Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificate Revocation Paradigms. CoRR, (1999)Creating a Decryption Proof Verifier for the Estonian Internet Voting System.. ARES, page 58:1-58:7. ACM, (2023)UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System., , and . CoRR, (2021)Personal Security Environment on Palm PDA., , and . ACSAC, page 366-372. IEEE Computer Society, (2000)Scalable and Efficient PKI for Inter-Organizational Communication., , , and . ACSAC, page 308-318. IEEE Computer Society, (2003)XML Based Document Management in Estonian Legislative System., , and . BalticDB&IS, page 321-330. Institute of Cybernetics at Tallin Technical University, (2002)Undeniable Replies for Database Queries., , and . BalticDB&IS, page 215-226. Institute of Cybernetics at Tallin Technical University, (2002)Computing Exact Outcomes of Multi-parameter Attack Trees., and . OTM Conferences (2), volume 5332 of Lecture Notes in Computer Science, page 1036-1051. Springer, (2008)Improving the Verifiability of the Estonian Internet Voting Scheme., , , and . E-VOTE-ID, volume 10141 of Lecture Notes in Computer Science, page 92-107. Springer, (2016)Pseudonymization Service for X-Road eGovernment Data Exchange Layer.. EGOVIS, volume 6866 of Lecture Notes in Computer Science, page 135-145. Springer, (2011)