|
Search the dblp DataBase
Jan Willemson:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson
Improving the Availability of Time-Stamping Services. [Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:360-375 [Conf]
- Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson
Scalable and Efficient PKI for Inter-Organizational Communication. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:308-318 [Conf]
- Margus Freudenthal, S. Heiberg, Jan Willemson
Personal Security Environment on Palm PDA. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:366-372 [Conf]
- Meelis Roos, Ahto Buldas, Jan Willemson
Undeniable Replies for Database Queries. [Citation Graph (0, 0)][DBLP] BalticDB&IS, 2002, pp:215-226 [Conf]
- Jan Willemson, Kristo Heero, Uuno Puus
XML Based Document Management in Estonian Legislative System. [Citation Graph (0, 0)][DBLP] BalticDB&IS, 2002, pp:321-330 [Conf]
- Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Willemson
Time-Stamping with Binary Linking Schemes. [Citation Graph (0, 0)][DBLP] CRYPTO, 1998, pp:486-501 [Conf]
- Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
Universally Composable Time-Stamping Schemes with Audit. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:359-373 [Conf]
- Arne Ansper, Ahto Buldas, Meelis Roos, Jan Willemson
Efficient Long-Term Validation of Digital Signatures. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2001, pp:402-415 [Conf]
- Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson
Rational Choice of Security Measures Via Multi-parameter Attack Trees. [Citation Graph (0, 0)][DBLP] CRITIS, 2006, pp:235-248 [Conf]
- Jan Willemson
Certificate Revocation Paradigms [Citation Graph (0, 0)][DBLP] CoRR, 1999, v:0, n:, pp:- [Journal]
- Maarja Kruusmaa, Jan Willemson
Covering the path space: a casebase analysis for mobile robot path planning. [Citation Graph (0, 0)][DBLP] Knowl.-Based Syst., 2003, v:16, n:5-6, pp:235-242 [Journal]
- Aivo Jürgenson, Jan Willemson
Processing Multi-parameter Attacktrees with Estimated Parameter Values. [Citation Graph (0, 0)][DBLP] IWSEC, 2007, pp:308-319 [Conf]
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. [Citation Graph (, )][DBLP]
Extending the Gordon and Loeb Model for Information Security Investment. [Citation Graph (, )][DBLP]
Sharemind: A Framework for Fast Privacy-Preserving Computations. [Citation Graph (, )][DBLP]
Serial Model for Attack Tree Computations. [Citation Graph (, )][DBLP]
On Fast and Approximate Attack Tree Computations. [Citation Graph (, )][DBLP]
Computing Exact Outcomes of Multi-parameter Attack Trees. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|