Publications by Jan Willemson

1  Peer-reviewed papers

1.1  Journal papers

  1. Maarja Kruusmaa, Jan Willemson, Covering the path space: a casebase analysis for mobile robot path planning, in Knowledge Based Systems, Volume 16, Issues 5-6, Pages 235-242 (July 2003), Elsevier. Available at
    https://www.sciencedirect.com/science/article/pii/S0950705103000248.
  2. Dan Bogdanov, Margus Niitsoo, Tomas Toft, Jan Willemson, High-performance secure multi-party computation for data mining applications, in International Journal of Information Security, Springer, 2012, Volume 11, Number 6, pages 403-418, DOI: 10.1007/s10207-012-0177-2. Available at
  3. Liina Kamm, Jan Willemson, Secure floating point arithmetic and private satellite collision analysis, in International Journal of Information Security, November 2015, Volume 14, Issue 6, pp 531-548, Springer. Available at
    https://link.springer.com/article/10.1007/s10207-014-0271-8.
  4. Xun Yi, Athman Bouguettaya, Dimitrios Georgakopoulos, Andy Song, Jan Willemson, Privacy Protection for Wireless Medical Sensor Data. IEEE Transactions on Dependable and Secure Computing 13(3): 369-380 (2016). Available at
    https://www.computer.org/csdl/trans/tq/2016/03/07047722-abs.html.
  5. Jan Willemson, Bits or Paper: which should get to carry your vote? Journal of Information Security and Applications, Elsevier, Volume 38, February 2018, Pages 124-131, DOI: https://doi.org/10.1016/j.jisa.2017.11.007. Available at
    https://research.cyber.ee/~jan/publ/papervoting-jisa.pdf.
  6. Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson, DiLizium: A Two-Party Lattice-Based Signature Scheme, in Entropy 2021, 23(8), 989, MDPI. DOI: https://doi.org/10.3390/e23080989. Available at
    https://www.mdpi.com/1099-4300/23/8/989 and https://research.cyber.ee/~jan/publ/entropy-23-00989.pdf.
  7. Piret Ehin, Mihkel Solvak, Jan Willemson, Priit Vinkel, Internet voting in Estonia 2005-2019: Evidence from eleven elections, in Government Information Quarterly, 39(4): 101718 (2022). DOI: https://doi.org/10.1016/j.giq.2022.101718. Available at
    https://www.sciencedirect.com/science/article/pii/S0740624X2200051X.
  8. Jan Willemson, Towards Identifying Social Factors behind (In)Efficiency of Voting Security Measures. In eJournal of eDemocracy and Open Government (JeDEM), vol. 14, no. 1 (2022), pages 72-85. DOI: https://doi.org/10.29379/jedem.v14i1.673. Available at
    https://jedem.org/index.php/jedem/article/view/673.
  9. Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik, Improved lattice-based mix-nets for electronic voting. In IET Information Security, Volume 17, Issue 1, January 2023, pages 18-34. DOI: http://dx.doi.org/10.1049/ise2.12089. Available at https://research.cyber.ee/ jan/publ/IET-IS-lattice-mixnet.pdf.

1.2  Peer-reviewed papers in scientific conferences

  1. Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Villemson, Time-Stamping with Binary Linking Schemes, Advances in Cryptology - CRYPTO '98, Springer-Verlag 1998, LNCS 1462, pp 486-501. Available at
    https://research.cyber.ee/~jan/publ/bllv98.pdf.
  2. Margus Freudenthal, Sven Heiberg, Jan Willemson, Personal Security Environment on Palm PDA, in Proceedings of 16th Annual Computer Security Applications Conference ACSAC'00, pp 366-372. December 2000, New Orleans, Louisiana, USA. Available at
    https://research.cyber.ee/~jan/publ/acsac_smartpalm.pdf.
  3. Arne Ansper, Ahto Buldas, Meelis Roos, Jan Willemson, Efficient long-term validation of digital signatures, Advances in Cryptology - PKC 2001, Springer-Verlag, LNCS 1992, pp 402-415, presented on PKC 2001, February 2001, Cheju Island, Korea. Available at
    https://research.cyber.ee/~jan/publ/efficient.pdf.
  4. Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson, Improving the availability of time-stamping services, in Information Security and Privacy, 6th Australasian Conference, ACISP 2001, July 11.-13. 2001, Sydney, Australia. Springer, LNCS 2119, pp. 360-375. Available at
    https://research.cyber.ee/~jan/publ/ts_avail_final.ps.
  5. Ahto Buldas, Meelis Roos, Jan Willemson, Undeniable replies for database queries, in Proceedings of the Fifth International Baltic Conference on DB and IS, June 2002, Tallinn, Estonia, edited by Hele-Mai Haav and Ahto Kalja, Vol. 2, pp. 215-226. Available at
    https://research.cyber.ee/~jan/publ/dbart_2.ps
  6. Kristo Heero, Uuno Puus, Jan Willemson, XML based document management in Estonian legislative system, in Proceedings of the Fifth International Baltic Conference on DB and IS, June 2002, Tallinn, