Struktuur

Asutuse üldandmed

10140133
Cybernetica AS
Cybernetica AS
eraõiguslik juriidiline isik
Oliver Väärtnõu

Kontakt

Eesti Vabariik
Tallinn
Mäealuse 2/1
12618
6 397 991
6 397 992
Evalveerimisotsused (1)
EvalveeritudValdkondKuupäev
1.01.2010 — 31.12.2017Loodusteadused ja tehnika2.07.2010
  • Leitud 113 kirjet
ProgrammNumberNimiProjekti algusProjekti lõppVastutav täitjaAsutusRahastamine kokku
TAPTAP39-1"Cybernetica teadusaparatuuri ja seadmete kaasajastamine III"01.11.201128.02.2013Britt TulitCybernetica AS200 000,00 EUR
MUUIST-15964AEOLUS: Algorithmic Principles for Building Efficient Overlay Computers01.09.200528.02.2010Cybernetica AS95 809,63 EUR
MUUB73696Akulaadurite väljatöötlus ja valmistamine01.01.200531.12.2007Raul-Vello RebaneCybernetica AS54 780,97 EUR
MUUB73256Andmetelefoni E924 väljatöötus01.01.200631.12.2006Tiit PikpoomCybernetica AS14 380,12 EUR
MUUST5AtoN sõnumite marsruutimistarkvara ja dokumentatsioon01.03.200922.06.2009Viljar TulitCybernetica AS26 703,88 EUR
MUUS020VTAMBaasjaamade kaugjuhtimise ja monitooringu süsteem01.01.200931.12.2010Rein HaavelCybernetica AS10 225,86 EUR
MUU027751/TT8BalticTime - täpse aja ja ajatempliteenuse väljatöötamine.01.01.200630.10.2009Monika OitCybernetica AS105 502,35 EUR
TAPTAP14-1Cybernetica teadusaparatuuri ja -seadmete kaasajastamine01.04.201031.03.2012Britt TulitCybernetica AS357 905,23 EUR
TAPTAP25-1Cybernetica teadusaparatuuri ja -seadmete kaasajastamine II01.06.201131.12.2012Britt TulitCybernetica AS171 283,22 EUR
TAPTAP52-1Cybernetica teadusaparatuuri ja seadmete kaasajastamine IV01.04.201331.12.2015Britt TulitCybernetica AS133 000,00 EUR
MUUDATABIO (732064)Data-Driven Bioeconomy01.01.201731.12.2019Margus FreudenthalCybernetica AS171 641,00 EUR
MUUDASPTOOL IST-2001-34552Development of tools for direct digital alias-free processing of RF and microwave signals with demonstration of their application potential01.04.200231.03.2006Mart MinCybernetica AS79 850,51 EUR
MUUB80599DGPS jaamade juhtimise ja seire kaasajastamise projektilahendus01.01.200531.12.2005Raul-Vello RebaneCybernetica AS15 991,46 EUR
MUUK-TES/07/443/EH3Digipiltide arhiivi infosüsteemi loomine27.06.200727.07.2007Lembit PirnCybernetica AS25 117,28 EUR
MUUBES1xDigitaalallkirja jätkusuutlikuse analüüs18.02.201301.04.2013Arne AnsperCybernetica AS25 000,00 EUR
MUU200507L0023-000-000/B76741B001e-politsei autoarvutite väljatöötus ja kaasajastamine01.01.200531.12.2009Aivar UskCybernetica AS165 275,52 EUR
MUU325211e-SENS01.04.201301.04.2016Arne AnsperCybernetica AS77 320,00 EUR
TKTT5Eesti Arvutiteaduse Tippkeskus (EXCS)01.09.200831.08.2015Cybernetica AS700 000,00 EUR
MUUB81503Eesti-Vene piirivalvesüsteemi tark-ja riistvara uuendamine01.01.200731.12.2007Rein HaavelCybernetica AS37 388,31 EUR
ETFETF8058Efektiivne krüptoarvutamine01.01.200931.12.2011Helger LipmaaCybernetica AS; Tartu Ülikool, Matemaatika-informaatikateaduskond54 471,42 EUR
