| 2012 | ||
|---|---|---|
| [lz12] | Helger Lipmaa and Bingsheng Zhang. A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument. In Ivan Visconti and Roberto De Prisco, editors, SCN 2012, volume 7485 of Lecture Notes in Computer Science, pages 477--502, Amalfi, Italy, September 5--7, 2012. Springer, Heidelberg. | |
| [lip12b] | Helger Lipmaa. Secure Accumulators from Euclidean Rings without Trusted Setup. In Feng Bao, Pierangela Samarati and Jianying Zhou, editors, ACNS 2012, volume 7341 of Lecture Notes in Computer Science, pages 224--240, Singapore, June 26--29, 2012. Springer, Heidelberg. | |
| [lip12a] | Helger Lipmaa. Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. In Ronald Cramer, editor, TCC 2012, volume 7194 of Lecture Notes in Computer Science, pages 169--189, Taormina, Italy, March 18--21, 2012. Springer, Heidelberg. | |
| [clz12] | Rafik Chaabouni, Helger Lipmaa and Bingsheng Zhang. A Non-Interactive Range Proof with Constant Communication. In Angelos Keromytis, editor, FC 2012, volume 7397 of Lecture Notes in Computer Science, pages 179--199, Bonaire, The Netherlands, February 27--March 2, 2012. Springer, Heidelberg. | |
| 2010 | ||
| [lip10] | Helger Lipmaa. On the CCA1-Security of Elgamal and Damgård's Elgamal. In Xuejia Lai, Moti Yung and Dongdai Lin, editors, Inscrypt 2010, volume 6584 of Lecture Notes in Computer Science, pages 18--35, Shanghai, China, October 20--23, 2010. Springer, Heidelberg. | |
| [hlv10] | Sven Heiberg, Helger Lipmaa and Filip van Laenen. On E-Vote Integrity in the Case of Malicious Voter Computers. In Dimitris Gritzalis, Bart Preneel and Marianthi Theoharidou, editors, Esorics 2010, volume 6345 of Lecture Notes in Computer Science, pages 373--388, Athens, Greece, September 20--22, 2010. Springer, Heidelberg. | |
| [cls10] | Rafik Chaabouni, Helger Lipmaa and abhi shelat. Additive Combinatorics and Discrete Logarithm Based Range Protocols. In Ron Steinfeld and Philip Hawkes, editors, ACISP 2010, volume 6168 of Lecture Notes in Computer Science, pages 336--351, Sydney, Australia, July 5--7, 2010. Springer, Heidelberg. | |
| [lz10] | Helger Lipmaa and Bingsheng Zhang. Two New Efficient PIR-Writing Protocols. In Jianying Zhou and Moti Yung?, editors, ACNS 2010, volume 6123 of Lecture Notes in Computer Science, pages 438--455, Beijing, China, June 22--25, 2010. Springer, Heidelberg. | |
| [ll10] | Sven Laur and Helger Lipmaa. On the Feasibility of Consistent Computations. In Phong Q. Nguyen and David Pointcheval, editors, PKC 2010, volume 6056 of Lecture Notes in Computer Science, pages 88--106, Paris, France, May 26--28, 2010. Springer, Heidelberg. | |
| [gkl10] | Jens Groth, Aggelos Kiayias and Helger Lipmaa. Multi-Query Computationally-Private Information Retrieval with Constant Communication Rate. In Phong Q. Nguyen and David Pointcheval, editors, PKC 2010, volume 6056 of Lecture Notes in Computer Science, pages 107--123, Paris, France, May 26--28, 2010. Springer, Heidelberg. | |
| 2009 | ||
| [lz09] | Helger Lipmaa and Bingsheng Zhang. Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication. In Feng Bao, Moti Yung, Dongdai Lin and Jiwu Jing, editors, Inscrypt 2009, volume 6151 of Lecture Notes in Computer Science, pages 154--163, Beijing, China, December 11--15, 2009. Springer, Heidelberg. | |
| [lip09] | Helger Lipmaa. First CPIR Protocol with Data-Dependent Computation. In Donghoon Lee and Seokhie Hong, editors, ICISC 2009, volume 5984 of Lecture Notes in Computer Science, pages 193--210, Seoul, Korea, December 2--4, 2009. Springer, Heidelberg. | |
| [ahlov09] | Arne Ansper, Sven Heiberg, Helger Lipmaa, Tom André Øverland and Filip van Laenen. Security and Trust for the Norwegian E-voting Pilot Project E-valg 2011. In Audun Jøsang, Torleiv Maseng and Svein J. Knapskog, editors, 4th Nordic Conference on Secure IT Systems, NordSec 2009, volume 5838 of Lecture Notes in Computer Science, pages 207--222, Oslo, Norway, October 14--16, 2009. Springer, Heidelberg. | |
| 2008 | ||
| [dl08b] | Giovanni Di Crescenzo and Helger Lipmaa. 3-Message NP Arguments in The BPK Model with Optimal Soundness And Zero-Knowledge. In Seok-Hee Hong, Hiroshi Nagamochi and Takuro Fukunaga, editors, The 19th International Symposium on Algorithm and Computation, ISAAC 2008, volume 5369 of Lecture Notes in Computer Science, pages 616--628, Gold Coast, Australia, December 15--17, 2008. Springer, Heidelberg. | |
| [tknil08] | Jin Tamura, Kazukuni Kobara, Ryo Nojima, Hideki Imai and Helger Lipmaa. A note on the error of Optimized LFC Private Information Retrieval Scheme. In Hirosuke Yamamoto (?), editor, 2008 International Symposium on Information Theory and its Applications, ISITA 2008, volume ? of ?, pages ?--?, Auckland, New Zealand, December 7--10, 2008. IEEE. | |
| [dlp08] | Yvo Desmedt, Helger Lipmaa and Duong Hieu Phan. Hybrid Damgård Is CCA1-Secure under The DDH Assumption. In Matthew K. Franklin, Lucas Chi Kwong Hui and Duncan S. Wong, editors, The 7th International Conference on Cryptology And Network Security (CANS 2008), volume 5339 of Lecture Notes in Computer Science, pages 18--30, Hong Kong, China, December 2--4, 2008. Springer, Heidelberg. | |
| [lip08] | Helger Lipmaa. New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. In Tzong-Chen Wu and Chin-Laung Lei, editors, 11th Information Security Conference, ISC 2008, volume 5222 of Lecture Notes in Computer Science, pages 441--454, Taipei, Taiwan, September 15--18, 2008. Springer, Heidelberg. | |
| [dl08a] | Giovanni Di Crescenzo and Helger Lipmaa. Succinct NP Proofs from An Extractability Assumption. In Arnold Beckmann, Costas Dimitracopoulos and Benedikt Löwe, editors, Computability in Europe, volume 5028 of Lecture Notes in Computer Science, pages 175--185, Athens, Greece, June 15--20, 2008. Springer, Heidelberg. | |
| 2007 | ||
| [dlw07] | Philippe Dumas, Helger Lipmaa and Johan Wallén. Asymptotic Behaviour of A Non-Commutative Rational Series With a Nonnegative Linear Representation. Discrete Mathematics and Theoretical Computer Science, 9 (1):247--274, October 2007. | |
| [ll07] | Sven Laur and Helger Lipmaa. A New Protocol for Conditional Disclosure of Secrets And Its Applications. In Jonathan Katz and Moti Yung, editors, ACNS 2007, volume 4521 of Lecture Notes in Computer Science, pages 207--225, Zhuhai, China, June 5--8, 2007. Springer, Heidelberg. | |
| 2006 | ||
| [llm06] | Sven Laur, Helger Lipmaa and Taneli Mielikäinen. Cryptographically Private Support Vector Machines. In Lyle Ungar, Mark Craven, Dimitrios Gunopulos and Tina Eliassi-Rad, editors, The Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006, pages 618--624, Philadelphia, USA, August 20--23, 2006. ACM. | |
| [aal06] | Ammar Alkassar, Elena Andreeva and Helger Lipmaa. SLC: Efficient Authenticated Encryption for Short Packets. In Jana Dittmann, editor, Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), volume 77 of Lecture Notes in Informatics, pages 270--278, Magdeburg, Germany, February 20--22, 2006. Gesellschaft für Informatik e.v.. | |
| 2005 | ||
| [el05b] | Edith Elkind and Helger Lipmaa. Hybrid Voting Protocols and Hardness of Manipulation. In Xiaotie Deng and Dingzhu Du, editors, The 16th Annual International Symposium on Algorithms and Computation, ISAAC 2005, volume 3827 of Lecture Notes in Computer Science, pages 206--215, Sanya, Hainan, China, December 19--21, 2005. Springer, Heidelberg. | |
| [llm05] | Sven Laur, Helger Lipmaa and Taneli Mielikäinen. Private Itemset Support Counting. In Sihan Qing, Wenbo Mao, Javier Lopez and Guilin Wang, editors, Information and Communications Security: 7th International Conference, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 97--111, Beijing, China, December 10--13, 2005. Springer, Heidelberg. | |
| [llp05] | Yong Li, Helger Lipmaa and Dingyi Pei. On Delegatability of Four Designated Verifier Signatures. In Sihan Qing, Wenbo Mao, Javier Lopez and Guilin Wang, editors, Information and Communications Security: 7th International Conference, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 61--71, Beijing, China, December 10--13, 2005. Springer, Heidelberg. | |
| [lip05] | Helger Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. In Jianying Zhou and Javier Lopez, editors, The 8th Information Security Conference (ISC'05), volume 3650 of Lecture Notes in Computer Science, pages 314--328, Singapore, September 20--23, 2005. Springer, Heidelberg. | |
| [lwb05] | Helger Lipmaa, Guilin Wang and Feng Bao. Designated Verifier Signature Schemes: Attacks, New Security Notions and A New Construction. In Luis Caires, Guiseppe F. Italiano, Luis Monteiro, Catuscia Palamidessi and Moti Yung, editors, The 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, volume 3580 of Lecture Notes in Computer Science, pages 459--471, Lisboa, Portugal, July 11--15, 2005. Springer, Heidelberg. | |
| [el05a] | Edith Elkind and Helger Lipmaa. Small Coalitions Cannot Manipulate Voting. In Andrew Patrick and Moti Yung, editors, Financial Cryptography and Data Security --- Ninth International Conference, volume 3570 of Lecture Notes in Computer Science, pages 285--297, Roseau, The Commonwealth Of Dominica, February 28--March 3, 2005. Springer, Heidelberg. | |
| 2004 | ||
| [gllm04] | Bart Goethals, Sven Laur, Helger Lipmaa and Taneli Mielikäinen. On Private Scalar Product Computation for Privacy-Preserving Data Mining. In Choonsik Park and Seongtaek Chee, editors, The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), volume 3506 of Lecture Notes in Computer Science, pages 104--120, Seoul, Korea, December 2--3, 2004. Springer, Heidelberg. | |
| [ll04] | Sven Laur and Helger Lipmaa. On Private Similarity Search Protocols. In Sanna Liimatainen and Teemupekka Virtanen, editors, Proceedings of the 9th Nordic Workshop on Secure IT Systems (NordSec 2004), pages 73--77, Espoo, Finland, November 4--5, 2004. ISBN 951-22-7348-9. | |
| [lip04] | Helger Lipmaa. Statistical Zero-Knowledge Arguments: Theory and Practice. In 4th European Congress on Computational Methods in Applied Sciences and Engineering (ECCOMAS 2004), Jyväskylä, Finland, July 24--28, 2004. Invited survey. | |
| [ajl04] | Andris Ambainis, Markus Jakobsson and Helger Lipmaa. Cryptographic Randomized Response Techniques. In Feng Bao, Robert H. Deng and Jianying Zhou, editors, PKC 2004, volume 2947 of Lecture Notes in Computer Science, pages 425--438, Singapore, March 1--4, 2004. Springer, Heidelberg. | |
| [el04] | Edith Elkind and Helger Lipmaa. Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. In Ari Juels, editor, Financial Cryptography - Eighth International Conference, volume 3110 of Lecture Notes in Computer Science, pages 117--131, Key West, FL, USA, February 9--12, 2004. Springer, Heidelberg. | |
| [lwd04] | Helger Lipmaa, Johan Wallén and Philippe Dumas. On the Additive Differential Probability of Exclusive-Or. In Bimal Roy and Willi Meier, editors, Fast Software Encryption 2004, volume 3017 of Lecture Notes in Computer Science, pages 317--331, Delhi, India, February 5--7, 2004. Springer, Heidelberg. | |
| 2003 | ||
| [lip03b] | Helger Lipmaa. Verifiable Homomorphic Oblivious Transfer and Private Equality Test. In Chi Sung Laih, editor, Advances on Cryptology --- ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 416--433, Taipei, Taiwan, November 30--December 4, 2003. Springer, Heidelberg. | |
| [lip03a] | Helger Lipmaa. On Diophantine Complexity and Statistical Zero-Knowledge Arguments. In Chi Sung Laih, editor, Advances on Cryptology --- ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 398--415, Taipei, Taiwan, November 30--December 4, 2003. Springer, Heidelberg. | |
| 2002 | ||
| [lip02c] | Helger Lipmaa. On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. In Alfred Menezes and Palash Sarkar, editors, INDOCRYPT 2002, volume 2551 of Lecture Notes in Computer Science, pages 48--61, Hyderabad, India, December 15--18, 2002. Springer, Heidelberg. | |
| [lip02b] | Helger Lipmaa. Fast Software Implementations of SC2000. In Agnes Chan and Virgil Gligor, editors, Information Security Conference 2002, volume 2433 of Lecture Notes in Computer Science, pages 63--74, São Paulo, Brazil, September 30 --- October 2, 2002. Springer, Heidelberg. | |
| [lip02a] | Helger Lipmaa. On Optimal Hash Tree Traversal for Interval Time-Stamping. In Agnes Chan and Virgil Gligor, editors, Information Security Conference 2002, volume 2433 of Lecture Notes in Computer Science, pages 357--371, São Paulo, Brazil, September 30 --- October 2, 2002. Springer-Verlag. | |
| [tlt02] | Masahiko Takenaka, Helger Lipmaa and Naoya Torii. The Implementation of The Block Cipher SC2000 (III). In ISEC Technical group meeting, Tohoku University, Sendai, Japan, July 18--19, 2002. In Japanese. | |
| [bll02] | Ahto Buldas, Peeter Laud and Helger Lipmaa. Eliminating Counterevidence with Applications to Accountable Certificate Management. Journal of Computer Security, 10 (3):273--296, 2002. | |
| [lan02] | Helger Lipmaa, N. Asokan and Valtteri Niemi. Secure Vickrey Auctions without Threshold Trust. In Matt Blaze, editor, Financial Cryptography 2002, volume 2357 of Lecture Notes in Computer Science, pages 85--101, Southampton Beach, Bermuda, March 11--14, 2002. Springer, Heidelberg. | |
| 2001 | ||
| [lm01] | Helger Lipmaa and Shiho Moriai. Efficient Algorithms for Computing Differential Properties of Addition. In Mitsuru Matsui, editor, Fast Software Encryption: 8th International Workshop, FSE 2001, volume 2355 of Lecture Notes in Computer Science, pages 336--350, Yokohama, Japan, April 2--4, 2001. Springer, Heidelberg. ISBN 3-540-43869-6. | |
| 2000 | ||
| [bll00] | Ahto Buldas, Peeter Laud and Helger Lipmaa. Accountable Certificate Management using Undeniable Attestations. In Sushil Jajodia and Pierangela Samarati, editors, 7th ACM Conference on Computer and Communications Security, pages 9--18, Athens, Greece, November 1--4, 2000. ACM Press. ISBN ACM ISBN 1-58113-203-4. | |
| [lrw00] | Helger Lipmaa, Phillip Rogaway and David Wagner. Comments to NIST Concerning AES-modes of Operations: CTR-mode Encryption. In Symmetric Key Block Cipher Modes of Operation Workshop, Baltimore, Maryland, USA, October 20, 2000. | |
| [AL00] | Kazumaro Aoki and Helger Lipmaa. Fast Implementations of AES Candidates. Third AES Candidate Conference, New York City, USA, 13--14 April 2000. | RI |
| [bls00] | Ahto Buldas, Helger Lipmaa and Berry Schoenmakers. Optimally Efficient Accountable Time-Stamping. In Yuliang Zheng and Hideki Imai, editors, PKC 2000, volume 1751 of Lecture Notes in Computer Science, pages 293--305, Melbourne, Australia, January 18--20, 2000. Springer, Heidelberg. | |
| 1998 | ||
| [bllv98] | Ahto Buldas, Peeter Laud, Helger Lipmaa and Jan Villemson. Time-Stamping with Binary Linking Schemes. In Hugo Krawczyk, editor, Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, volume 1462 of Lecture Notes in Computer Science, pages 486--501, Santa Barbara, CA, USA, August 23--27, 1998. Springer, Heidelberg. ISBN 3-540-64892-5. | |
| [lip98] | Helger Lipmaa. IDEA: A Cipher for Muldimedia Architectures? In Stafford Tavares and Henk Meijer, editors, Selected Areas in Cryptography '98, volume 1556 of Lecture Notes in Computer Science, pages 253--268, Kingston, Canada, August 17--18, 1998. Springer, Heidelberg. | |
| Andris Ambainis, Markus Jakobsson, Helger Lipmaa. Cryptographic Randomized Response Techniques. In DIMACS/PORTIA Workshop on Privacy-Preserving Data Mining. Rutgers University, Piscataway, NJ, USA, 15--16~March 2004. Program available at http://dimacs.rutgers.edu/Workshops/Privacy/ | |
| Edith Elkind and Helger Lipmaa. How Hard is it to Manipulate Voting?. In DIMACS Workshop on Electronic Voting, Rutgers U, NJ, USA, 26--27~May 2004. Program available at http://dimacs.rutgers.edu/Workshops/Voting/ | |
| Helger Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. In The Past, Present and Future of Oblivious Transfer, Satellite workshop of the Fifth Haifa Workshop on Interdisciplinary Applications of Graph theory, Combinatorics, and Algorithms, Haifa, Israel, May 17, 2005. Webpage at http://cri.haifa.ac.il/events/2005/graph/oblivious.htm. | |
| Edith Elkind and Helger Lipmaa. Hybrid Voting Protocols and Hardness of Manipulation. In First Spain Italy Netherlands Meeting on Game Theory, Maastricht, The Netherlands, June 24--26, 2005. Webpage at http://www.fdewb.unimaas.nl/sing/ | |
| Edith Elkind and Helger Lipmaa. Hybrid Voting Protocols and Hardness of Manipulation. In 1st International Workshop on Computational Social Choice, Amsterdam, 6-8 December 2006. Webpage at http://staff.science.uva.nl/~ulle/COMSOC-2006. | |
| Edith Elkind and Helger Lipmaa. Hybrid Voting Protocols and Hardness of Manipulation. In VOTEID 2009, Luxembourg, 6-9 September 2009. Invited talk. |
Helger Lipmaa, Secure
Electronic Voting Protocols. Forthcoming chapter from The Handbook of
Information Security, Hossein Bidgoli, Editor-in-Chief. John Wiley & Sons,
Inc., 2005. [Invited, peer-reviewed.] [.pdf .ps.gz]
Buy it from Amazon |
| Helger Lipmaa, "Kvantarvutid", Eesti Füüsika Seltsi 9. aastaraamat, 1999, pp. 102--125 ["Quantum Computing", Ninth Annual of the Estonian Physical Society. Invited.] [in Estonian: ps.gz (64.4KB), ps.bz2 (55.9KB), pdf (167.8KB), html] |
Cryptography eprint Archive:
| Helger Lipmaa. Efficient Multi-Query CPIR from Ring-LWE | |
| 2011/394 | Helger Lipmaa and Binsheng Zhang. A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument |
| 2011/317 | Helger Lipmaa. Two Simple Code-Verification Voting Protocols |
| 2011/009 | Helger Lipmaa. Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments |
| 2010/195 | Sven Heiberg, Helger Lipmaa, Filip Van Laenen. On E-Vote Integrity in the Case of Malicious Voter Computers. (Published in Esorics 2010) |
| 2009/469 | Rafik Chaabouni, Helger Lipmaa, and Abhi Shelat. Additive Combinatorics and Discrete Logarithm Based Range Protocols. (Published in ACISP 2010) |
| 2009/395 | Helger Lipmaa. First CPIR with Database-Dependent Computation. (Published in ICISC 2009) |
| 2008/234 | Helger Lipmaa. On the CCA1-Security of Elgamal And Damg{\aa}rd's Elgamal. (Published in Inscrypt 2010) |
| 2008/107 | Helger Lipmaa. Private Branching Programs: On Communication-Efficient Cryptocomputing. |
| 2007/133 | Helger Lipmaa. New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. (Published in ISC 2008) |
| 2006/356 | Emilia Käsper, Sven Laur and Helger Lipmaa. Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds |
| 2006/198 | Sven Laur, Helger Lipmaa and Taneli Mielikäinen. Cryptographically Private Support Vector Machines. (Short version published in KDD 2006) |
| 2006/088 | Sven Laur and Helger Lipmaa. Consistent Adaptive Two-Party Computations. (Accepted to PKC 2010) |
| 2005/378 | Sven Laur and Helger Lipmaa. Additive Conditional Disclosure of Secrets And Applications. (Final version published in ACNS 2007.) |
| 2004/063 | Helger Lipmaa. An Oblivious Transfer Protocol with Log-Squared Total Communication. (Final version published in ISC 2005.) |
| 2003/105 | Helger Lipmaa. On Diophantine Complexity and Statistical Zero-Knowledge Arguments. (Final version published in ASIACRYPT 2003.) |
| 2003/027 | Andris Ambainis, Markus Jakobsson, Helger Lipmaa. Cryptographic Randomized Response Techniques. (Final version published in PKC 2004.) |
| 2003/021 | Edith Elkind, Helger Lipmaa. Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. (Final version published in FC 2004.) |
| 2002/124 | Helger Lipmaa. On Optimal Hash Tree Traversal for Interval Time-Stamping. (Final version published in ISC 2002) |
| 2001/095 | Helger Lipmaa and N. Asokan and Valtteri Niemi. Secure Vickrey Auctions without Threshold Trust. (Final version published in FC 2002) |
| 2001/086 | Helger Lipmaa. Statistical Zero-Knowledge Proofs from Diophantine Equations. (Superseded by eprint 2003/105) |
| 2001/001 | Helger Lipmaa, Shiho Moriai. Efficient Algorithms for Computing Differential Properties of Addition. (Final version published in FSE 2001) |
| 2000/027 | Ahto Buldas and Peeter Laud and Helger Lipmaa. Accountable Certificate Management using Undeniable Attestations. (Final version published in ACM CCS 2000) |
This section is incomplete:
See my CV. Some of the most important presentations (that do not have a corresponding publication):
Some videos of my presentations:
There might several different chains of length 3. The first one of length 4 that I became aware of (early 2000) is: Helger Lipmaa -> Berry Schoenmakers -> Moti Yung -> Noga Alon -> Paul Erdös. The first one of length 3: Helger Lipmaa -> Andris Ambainis -> Leonard J. Schulman -> Paul Erdös.
You can check the updated information from the MR Collaboration Distance page.
So how worthy is a conference? One (and certainly not the most important! Caveat: it might actually give very wrong impression about the level of conference: some conferences get much more 'obviously bad submissions' than others. Some conferences and workshops---e.g., FSE---are very good even if the acceptance ratio is not that high.) way to measure it is to calculate the ratio of acceptance there. I've done it for the conferences my own papers were accepted to. Sorted by acceptance ratio. Note also that during the last years, the number of submissions has gone up in all conferences. [I have not had time to update this for a while - Helger]
Impact factors according to citeseer. They are written in [ ] at the end of everything else.
According to Scholar.Google, several of my publications are highly cited, and since Scholar is relatively incomplete, the actual citation index is probably (much) higher. Because it takes too much time to update the numbers manually, please just consult the previous link. Note that: papers "On private scalar product..." and "On secure scalar product..." are actually the same (many people cite by using a wrong title), and that [BLL02] and my phd thesis are NOT included.
For record, entries in the ISI database are worse than in Scholar.Google. The most annoying fact is that for certain publications, only the first author gets a reference. Moreover, they do not store for example ACM and IEEE publications, which means that [BLL00] and [BLL02] are not in the database, nor are many papers on ACM/IEEE conferences and journals that cite my papers.
My entries in:
Warning: fopen(counters/papers.log) [function.fopen]: failed to open stream: No such file or directory in /home/murakas/math/u/lipmaa/public_html/counter.php on line 3
for