default search action
Jan Willemson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c62]Petr Tuma, Jan Hajny, Petr Muzikant, Jan Havlin, Lukas Malina, Patrik Dobias, Jan Willemson:
Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment. SECRYPT 2024: 826-831 - 2023
- [j8]Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik:
Improved lattice-based mix-nets for electronic voting. IET Inf. Secur. 17(1): 18-34 (2023) - [c61]Jan Willemson:
Creating a Decryption Proof Verifier for the Estonian Internet Voting System. ARES 2023: 58:1-58:7 - [c60]Kristjan Krips, Nikita Snetkov, Jelizaveta Vakarjuk, Jan Willemson:
Trust Assumptions in Voting Systems. ESORICS Workshops (2) 2023: 309-329 - [c59]Jan Willemson, Kristjan Krips:
Estimating Carbon Footprint of Paper and Internet Voting. E-Vote-ID 2023: 140-155 - [c58]Jan Willemson:
Analysis of Information Security Measures Embedded in the GDPR. REW 2023: 214-217 - [c57]Jan Willemson:
Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System. STM 2023: 126-135 - [c56]Petr Muzikant, Jan Willemson:
Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices. UbiSec 2023: 147-162 - [i22]Jan Willemson:
Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System. CoRR abs/2305.09411 (2023) - [i21]Kristjan Krips, Nikita Snetkov, Jelizaveta Vakarjuk, Jan Willemson:
Trust assumptions in voting systems. CoRR abs/2309.10391 (2023) - 2022
- [j7]Piret Ehin, Mihkel Solvak, Jan Willemson, Priit Vinkel:
Internet voting in Estonia 2005-2019: Evidence from eleven elections. Gov. Inf. Q. 39(4): 101718 (2022) - [c55]Alisa Pankova, Jan Willemson:
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols. ACNS 2022: 313-333 - [c54]Jan Willemson:
Fifty Shades of Personal Data - Partial Re-identification and GDPR. APF 2022: 88-96 - [c53]Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson:
Russian Federal Remote E-voting Scheme of 2021 - Protocol Description and Analysis. EICC 2022: 29-35 - 2021
- [j6]Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson:
DiLizium: A Two-Party Lattice-Based Signature Scheme. Entropy 23(8): 989 (2021) - [c52]Sven Heiberg, Kristjan Krips, Jan Willemson, Priit Vinkel:
Facial Recognition for Remote Electronic Voting - Missing Piece of the Puzzle or Yet Another Liability? ETAA 2021: 77-93 - [c51]Arne Koitmäe, Jan Willemson, Priit Vinkel:
Vote Secrecy and Voter Feedback in Remote Voting - Can We Have Both? E-VOTE-ID 2021: 140-154 - [c50]Sven Heiberg, Kristjan Krips, Jan Willemson:
Mobile Voting - Still Too Risky? Financial Cryptography Workshops 2021: 263-278 - [c49]Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik:
Improved Lattice-Based Mix-Nets for Electronic Voting. ICISC 2021: 119-136 - [c48]Valeh Farzaliyev, Kristjan Krips, Jan Willemson:
Developing a Personal Voting Machine for the Estonian Internet Voting System. SAC 2021: 1607-1616 - [i20]Bingsheng Zhang, Zengpeng Li, Jan Willemson:
UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System. CoRR abs/2109.01994 (2021) - [i19]Sven Heiberg, Kristjan Krips, Jan Willemson:
Mobile Voting - Still Too Risky? IACR Cryptol. ePrint Arch. 2021: 787 (2021) - [i18]Sven Heiberg, Kristjan Krips, Jan Willemson, Priit Vinkel:
Facial Recognition for Remote Electronic Voting â" Missing Piece of the Puzzle or Yet Another Liability? IACR Cryptol. ePrint Arch. 2021: 1143 (2021) - [i17]Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson:
Russian Federal Remote E-voting Scheme of 2021 - Protocol Description and Analysis. IACR Cryptol. ePrint Arch. 2021: 1454 (2021) - [i16]Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik:
Improved Lattice-Based Mix-Nets for Electronic Voting. IACR Cryptol. ePrint Arch. 2021: 1499 (2021) - [i15]Alisa Pankova, Jan Willemson:
Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols. IACR Cryptol. ePrint Arch. 2021: 1501 (2021) - 2020
- [c47]Mart Oruaas, Jan Willemson:
Developing Requirements for the New Encryption Mechanisms in the Estonian eID Infrastructure. DB&IS 2020: 13-20
2010 – 2019
- 2019
- [c46]Jan Willemson:
How Not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Application. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 111-121 - [c45]Kristjan Krips, Jan Willemson, Sebastian Värv:
Is Your Vote Overheard? A New Scalable Side-Channel Attack Against Paper Voting. EuroS&P 2019: 621-634 - [c44]Kristjan Krips, Jan Willemson:
