Peeter Laud

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows
Lecture Notes in Computer Science
2020-08-03Paper
Secure implementation of asynchronous method calls and futures
Trusted Systems
2017-01-23Paper
Strong forward security in identity-based signcryption
Journal of Discrete Mathematical Sciences & Cryptography
2016-11-02Paper
Verifiable computation in multiparty protocols with honest majority
Provable Security
2015-09-29Paper
Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures
Provable Security
2015-09-29Paper
On the computational soundness of cryptographically masked flows
Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
2014-09-12Paper
Securing the future -- an information flow analysis of a distributed OO language
SOFSEM 2012: Theory and Practice of Computer Science
2012-06-15Paper
Type systems equivalent to data-flow analyses for imperative languages
Theoretical Computer Science
2007-01-09Paper
Fundamentals of Computation Theory
Lecture Notes in Computer Science
2006-10-20Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
scientific article; zbMATH DE number 1956552 (Why is no real title available?)2003-07-30Paper
scientific article; zbMATH DE number 1692935 (Why is no real title available?)2002-01-21Paper
scientific article; zbMATH DE number 1302867 (Why is no real title available?)1999-06-17Paper


Research outcomes over time


This page was built for person: Peeter Laud