Computing exact outcomes of multi-parameter attack trees A Jürgenson, J Willemson OTM Confederated International Conferences" On the Move to Meaningful …, 2008 | 82 | 2008 |
Serial model for attack tree computations A Jürgenson, J Willemson International Conference on Information Security and Cryptology, 118-128, 2009 | 65 | 2009 |
Processing multi-parameter attacktrees with estimated parameter values A Jürgenson, J Willemson International Workshop on Security, 308-319, 2007 | 41 | 2007 |
Server-supported RSA signatures for mobile devices A Buldas, A Kalu, P Laud, M Oruaas European Symposium on Research in Computer Security, 315-333, 2017 | 27 | 2017 |
On fast and approximate attack tree computations A Jürgenson, J Willemson International Conference on Information Security Practice and Experience, 56-66, 2010 | 22 | 2010 |
Does secure time-stamping imply collision-free hash functions? A Buldas, A Jürgenson International Conference on Provable Security, 138-150, 2007 | 12 | 2007 |
Pushing back the rain-how to create trustworthy services in the cloud D Bogdanov, A Kalu ISACA Journal 3, 49-51, 2013 | 8 | 2013 |
Efficient Semantics of Parallel and Serial Models of Attack Trees A Jürgenson TUT Press, 2010 | 6 | 2010 |
Efficiency bounds for adversary constructions in black-box reductions A Buldas, A Jürgenson, M Niitsoo Australasian Conference on Information Security and Privacy, 264-275, 2009 | 3 | 2009 |
COMPOSITE DIGITAL SIGNATURES A Buldas, P Laud, M Oruaas, A Kalu US Patent App. 16/342,473, 2020 | | 2020 |