Follow
Aivo Kalu
Aivo Kalu
Cybernetica AS
Verified email at cyber.ee
Title
Cited by
Cited by
Year
Computing exact outcomes of multi-parameter attack trees
A Jürgenson, J Willemson
OTM Confederated International Conferences" On the Move to Meaningful …, 2008
822008
Serial model for attack tree computations
A Jürgenson, J Willemson
International Conference on Information Security and Cryptology, 118-128, 2009
652009
Processing multi-parameter attacktrees with estimated parameter values
A Jürgenson, J Willemson
International Workshop on Security, 308-319, 2007
412007
Server-supported RSA signatures for mobile devices
A Buldas, A Kalu, P Laud, M Oruaas
European Symposium on Research in Computer Security, 315-333, 2017
272017
On fast and approximate attack tree computations
A Jürgenson, J Willemson
International Conference on Information Security Practice and Experience, 56-66, 2010
222010
Does secure time-stamping imply collision-free hash functions?
A Buldas, A Jürgenson
International Conference on Provable Security, 138-150, 2007
122007
Pushing back the rain-how to create trustworthy services in the cloud
D Bogdanov, A Kalu
ISACA Journal 3, 49-51, 2013
82013
Efficient Semantics of Parallel and Serial Models of Attack Trees
A Jürgenson
TUT Press, 2010
62010
Efficiency bounds for adversary constructions in black-box reductions
A Buldas, A Jürgenson, M Niitsoo
Australasian Conference on Information Security and Privacy, 264-275, 2009
32009
COMPOSITE DIGITAL SIGNATURES
A Buldas, P Laud, M Oruaas, A Kalu
US Patent App. 16/342,473, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–10