The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peeter Laud: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ahto Buldas, Peeter Laud, Helger Lipmaa
    Accountable certificate management using undeniable attestations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:9-17 [Conf]
  2. Peeter Laud
    Secrecy types for a simulatable cryptographic library. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:26-35 [Conf]
  3. Michael Backes, Peeter Laud
    Computationally sound secrecy proofs by mechanized flow analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:370-379 [Conf]
  4. Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Willemson
    Time-Stamping with Binary Linking Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:486-501 [Conf]
  5. Peeter Laud
    Semantics and Program Analysis of Computationally Secure Information Flow. [Citation Graph (0, 0)][DBLP]
    ESOP, 2001, pp:77-91 [Conf]
  6. Peeter Laud
    Handling Encryption in an Analysis for Secure Information Flow. [Citation Graph (0, 0)][DBLP]
    ESOP, 2003, pp:159-173 [Conf]
  7. Peeter Laud, Varmo Vene
    A Type System for Computationally Secure Information Flow. [Citation Graph (0, 0)][DBLP]
    FCT, 2005, pp:365-377 [Conf]
  8. Ahto Buldas, Peeter Laud
    New linking schemes for digital time-stamping. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:3-13 [Conf]
  9. Peeter Laud, Ricardo Corin
    Sound Computational Interpretation of Formal Encryption with Composed Keys. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:55-66 [Conf]
  10. Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
    Universally Composable Time-Stamping Schemes with Audit. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:359-373 [Conf]
  11. Peeter Laud
    Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:71-85 [Conf]
  12. Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson
    Rational Choice of Security Measures Via Multi-parameter Attack Trees. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:235-248 [Conf]
  13. Ahto Buldas, Peeter Laud, Helger Lipmaa
    Eliminating Counterevidence with Applications to Accountable Certificate Management. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:3, pp:273-296 [Journal]
  14. Peeter Laud, Tarmo Uustalu, Varmo Vene
    Type systems equivalent to data-flow analyses for imperative languages. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:364, n:3, pp:292-310 [Journal]

  15. A User Interface for a Game-Based Protocol Verification Tool. [Citation Graph (, )][DBLP]


  16. On the computational soundness of cryptographically masked flows. [Citation Graph (, )][DBLP]


  17. Application of Dependency Graphs to Security Protocol Analysis. [Citation Graph (, )][DBLP]


  18. Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library. [Citation Graph (, )][DBLP]


  19. Formal Analysis of the Estonian Mobile-ID Protocol. [Citation Graph (, )][DBLP]


Search in 0.028secs, Finished in 0.028secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002