Travelled to:
1 × Italy
1 × Poland
1 × Taiwan
1 × USA
Collaborated with:
∅ M.G.Muñiz A.Toots R.Tuuling M.Yerokhin M.Dumas L.García-Bañuelos R.Matulevicius A.Pankova M.Pettai P.Pullonen J.Tom
Talks about:
analysi (3) flow (3) inform (2) comput (2) secur (2) cryptographi (1) cryptograph (1) recognit (1) protocol (1) without (1)
Person: Peeter Laud
DBLP: Laud:Peeter
Contributed to:
Wrote 5 papers:
- SAC-2011-MunizL #encryption #on the #protocol #recognition
- On the (im)possibility of perennial message recognition protocols without public-key cryptography (MGM, PL), pp. 1510–1515.
- POPL-2008-Laud #encryption #on the
- On the computational soundness of cryptographically masked flows (PL), pp. 337–348.
- ESOP-2003-Laud #analysis #data flow #encryption
- Handling Encryption in an Analysis for Secure Information Flow (PL), pp. 159–173.
- ESOP-2001-Laud #data flow #program analysis #semantics
- Semantics and Program Analysis of Computationally Secure Information Flow (PL), pp. 77–91.
- FASE-2019-TootsTYDGLMPPPT #analysis #privacy #process
- Business Process Privacy Analysis in Pleak (AT, RT, MY, MD, LGB, PL, RM, AP, MP, PP, JT), pp. 306–312.