Struktuur

Asutuse üldandmed

10140133
Cybernetica AS
Cybernetica AS
eraõiguslik juriidiline isik
Oliver Väärtnõu

Kontakt

Eesti Vabariik
Tallinn
Mäealuse 2/1
12618
6 397 991
6 397 992
Evalveerimisotsused (1)
EvalveeritudValdkondKuupäev
1.01.2010 — 31.12.2017Loodusteadused ja tehnika2.07.2010
  • Leitud 113 kirjet
ProgrammNumberNimiProjekti algusProjekti lõppVastutav täitjaAsutusRahastamine kokku
TAPTAP39-1"Cybernetica teadusaparatuuri ja seadmete kaasajastamine III"01.11.201128.02.2013Britt TulitCybernetica AS200 000,00 EUR
MUUIST-15964AEOLUS: Algorithmic Principles for Building Efficient Overlay Computers01.09.200528.02.2010Cybernetica AS95 809,63 EUR
MUUB73696Akulaadurite väljatöötlus ja valmistamine01.01.200531.12.2007Raul-Vello RebaneCybernetica AS54 780,97 EUR
MUUB73256Andmetelefoni E924 väljatöötus01.01.200631.12.2006Tiit PikpoomCybernetica AS14 380,12 EUR
MUUST5AtoN sõnumite marsruutimistarkvara ja dokumentatsioon01.03.200922.06.2009Viljar TulitCybernetica AS26 703,88 EUR
MUUS020VTAMBaasjaamade kaugjuhtimise ja monitooringu süsteem01.01.200931.12.2010Rein HaavelCybernetica AS10 225,86 EUR
MUU027751/TT8BalticTime - täpse aja ja ajatempliteenuse väljatöötamine.01.01.200630.10.2009Monika OitCybernetica AS105 502,35 EUR
TAPTAP14-1Cybernetica teadusaparatuuri ja -seadmete kaasajastamine01.04.201031.03.2012Britt TulitCybernetica AS357 905,23 EUR
TAPTAP25-1Cybernetica teadusaparatuuri ja -seadmete kaasajastamine II01.06.201131.12.2012Britt TulitCybernetica AS171 283,22 EUR
TAPTAP52-1Cybernetica teadusaparatuuri ja seadmete kaasajastamine IV01.04.201331.12.2015Britt TulitCybernetica AS133 000,00 EUR
MUUDATABIO (732064)Data-Driven Bioeconomy01.01.201731.12.2019Margus FreudenthalCybernetica AS171 641,00 EUR
MUUDASPTOOL IST-2001-34552Development of tools for direct digital alias-free processing of RF and microwave signals with demonstration of their application potential01.04.200231.03.2006Mart MinCybernetica AS79 850,51 EUR
MUUB80599DGPS jaamade juhtimise ja seire kaasajastamise projektilahendus01.01.200531.12.2005Raul-Vello RebaneCybernetica AS15 991,46 EUR
MUUK-TES/07/443/EH3Digipiltide arhiivi infosüsteemi loomine27.06.200727.07.2007Lembit PirnCybernetica AS25 117,28 EUR
MUUBES1xDigitaalallkirja jätkusuutlikuse analüüs18.02.201301.04.2013Arne AnsperCybernetica AS25 000,00 EUR
MUU200507L0023-000-000/B76741B001e-politsei autoarvutite väljatöötus ja kaasajastamine01.01.200531.12.2009Aivar UskCybernetica AS165 275,52 EUR
MUU325211e-SENS01.04.201301.04.2016Arne AnsperCybernetica AS77 320,00 EUR
TKTT5Eesti Arvutiteaduse Tippkeskus (EXCS)01.09.200831.08.2015Cybernetica AS700 000,00 EUR
MUUB81503Eesti-Vene piirivalvesüsteemi tark-ja riistvara uuendamine01.01.200731.12.2007Rein HaavelCybernetica AS37 388,31 EUR
ETFETF8058Efektiivne krüptoarvutamine01.01.200931.12.2011Helger LipmaaCybernetica AS; Tartu Ülikool, Matemaatika-informaatikateaduskond54 471,42 EUR
ETFETF9303Efektiivsed ja turvalised krüptograafilised protokollid01.01.201231.12.2012Helger LipmaaCybernetica AS; Tartu Ülikool, Matemaatika-informaatikateaduskond13 706,40 EUR
SFSF0011799s01Elektrondokumentide krüptograafilised turvaatribuudid ja nende pikaajaline säilitamine 01.01.200131.12.2005Ahto BuldasCybernetica AS145 654,64 EUR
MUU1-50-4/431/TL7Elektroonilise laboriinfosüsteemi arendustööd21.04.200509.12.2008Jaak Pruulmann-VengerfeldtCybernetica AS379 155,66 EUR
MUUSDO0510/S80805EMC eritingimustele vastava passiivradari konteineri väljatöötamine01.01.200631.12.2007Rein HaavelCybernetica AS215 155,62 EUR
MUU2.6-4/4Erinevate tarkvaraplatvormide põhiste rakenduste analüüs, väljatöötus ja tarnimine Maksu-jaTolliametile16.02.200501.07.2009Arne AnsperCybernetica AS4 401 770,10 EUR
  • Leitud 331 kirjet
PublikatsioonKlassifikaatorFail
Bogdanov, Dan; Kamm, Liina; Laur, Sven; Sokk, Ville (2017). Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data. IEEE / ACM Transactions on Computational Biology and Bioinformatics, 1−8 [_isbeingpublished].1.1.