On Practical Aspects of Coercion-Resistant Remote Voting Systems. E-VOTE-ID 2019: 216-232 - 2018
- [j5]Jan Willemson:
Bits or paper: Which should get to carry your vote? J. Inf. Secur. Appl. 38: 124-131 (2018) - [c43]Kristjan Krips, Jan Willemson, Sebastian Värv:
Implementing an Audio Side Channel for Paper Voting. E-Vote-ID 2018: 132-145 - [i14]Sven Heiberg, Ivo Kubjas, Janno Siim, Jan Willemson:
On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards. IACR Cryptol. ePrint Arch. 2018: 685 (2018) - 2017
- [c42]Ahto Buldas, Aleksandr Lenin, Jan Willemson, Anton Charnamord:
Simple Infeasibility Certificates for Attack Trees. IWSEC 2017: 39-55 - [c41]Margus Freudenthal, Jan Willemson:
Challenges of Federating National Data Access Infrastructures. SECITC 2017: 104-114 - [c40]Jan Willemson:
Bits or Paper: Which Should Get to Carry Your Vote? E-VOTE-ID 2017: 292-305 - [c39]Ivo Kubjas, Tiit Pikma, Jan Willemson:
Estonian Voting Verification Mechanism Revisited Again. E-VOTE-ID 2017: 306-317 - [i13]Ivo Kubjas, Tiit Pikma, Jan Willemson:
Estonian Voting Verification Mechanism Revisited Again. IACR Cryptol. ePrint Arch. 2017: 81 (2017) - 2016
- [j4]Xun Yi, Athman Bouguettaya, Dimitrios Georgakopoulos, Andy Song, Jan Willemson:
Privacy Protection for Wireless Medical Sensor Data. IEEE Trans. Dependable Secur. Comput. 13(3): 369-380 (2016) - [c38]Vassil S. Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson:
Alternative Implementations of Secure Real Numbers. CCS 2016: 553-564 - [c37]Sven Heiberg, Tarvi Martens, Priit Vinkel, Jan Willemson:
Improving the Verifiability of the Estonian Internet Voting Scheme. E-VOTE-ID 2016: 92-107 - [i12]Vassil S. Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson:
Alternative Implementations of Secure Real Numbers. IACR Cryptol. ePrint Arch. 2016: 773 (2016) - 2015
- [j3]Liina Kamm, Jan Willemson:
Secure floating point arithmetic and private satellite collision analysis. Int. J. Inf. Sec. 14(6): 531-548 (2015) - [c36]Christian W. Probst, Jan Willemson, Wolter Pieters:
The Attack Navigator. GraMSec@CSF 2015: 1-17 - [c35]Toomas Krips, Jan Willemson:
Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation. FPS 2015: 66-82 - [c34]Aleksandr Lenin, Jan Willemson, Anton Charnamord:
Genetic Approximations for the Failure-Free Security Games. GameSec 2015: 311-321 - [c33]Sven Heiberg, Arnis Parsovs, Jan Willemson:
Log Analysis of Estonian Internet Voting 2013-2014. VoteID 2015: 19-34 - [i11]Sven Heiberg, Arnis Parsovs, Jan Willemson:
Log Analysis of Estonian Internet Voting 2013-2015. IACR Cryptol. ePrint Arch. 2015: 1211 (2015) - 2014
- [c32]Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt, Riivo Talviste, Jan Willemson:
Privacy-Preserving Statistical Data Analysis on Federated Databases. APF 2014: 30-55 - [c31]Sven Heiberg, Jan Willemson:
Verifiable internet voting in Estonia. EVOTE 2014: 1-8 - [c30]Peeter Laud, Jan Willemson:
Composable Oblivious Extended Permutations. FPS 2014: 294-310 - [c29]Toomas Krips, Jan Willemson:
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations. ISC 2014: 179-197 - [c28]Aleksandr Lenin, Jan Willemson, Dyan Permata Sari:
Attacker Profiling in Quantitative Security Assessment Based on Attack Trees. NordSec 2014: 199-212 - [c27]Dan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka, Shin'ichiro Matsuo, Jan Willemson:
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection. WISTP 2014: 108-123 - [i10]Toomas Krips, Jan Willemson:
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations. IACR Cryptol. ePrint Arch. 2014: 221 (2014) - [i9]Peeter Laud, Jan Willemson:
Composable Oblivious Extended Permutations. IACR Cryptol. ePrint Arch. 2014: 400 (2014) - 2013
- [c26]Sven Laur, Riivo Talviste, Jan Willemson:
From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting. ACNS 2013: 84-101 - [c25]Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson:
Protecting a Federated Database Infrastructure against Denial-of-Service Attacks. CRITIS 2013: 26-37 - [c24]Xun Yi, Yuan Miao, Elisa Bertino, Jan Willemson:
Multiparty privacy protection for electronic health records. GLOBECOM 2013: 2730-2735 - [c23]Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson:
High-Performance Qualified Digital Signatures for X-Road. NordSec 2013: 123-138 - [c22]Xun Yi, Jan Willemson, Farid Naït-Abdesselam:
Privacy-Preserving Wireless Medical Sensor Network. TrustCom/ISPA/IUCC 2013: 118-125 - [i8]Sven Laur, Riivo Talviste, Jan Willemson:
