The following pages link to Peeter Laud (Q860843):
Displaying 14 items.
- Type systems equivalent to data-flow analyses for imperative languages (Q860844) (← links)
- (Q2763667) (← links)
- Strong Forward Security in Identity-Based Signcryption (Q2831090) (← links)
- Securing the Future — An Information Flow Analysis of a Distributed OO Language (Q2891392) (← links)
- Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures (Q2948146) (← links)
- Verifiable Computation in Multiparty Protocols with Honest Majority (Q2948147) (← links)
- Secure Implementation of Asynchronous Method Calls and Futures (Q2957110) (← links)
- On the computational soundness of cryptographically masked flows (Q3189852) (← links)
- Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows (Q3304822) (← links)
- (Q4249353) (← links)
- (Q4417891) (← links)
- Fundamentals of Computation Theory (Q5492942) (← links)
- Information Security (Q5493183) (← links)
- Information Security and Cryptology - ICISC 2003 (Q5714151) (← links)