Jan Willemson
Orcid: 0000-0002-6290-2099
According to our database1,
Jan Willemson
authored at least 75 papers
between 1998 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
J. Cryptol., March, 2025
2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2023
IET Inf. Secur., January, 2023
Proceedings of the Ubiquitous Security, 2023
Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System.
Proceedings of the Security and Trust Management - 19th International Workshop, 2023
Proceedings of the 31st IEEE International Requirements Engineering Conference, RE 2023, 2023
Proceedings of the Electronic Voting: 8th International Joint Conference, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Gov. Inf. Q., 2022
Proceedings of the Privacy Technologies and Policy - 10th Annual Privacy Forum, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols.
IACR Cryptol. ePrint Arch., 2021
Facial Recognition for Remote Electronic Voting â" Missing Piece of the Puzzle or Yet Another Liability?
IACR Cryptol. ePrint Arch., 2021
CoRR, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021
2020
Developing Requirements for the New Encryption Mechanisms in the Estonian eID Infrastructure.
Proceedings of the Databases and Information Systems, 2020
2019
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
How Not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Application.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Electronic Voting - Third International Joint Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017
Proceedings of the Advances in Information and Computer Security, 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
Proceedings of the Electronic Voting - First International Joint Conference, 2016
2015
Proceedings of the E-Voting and Identity - 5th International Conference, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Proceedings of the Graphical Models for Security - Second International Workshop, 2015
2014
IACR Cryptol. ePrint Arch., 2014
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Universally composable privacy preserving finite automata execution with low online and offline complexity.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Critical Information Infrastructures Security, 2013
2012
Int. J. Inf. Sec., 2012
Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the E-Voting and Identity - Third International Conference, 2011
Proceedings of the Electronic Government and the Information Systems Perspective, 2011
2010
Proceedings of the Information Security, 2010
Proceedings of the ARES 2010, 2010
2009
Proceedings of the Information, Security and Cryptology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications.
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Advances in Information and Computer Security, 2007
2006
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
Proceedings of the Critical Information Infrastructures Security, 2006
2005
IACR Cryptol. ePrint Arch., 2005
2003
Knowl. Based Syst., 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
XML Based Document Management in Estonian Legislative System.
Proceedings of the Baltic Conference, 2002
Undeniable Replies for Database Queries.
Proceedings of the Baltic Conference, 2002
2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
1998
Proceedings of the Advances in Cryptology, 1998