Search the dblp DataBase
Peeter Laud :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ahto Buldas , Peeter Laud , Helger Lipmaa Accountable certificate management using undeniable attestations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:9-17 [Conf ] Peeter Laud Secrecy types for a simulatable cryptographic library. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:26-35 [Conf ] Michael Backes , Peeter Laud Computationally sound secrecy proofs by mechanized flow analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:370-379 [Conf ] Ahto Buldas , Peeter Laud , Helger Lipmaa , Jan Willemson Time-Stamping with Binary Linking Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:486-501 [Conf ] Peeter Laud Semantics and Program Analysis of Computationally Secure Information Flow. [Citation Graph (0, 0)][DBLP ] ESOP, 2001, pp:77-91 [Conf ] Peeter Laud Handling Encryption in an Analysis for Secure Information Flow. [Citation Graph (0, 0)][DBLP ] ESOP, 2003, pp:159-173 [Conf ] Peeter Laud , Varmo Vene A Type System for Computationally Secure Information Flow. [Citation Graph (0, 0)][DBLP ] FCT, 2005, pp:365-377 [Conf ] Ahto Buldas , Peeter Laud New linking schemes for digital time-stamping. [Citation Graph (0, 0)][DBLP ] ICISC, 1998, pp:3-13 [Conf ] Peeter Laud , Ricardo Corin Sound Computational Interpretation of Formal Encryption with Composed Keys. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:55-66 [Conf ] Ahto Buldas , Peeter Laud , Märt Saarepera , Jan Willemson Universally Composable Time-Stamping Schemes with Audit. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:359-373 [Conf ] Peeter Laud Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:71-85 [Conf ] Ahto Buldas , Peeter Laud , Jaan Priisalu , Märt Saarepera , Jan Willemson Rational Choice of Security Measures Via Multi-parameter Attack Trees. [Citation Graph (0, 0)][DBLP ] CRITIS, 2006, pp:235-248 [Conf ] Ahto Buldas , Peeter Laud , Helger Lipmaa Eliminating Counterevidence with Applications to Accountable Certificate Management. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2002, v:10, n:3, pp:273-296 [Journal ] Peeter Laud , Tarmo Uustalu , Varmo Vene Type systems equivalent to data-flow analyses for imperative languages. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:364, n:3, pp:292-310 [Journal ] A User Interface for a Game-Based Protocol Verification Tool. [Citation Graph (, )][DBLP ] On the computational soundness of cryptographically masked flows. [Citation Graph (, )][DBLP ] Application of Dependency Graphs to Security Protocol Analysis. [Citation Graph (, )][DBLP ] Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library. [Citation Graph (, )][DBLP ] Formal Analysis of the Estonian Mobile-ID Protocol. [Citation Graph (, )][DBLP ] Search in 0.028secs, Finished in 0.028secs