Morgan, D., Parsovs, A.  Using the Estonian Electronic Identity Card for Authentication to a Machine. NordSec 2017: Secure IT Systems pp 175-191, Springer 2017.

Willemson, J.  Bits or Paper: which should get to carry your vote?  Journal of Information Security and Applications, Elsevier, Volume 38, February 2018, Pages 124-131.

Kubjas, I., Pikma, T., Willemson, J.  Estonian Voting Verification Mechanism Revisited Again. In Proceedings of the Second International Joint Conference E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, LNCS, volume 10615, pp. 306-317, Springer 2017.

Fauzi, P., Lipmaa, H., Siim, J., Zając, M.  An Efficient Pairing-Based Shuffle Argument. ASIACRYPT 2017: Advances in Cryptology – ASIACRYPT 2017 pp 97-127.

Mooses, K., Oja, M., Reisberg, S., Vilo, J., Kull, M.  Validating Fitbit Zip for monitoring physical activity of children in school: a cross-sectional study. Submitted to BMC Public Health.

Salnikov-Tarnovski, N.  Deceived by monitoring. JFokus conference, Stockholm, Sweden. 06.-08.02.2017.


Kõivumägi, E., Vait, M., Hadachi, A., Singer, G., Vainikko E.  Real Time Movement Labeling of Mobile Event Data. Journal of Location Based Services, Editor: Taylor & Francis, 2015.

Krips, T., Willemson, J.  Point-counting method for embarrassingly parallel evaluation in secure computation. Foundations & Practice of Security 2015, 25.-29.10.2015, Clermont-Ferrand, France. To be published in volume 9482 of Lecture Notes in Computer Science, Springer.

Pettai, M., Laud, P.  Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries. In IEEE 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 14-17 July 2015.

Pettai, M., Laud, P.  Combining Differential Privacy and Secure Multiparty Computation. Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, 7.-11.12.2015, pages 421-430.

Daneshmand, M., Traumann, A., Anbarjafari, G.  3D Size-Estimation based on the Geodesic Distance Measured by Photogrammetric Scanning Device. 6th Int. Conf. on 3D Body Scanning Technologies, Lugano. Switzerland: Hometrica Consulting, 221−231.

Daneshmand, M., Aabloo, A., Anbarjafari, G.  Size-Dictionary Interpolation for Robot’s Adjustment. Frontiers in Bioengineering and Biotechnology, 3, 63-70.

Traumann, A., Daneshmand, M., Escalera, S., Anbarjafari, G.  Vision-based Accurate 3D Measurement Using Optical Depth Information. Electronics Letters Journal, 51 (18), 1420−1422.

Traumann, A., Anbarjafari, G., Escalera, S.  A new Retexturing Method for Virtual Fitting Room Using Microsoft Kinect 2 Camera. Computer Vision and Pattern Recognition Conference. Boston, USA: IEEE, 75−79.

Daneshman, M., Aabloo, A., Ozcinar, c., Anbarjafari, G.  Real-time, Automatic Shape-Changing Robot Adjustment and Gender Classification. Signal, Image and Video Processing, 1−8.

Heiberg, S., Parsovs, A., Willemson, J.  Log Analysis of Estonian Internet Voting 2013–2014. 5th International Conference on E-Voting and Identity, VoteID 2015, Bern, Switzerland, September 2nd-4th, 2015. Ed. Rolf Haenni, Reto E. Koenig, Douglas Wikström. Springer, 19−34. (Lecture Notes in Computer Science; 9269).

Ahas, R., Aasa, A., Yuan, Y., Smoreda, Z., Raubal, M., Liu, Y., Ziemlicki, C., Zook, M., Tiru, M.  Everyday Space-Time Geographies: Using mobile phone based sensor data to monitor urban activity in Harbin. Paris and Tallinn, International Journal of Geographical Information Science 2015.

Raun, J., Ahas, R., Tiru, M.  Distinguishing tourism destinations with behavioural data from mobile positioning databases. Annals of Tourism Research.

