The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jan Willemson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson
    Improving the Availability of Time-Stamping Services. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:360-375 [Conf]
  2. Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson
    Scalable and Efficient PKI for Inter-Organizational Communication. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:308-318 [Conf]
  3. Margus Freudenthal, S. Heiberg, Jan Willemson
    Personal Security Environment on Palm PDA. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:366-372 [Conf]
  4. Meelis Roos, Ahto Buldas, Jan Willemson
    Undeniable Replies for Database Queries. [Citation Graph (0, 0)][DBLP]
    BalticDB&IS, 2002, pp:215-226 [Conf]
  5. Jan Willemson, Kristo Heero, Uuno Puus
    XML Based Document Management in Estonian Legislative System. [Citation Graph (0, 0)][DBLP]
    BalticDB&IS, 2002, pp:321-330 [Conf]
  6. Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Willemson
    Time-Stamping with Binary Linking Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:486-501 [Conf]
  7. Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
    Universally Composable Time-Stamping Schemes with Audit. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:359-373 [Conf]
  8. Arne Ansper, Ahto Buldas, Meelis Roos, Jan Willemson
    Efficient Long-Term Validation of Digital Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:402-415 [Conf]
  9. Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson
    Rational Choice of Security Measures Via Multi-parameter Attack Trees. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:235-248 [Conf]
  10. Jan Willemson
    Certificate Revocation Paradigms [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  11. Maarja Kruusmaa, Jan Willemson
    Covering the path space: a casebase analysis for mobile robot path planning. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2003, v:16, n:5-6, pp:235-242 [Journal]
  12. Aivo Jürgenson, Jan Willemson
    Processing Multi-parameter Attacktrees with Estimated Parameter Values. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:308-319 [Conf]

  13. A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. [Citation Graph (, )][DBLP]


  14. Extending the Gordon and Loeb Model for Information Security Investment. [Citation Graph (, )][DBLP]


  15. Sharemind: A Framework for Fast Privacy-Preserving Computations. [Citation Graph (, )][DBLP]


  16. Serial Model for Attack Tree Computations. [Citation Graph (, )][DBLP]


  17. On Fast and Approximate Attack Tree Computations. [Citation Graph (, )][DBLP]


  18. Computing Exact Outcomes of Multi-parameter Attack Trees. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002