Laud, Peeter
54  results:
Search for persons X
?
2

CACS: A Cloud Privacy-Preserving Attribute Management Syste:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
Kalu, Aivo ; Kus, Burak Can ; Laud, Peeter... - p. 1-9 , 2023
 
?
3

Server-Supported Decryption for Mobile Devices:

, In: Security and Trust Management; Lecture Notes in Computer Science,
 
?
4

A Comparison-Based Methodology for the Security Assurance o..:

, In: Computer Security. ESORICS 2022 International Workshops; Lecture Notes in Computer Science,
Laud, Peeter ; Vakarjuk, Jelizaveta - p. 625-644 , 2023
 
?
5

A Parallel Privacy-Preserving Shortest Path Protocol from a..:

, In: Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology,
Anagreh, Mohammad ; Laud, Peeter - p. 120-135 , 2023
 
?
6

Interpreting Epsilon of Differential Privacy in Terms of Ad..:

, In: 2022 IEEE 35th Computer Security Foundations Symposium (CSF),
Pankova, Alisa ; Laud, Peeter - p. 96-111 , 2022
 
?
8

Linear-Time Oblivious Permutations for SPDZ:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
Laud, Peeter - p. 245-252 , 2021
 
?
10

Attribute-based encryption for named data networking:

, In: Proceedings of the 8th ACM Conference on Information-Centric Networking,
Lenin, Aleksandr ; Laud, Peeter - p. 118-120 , 2021
 
?
11

Multi-level privacy analysis of business processes: the Ple..:

Dumas, Marlon ; García-Bañuelos, Luciano ; Jääger, Joosep...
International Journal on Software Tools for Technology Transfer.  24 (2021)  2 - p. 183-203 , 2021
 
?
12

Efficient Permutation Protocol for MPC in the Head:

, In: Security and Trust Management; Lecture Notes in Computer Science,
Laud, Peeter - p. 62-80 , 2021
 
?
13

Transitioning from testbeds to ships: an experience study i..:

Archer, Dave ; August, Michael A ; Bouloukakis, Georgios...
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology.  19 (2020)  3 - p. 501-517 , 2020
 
?
14

Secure Multi-party Computation for Inter-organizational Pro..:

, In: Enterprise, Business-Process and Information Systems Modeling; Lecture Notes in Business Information Processing,
 
?
15

A Framework of Metrics for Differential Privacy from Local ..:

Laud, Peeter ; Pankova, Alisa ; Pettai, Martin
Proceedings on Privacy Enhancing Technologies.  2020 (2020)  2 - p. 175-208 , 2020
 
1-15