A user interface for a game-based protocol verification toolLaud, Peeter; Tšahhirov, IljaFormal Aspects in Security and Trust : 6th International Workshop : FAST 2009, Eindhoven, Netherlands, November 5-6, 2009 : Revised Selected Papers2010 / p. 263-278 : ill https://research.cyber.ee/~peeter/research/fast09.pdf Application of dependency graphs to security protocol analysisTšahhirov, Ilja; Laud, PeeterSymposium on Trustworthy Global Computing : Sophia-Antipolis, France, November 5-6, 20072007 / ? p Application of dependency graphs to security protocol analysisTšahhirov, Ilja; Laud, PeeterTrustworthy global computing2008 / p. 294-311 : ill https://link.springer.com/chapter/10.1007/978-3-540-78663-4_20 Assymetric encryption in automatic analyses for confidentiality against active adversariesTšahhirov, IljaEleventh Estonian Winter School in Computer Science (EWSCS'06) : Park Hotel Palmse, Lahemaa, Estonia : March 5-10, 20062006 / [1] p Digital signature in automatic analyses for confidentiality against active adversariesTšahhirov, Ilja; Laud, PeeterNORDSEC 2005 : proceedings of the 10th Nordic Workshop on Secure IT Systems October 20-21, 2005, Tartu, Estonia2005 / p. 29-41 Digital signature systems - an interoperability outlookTšahhirov, Ilja; Bolotov, Jevgeni; Tepandi, JaakScientific proceedings of Riga Technical University. 5. [series], Computer science2004 / p. 60-68 Security protocols analysis in the computational model - dependency flow graphs-based approach = Turvaprotokollide analüüs arvutuslikul mudelil - sõltuvusgraafidel põhinev lähenemisviisTšahhirov, Ilja2008 https://www.ester.ee/record=b2449152*est Wireless PKI security and mobile votingTepandi, Jaak; Vassiljev, Stanislav; Tšahhirov, IljaComputer2010 / 6, p. 54-60 https://www.computer.org/csdl/magazine/co/2010/06/mco2010060054/13rRUILLkGV