A user interface for a game-based protocol verification toolLaud, Peeter; Tšahhirov, IljaFormal Aspects in Security and Trust : 6th International Workshop : FAST 2009, Eindhoven, Netherlands, November 5-6, 2009 : Revised Selected Papers2010 / p. 263-278 : ill https://research.cyber.ee/~peeter/research/fast09.pdf Application of dependency graphs to security protocol analysisTšahhirov, Ilja; Laud, PeeterSymposium on Trustworthy Global Computing : Sophia-Antipolis, France, November 5-6, 20072007 / ? p Application of dependency graphs to security protocol analysisTšahhirov, Ilja; Laud, PeeterTrustworthy global computing2008 / p. 294-311 : ill https://link.springer.com/chapter/10.1007/978-3-540-78663-4_20 Attribute-based encryption for named data networkingLenin, Aleksandr; Laud, PeeterICN '21 : Proceedings of the 8th ACM Conference on Information-Centric Networking2021 / p. 118–120 https://doi.org/10.1145/3460417.3483371 Bounded pre-image awareness and the security of hash-tree keyless signaturesBuldas, Ahto; Laanoja, Risto; Laud, Peeter; Truu, AhtoProvable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014 : proceedings2014 / p. 130-145 : ill CACS: A cloud privacy-preserving attribute management systemKalu, Aivo; Kus, Burak Can; Laud, Peeter; Leung, Kin Long; Snetkov, Nikita; Vakarjuk, JelizavetaProceedings of the 18th International Conference on Availability, Reliability and Security (ARES), Benevento Italy, 29 August 2023 - 1 September, 20232023 / art. 122, p. 1-9 https://doi.org/10.1145/3600160.3605022 A comparison-based methodology for the security assurance of novel systemsLaud, Peeter; Vakarjuk, JelizavetaESORICS 2022: Computer Security. ESORICS 2022 International Workshops : conference proceedings2023 / p. 625-644 https://doi.org/10.1007/978-3-031-25460-4_36 Digital signature in automatic analyses for confidentiality against active adversariesTšahhirov, Ilja; Laud, PeeterNORDSEC 2005 : proceedings of the 10th Nordic Workshop on Secure IT Systems October 20-21, 2005, Tartu, Estonia2005 / p. 29-41 Eliminating counterevidence with applications to accountable certificate managementBuldas, Ahto; Laud, Peeter; Lipmaa, HelgerJournal of computer security2002 / 3, p. 273-296 Elutähtsate teenuste ristsõltuvuse analüüsLaud, Peeter; Bahsi, Hayretdin; Lenin, Aleksandr; Mändmaa, Kalev; Priisalu, Jaan; Tuuling, ReedikSõjateadlane2020 / lk. 207-237 https://www.ester.ee/record=b4555087*est GraafidBuldas, Ahto; Laud, Peeter; Villemson, Jan2003 https://www.ester.ee/record=b1804744*est GraafidBuldas, Ahto; Laud, Peeter; Villemson, Jan2008 https://www.ester.ee/record=b2345899*est Mapping the information flows for the architecture of a nationwide situation awareness system : (Poster)Bahsi, Hayretdin; Dieves, Veiko; Kangilaski, Taivo; Laud, Peeter; Mõtus, Leo; Murumets, Jaan; Ploom, Illimar; Priisalu, Jaan; Seeba, Mari; Täks, Ermo; Tammel, Kaide; Tammpuu, Piia; Taveter, Kuldar; Trumm, Avo; Truusa, Tiia-Triin; Vihalemm, TriinProceedings 2019 IEEE International Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA) : Las Vegas, NV, USA, 8-11 April 20192019 / p. 152–157 https://doi.org/10.1109/COGSIMA.2019.8724167 New linking schemes for digital time-stampingBuldas, Ahto; Laud, PeeterProceedings of the CISC'98, Seoul, Korea1998 / p. 112-123 Rational choice of security measures via multi-parameter attack treesBuldas, Ahto; Laud, Peeter; Priisalu, Jaan; Saarepera, Märt; Willemson, Jan1st International Workshop on Critical Information Infrastructures Security : Samos Island, Greece, August 30 - September 2, 20062006 / p. 232-243 https://link.springer.com/chapter/10.1007/11962977_19 Server-supported decryption for mobile devicesKirss, Johanna Maria; Laud, Peeter; Snetkov, Nikita; Vakarjuk, JelizavetaSecurity and Trust Management : 18th International Workshop, STM 2022 Copenhagen, Denmark, September 29, 2022 : proceedings2023 / p. 71-81 https://doi.org/10.1007/978-3-031-29504-1_4 Journal metrics at Scopus Article at Scopus Server-supported RSA signatures for mobile devicesBuldas, Ahto; Kalu, Aivo; Laud, Peeter; Oruaas, MartComputer Security - ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11–15, 2017 : proceedings, part I2017 / p. 315-333 : ill http://doi.org/10.1007/978-3-319-66402-6_19 Time-stamping with binary linking schemesBuldas, Ahto; Laud, Peeter; Lipmaa, Helger; Willemson, JanAdvances in Cryptology : CRYPTO'98 : 18th Annual International Cryptology Conference, Santa Barbara, California, USA August 23–27, 1998 : proceedings1998 / p. 486-501 : ill Type systems equivalent to dataflow analyses for imperative languagesLaud, Peeter; Uustalu, Tarmo; Vene, VarmoProceedings of 3rd APPSEM II Workshop : APPSEM'05 : Frauenchiemsee, September 20052005 / [12] p Universally composable time-stamping schemes with auditBuldas, Ahto; Laud, Peeter; Saarepera, Märt; Villemson, JanLecture notes in computer science2005 / p. 359-373