ETFETF9303Efektiivsed ja turvalised krüptograafilised protokollid01.01.201231.12.2012Helger LipmaaCybernetica AS; Tartu Ülikool, Matemaatika-informaatikateaduskond13 706,40 EUR
SFSF0011799s01Elektrondokumentide krüptograafilised turvaatribuudid ja nende pikaajaline säilitamine 01.01.200131.12.2005Ahto BuldasCybernetica AS145 654,64 EUR
MUU1-50-4/431/TL7Elektroonilise laboriinfosüsteemi arendustööd21.04.200509.12.2008Jaak Pruulmann-VengerfeldtCybernetica AS379 155,66 EUR
MUUSDO0510/S80805EMC eritingimustele vastava passiivradari konteineri väljatöötamine01.01.200631.12.2007Rein HaavelCybernetica AS215 155,62 EUR
MUU2.6-4/4Erinevate tarkvaraplatvormide põhiste rakenduste analüüs, väljatöötus ja tarnimine Maksu-jaTolliametile16.02.200501.07.2009Arne AnsperCybernetica AS4 401 770,10 EUR
  • Leitud 338 kirjet
PublikatsioonKlassifikaatorFail
Bogdanov, Dan; Kamm, Liina; Laur, Sven; Sokk, Ville (2017). Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data. IEEE / ACM Transactions on Computational Biology and Bioinformatics, 1−8 [ilmumas].1.1.
Buldas, Ahto; Laanoja, Risto; Truu, Ahto (2017). Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world. International Journal of Services, Technology and Management, 23 (1/2), 117−130.<a href='http://dx.doi.org/10.1504/IJSTM.2017.10002708' target='_blank'>10.1504/IJSTM.2017.10002708</a>.1.1.
Laud, Peeter; Pankova, Alisa; Jagomägis, Roman (2017). Preprocessing Based Verification of Multiparty Protocols with Honest Majority. Proceedings on Privacy Enhancing Technologies, 2017, 4, 19−72.1.2.
Buldas, Ahto; Märt, Saarepera (2017). Are the current system engineering practices sufficient to meet cyber crime? <i>Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings.</i> Ed. Tryfonas,Theo. Springer, 451−463. (Lecture Notes in Computer Science ; 10292).<a href='http://doi.org/10.1007/978-3-319-58460-7_31' target='_blank'>10.1007/978-3-319-58460-7_31</a>.3.1.
Pettai, Martin; Laud, Peeter (2017). Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows. In: Maffei, Matteo; Ryan, Mark (Ed.). Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings (298−319). Springer. (Lecture Notes in Computer Science; 10204).3.1.
Buldas, Ahto; Geihs, Matthias; Buchmann, Johannes (2017). Long-term secure commitments via extractable-binding commitments. <i>Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I.</i> Ed. Pieprzyk, Josef; Suriadi, Suriadi. Cham: Springer, 65−81. (Lecture Notes in Computer Science; 10342).<a href='http://doi.org/10.1007/978-3-319-60055-0_4' target='_blank'>10.1007/978-3-319-60055-0_4</a>.3.1.
Buldas, Ahto; Geihs, Matthias; Buchmann, Johannes (2017). Long-term secure time-stamping using preimage-aware hash functions. <i>The Eleventh International Conference on Provable Security (ProvSec 2017) : October 23-25, Xian, China.</i> Ed. Okamoto, Tatsuki; Yo, Yong. Springer,. (Lecture Notes in Computer Science).<a href='http://doi.org/' target='_blank'></a> [ilmumas].3.1.
