  Tarvi Martens and
                  Priit Vinkel and
                  Jan Willemson},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Jordi Barrat and
                  Josh Benaloh and
                  Nicole J. Goodman and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  title        = {Improving the Verifiability of the Estonian Internet Voting Scheme},
  booktitle    = {Electronic Voting - First International Joint Conference, E-Vote-ID
                  2016, Bregenz, Austria, October 18-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10141},
  pages        = {92--107},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-52240-1\_6},
  doi          = {10.1007/978-3-319-52240-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/HeibergMVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DimitrovKKRW16,
  author       = {Vassil S. Dimitrov and
                  Liisi Kerik and
                  Toomas Krips and
                  Jaak Randmets and
                  Jan Willemson},
  title        = {Alternative Implementations of Secure Real Numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {773},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/773},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DimitrovKKRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KammW15,
  author       = {Liina Kamm and
                  Jan Willemson},
  title        = {Secure floating point arithmetic and private satellite collision analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {6},
  pages        = {531--548},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0271-8},
  doi          = {10.1007/S10207-014-0271-8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KammW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ProbstWP15,
  author       = {Christian W. Probst and
                  Jan Willemson and
                  Wolter Pieters},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {The Attack Navigator},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_1},
  doi          = {10.1007/978-3-319-29968-6\_1},
  timestamp    = {Thu, 23 Sep 2021 11:47:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/ProbstWP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/KripsW15,
  author       = {Toomas Krips and
                  Jan Willemson},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Evangelos Kranakis and
                  Guillaume Bonfante},
  title        = {Point-Counting Method for Embarrassingly Parallel Evaluation in Secure
                  Computation},
  booktitle    = {Foundations and Practice of Security - 8th International Symposium,
                  {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9482},
  pages        = {66--82},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30303-1\_5},
  doi          = {10.1007/978-3-319-30303-1\_5},
  timestamp    = {Fri, 27 Dec 2019 21:23:06 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/KripsW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LeninWC15,
  author       = {Aleksandr Lenin and
                  Jan Willemson and
                  Anton Charnamord},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Genetic Approximations for the Failure-Free Security Games},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {311--321},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_17},
  doi          = {10.1007/978-3-319-25594-1\_17},
  timestamp    = {Thu, 17 Sep 2020 10:44:10 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LeninWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/HeibergPW15,
  author       = {Sven Heiberg and
                  Arnis Parsovs and
                  Jan Willemson},
  editor       = {Rolf Haenni and
                  Reto E. Koenig and
                  Douglas Wikstr{\"{o}}m},
  title        = {Log Analysis of Estonian Internet Voting 2013-2014},
  booktitle    = {E-Voting and Identity - 5th International Conference, VoteID 2015,
                  Bern, Switzerland, September 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9269},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22270-7\_2},
  doi          = {10.1007/978-3-319-22270-7\_2},
  timestamp    = {Thu, 27 Feb 2020 12:57:39 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/HeibergPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeibergPW15,
  author       = {Sven Heiberg and
                  Arnis Parsovs and
                  Jan Willemson},
  title        = {Log Analysis of Estonian Internet Voting 2013-2015},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1211},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1211},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeibergPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/BogdanovKLPTW14,
  author       = {Dan Bogdanov and
                  Liina Kamm and
                  Sven Laur and
                  Pille Pruulmann{-}Vengerfeldt and
                  Riivo Talviste and
                  Jan Willemson},
  editor       = {Bart Preneel and
                  Demosthenes Ikonomou},
  title        = {Privacy-Preserving Statistical Data Analysis on Federated Databases},
  booktitle    = {Privacy Technologies and Policy - Second Annual Privacy Forum, {APF}
                  2014, Athens, Greece, May 20-21, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8450},
  pages        = {30--55},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06749-0\_3},
  doi          = {10.1007/978-3-319-06749-0\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apf/BogdanovKLPTW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/HeibergW14,
  author       = {Sven Heiberg and
                  Jan Willemson},
  editor       = {Robert Krimmer and
                  Melanie Volkamer},
  title        = {Verifiable internet voting in Estonia},
  booktitle    = {6th International Conference on Electronic Voting: Verifying the Vote,
                  {EVOTE} 2014, Lochau / Bregenz, Austria, October 29-31, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/EVOTE.2014.7001135},
  doi          = {10.1109/EVOTE.2014.7001135},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/HeibergW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/LaudW14,
  author       = {Peeter Laud and
                  Jan Willemson},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood and
                  Philip W. L. Fong},
  title        = {Composable Oblivious Extended Permutations},
  booktitle    = {Foundations and Practice of Security - 7th International Symposium,
                  {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8930},
  pages        = {294--310},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17040-4\_19},
  doi          = {10.1007/978-3-319-17040-4\_19},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/LaudW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KripsW14,
  author       = {Toomas Krips and
                  Jan Willemson},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty
                  Computations},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {179--197},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_11},
  doi          = {10.1007/978-3-319-13257-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KripsW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LeninWS14,
  author       = {Aleksandr Lenin and
                  Jan Willemson and
                  Dyan Permata Sari},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Attacker Profiling in Quantitative Security Assessment Based on Attack
                  Trees},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {199--212},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_12},
  doi          = {10.1007/978-3-319-11599-3\_12},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/LeninWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BogdanovEJKMW14,
  author       = {Dan Bogdanov and
                  Keita Emura and
                  Roman Jagom{\"{a}}gis and
                  Akira Kanaoka and
                  Shin'ichiro Matsuo and
                  Jan Willemson},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {A Secure Genetic Algorithm for the Subset Cover Problem and Its Application
                  to Privacy Protection},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {108--123},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_8},
  doi          = {10.1007/978-3-662-43826-8\_8},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BogdanovEJKMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KripsW14,
  author       = {Toomas Krips and
                  Jan Willemson},
  title        = {Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty
                  Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/221},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KripsW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaudW14,
  author       = {Peeter Laud and
                  Jan Willemson},
  title        = {Composable Oblivious Extended Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/400},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaudW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LaurTW13,
  author       = {Sven Laur and
                  Riivo Talviste and
                  Jan Willemson},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {From Oblivious {AES} to Efficient and Secure Database Join in the
                  Multiparty Setting},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {84--101},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_6},
  doi          = {10.1007/978-3-642-38980-1\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LaurTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/AnsperBFW13,
  author       = {Arne Ansper and
                  Ahto Buldas and
                  Margus Freudenthal and
                  Jan Willemson},
  editor       = {Eric A. M. Luiijf and
                  Pieter H. Hartel},
  title        = {Protecting a Federated Database Infrastructure against Denial-of-Service
                  Attacks},
  booktitle    = {Critical Information Infrastructures Security - 8th International
                  Workshop, {CRITIS} 2013, Amsterdam, The Netherlands, September 16-18,
                  2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8328},
  pages        = {26--37},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03964-0\_3},
  doi          = {10.1007/978-3-319-03964-0\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/AnsperBFW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/YiMBW13,
  author       = {Xun Yi and
                  Yuan Miao and
                  Elisa Bertino and
                  Jan Willemson},
  title        = {Multiparty privacy protection for electronic health records},
  booktitle    = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta,
                  GA, USA, December 9-13, 2013},
  pages        = {2730--2735},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GLOCOM.2013.6831487},
  doi          = {10.1109/GLOCOM.2013.6831487},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/YiMBW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AnsperBFW13,
  author       = {Arne Ansper and
                  Ahto Buldas and
                  Margus Freudenthal and
                  Jan Willemson},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {High-Performance Qualified Digital Signatures for X-Road},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {123--138},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_9},
  doi          = {10.1007/978-3-642-41488-6\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AnsperBFW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YiWN13,
  author       = {Xun Yi and
                  Jan Willemson and
                  Farid Na{\"{\i}}t{-}Abdesselam},
  title        = {Privacy-Preserving Wireless Medical Sensor Network},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {118--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.19},
  doi          = {10.1109/TRUSTCOM.2013.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YiWN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaurTW13,
  author       = {Sven Laur and
                  Riivo Talviste and
                  Jan Willemson},
  title        = {From oblivious {AES} to efficient and secure database join in the
                  multiparty setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/203},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaurTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaudW13,
  author       = {Peeter Laud and
                  Jan Willemson},
  title        = {Universally composable privacy preserving finite automata execution
                  with low online and offline complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {678},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/678},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaudW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KammW13,
  author       = {Liina Kamm and
                  Jan Willemson},
  title        = {Secure Floating-Point Arithmetic and Private Satellite Collision Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {850},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/850},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KammW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BogdanovNTW12,
  author       = {Dan Bogdanov and
                  Margus Niitsoo and
                  Tomas Toft and
                  Jan Willemson},
  title        = {High-performance secure multi-party computation for data mining applications},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {6},
  pages        = {403--418},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0177-2},
  doi          = {10.1007/S10207-012-0177-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BogdanovNTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BogdanovTW12,
  author       = {Dan Bogdanov and
                  Riivo Talviste and
                  Jan Willemson},
  editor       = {Angelos D. Keromytis},
  title        = {Deploying Secure Multi-Party Computation for Financial Data Analysis
