Ahto Buldas
Orcid: 0000-0002-6413-8258
According to our database1,
Ahto Buldas
authored at least 52 papers
between 1998 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2023
SN Comput. Sci., November, 2023
2022
An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation.
IEEE Access, 2022
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2022
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2022
2020
Comput. Secur., 2020
Blockchain Technology: Intrinsic Technological and Socio-Economic Barriers - FDSE'2020 Keynote.
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Advances in Information and Computer Security, 2019
2017
Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world.
Int. J. Serv. Technol. Manag., 2017
IACR Cryptol. ePrint Arch., 2017
Long-Term Secure Time-Stamping Using Preimage-Aware Hash Functions - (Short Version).
Proceedings of the Provable Security, 2017
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
Proceedings of the Critical Information Infrastructures Security, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?.
Proceedings of the Provable Security, Second International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Provable Security, 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Advances in Information and Computer Security, 2007
2006
Proceedings of the Critical Information Infrastructures Security, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
2004
Proceedings of the Advances in Cryptology, 2004
2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
J. Comput. Secur., 2002
Undeniable Replies for Database Queries.
Proceedings of the Baltic Conference, 2002
2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Public Key Cryptography, 2000
1998
New linking schemes for digital time-stamping.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Proceedings of the Advances in Cryptology, 1998