High-performance secure multi-party computation for data mining applications D Bogdanov, M Niitsoo, T Toft, J Willemson International Journal of Information Security 11, 403-418, 2012 | 257 | 2012 |
Why do students choose to study Information and Communications Technology? K Kori, M Pedaste, M Niitsoo, R Kuusik, H Altin, E Tõnisson, I Vau, ... Procedia-Social and Behavioral Sciences 191, 2867-2872, 2015 | 28 | 2015 |
PREDICTORS OF INFORMATICS STUDENTS’PROGRESS AND GRADUATION IN UNIVERSITY STUDIES M Niitsoo, M Paales, M Pedaste, L Siiman, E Tõnisson INTED2014 Proceedings, 2521-2529, 2014 | 24 | 2014 |
Optimally tight security proofs for hash-then-publish time-stamping A Buldas, M Niitsoo Australasian Conference on Information Security and Privacy, 318-335, 2010 | 22 | 2010 |
Python prevails V Leping, M Lepp, M Niitsoo, E Tõnisson, V Vene, A Villems Proceedings of the International Conference on Computer Systems and …, 2009 | 22 | 2009 |
Optimal adversary behavior for the serial model of financial attack trees M Niitsoo International Workshop on Security, 354-370, 2010 | 18 | 2010 |
Estimating differential expression from multiple indicators S Ilmjaerv, CA Hundahl, R Reimets, M Niitsoo, R Kolde, J Vilo, E Vasar, ... Nucleic Acids Research 42 (8), e72-e72, 2014 | 16 | 2014 |
Matchmysound: Introducing feedback to online music education K Kão, M Niitsoo New Horizons in Web Based Learning: ICWL 2014 International Workshops, SPeL …, 2014 | 9 | 2014 |
Oracle separation in the non-uniform model A Buldas, S Laur, M Niitsoo International Conference on Provable Security, 230-244, 2009 | 6 | 2009 |
Black-box Oracle Separation Techniques with Applications in Time-stamping M Niitsoo | 5 | 2011 |
E-learning Quality Assurance System for E-courses in Estonia M Dremljuga-Telk, E Koitla, K Kusnets, M Kusmin, M Niitsoo, LPT Plank, ... Developing Quality Cultures in Teacher Education: Expanding Horizons in …, 2011 | 5 | 2011 |
Improved protocols for the SHAREMIND virtual machine D Bogdanov, M Niitsoo, T Toft, J Willemson Research report T-4-10, Cybernetica, 2010 | 5 | 2010 |
Black-box separations and their adaptability to the non-uniform model A Buldas, M Niitsoo Australasian Conference on Information Security and Privacy, 152-167, 2013 | 3 | 2013 |
Efficiency bounds for adversary constructions in black-box reductions A Buldas, A Jürgenson, M Niitsoo Australasian Conference on Information Security and Privacy, 264-275, 2009 | 3 | 2009 |
Can we construct unbounded time-stamping schemes from collision-free hash functions? A Buldas, M Niitsoo International Conference on Provable Security, 254-267, 2008 | 3 | 2008 |
Deterministic random oracles M Niitsoo International Conference on Provable Security, 88-103, 2012 | 1 | 2012 |
Cryptographic reductions M Niitsoo | 1 | 2008 |
OPTIMIZING THE INTERACTION BETWEEN A SELF-LEARNING GUITAR STUDENT AND A SOUND RECOGNITION BASED EDUCATIONAL GAME. K KÄO, M NIITSOO CFMAE: The Changing Face of Music & Art Education 7 (1), 2015 | | 2015 |
Can we Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions M Niitsoo | | 2008 |
Fairness in two-party random sampling M Niitsoo | | 2008 |