Buldas, Ahto; Märt, Saarepera (2017). Are the current system engineering practices sufficient to meet cyber crime? <i>Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings.</i> Ed. Tryfonas,Theo. Springer, 451−463. (Lecture Notes in Computer Science ; 10292).3.1.
Archer, David W.; Bogdanov, Dan; Pinkas, Benny; Pullonen, Pille; (2016). Maturity and Performance of Programmable Secure Computation. IEEE Security &amp; Privacy, 14 (5), 48−56, 10.1109/MSP.2016.97.1.1.
Yi, Xun; Bouguettaya, Athman; Georgakopoulos, Dimitrios; Song, Andy; Willemson, Jan (2016). Privacy Protection for Wireless Medical Sensor Data. IEEE Transactions on Dependable and Secure Computing, 13 (3), 369−380, 10.1109/TDSC.2015.2406699.1.1.
Bogdanov, Dan; Kamm, Liina; Laur, Sven; Sokk, Ville (2016). <p>Rmind: a tool for cryptographically secure statistical analysis</p> . IEEE Transactions on Dependable and Secure Computing, 1−1, 10.1109/TDSC.2016.2587623.1.1.
Bogdanov, Dan; Kamm, Liina; Kubo, Baldur; Rebane, Reimo; Sokk, Ville; Talviste, Riivo (2016). Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation. Proceedings on Privacy Enhancing Technologies, 2016 (3), 117−135, 10.1515/popets-2016-0019.1.2.
Dimitrov, Vassil; Kerik, Liisi; Krips, Toomas; Randmets, Jaak; Willemson, Jan (2016). Alternative Implementations of Secure Real Numbers. <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS): 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), Vienna, Austria, October 24-28, 2016.</i> _EditorsAbbr Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi. ACM, 553−564.3.1.
Buchmann, Johannes; Büscher, Niklas; Göpfert, Florian; Katzenbeisser, Stefan; Krämer, Juliane; Micciancio, Daniele; Siim, Sander; van Vredendaal, Christine; Walter, Michael (2016). Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. <i>Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography: The 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi&#39;an, China, May 30 - June 03, 2016.</i> ACM Press, 11−20.3.1.
Dumas, Marlon; García-Bañuelos, Luciano; Laud, Peeter (2016). Differential Privacy Analysis of Data Processing Workflows. <i>Graphical Models for Security - Third International Workshop, GraMSec 2016: GraMSec 2016, Lisbon, Portugal, 27.06.2016.</i> _EditorsAbbr Kordy, Barbara; Ekstedt, Mathias; Kim, Dong Seong. Springer, 62−79. (Lecture Notes in Computer Science; 9987).3.1.
Heiberg, Sven; Martens, Tarvi; Vinkel, Priit; Willemson, Jan (2016). Improving the verifiability of the Estonian Internet Voting scheme. <i>The International Conference on Electronic Voting E-Vote-ID 2016, 18-21 October 2016, Lochau/Bregenz, Austria.</i> _EditorsAbbr Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole Goodman, Peter Y.A. Ryan, Oliver Spycher, Vanessa Teague, Gregor Wenda . Springer, 92−107. (Lecture Notes in Computer Science; 10141).3.1.
Kerik, Liisi; Laud, Peeter; Randmets, Jaak (2016). Optimizing MPC for robust and scalable integer and floating-point arithmetic. <i>Financial Cryptography Workshops 2016, 9604: WAHC&#39;16 - 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, Barbados, 26.02.2016.</i> _EditorsAbbr Clark, Jeremy; Meiklejohn, Sarah; Ryan, Peter Y. A.; Wallach, Dan S.; Brenner, Michael; Rohloff, Kurt. Springer Verlag, 271−287. (Lecture Notes in Computer Science).3.1.
