[ sulge aken ]
Elulookirjeldus (CV) | ||
1. | Eesnimi | Peeter |
2. | Perekonnanimi | Laud |
3. | Töökoht | Tartu Ülikool |
4. | Ametikoht | vanemteadur |
5. | Sünniaeg | 06.04.1977 (päev.kuu.aasta) |
6. | Haridus | 1997 - Tartu Ülikool, informaatikabakalaureus 1998 - Tartu Ülikool, informaatikamagister 2002 - Saarimaa Ülikool (Saksamaa), inseneriteaduste doktor |
7. | Teenistuskäik | 1996 - 1998 HClub-Arvutitarkvara AS, programmeerija 1998 - 1999 Cybernetica AS, teadur 1999 - 2000 Saarimaa Ülikool, teaduslik töötaja 2002 - ... Cybernetica AS, vanemteadur 2002 - 2003 Tartu Ülikool, teadur 2003 - ... Tartu Ülikool, vanemteadur |
8. | Teaduskraad | PhD |
9. | Teaduskraadi välja andnud asutus, aasta |
Saarimaa Ülikool, 2002 |
10. | Tunnustused | EAPLS-i (European Ass. of Prog. Lang. and Systems) auhind parima artikli eest kobarkonverentsil ETAPS '03 |
11. | Teadusorganisatsiooniline ja –administratiivne tegevus |
Tartu Ülikooli arvutiteaduse instituudi teadusseminari läbiviija (2003 sügis - ...) 9. (2004) ja 10. (2005) Eesti Arvutiteaduse Talvekooli üks organiseerijatest CCS 2004 & 2005, 11th & 12th ACM conference on Computer and Communications Security programmkomiteede liige NordSec 2005 programmkomitee liige SecCo'05, 3rd International Workshop on Security Issues in Concurrency programmkomitee liige |
12. | Juhendamisel kaitstud väitekirjad |
|
13. | Teadustöö põhisuunad | krüptoloogia, programmide staatiline analüüs |
14. | Jooksvad grandid | ETF 6095, Universaalselt komponeeritav turvalisus ja selle formaliseerimine |
15. | Teaduspublikatsioonid |
A. Buldas, P. Laud, M. Saarepera, J. Villemson. Universally Composable Time-Stamping Schemes with Audit. In Information Security: 8th International Conference, ISC 2005, Volume 3650 of Lecture Notes in Computer Science, Singapore, September 20-23, 2005, pages 359-373. I. Tšahhirov, P. Laud. Digital Signature in Automatic Analyses for Confidentiality against Active Adversaries. In proceedings of Nordsec 2005, 10th Nordic Workshop on Secure IT Systems, Tartu, Estonia, October 20-21, 2005, pages 29-41. P. Laud. Secrecy Types for a Simulatable Cryptographic Library. In 12th ACM Conference on Computer and Communications Security, pages 26-35, Alexandria, VA, USA, November 7-11, 2005. P. Laud, V. Vene. A Type System for Computationally Secure Information Flow. In proceedings of the 15th Symposium on Fundamentals of Computation Theory (FCT) 2005 (LNCS 3623), Lübeck, Germany, pages 365-377, 2005. P. Laud, R. Corin. Sound Computational Interpretation of Formal Encryption with Composed Keys. In Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 2003, Revised Papers (LNCS 2971), pages 55-66, 2004. P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries, in proceedings of 2004 IEEE Symposium on Security and Privacy, pages 71-85, Oakland, CA, May 9-12, 2004. IEEE Computer Society Conference Publishing Services. P. Laud. Handling Encryption in an Analysis for Secure Information Flow. In Programming Languages and Systems, 12th European Symposium On Programming, ESOP 2003 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003 Warsaw, Poland, April 7-11, 2003 Proceedings (LNCS 2618), pages 159-173, 2003. A. Buldas, P. Laud, H. Lipmaa. Eliminating counterevidence with applications to accountable certificate management, Journal of Computer Security 10(2002), pages 273--296, IOS Press. P. Laud. Encryption Cycles and Two Views of Cryptography. In NORDSEC 2002 - Proceedings of the 7th Nordic Workshop on Secure IT Systems (Karlstad University Studies 2002:31), pages 85-100, Karlstad, Sweden, November 7-8, 2002. P. Laud. Semantics and Program Analysis of Computationally Secure Information Flow. In Programming Languages and Systems, 10th European Symposium On Programming, ESOP 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genoa, Italy, April 2-6, 2001 Proceedings (LNCS 2028), pages 77-91, 2001. A. Buldas, P. Laud, H. Lipmaa. Accountable Certificate Management using Undeniable Attestations. In 7th ACM Conference on Computer and Communications Security, pages 9--18, Athens, Greece, November 1--4, 2000. ACM Press. A. Buldas, P. Laud, H. Lipmaa, J. Willemson. Time-Stamping with Binary Linking Schemes. In Advances in Cryptology --- proceedings of CRYPTO '98 (LNCS 1462), pages 486--501, 1998. A. Buldas, P. Laud. New Linking Schemes for Digital Time-Stamping. In The 1st International Conference on Information Security and Cryptology, pages 3-14, Seoul, Korea, December 18-19, 1998. |
viimati muudetud: 08.08.2005
Curriculum Vitae (CV) | ||