Kikas, R., Dumas, M., Saabas, A.  Explaining International Migration in the Skype Network: The Role of Social Network Features. ACM Workshop on Social Media World Sensors (Sideways@HT 2015). ACM, 17−22.

Verenich, I., Dumas, M., Kikas, R., Melnikov, D.  Combining Propensity and Influence Models for Product Adoption Prediction. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, Paris, France. Ed. Jian Pei, Fabrizio Silvestri, Jie Tang:. ACM, 49−56.

Teinemaa, I., Leontjeva, A., Dumas, M., Kikas, R.  Community-Based Prediction of Activity Change in Skype. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, Paris, France. Ed. Jian Pei, Fabrizio Silvestri, Jie Tang. ACM, 73−80.

Rossetti, G., Pappalardo, L., Kikas, R., Pedreschi, D., Giannotti, F., Dumas, M.  Community-centric analysis of user engagement in Skype social networks. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, Paris, France. Ed. Jian Pei, Fabrizio Silvestri, Jie Tang. ACM, 547−552.

Allikivi, M-L.  Clustering-based motif discovery from short peptides. M.Sc. University of Tartu

Panarin, A.  Logs Mining Based Approach to eCommerce Customer Classification. M.Sc. University of Tartu.

Särg, D.  Internetikeele süntaktiline analüüs kitsenduste grammatikaga. MA. University of Tartu.


Heiberg, S., Willemson, J.  Verifiable Internet Voting in Estonia. In: Krimmer, R., Volkamer, M.: Proceedings of Electronic Voting 2014 (EVOTE2014), TUT Press, Tallinn, pages 23-29.

Laud, P., Pankova, A.  Verifiable Computation in Multiparty Protocols with Honest Majority. IACR Cryptology ePrint Archive 2014: 60 (2014).

Pettai, M., Laud, P.  Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries. IACR Cryptology ePrint Archive 2014: 240 (2014).

Krips, T., Willemson, J.  Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations. IACR Cryptology ePrint Archive 2014: 221 (2014).

Šor, V., Srirama, S. N.  Memory Leak Detection in Java: Taxonomy and Classification of Approaches. The Journal of Systems & Software (2014) ISSN: 0164-1212, 96(1):139-151, 2014. Elsevier, DOI: 10.1016/j.jss.2014.06.005.

Šor, V., Srirama, S. N., Salnikov-Tarnovski, N.  Memory leak detection in Plumbr. Journal of Software Practice and Experience, ISSN: 1097-024X, Wiley, DOI: 10.1002/spe.2275.

Karsai, M., Iñiguez, G., Kaski, K., Kertész, J.  Complex contagion process in spreading of online innovation. Journal of the Royal Society Interface Volume 11, Number 101, 2014.

Saar, T., Dumas, M., Kaljuve, M., Semenenko, N.  Cross-browser testing in Browserbite. In Proc. of 14th Int. Conf. on Web Engineering, ICWE 2014.

Heiberg, S., Willemson, J.  Modeling Threats of a Voting Method. Chapter 7 of Dimitrios Zissis and Dimitrios Lekkas (editors) Design, Development, and Use of Secure Electronic Voting Systems, IGI Global, 2014, pages 128-148

Floreskul, V., Tretyakov, K., Dumas, M.  Memory-Efficient Fast Shortest Path Estimation in Large Social Networks. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM’2014), Ann Arbor, MI, USA, June 2014.

Hadachi, A., Batrashev, O., Lind, A., Singer, A., Vainikko, E.  Cell phone Subscribers Mobility Prediction Using an Enhance Markov Chain Algorithm. In: Intelligent Vehicles Symposium (IV), 2014 IEEE: 2014 Intelligent Vehicles Symposium; Dearborn, Michigan, USA; June 8-11, 2014.

Šor, V.  Statistical approach for memory leak detection in Java applications. PhD thesis. University of Tartu.

Verenich, I.  Prediction of Product Adoption in Social Networks Using the Network Value of Users. MSc thesis, University of Tartu

Teinemaa, I.  Community-Based Prediction of Activity Decay in a Social Network. MSc thesis, University of Tartu


Kõivumägi, E., Vait, M., Hadachi, A., Singer, G.  Real Time Movement Labeling of Mobile Event Streams. Conference presentation at Mobile Ghent ’13.

Sirel, R., Reisberg, S., Merzin, M., Pruulmann, J., Kalda, R., Vilo, J.  Elektrooniliste terviselugude analüüsimise võimalused Tartu perearstide infosüsteemi näitel. Eesti Arst 2013, 92(8), 452-459.

Heiberg, S.  New Technologies for Democratic Elections. In: Business Process Management Workshops, Lecture Notes in Business Information Processing Volume 132, 2013, pp 630-635, Springer 2013.

Laur, S., Talviste, R., Willemson, J.  From oblivious AES to efficient and secure database join in the multiparty setting. 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), LNCS 7954, pp. 84-101. Springer, 2013.

Pankova, A., Laud, P., Pettai, M., Randmets, J.  Specifying Sharemind’s Arithmetic Black Box. PETShop: The Workshop on Language Support for Privacy Enhancing Technologies, Berlin, Germany, November 4th, 2013. Association for Computing Machinery (ACM) , 2013, 19 – 21.

Pankova, A., Laud, P.  On the (Im)possibility of Privately Outsourcing Linear Programming. CCSW 2013: The ACM Cloud Computing Security Workshop, Berlin, Germany, November 8th, 2013. (Toim.) Juels, Ari; Parno, Bryan. Association for Computing Machinery (ACM) , 2013, 55 – 64.

Pankova, A., Laud, P.  New Attacks against Transformation-Based Privacy-Preserving Linear Programming. Security and Trust Management – 9th International Workshop (STM 2013), Royal Holloway University of London, September 12-13. (Toim.) Accorsi, Rafael; Ranise, Silvio. Springer, 2013, (Lecture Notes in Computer Science; 8203), 17 – 32.

Leontjeva, A., Goldszmidt, M., Xie, Y., Yu, F., Abadi, M.  Early security classification of skype users via machine learning. In Proceedings of the 2013 ACM workshop on Artificial intelligence and security (AISec ’13). ACM, New York, NY, USA, 35-44.

Semenenko, N., Saar, T., Dumas, M.  Browserbite: Accurate Cross-Browser Testing via Machine Learning Over Image Features. In Proc. of the 29th IEEE International Conference on Software Maintenance (ICSM 2013 – Industry Track), Eindhoven, The Netherlands. September 2013. IEEE Computer Society.

Šor, V., Treier, T., Srirama, S. N.  Improving statistical approach for memory leak detection using machine learning. In Proc. of the 29th IEEE International Conference on Software Maintenance (ICSM 2013 – Industry Track), Eindhoven, The Netherlands. September 2013. IEEE Computer Society.

Kikas, R., Dumas, M., Karsai, M.  Bursty egocentric network evolution in Skype. Social Network Analysis and Mining, July 2013.

Abels, A., Kruusmaa, M.  Construction of a Female Shape-Changing Robotic Mannequin. Journal of Automation and Control Engineering, Vol. 1, No. 2, June 2013.

Abels, A., Kruusmaa, M.  Shape Control of an Anthropomorphic Tailoring Robot Mannequin. International Journal of Humanoid Robotics, Vol. 10, No. 2m June 2013.

Sirel, R.  Meetodeid tekstide leksikaalsete ja grammatiliste erinevuste tuvastamiseks meditsiiniliste tarbetekstide näitel. Eesti Rakenduslingvistika Ühingu Aastaraamat, 9, 265 – 278.

Kamm, L., Bogdanov, D., Laur, S., Vilo, J.  A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics. First published online Feb. 14, 2013, doi:10.1093/bioinformatics/btt066.

Freudenthal, M.  Simpl: A Toolkit for Domain-Specific Language Development in Enterprise Information Systems. PhD thesis. University of Tartu.

Kabanov, J.  Towards a more productive Java EE ecosystem. PhD thesis. University of Tartu.

Bogdanov, D.  Sharemind: programmable secure computations with practical applications. PhD thesis. University of Tartu.

