Margus Niitsoo

According to our database1, Margus Niitsoo authored at least 10 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
MatchMySound: Introducing Feedback to Online Music Education.
Proceedings of the New Horizons in Web Based Learning, 2014

2013
Black-Box Separations and Their Adaptability to the Non-uniform Model.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
High-performance secure multi-party computation for data mining applications.
Int. J. Inf. Sec., 2012

Deterministic Random Oracles.
Proceedings of the Provable Security - 6th International Conference, 2012

2010
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees.
IACR Cryptol. ePrint Arch., 2010

Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Oracle Separation in the Non-uniform Model.
Proceedings of the Provable Security, Third International Conference, 2009

Python prevails.
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009

Efficiency Bounds for Adversary Constructions in Black-Box Reductions.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?.
Proceedings of the Provable Security, Second International Conference, 2008


  Loading...