From oblivious AES to efficient and secure database join in the multiparty setting. IACR Cryptol. ePrint Arch. 2013: 203 (2013) - [i7]Peeter Laud, Jan Willemson:
Universally composable privacy preserving finite automata execution with low online and offline complexity. IACR Cryptol. ePrint Arch. 2013: 678 (2013) - [i6]Liina Kamm, Jan Willemson:
Secure Floating-Point Arithmetic and Private Satellite Collision Analysis. IACR Cryptol. ePrint Arch. 2013: 850 (2013) - 2012
- [j2]Dan Bogdanov, Margus Niitsoo, Tomas Toft, Jan Willemson:
High-performance secure multi-party computation for data mining applications. Int. J. Inf. Sec. 11(6): 403-418 (2012) - [c21]Dan Bogdanov, Riivo Talviste, Jan Willemson:
Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper). Financial Cryptography 2012: 57-64 - 2011
- [c20]Jan Willemson:
Pseudonymization Service for X-Road eGovernment Data Exchange Layer. EGOVIS 2011: 135-145 - [c19]Sven Laur, Jan Willemson, Bingsheng Zhang:
Round-Efficient Oblivious Database Manipulation. ISC 2011: 262-277 - [c18]Sven Heiberg, Peeter Laud, Jan Willemson:
The Application of I-Voting for Estonian Parliamentary Elections of 2011. VoteID 2011: 208-223 - [i5]Sven Laur, Jan Willemson, Bingsheng Zhang:
Round-efficient Oblivious Database Manipulation. IACR Cryptol. ePrint Arch. 2011: 429 (2011) - [i4]Dan Bogdanov, Riivo Talviste, Jan Willemson:
Deploying secure multi-party computation for financial data analysis. IACR Cryptol. ePrint Arch. 2011: 662 (2011) - 2010
- [c17]Jan Willemson:
Extending the Gordon and Loeb Model for Information Security Investment. ARES 2010: 258-261 - [c16]Aivo Jürgenson, Jan Willemson:
On Fast and Approximate Attack Tree Computations. ISPEC 2010: 56-66
2000 – 2009
- 2009
- [c15]Aivo Jürgenson, Jan Willemson:
Serial Model for Attack Tree Computations. ICISC 2009: 118-128 - 2008
- [c14]Jan Willemson, Arne Ansper:
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. ARES 2008: 572-577 - [c13]Dan Bogdanov, Sven Laur, Jan Willemson:
Sharemind: A Framework for Fast Privacy-Preserving Computations. ESORICS 2008: 192-206 - [c12]Aivo Jürgenson, Jan Willemson:
Computing Exact Outcomes of Multi-parameter Attack Trees. OTM Conferences (2) 2008: 1036-1051 - [i3]Dan Bogdanov, Sven Laur, Jan Willemson:
Sharemind: a framework for fast privacy-preserving computations. IACR Cryptol. ePrint Arch. 2008: 289 (2008) - 2007
- [c11]Aivo Jürgenson, Jan Willemson:
Processing Multi-parameter Attacktrees with Estimated Parameter Values. IWSEC 2007: 308-319 - 2006
- [c10]Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson:
Rational Choice of Security Measures Via Multi-parameter Attack Trees. CRITIS 2006: 235-248 - [c9]Jan Willemson:
On the Gordon & Loeb Model for Information Security Investment. WEIS 2006 - 2005
- [c8]Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson:
Universally Composable Time-Stamping Schemes with Audit. ISC 2005: 359-373 - [i2]Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson:
Universally Composable Time-Stamping Schemes with Audit. IACR Cryptol. ePrint Arch. 2005: 198 (2005) - 2003
- [j1]Maarja Kruusmaa, Jan Willemson:
Covering the path space: a casebase analysis for mobile robot path planning. Knowl. Based Syst. 16(5-6): 235-242 (2003) - [c7]Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson:
Scalable and Efficient PKI for Inter-Organizational Communication. ACSAC 2003: 308-318 - 2002
- [c6]Meelis Roos, Ahto Buldas, Jan Willemson:
Undeniable Replies for Database Queries. BalticDB&IS 2002: 215-226 - [c5]Jan Willemson, Kristo Heero, Uuno Puus:
XML Based Document Management in Estonian Legislative System. BalticDB&IS 2002: 321-330 - 2001
- [c4]Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson:
Improving the Availability of Time-Stamping Services. ACISP 2001: 360-375 - [c3]Arne Ansper, Ahto Buldas, Meelis Roos, Jan Willemson:
Efficient Long-Term Validation of Digital Signatures. Public Key Cryptography 2001: 402-415 - 2000
- [c2]Margus Freudenthal, Sven Heiberg, Jan Willemson:
Personal Security Environment on Palm PDA. ACSAC 2000: 366-372
1990 – 1999
- 1999
- [i1]Jan Willemson:
Certificate Revocation Paradigms. CoRR cs.CR/9909012 (1999) - 1998
- [c1]Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Willemson:
Time-Stamping with Binary Linking Schemes. CRYPTO 1998: 486-501
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint