Buldas, Ahto, 1967-
Ahto Buldas eesti informaatik ja krüptograaf
Buldas, Ahto.
VIAF ID: 311200433 (Personal)
Permalink: http://viaf.org/viaf/311200433
Preferred Forms
- 100 0 _ ‡a Ahto Buldas ‡c eesti informaatik ja krüptograaf
- 100 1 _ ‡a Buldas, Ahto
-
-
4xx's: Alternate Name Forms (3)
Works
Title | Sources |
---|---|
An algebraic approach to the structure of graphs / Ahto Buldas. - Tallin, 1999. | |
Are the Current System Engineering Practices Sufficient to Meet Cyber Crime? | |
Attribute evaluation on attack trees with incomplete information | |
Digitaalallkirja juurutamine riigiasutustes strateegiline plaan | |
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? | |
Efficiency Bounds for Adversary Constructions in Black-Box Reductions | |
Efficient Record-Level Keyless Signatures for Audit Logs | |
Eliminating counterevidence with applications to accountable certificate management1 | |
English-Estonian dictionary of data protection and information security. | |
Graafid | |
High-Performance Qualified Digital Signatures for X-Road | |
Improving the Availability of Time-Stamping Services | |
Infosüsteemide turve. | |
Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world | |
Knowledge-Binding Commitments with Applications in Time-Stamping | |
Long-Term Secure Commitments via Extractable-Binding Commitments | |
Oracle Separation in the Non-uniform Model | |
Protecting a Federated Database Infrastructure against Denial-of-Service Attacks | |
Räsifunktsioonidel põhinevad serveri toega digitaalse signeerimise lahendused. | |
Rational Choice of Security Measures Via Multi-parameter Attack Trees | |
Reliable and efficient determination of the likelihood of rational attacks = Ratsionaalsete rünnete tõepära efektiivne ja usaldusväärne kindlakstegemine | |
Scalable and eficient PKI for inter-organizational communication | |
Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size | |
A Server-Assisted Hash-Based Signature Scheme | |
Server-Supported RSA Signatures for Mobile Devices | |
Simple Infeasibility Certificates for Attack Trees | |
Size-efficient interval time stamps | |
Time-stamping with binary linking schemes | |
Turbe tehnoloogia. | |
Turvarisk. | |
An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation | |
Upper Bounds for Adversaries’ Utility in Attack Trees |