                  - (Short Paper)},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {57--64},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_5},
  doi          = {10.1007/978-3-642-32946-3\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BogdanovTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egov/Willemson11,
  author       = {Jan Willemson},
  editor       = {Kim Normann Andersen and
                  Enrico Francesconi and
                  {\AA}ke Gr{\"{o}}nlund and
                  Tom M. van Engers},
  title        = {Pseudonymization Service for X-Road eGovernment Data Exchange Layer},
  booktitle    = {Electronic Government and the Information Systems Perspective - Second
                  International Conference, {EGOVIS} 2011, Toulouse, France, August
                  29 - September 2, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6866},
  pages        = {135--145},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22961-9\_11},
  doi          = {10.1007/978-3-642-22961-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/egov/Willemson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LaurWZ11,
  author       = {Sven Laur and
                  Jan Willemson and
                  Bingsheng Zhang},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {Round-Efficient Oblivious Database Manipulation},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {262--277},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_18},
  doi          = {10.1007/978-3-642-24861-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LaurWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/HeibergLW11,
  author       = {Sven Heiberg and
                  Peeter Laud and
                  Jan Willemson},
  editor       = {Aggelos Kiayias and
                  Helger Lipmaa},
  title        = {The Application of I-Voting for Estonian Parliamentary Elections of
                  2011},
  booktitle    = {E-Voting and Identity - Third International Conference, VoteID 2011,
                  Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  pages        = {208--223},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32747-6\_13},
  doi          = {10.1007/978-3-642-32747-6\_13},
  timestamp    = {Thu, 27 Feb 2020 12:57:38 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/HeibergLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaurWZ11,
  author       = {Sven Laur and
                  Jan Willemson and
                  Bingsheng Zhang},
  title        = {Round-efficient Oblivious Database Manipulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/429},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaurWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovTW11,
  author       = {Dan Bogdanov and
                  Riivo Talviste and
                  Jan Willemson},
  title        = {Deploying secure multi-party computation for financial data analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {662},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/662},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Willemson10,
  author       = {Jan Willemson},
  title        = {Extending the Gordon and Loeb Model for Information Security Investment},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {258--261},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.37},
  doi          = {10.1109/ARES.2010.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Willemson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JurgensonW10,
  author       = {Aivo J{\"{u}}rgenson and
                  Jan Willemson},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {On Fast and Approximate Attack Tree Computations},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {56--66},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_5},
  doi          = {10.1007/978-3-642-12827-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/JurgensonW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/JurgensonW09,
  author       = {Aivo J{\"{u}}rgenson and
                  Jan Willemson},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Serial Model for Attack Tree Computations},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {118--128},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_9},
  doi          = {10.1007/978-3-642-14423-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/JurgensonW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/WillemsonA08,
  author       = {Jan Willemson and
                  Arne Ansper},
  title        = {A Secure and Scalable Infrastructure for Inter-Organizational Data
                  Exchange and eGovernment Applications},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {572--577},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.90},
  doi          = {10.1109/ARES.2008.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/WillemsonA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BogdanovLW08,
  author       = {Dan Bogdanov and
                  Sven Laur and
                  Jan Willemson},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Sharemind: {A} Framework for Fast Privacy-Preserving Computations},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {192--206},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_13},
  doi          = {10.1007/978-3-540-88313-5\_13},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BogdanovLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/JurgensonW08,
  author       = {Aivo J{\"{u}}rgenson and
                  Jan Willemson},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {Computing Exact Outcomes of Multi-parameter Attack Trees},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008
                  Confederated International Conferences, CoopIS, DOA, GADA, IS, and
                  {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5332},
  pages        = {1036--1051},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88873-4\_8},
  doi          = {10.1007/978-3-540-88873-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/JurgensonW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovLW08,
  author       = {Dan Bogdanov and
                  Sven Laur and
                  Jan Willemson},
  title        = {Sharemind: a framework for fast privacy-preserving computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/289},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JurgensonW07,
  author       = {Aivo J{\"{u}}rgenson and
                  Jan Willemson},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Processing Multi-parameter Attacktrees with Estimated Parameter Values},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {308--319},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_21},
  doi          = {10.1007/978-3-540-75651-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JurgensonW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/BuldasLPSW06,
  author       = {Ahto Buldas and
                  Peeter Laud and
                  Jaan Priisalu and
                  M{\"{a}}rt Saarepera and
