Robust rank aggregation for gene list integration and meta-analysis R Kolde, S Laur, P Adler, J Vilo Bioinformatics 28 (4), 573-580, 2012 | 1002 | 2012 |
Sharemind: A framework for fast privacy-preserving computations D Bogdanov, S Laur, J Willemson Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008 | 1001 | 2008 |
On private scalar product computation for privacy-preserving data mining B Goethals, S Laur, H Lipmaa, T Mielikäinen Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 571 | 2005 |
Efficient mutual data authentication using manually authenticated strings S Laur, K Nyberg International Conference on Cryptology and Network Security, 90-107, 2006 | 216 | 2006 |
A new way to protect privacy in large-scale genome-wide association studies L Kamm, D Bogdanov, S Laur, J Vilo Bioinformatics 29 (7), 886-893, 2013 | 179 | 2013 |
Cryptographically private support vector machines S Laur, H Lipmaa, T Mielikäinen Proceedings of the 12th ACM SIGKDD international conference on Knowledge …, 2006 | 179 | 2006 |
Round-efficient oblivious database manipulation S Laur, J Willemson, B Zhang Information Security: 14th International Conference, ISC 2011, Xi’an, China …, 2011 | 140 | 2011 |
Rmind: a tool for cryptographically secure statistical analysis D Bogdanov, L Kamm, S Laur, V Sokk IEEE Transactions on Dependable and Secure Computing 15 (3), 481-495, 2016 | 95 | 2016 |
From oblivious AES to efficient and secure database join in the multiparty setting S Laur, R Talviste, J Willemson Applied Cryptography and Network Security: 11th International Conference …, 2013 | 78 | 2013 |
Privacy-preserving statistical data analysis on federated databases D Bogdanov, L Kamm, S Laur, P Pruulmann-Vengerfeldt, R Talviste, ... Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014 | 60 | 2014 |
Sas-based group authentication and key agreement protocols S Laur, S Pasini Public Key Cryptography–PKC 2008: 11th International Workshop on Practice …, 2008 | 57 | 2008 |
A practical analysis of oblivious sorting algorithms for secure multi-party computation D Bogdanov, S Laur, R Talviste Nordic Conference on Secure IT Systems, 59-74, 2014 | 53 | 2014 |
Genome-wide study identifies association between HLA-B∗ 55: 01 and self-reported penicillin allergy K Krebs, J Bovijn, N Zheng, M Lepamets, JC Censin, T Jürgenson, D Särg, ... The American Journal of Human Genetics 107 (4), 612-621, 2020 | 49 | 2020 |
Implementation and evaluation of an algorithm for cryptographically private principal component analysis on genomic data D Bogdanov, L Kamm, S Laur, V Sokk IEEE/ACM transactions on computational biology and bioinformatics 15 (5 …, 2018 | 43 | 2018 |
Estnltk-nlp toolkit for estonian S Orasmaa, T Petmanson, A Tkachenko, S Laur, HJ Kaalep Proceedings of the Tenth International Conference on Language Resources and …, 2016 | 43 | 2016 |
A new protocol for conditional disclosure of secrets and its applications S Laur, H Lipmaa International Conference on Applied Cryptography and Network Security, 207-225, 2007 | 43 | 2007 |
Linear ensembles of word embedding models A Muromägi, K Sirts, S Laur arXiv preprint arXiv:1704.01419, 2017 | 42 | 2017 |
A universal toolkit for cryptographically secure privacy-preserving data mining D Bogdanov, R Jagomägis, S Laur Pacific-asia workshop on intelligence and security informatics, 112-126, 2012 | 38 | 2012 |
Knowledge-binding commitments with applications in time-stamping A Buldas, S Laur International Workshop on Public Key Cryptography, 150-165, 2007 | 36 | 2007 |
Named entity recognition in estonian A Tkachenko, T Petmanson, S Laur Proceedings of the 4th Biennial International Workshop on Balto-Slavic …, 2013 | 35 | 2013 |