1. | First Name | Peeter |
2. | Surname | Laud |
3. | Institution | Tartu University |
4. | Position | senior researcher |
5. | Date of birth | 06.04.1977 (day.month.year) |
6. | Education | 1997 - Tartu University, BSc (computer science) 1998 - Tartu University, MSc (computer science) 2002 - University of Saarland, Dr. of engineering (Dr.-Ing.) |
7. | Research and professional experience |
1996 - 1998 HClub-Arvutitarkvara AS, programmer 1998 - 1999 Cybernetica AS, researcher 1999 - 2000 Saarimaa Ülikool, researcher 2002 - ... Cybernetica AS, senior researcher 2002 - 2003 Tartu Ülikool, researcher 2003 - ... Tartu Ülikool, senior researcher |
8. | Academic degree | PhD |
9. | Dates and sites of earning the degrees |
University of Saarland, 2002 |
10. | Honours/awards | EAPLS (European Ass. of Prog. Lang. and Systems) best paper award at the joint conference ETAPS '03 |
11. | Research-administrative experience |
Organizer of the scientific seminar of the institute of Computer Science of Tartu University (2003 fall - ...) One of the organizers of the 9th (2004) and 10th (2005) Estonian Winter Schools on Computer Science PC member of CCS 2004 & 2005, 11th & 12th ACM conference on Computer and Communications Security PC member of NordSec 2005 PC member of SecCo'05, 3rd International Workshop on Security Issues in Concurrency |
12. | Supervised dissertations | |
13. | Current research program | cryptology, static analysis of programs |
14. | Current grant funding | ETF 6095, Universally composable security and its formalization |
15. | List of most important publications |
A. Buldas, P. Laud, M. Saarepera, J. Villemson. Universally Composable Time-Stamping Schemes with Audit. In Information Security: 8th International Conference, ISC 2005, Volume 3650 of Lecture Notes in Computer Science, Singapore, September 20-23, 2005, pages 359-373. I. Tšahhirov, P. Laud. Digital Signature in Automatic Analyses for Confidentiality against Active Adversaries. In proceedings of Nordsec 2005, 10th Nordic Workshop on Secure IT Systems, Tartu, Estonia, October 20-21, 2005, pages 29-41. P. Laud. Secrecy Types for a Simulatable Cryptographic Library. In 12th ACM Conference on Computer and Communications Security, pages 26-35, Alexandria, VA, USA, November 7-11, 2005. P. Laud, V. Vene. A Type System for Computationally Secure Information Flow. In proceedings of the 15th Symposium on Fundamentals of Computation Theory (FCT) 2005 (LNCS 3623), Lübeck, Germany, pages 365-377, 2005. P. Laud, R. Corin. Sound Computational Interpretation of Formal Encryption with Composed Keys. In Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 2003, Revised Papers (LNCS 2971), pages 55-66, 2004. P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries, in proceedings of 2004 IEEE Symposium on Security and Privacy, pages 71-85, Oakland, CA, May 9-12, 2004. IEEE Computer Society Conference Publishing Services. P. Laud. Handling Encryption in an Analysis for Secure Information Flow. In Programming Languages and Systems, 12th European Symposium On Programming, ESOP 2003 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003 Warsaw, Poland, April 7-11, 2003 Proceedings (LNCS 2618), pages 159-173, 2003. A. Buldas, P. Laud, H. Lipmaa. Eliminating counterevidence with applications to accountable certificate management, Journal of Computer Security 10(2002), pages 273--296, IOS Press. P. Laud. Encryption Cycles and Two Views of Cryptography. In NORDSEC 2002 - Proceedings of the 7th Nordic Workshop on Secure IT Systems (Karlstad University Studies 2002:31), pages 85-100, Karlstad, Sweden, November 7-8, 2002. P. Laud. Semantics and Program Analysis of Computationally Secure Information Flow. In Programming Languages and Systems, 10th European Symposium On Programming, ESOP 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genoa, Italy, April 2-6, 2001 Proceedings (LNCS 2028), pages 77-91, 2001. A. Buldas, P. Laud, H. Lipmaa. Accountable Certificate Management using Undeniable Attestations. In 7th ACM Conference on Computer and Communications Security, pages 9--18, Athens, Greece, November 1--4, 2000. ACM Press. A. Buldas, P. Laud, H. Lipmaa, J. Willemson. Time-Stamping with Binary Linking Schemes. In Advances in Cryptology --- proceedings of CRYPTO '98 (LNCS 1462), pages 486--501, 1998. A. Buldas, P. Laud. New Linking Schemes for Digital Time-Stamping. In The 1st International Conference on Information Security and Cryptology, pages 3-14, Seoul, Korea, December 18-19, 1998. |
last updated: 08.08.2005
[ sulge aken ]