Laud, Peeter; Pankova, Alisa (2016). Optimizing Secure Computation Programs with Private Conditionals. <i>Information and Communications Security, 18th International Conference, ICICS 2016: 18th International Conference on Information and Communications Security (ICICS 2016), Singapore, 29.11-02.12.2016.</i> _EditorsAbbr Kwok-Yan Lam, Chi-Hung Chi and Sihan Qing. Springer, 418−430. (Lecture Notes in Computer Science; 9977).3.1.
Krips, Toomas; Willemson, Jan (2016). Point-counting method for embarrassingly parallel evaluation in secure computation. <i>8th International Symposium on Foundations &amp; Practice of Security, October 26-28 2015, Clermont-Ferrand, France .</i> _EditorsAbbr Joaquin Garcia-Alfaro, Evangelos Kranakis, Guillaume Bonfante. Springer, 66−82. (Lecture Notes in Computer Science; 9482).3.1.
Laud, Peeter; Pettai, Martin (2016). Secure Multiparty Sorting Protocols with Covert Privacy. <i>Secure IT Systems - 21st Nordic Conference, NordSec 2016: Nordsec 2016, Oulu, Finland, 2.-4.11.2016.</i> _EditorsAbbr Brumley, Billy Bob; Röning, Juha. Springer, 216−231. (Lecture Notes in Computer Science; 10014).3.1.
Laud, Peeter; Pankova, Alisa (2016). Securing Multiparty Protocols Against the Exposure of Data to Honest Parties. <i>Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA: Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016, Heraklion, Greece, 26.-27.09.2016.</i> _EditorsAbbr Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj. Springer, 165−180. (Lecture Notes in Computer Science; 9963).3.1.
Probst, Christian: Willemson, Jan; Pieters, Wolter (2016). The Attack Navigator. <i>Second International Workshop GraMSec 2015.</i> _EditorsAbbr Sjouke Mauw, Barbara Kordy, Sushul Jajodia. Springer, 1−17. (LNCS; 9390).3.1.
Bogdanov, Dan; Kamm, Liina; Laur, Sven; Sokk, Ville (2016). Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data. 1−8.5.2.
Bogdanov, Dan; Jõemets, Marko; Siim, Sander; Vaht, Meril (2016). Privacy-preserving tax fraud detection in the cloud with realistic data volumes. Cybernetica Research Reports.6.7.
Kamm, Liina; Willemson, Jan (2015). Secure Floating-Point Arithmetic and Private Satellite Collision Analysis. International Journal of Information Security, 14 (6), 531−548, 10.1007/s10207-014-0271-8.1.1.
Freudenthal, Margus (2015). Simpl DSL Toolkit. Science of Computer Programming, 114, 85−91, 10.1016/j.scico.2014.11.018.1.1.
Laud, Peeter (2015). Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees. Proceedings on Privacy Enhancing Technologies, 2015 (2), 188−205, 10.1515/popets-2015-0011.1.2.
Kamm, Liina (2015). Privacy-preserving statistical analysis using secure multi-party computation. (Tartu Ülikool.; Matemaatika-informaatikateaduskond; Arvutiteaduse instituut;). Tartu: University of Tartu Press.2.3.
Lenin, A. (2015). Reliable and Efficient Determination of the Likelihood of Rational Attacks. Tallinn: TUT Press.2.3.
Laud, Peeter; Randmets, Jaak (2015). A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols. <i>22nd ACM Conference on Computer and Communications Security, Denver, CO, USA, October 12th-16th, 2015.</i> _EditorsAbbr Kruegel, Christopher; Li, Ninghui. ACM, 1492−1503.3.1.
Pettai, Martin; Laud, Peeter (2015). Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries. <i>28th IEEE Computer Security Foundations Symposium, Verona, Italy, July 13th-17th, 2015.</i> _EditorsAbbr Fournet, Cedric; Hicks, Michael. IEEE Computer Society Press, 75−89.3.1.
  • Leitud 1 kirjet
PealkiriJuhendatavKraadJuhendajaKaitsmise staatusKaitsmise aastaAsutus
A Comprehensive Protocol Suite for Secure Two-Party ComputationSander SiimmagistrikraadDan Bogdanov; Pille PullonenKaitstud2016Cybernetica AS