Jan Willemson

According to our database1, Jan Willemson authored at least 62 papers between 1998 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Facial Recognition for Remote Electronic Voting â€" Missing Piece of the Puzzle or Yet Another Liability?
IACR Cryptol. ePrint Arch., 2021

Mobile Voting - Still Too Risky?
IACR Cryptol. ePrint Arch., 2021

DiLizium: A Two-Party Lattice-Based Signature Scheme.
Entropy, 2021

UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System.
CoRR, 2021

Developing a Personal Voting Machine for the Estonian Internet Voting System.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Vote Secrecy and Voter Feedback in Remote Voting - Can We Have Both?
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021

2020
Developing Requirements for the New Encryption Mechanisms in the Estonian eID Infrastructure.
Proceedings of the Databases and Information Systems, 2020

2019
On Practical Aspects of Coercion-Resistant Remote Voting Systems.
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019

Is Your Vote Overheard? A New Scalable Side-Channel Attack Against Paper Voting.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

How Not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Application.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
Bits or paper: Which should get to carry your vote?
J. Inf. Secur. Appl., 2018

On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards.
IACR Cryptol. ePrint Arch., 2018

Implementing an Audio Side Channel for Paper Voting.
Proceedings of the Electronic Voting - Third International Joint Conference, 2018

2017
Estonian Voting Verification Mechanism Revisited Again.
IACR Cryptol. ePrint Arch., 2017

Challenges of Federating National Data Access Infrastructures.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Simple Infeasibility Certificates for Attack Trees.
Proceedings of the Advances in Information and Computer Security, 2017

2016
Privacy Protection for Wireless Medical Sensor Data.
IEEE Trans. Dependable Secur. Comput., 2016

Alternative Implementations of Secure Real Numbers.
IACR Cryptol. ePrint Arch., 2016

Improving the Verifiability of the Estonian Internet Voting Scheme.
Proceedings of the Electronic Voting - First International Joint Conference, 2016

2015
Secure floating point arithmetic and private satellite collision analysis.
Int. J. Inf. Sec., 2015

Log Analysis of Estonian Internet Voting 2013-2015.
IACR Cryptol. ePrint Arch., 2015

Log Analysis of Estonian Internet Voting 2013-2014.
Proceedings of the E-Voting and Identity - 5th International Conference, 2015

Genetic Approximations for the Failure-Free Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

The Attack Navigator.
Proceedings of the Graphical Models for Security - Second International Workshop, 2015

2014
Composable Oblivious Extended Permutations.
IACR Cryptol. ePrint Arch., 2014

Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations.
IACR Cryptol. ePrint Arch., 2014

A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Attacker Profiling in Quantitative Security Assessment Based on Attack Trees.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

Verifiable internet voting in Estonia.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014

Privacy-Preserving Statistical Data Analysis on Federated Databases.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
From oblivious AES to efficient and secure database join in the multiparty setting.
IACR Cryptol. ePrint Arch., 2013

Universally composable privacy preserving finite automata execution with low online and offline complexity.
IACR Cryptol. ePrint Arch., 2013

Privacy-Preserving Wireless Medical Sensor Network.
Proceedings of the 12th IEEE International Conference on Trust, 2013

High-Performance Qualified Digital Signatures for X-Road.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

Multiparty privacy protection for electronic health records.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Protecting a Federated Database Infrastructure against Denial-of-Service Attacks.
Proceedings of the Critical Information Infrastructures Security, 2013

2012
High-performance secure multi-party computation for data mining applications.
Int. J. Inf. Sec., 2012

Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Round-efficient Oblivious Database Manipulation.
IACR Cryptol. ePrint Arch., 2011

Deploying secure multi-party computation for financial data analysis.
IACR Cryptol. ePrint Arch., 2011

The Application of I-Voting for Estonian Parliamentary Elections of 2011.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Pseudonymization Service for X-Road eGovernment Data Exchange Layer.
Proceedings of the Electronic Government and the Information Systems Perspective, 2011

2010
On Fast and Approximate Attack Tree Computations.
Proceedings of the Information Security, 2010

Extending the Gordon and Loeb Model for Information Security Investment.
Proceedings of the ARES 2010, 2010

2009
Serial Model for Attack Tree Computations.
Proceedings of the Information, Security and Cryptology, 2009

2008
Sharemind: a framework for fast privacy-preserving computations.
IACR Cryptol. ePrint Arch., 2008

Computing Exact Outcomes of Multi-parameter Attack Trees.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications.
Proceedings of the The Third International Conference on Availability, 2008

2007
Processing Multi-parameter Attacktrees with Estimated Parameter Values.
Proceedings of the Advances in Information and Computer Security, 2007

2006
On the Gordon & Loeb Model for Information Security Investment.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

Rational Choice of Security Measures Via Multi-parameter Attack Trees.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Universally Composable Time-Stamping Schemes with Audit.
IACR Cryptol. ePrint Arch., 2005

2003
Covering the path space: a casebase analysis for mobile robot path planning.
Knowl. Based Syst., 2003

Scalable and Efficient PKI for Inter-Organizational Communication.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
XML Based Document Management in Estonian Legislative System.
Proceedings of the Baltic Conference, 2002

Undeniable Replies for Database Queries.
Proceedings of the Baltic Conference, 2002

2001
Efficient Long-Term Validation of Digital Signatures.
Proceedings of the Public Key Cryptography, 2001

Improving the Availability of Time-Stamping Services.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Personal Security Environment on Palm PDA.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Certificate Revocation Paradigms
CoRR, 1999

1998
Time-Stamping with Binary Linking Schemes.
Proceedings of the Advances in Cryptology, 1998


  Loading...