                  Jan Willemson},
  editor       = {Javier L{\'{o}}pez},
  title        = {Rational Choice of Security Measures Via Multi-parameter Attack Trees},
  booktitle    = {Critical Information Infrastructures Security, First International
                  Workshop, {CRITIS} 2006, Samos, Greece, August 31 - September 1, 2006,
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4347},
  pages        = {235--248},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11962977\_19},
  doi          = {10.1007/11962977\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/BuldasLPSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/Willemson06,
  author       = {Jan Willemson},
  title        = {On the Gordon {\&} Loeb Model for Information Security Investment},
  booktitle    = {5th Annual Workshop on the Economics of Information Security, {WEIS}
                  2006, Robinson College, University of Cambridge, England, UK, June
                  26-28, 2006},
  year         = {2006},
  url          = {http://weis2006.econinfosec.org/docs/12.pdf},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/Willemson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BuldasLSW05,
  author       = {Ahto Buldas and
                  Peeter Laud and
                  M{\"{a}}rt Saarepera and
                  Jan Willemson},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Universally Composable Time-Stamping Schemes with Audit},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {359--373},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_26},
  doi          = {10.1007/11556992\_26},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BuldasLSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuldasLSW05,
  author       = {Ahto Buldas and
                  Peeter Laud and
                  M{\"{a}}rt Saarepera and
                  Jan Willemson},
  title        = {Universally Composable Time-Stamping Schemes with Audit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/198},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BuldasLSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/KruusmaaW03,
  author       = {Maarja Kruusmaa and
                  Jan Willemson},
  title        = {Covering the path space: a casebase analysis for mobile robot path
                  planning},
  journal      = {Knowl. Based Syst.},
  volume       = {16},
  number       = {5-6},
  pages        = {235--242},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0950-7051(03)00024-8},
  doi          = {10.1016/S0950-7051(03)00024-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/KruusmaaW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AnsperBFW03,
  author       = {Arne Ansper and
                  Ahto Buldas and
                  Margus Freudenthal and
                  Jan Willemson},
  title        = {Scalable and Efficient {PKI} for Inter-Organizational Communication},
  booktitle    = {19th Annual Computer Security Applications Conference {(ACSAC} 2003),
                  8-12 December 2003, Las Vegas, NV, {USA}},
  pages        = {308--318},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSAC.2003.1254335},
  doi          = {10.1109/CSAC.2003.1254335},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AnsperBFW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/balt/RoosBW02,
  author       = {Meelis Roos and
                  Ahto Buldas and
                  Jan Willemson},
  editor       = {Hele{-}Mai Haav and
                  Ahto Kalja},
  title        = {Undeniable Replies for Database Queries},
  booktitle    = {Proceedings of the Baltic Conference, BalticDB{\&}IS 2002, Tallinn,
                  Estonia, Volume 2},
  pages        = {215--226},
  publisher    = {Institute of Cybernetics at Tallin Technical University},
  year         = {2002},
  timestamp    = {Sat, 07 Jul 2018 14:03:18 +0200},
  biburl       = {https://dblp.org/rec/conf/balt/RoosBW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/balt/WillemsonHP02,
  author       = {Jan Willemson and
                  Kristo Heero and
                  Uuno Puus},
  editor       = {Hele{-}Mai Haav and
                  Ahto Kalja},
  title        = {{XML} Based Document Management in Estonian Legislative System},
  booktitle    = {Proceedings of the Baltic Conference, BalticDB{\&}IS 2002, Tallinn,
                  Estonia, Volume 1},
  pages        = {321--330},
  publisher    = {Institute of Cybernetics at Tallin Technical University},
  year         = {2002},
  timestamp    = {Sat, 07 Jul 2018 14:03:11 +0200},
  biburl       = {https://dblp.org/rec/conf/balt/WillemsonHP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AnsperBSW01,
  author       = {Arne Ansper and
                  Ahto Buldas and
                  M{\"{a}}rt Saarepera and
                  Jan Willemson},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Improving the Availability of Time-Stamping Services},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {360--375},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_29},
  doi          = {10.1007/3-540-47719-5\_29},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AnsperBSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AnsperBRW01,
  author       = {Arne Ansper and
                  Ahto Buldas and
                  Meelis Roos and
                  Jan Willemson},
  editor       = {Kwangjo Kim},
  title        = {Efficient Long-Term Validation of Digital Signatures},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {402--415},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_29},
  doi          = {10.1007/3-540-44586-2\_29},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AnsperBRW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FreudenthalHW00,
  author       = {Margus Freudenthal and
                  Sven Heiberg and
                  Jan Willemson},
  title        = {Personal Security Environment on Palm {PDA}},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {366--372},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898891},
  doi          = {10.1109/ACSAC.2000.898891},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FreudenthalHW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-9909012,
  author       = {Jan Willemson},
  title        = {Certificate Revocation Paradigms},
  journal      = {CoRR},
  volume       = {cs.CR/9909012},
  year         = {1999},
  url          = {https://arxiv.org/abs/cs/9909012},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-9909012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BuldasLLV98,
  author       = {Ahto Buldas and
                  Peeter Laud and
                  Helger Lipmaa and
                  Jan Willemson},
  editor       = {Hugo Krawczyk},
  title        = {Time-Stamping with Binary Linking Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {486--501},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055749},
  doi          = {10.1007/BFB0055749},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BuldasLLV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics