Sven Laur
Sven Laur
Associate Professor in Privacy-Preserving Data Mining, University of Tartu
Verified email at
Cited by
Cited by
Sharemind: A framework for fast privacy-preserving computations
D Bogdanov, S Laur, J Willemson
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
Robust rank aggregation for gene list integration and meta-analysis
R Kolde, S Laur, P Adler, J Vilo
Bioinformatics 28 (4), 573-580, 2012
On private scalar product computation for privacy-preserving data mining
B Goethals, S Laur, H Lipmaa, T Mielikäinen
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
Efficient mutual data authentication using manually authenticated strings
S Laur, K Nyberg
International Conference on Cryptology and Network Security, 90-107, 2006
Cryptographically private support vector machines
S Laur, H Lipmaa, T Mielikäinen
Proceedings of the 12th ACM SIGKDD international conference on Knowledge …, 2006
A new way to protect privacy in large-scale genome-wide association studies
L Kamm, D Bogdanov, S Laur, J Vilo
Bioinformatics 29 (7), 886-893, 2013
Round-efficient oblivious database manipulation
S Laur, J Willemson, B Zhang
Information Security: 14th International Conference, ISC 2011, Xi’an, China …, 2011
Rmind: a tool for cryptographically secure statistical analysis
D Bogdanov, L Kamm, S Laur, V Sokk
IEEE Transactions on Dependable and Secure Computing 15 (3), 481-495, 2016
From oblivious AES to efficient and secure database join in the multiparty setting
S Laur, R Talviste, J Willemson
Applied Cryptography and Network Security: 11th International Conference …, 2013
Privacy-preserving statistical data analysis on federated databases
D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt, R Talviste, ...
Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014
Sas-based group authentication and key agreement protocols
S Laur, S Pasini
Public Key Cryptography–PKC 2008: 11th International Workshop on Practice …, 2008
A practical analysis of oblivious sorting algorithms for secure multi-party computation
D Bogdanov, S Laur, R Talviste
Nordic Conference on Secure IT Systems, 59-74, 2014
Estnltk-nlp toolkit for estonian
S Orasmaa, T Petmanson, A Tkachenko, S Laur, HJ Kaalep
Proceedings of the Tenth International Conference on Language Resources and …, 2016
Genome-wide study identifies association between HLA-B∗ 55: 01 and self-reported penicillin allergy
K Krebs, J Bovijn, N Zheng, M Lepamets, JC Censin, T Jürgenson, D Särg, ...
The American Journal of Human Genetics 107 (4), 612-621, 2020
A new protocol for conditional disclosure of secrets and its applications
S Laur, H Lipmaa
International Conference on Applied Cryptography and Network Security, 207-225, 2007
Linear ensembles of word embedding models
A Muromägi, K Sirts, S Laur
arXiv preprint arXiv:1704.01419, 2017
Implementation and evaluation of an algorithm for cryptographically private principal component analysis on genomic data
D Bogdanov, L Kamm, S Laur, V Sokk
IEEE/ACM transactions on computational biology and bioinformatics 15 (5 …, 2018
A universal toolkit for cryptographically secure privacy-preserving data mining
D Bogdanov, R Jagomägis, S Laur
Pacific-asia workshop on intelligence and security informatics, 112-126, 2012
Knowledge-binding commitments with applications in time-stamping
A Buldas, S Laur
International Workshop on Public Key Cryptography, 150-165, 2007
Named entity recognition in estonian
A Tkachenko, T Petmanson, S Laur
Proceedings of the 4th Biennial International Workshop on Balto-Slavic …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20