Buldas, Ahto; Kalu, Aivo; Laud, Peeter; Oruaas, Mart (2017). Server-Supported RSA Signatures for Mobile Devices. <i>Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I, 10492.</i> Ed. Foley, S.N. et al. Springer, 1−19. (Lecture Notes in Computer Science; 10492).<a href='http://dx.doi.org/10.1007/978-3-319-66402-6 19' target='_blank'>10.1007/978-3-319-66402-6 19</a> [ilmumas].3.1.
Buldas, Ahto; Lenin, Aleksandr; Willemson, Jan; Charnamord, Anton (2017). Simple infeasibility certificates for attack trees. <i>Advances in Information and Computer Security ; 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings.</i> Ed. Obana, Satoshi; Chida, Koji. Springer, 39−55. (Lecture Notes in Computer Science; 10418).<a href='https://doi.org/10.1007/978-3-319-64200-0_3' target='_blank'>10.1007/978-3-319-64200-0_3</a>.3.1.
Archer, David W.; Bogdanov, Dan; Pinkas, Benny; Pullonen, Pille; (2016). Maturity and Performance of Programmable Secure Computation. IEEE Security &amp; Privacy, 14 (5), 48−56.<a href='http://dx.doi.org/10.1109/MSP.2016.97' target='_blank'>10.1109/MSP.2016.97</a>.1.1.
Yi, Xun; Bouguettaya, Athman; Georgakopoulos, Dimitrios; Song, Andy; Willemson, Jan (2016). Privacy Protection for Wireless Medical Sensor Data. IEEE Transactions on Dependable and Secure Computing, 13 (3), 369−380.<a href='http://dx.doi.org/10.1109/TDSC.2015.2406699' target='_blank'>10.1109/TDSC.2015.2406699</a>.1.1.
Bogdanov, Dan; Kamm, Liina; Laur, Sven; Sokk, Ville (2016). <p>Rmind: a tool for cryptographically secure statistical analysis</p>. IEEE Transactions on Dependable and Secure Computing, 1−1.<a href='http://dx.doi.org/10.1109/TDSC.2016.2587623' target='_blank'>10.1109/TDSC.2016.2587623</a>.1.1.
Bogdanov, Dan; Kamm, Liina; Kubo, Baldur; Rebane, Reimo; Sokk, Ville; Talviste, Riivo (2016). Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation. Proceedings on Privacy Enhancing Technologies, 2016 (3), 117−135.<a href='http://dx.doi.org/10.1515/popets-2016-0019' target='_blank'>10.1515/popets-2016-0019</a>.1.2.
Dimitrov, Vassil; Kerik, Liisi; Krips, Toomas; Randmets, Jaak; Willemson, Jan (2016). Alternative Implementations of Secure Real Numbers. <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS): 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), Vienna, Austria, October 24-28, 2016.</i> Ed. Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi. ACM, 553−564.3.1.
Buchmann, Johannes; Büscher, Niklas; Göpfert, Florian; Katzenbeisser, Stefan; Krämer, Juliane; Micciancio, Daniele; Siim, Sander; van Vredendaal, Christine; Walter, Michael (2016). Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. <i>Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography: The 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi&#39;an, China, May 30 - June 03, 2016.</i> ACM Press, 11−20.3.1.
Dumas, Marlon; García-Bañuelos, Luciano; Laud, Peeter (2016). Differential Privacy Analysis of Data Processing Workflows. <i>Graphical Models for Security - Third International Workshop, GraMSec 2016: GraMSec 2016, Lisbon, Portugal, 27.06.2016.</i> Ed. Kordy, Barbara; Ekstedt, Mathias; Kim, Dong Seong. Springer, 62−79. (Lecture Notes in Computer Science; 9987).<a href='http://dx.doi.org/10.1007/978-3-319-46263-9_4' target='_blank'>10.1007/978-3-319-46263-9_4</a>.3.1.
