Sven Laur
Sven Laur
Associate Professor in Privacy-Preserving Data Mining, University of Tartu
Verified email at ut.ee
Title
Cited by
Cited by
Year
Sharemind: A framework for fast privacy-preserving computations
D Bogdanov, S Laur, J Willemson
European Symposium on Research in Computer Security, 192-206, 2008
7142008
Robust rank aggregation for gene list integration and meta-analysis
R Kolde, S Laur, P Adler, J Vilo
Bioinformatics 28 (4), 573-580, 2012
5382012
On private scalar product computation for privacy-preserving data mining
B Goethals, S Laur, H Lipmaa, T Mielikäinen
International Conference on Information Security and Cryptology, 104-120, 2004
5322004
Efficient mutual data authentication using manually authenticated strings
S Laur, K Nyberg
International Conference on Cryptology and Network Security, 90-107, 2006
2072006
Fixed Point Theory in Ordered Sets and Applications: from differential and integral equations to game theory
S Carl, S Heikkilä
Springer Science & Business Media, 2010
1662010
Cryptographically private support vector machines
S Laur, H Lipmaa, T Mielikäinen
Proceedings of the 12th ACM SIGKDD international conference on Knowledge …, 2006
1582006
A new way to protect privacy in large-scale genome-wide association studies
L Kamm, D Bogdanov, S Laur, J Vilo
Bioinformatics 29 (7), 886-893, 2013
1272013
Round-efficient oblivious database manipulation
S Laur, J Willemson, B Zhang
International Conference on Information Security, 262-277, 2011
922011
Rmind: a tool for cryptographically secure statistical analysis
D Bogdanov, L Kamm, S Laur, V Sokk
IEEE Transactions on Dependable and Secure Computing 15 (3), 481-495, 2016
732016
From oblivious AES to efficient and secure database join in the multiparty setting
S Laur, R Talviste, J Willemson
International Conference on Applied Cryptography and Network Security, 84-101, 2013
622013
Sas-based group authentication and key agreement protocols
S Laur, S Pasini
International Workshop on Public Key Cryptography, 197-213, 2008
552008
Privacy-preserving statistical data analysis on federated databases
D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt, R Talviste, ...
Annual Privacy Forum, 30-55, 2014
402014
A new protocol for conditional disclosure of secrets and its applications
S Laur, H Lipmaa
International Conference on Applied Cryptography and Network Security, 207-225, 2007
352007
A universal toolkit for cryptographically secure privacy-preserving data mining
D Bogdanov, R Jagomägis, S Laur
Pacific-Asia Workshop on Intelligence and Security Informatics, 112-126, 2012
322012
From input private to universally composable secure multi-party computation primitives
D Bogdanov, P Laud, S Laur, P Pullonen
2014 IEEE 27th Computer Security Foundations Symposium, 184-198, 2014
302014
Knowledge-binding commitments with applications in time-stamping
A Buldas, S Laur
International Workshop on Public Key Cryptography, 150-165, 2007
302007
A practical analysis of oblivious sorting algorithms for secure multi-party computation
D Bogdanov, S Laur, R Talviste
Nordic Conference on Secure IT Systems, 59-74, 2014
282014
User-aided data authentication
S Laur, S Pasini
International Journal of Security and Networks 4 (1-2), 69-86, 2009
282009
Estnltk-nlp toolkit for estonian
S Orasmaa, T Petmanson, A Tkachenko, S Laur, HJ Kaalep
Proceedings of the Tenth International Conference on Language Resources and …, 2016
272016
Do broken hash functions affect the security of time-stamping schemes?
A Buldas, S Laur
International Conference on Applied Cryptography and Network Security, 50-65, 2006
262006
The system can't perform the operation now. Try again later.
Articles 1–20