Tarkin, K.  Possibilities to improve semantic interoperability in medical data exchange in Estonia with Snomed CT: Analysis of discharge summary. MSc thesis, Tallinn University of Technology.

Semenenko, N.  Accurate diagnosis of cross-browser compatibility issues via machine learning. MSc thesis. University of Tartu.

Pankova, A.  Insecurity of Transformation-Based Privacy-Preserving Linear Programming. MSc thesis, University of Tartu.

Kaljuve, M.  Cross-Browser Document Capture System. MSc thesis, Univeristy of Tartu.

Floreskul, V.  Memory-Efficient Fast Shortest Path Distance Estimation in Large Graphs. MSc thesis. University of Tartu.


Bogdanov, D., Niitsoo, M., Toft, T., Willemson, J.  High-performance secure multi-party computation for data mining applications. International Journal of Information Security, Springer, 2012, Volume 11, Number 6, pages 403-418.

Heiberg, S., Laud, P., Willemson, J.  The Application of I-voting for Estonian Parliamentary Elections of 2011. In Aggelos Kiayias and Helger Lipmaa, editors, E-Voting and Identity, VoteID 2011, LNCS 7187, pp. 208-223. Springer, 2012.

Bogdanov, D., Talviste, R., Willemson, J.  Deploying Secure Multi-Party Computation for Financial Data Analysis. (Short Paper) In Angelos Keromytis, editor, Financial Cryptography and Data Security, LNCS 7397, pp. 57-64. Springer, 2012.

Šor, V., Srirama, S. N.  Evaluation of embeddable graph manipulation libraries in memory constrained environments. In Proc. of the ACM Research in Applied Computation Symposium (RACS 2012), Oct. 23-26 2012 San Antonio, TX, USA, pp. 269-275, ACM Press.

Bogdanov, D., Jagomägis, R., Laur, S.  A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining. In Proceedings of the Pacific-Asia Workshop on Intelligence and Security Informatics (PAISI 2012), Kuala Lumpur, Malaysia, May 2012, Springer, pp. 112-126.

Mazzucco, M., Mitrani, I.  Empirical Evaluation of Power Saving Policies for Data Centers. SIGMETRICS Performance Evaluation Review Volume 40, Number 3, pages 18-22, 2012.

Mazzucco, M., Vasar, M., Dumas, M.  Squeezing out the Cloud via Profit-Maximizing Resource Allocation Policies. To appear in the IEEE 20th International Symposium of Modeling, Analysis and Simulation of Computer and Telecommunciation Systems (MASCOTS 2012), Arlington (USA), August 2012.

Leontjeva, A., Tretjakov, T., Tamkivi, T., Vilo, J.  Fraud Detection: Methods of Analysis for Hypergraph Data. In Proceedings of the Workshop on Cyber Security of Online Social Networks (CSOSN 2012), Istanbul, Turkey, August 26-29, 2012.

Mazzucco, M., Dyachuk, D.  Optimizing cloud providers revenues via energy efficient server allocation. Sustainable Computing: Informatics and Systems, pp 1–12, Vol. 2, Issue 1, March 2012.

Mazzucco, M., Dyachuk, D.  Balancing electricity bill and performance in server farms with setup costs. Future Generation Computing Systems, vol. 28, no. 2, pp. 415-426, 2012.

Merzin, M.  Efficient algorithm for Local Area Network topology discovery. MSc thesis. University of Tartu.

Petmanson, T.  Pattern-Based Fact Extraction from Estonian Free-Texts. MSc thesis. University of Tartu.

Rebane, R.  A Feasibility Analysis of Secure Multiparty Computation Deployments. MSc thesis. University of Tartu.

Sarv, J.  Comparative Evaluation of Topological and Demographic Features for Service Adoption Prediction. MSc thesis. University of Tartu.

Melnikov, D.  Predicting Paid Service Adoption in a Large Social Network. MSc thesis. University of Tartu.


Matulevicius, R., Lakk, H., Lepmets, M.  An approach to assess and compare quality of security models. Computer Science and Information Systems, vol. 8, no. 2, pp. 447-476, 2011.

