2008 |
9 | EE | Dan Bogdanov,
Sven Laur,
Jan Willemson:
Sharemind: A Framework for Fast Privacy-Preserving Computations.
ESORICS 2008: 192-206 |
8 | EE | Sven Laur,
Sylvain Pasini:
SAS-Based Group Authentication and Key Agreement Protocols.
Public Key Cryptography 2008: 197-213 |
2007 |
7 | EE | Sven Laur,
Helger Lipmaa:
A New Protocol for Conditional Disclosure of Secrets and Its Applications.
ACNS 2007: 207-225 |
6 | EE | Ahto Buldas,
Sven Laur:
Knowledge-Binding Commitments with Applications in Time-Stamping.
Public Key Cryptography 2007: 150-165 |
2006 |
5 | EE | Ahto Buldas,
Sven Laur:
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
ACNS 2006: 50-65 |
4 | EE | Sven Laur,
Kaisa Nyberg:
Efficient Mutual Data Authentication Using Manually Authenticated Strings.
CANS 2006: 90-107 |
3 | EE | Sven Laur,
Helger Lipmaa,
Taneli Mielikäinen:
Cryptographically private support vector machines.
KDD 2006: 618-624 |
2005 |
2 | EE | Sven Laur,
Helger Lipmaa,
Taneli Mielikäinen:
Private Itemset Support Counting.
ICICS 2005: 97-111 |
2004 |
1 | EE | Bart Goethals,
Sven Laur,
Helger Lipmaa,
Taneli Mielikäinen:
On Private Scalar Product Computation for Privacy-Preserving Data Mining.
ICISC 2004: 104-120 |