Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Sven LaurAssociate Professor in Privacy-Preserving Data Mining, University of TartuVerified email at ut.ee
- Liina KammSenior researcher at Cybernetica ASVerified email at cyber.ee
- Jan WillemsonSenior researcher, CyberneticaVerified email at cyber.ee
- Riivo Talvisteresearcher, Cybernetica ASVerified email at cyber.ee
- Pille Pullonen-RaudvereCyberneticaVerified email at cyber.ee
- Peeter LaudCybernetica ASVerified email at cyber.ee
- Margus NiitsooUniversity of TartuVerified email at ut.ee
- Tomas ToftPostDoc, Computer Science Dept., Aarhus UniversityVerified email at cs.au.dk
- Yehuda LindellCryptographer at Coinbase; Professor of Computer Science, Bar-Ilan University (on leaveVerified email at biu.ac.il
- Marko JõemetsProject Manager, Cybernetica ASVerified email at cyber.ee
- Reimo RebaneCybernetica ASVerified email at cyber.ee
- Pille Pruulmann-VengerfeldtProfessor in media and communication, Malmö UniversityVerified email at mau.se
- Nigel SmartKU LeuvenVerified email at kuleuven.be
- Rebecca N. WrightBarnard CollegeVerified email at barnard.edu
- Jaak ViloProf. of Bioinformatics, Institute of Computer Science, University of Tartu, EstoniaVerified email at ut.ee
- Benny PinkasBar Ilan University and Aptos LabsVerified email at biu.ac.il
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
- Shin'ichiro MatsuoResearch Professor of Computer Science, Georgetown UniversityVerified email at georgetown.edu