Follow
Margus Niitsoo
Margus Niitsoo
Verified email at ut.ee
Title
Cited by
Cited by
Year
High-performance secure multi-party computation for data mining applications
D Bogdanov, M Niitsoo, T Toft, J Willemson
International Journal of Information Security 11, 403-418, 2012
2562012
Why do students choose to study Information and Communications Technology?
K Kori, M Pedaste, M Niitsoo, R Kuusik, H Altin, E Tõnisson, I Vau, ...
Procedia-Social and Behavioral Sciences 191, 2867-2872, 2015
282015
PREDICTORS OF INFORMATICS STUDENTS’PROGRESS AND GRADUATION IN UNIVERSITY STUDIES
M Niitsoo, M Paales, M Pedaste, L Siiman, E Tõnisson
INTED2014 Proceedings, 2521-2529, 2014
242014
Optimally tight security proofs for hash-then-publish time-stamping
A Buldas, M Niitsoo
Australasian Conference on Information Security and Privacy, 318-335, 2010
222010
Python prevails
V Leping, M Lepp, M Niitsoo, E Tõnisson, V Vene, A Villems
Proceedings of the International Conference on Computer Systems and …, 2009
222009
Optimal adversary behavior for the serial model of financial attack trees
M Niitsoo
International Workshop on Security, 354-370, 2010
182010
Estimating differential expression from multiple indicators
S Ilmjaerv, CA Hundahl, R Reimets, M Niitsoo, R Kolde, J Vilo, E Vasar, ...
Nucleic Acids Research 42 (8), e72-e72, 2014
162014
Matchmysound: Introducing feedback to online music education
K Kão, M Niitsoo
New Horizons in Web Based Learning: ICWL 2014 International Workshops, SPeL …, 2014
92014
Oracle separation in the non-uniform model
A Buldas, S Laur, M Niitsoo
International Conference on Provable Security, 230-244, 2009
62009
Black-box Oracle Separation Techniques with Applications in Time-stamping
M Niitsoo
52011
E-learning Quality Assurance System for E-courses in Estonia
M Dremljuga-Telk, E Koitla, K Kusnets, M Kusmin, M Niitsoo, LPT Plank, ...
Developing Quality Cultures in Teacher Education: Expanding Horizons in …, 2011
52011
Improved protocols for the SHAREMIND virtual machine
D Bogdanov, M Niitsoo, T Toft, J Willemson
Research report T-4-10, Cybernetica, 2010
52010
Efficiency bounds for adversary constructions in black-box reductions
A Buldas, A Jürgenson, M Niitsoo
Australasian Conference on Information Security and Privacy, 264-275, 2009
32009
Can we construct unbounded time-stamping schemes from collision-free hash functions?
A Buldas, M Niitsoo
International Conference on Provable Security, 254-267, 2008
32008
Black-box separations and their adaptability to the non-uniform model
A Buldas, M Niitsoo
Australasian Conference on Information Security and Privacy, 152-167, 2013
12013
Deterministic random oracles
M Niitsoo
International Conference on Provable Security, 88-103, 2012
12012
Cryptographic reductions
M Niitsoo
12008
OPTIMIZING THE INTERACTION BETWEEN A SELF-LEARNING GUITAR STUDENT AND A SOUND RECOGNITION BASED EDUCATIONAL GAME.
K KÄO, M NIITSOO
CFMAE: The Changing Face of Music & Art Education 7 (1), 2015
2015
Can we Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions
M Niitsoo
2008
Fairness in two-party random sampling
M Niitsoo
2008
The system can't perform the operation now. Try again later.
Articles 1–20