Freudenthal, M., Pugal, D.  Simpl: a toolkit for rapid DSL implementation. In Proceedings of 12th Symp. on Programming Languages and Software Tools (SPLST 2011), Tallinn, October 2011, pp. 78-89.

Mokarizadeh, S., Küngas, P., Matskin, M.  Evaluation of a Semi-Automated Semantic Annotation Approach for Bootstrapping the Analysis of Large-scale Web Service Networks. In Proceedings of IEEE/WIC/ACM Intl. Conf. on Web Intelligence – WI 2011 (Lyon, France, August 2011), pp. 388-395, ACM, 2011.

Tretyakov, K., Armas-Cervantes, A., García-Bañuelos, L., Vilo, J., Dumas, M.  Fast Fully Dynamic Landmark-based Estimation of Shortest Path Distances in Very Large Graphs. In Proceedings og the 20th ACM Conference on Information and Knowledge Management (CIKM’2011), Glasgow, UK, 1785-1794.

Küngas, P., Dumas, M.  Configurable SOAP Proxy Cache for Data Provisioning Web Services. In Proceedings of the 25th ACM Symposium On Applied Computing, TaiChung, Taiwan, March 2011. ACM Press.

Mazzucco, M., Dumas, M.  Reserved or On-Demand Instances? A Revenue Maximization Model for Cloud Provider. 2011.

Matulevicius, R., Dumas, M.  Towards Model Transformation between SecureUML and UMLsec for Role-based Access Control. Barzdins, J., Kirikova, M. (Eds.). Databases and Information Systems VI (339 – 352).IOS Press.

Laur, S., Zhang, B., Willemson, J.  Round-efficient Oblivious Database Manipulation. 2011.

Armas-Cervantes, A.  Fast Estimation of Shortest Path Distances in Very Large Graphs. MSc thesis. University of Tartu.


Mazzucco, M., Dyachuk, D.  On Allocation Policies for Power and Performance. 2010.

Freudenthal, M.  Using DSLs for Developing Enterprise Systems. Language Descriptions Tools and Applications, Paphos, Cyprus. March 27-28. 2010.

Freudenthal, M.  Domain-Specific Languages in a Customs Information System. IEEE Software, 2, 65 – 71. 2010.

Bogdanov, D., Laur, S.  The design of a privacy-preserving distributed virtual machine. In the Collection of AEOLUS theoretical findings. Deliverable D1.0.6. AEOLUS project IP-FP6-015964. 2010.

Matulevicius R., Dumas M.  A Comparison of SecureUML and UMLsec for Role-based Access Control. Proceedings of the 9th International Baltic Conference (Baltic DB&IS 2010), University of Latvia Press, 2010, 171-185.

Matulevicius R., Lepmets M., Lakk H., Sisask A.  Comparing Quality of Security Models: a Case Study. Local Proceedings of the 14th East European Conference on Advances in Databases and Information Systems (ADBIS 2010), University of Novi Sad, 2010, 95-109.

Annamaa A., Breslav A., Kabanov J., Vene, V.  An interactive tool for analyzing embedded SQL queries. In Proceedings of the 8th ASIAN Symposium on Programming Languages and Systems (APLAS’2010), Shanghai, November 2010. Springer.

Jagomägis, R.  SecreC: a Privacy-Aware Programming Language with Applications in Data Mining. MSc thesis. University of Tartu.

Tulmin, L.  A Conjugate Gradient Solver on the PlayStation 3. MSc thesis. University of Tartu.

Römer, T.  Autoscaling Hadoop Clusters. MSc thesis. University of Tartu.

Raudjärv, R.  Dynamic Schema-Based Web Forms Generation in Java. MSc thesis. University of Tartu.

Villido, R.  Semantic Integration Platform for Web Widget Communication. MSc thesis. University of Tartu.

Ristioja, J.  An analysis framework for an imperative privacy-preserving programming language. MSc thesis. University of Tartu.

Tkatšenko, A.  Named Entity Recognition for the Estonian Language. MSc thesis. University of Tartu.