Heiberg, Sven; Martens, Tarvi; Vinkel, Priit; Willemson, Jan (2016). Improving the verifiability of the Estonian Internet Voting scheme. <i>The International Conference on Electronic Voting E-Vote-ID 2016, 18-21 October 2016, Lochau/Bregenz, Austria.</i> Ed. Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole Goodman, Peter Y.A. Ryan, Oliver Spycher, Vanessa Teague, Gregor Wenda . Springer, 92−107. (Lecture Notes in Computer Science; 10141).3.1.
Kerik, Liisi; Laud, Peeter; Randmets, Jaak (2016). Optimizing MPC for robust and scalable integer and floating-point arithmetic. <i>Financial Cryptography Workshops 2016, 9604: WAHC&#39;16 - 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, Barbados, 26.02.2016.</i> Ed. Clark, Jeremy; Meiklejohn, Sarah; Ryan, Peter Y. A.; Wallach, Dan S.; Brenner, Michael; Rohloff, Kurt. Springer Verlag, 271−287. (Lecture Notes in Computer Science).<a href='http://dx.doi.org/10.1007/978-3-662-53357-4_18' target='_blank'>10.1007/978-3-662-53357-4_18</a>.3.1.
Laud, Peeter; Pankova, Alisa (2016). Optimizing Secure Computation Programs with Private Conditionals. <i>Information and Communications Security, 18th International Conference, ICICS 2016: 18th International Conference on Information and Communications Security (ICICS 2016), Singapore, 29.11-02.12.2016.</i> Ed. Kwok-Yan Lam, Chi-Hung Chi and Sihan Qing. Springer, 418−430. (Lecture Notes in Computer Science; 9977).3.1.
Krips, Toomas; Willemson, Jan (2016). Point-counting method for embarrassingly parallel evaluation in secure computation. <i>8th International Symposium on Foundations &amp; Practice of Security, October 26-28 2015, Clermont-Ferrand, France .</i> Ed. Joaquin Garcia-Alfaro, Evangelos Kranakis, Guillaume Bonfante. Springer, 66−82. (Lecture Notes in Computer Science; 9482).3.1.
Laud, Peeter; Pettai, Martin (2016). Secure Multiparty Sorting Protocols with Covert Privacy. <i>Secure IT Systems - 21st Nordic Conference, NordSec 2016: Nordsec 2016, Oulu, Finland, 2.-4.11.2016.</i> Ed. Brumley, Billy Bob; Röning, Juha. Springer, 216−231. (Lecture Notes in Computer Science; 10014).<a href='http://dx.doi.org/10.1007/978-3-319-47560-8_14' target='_blank'>10.1007/978-3-319-47560-8_14</a>.3.1.
Laud, Peeter; Pankova, Alisa (2016). Securing Multiparty Protocols Against the Exposure of Data to Honest Parties. <i>Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA: Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016, Heraklion, Greece, 26.-27.09.2016.</i> Ed. Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj. Springer, 165−180. (Lecture Notes in Computer Science; 9963).<a href='http://dx.doi.org/10.1007/978-3-319-47072-6_11' target='_blank'>10.1007/978-3-319-47072-6_11</a>.3.1.
Probst, Christian: Willemson, Jan; Pieters, Wolter (2016). The Attack Navigator. <i>Second International Workshop GraMSec 2015.</i> Ed. Sjouke Mauw, Barbara Kordy, Sushul Jajodia. Springer, 1−17. (LNCS; 9390).3.1.
Bogdanov, Dan; Kamm, Liina; Laur, Sven; Sokk, Ville (2016). Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data. 1−8.5.2.
Bogdanov, Dan; Jõemets, Marko; Siim, Sander; Vaht, Meril (2016). Privacy-preserving tax fraud detection in the cloud with realistic data volumes. Cybernetica Research Reports.6.7.
  • Leitud 1 kirjet
PealkiriJuhendatavKraadJuhendajaKaitsmise staatusKaitsmise aastaAsutus
A Comprehensive Protocol Suite for Secure Two-Party ComputationSander SiimmagistrikraadDan Bogdanov; Pille PullonenKaitstud2016Cybernetica AS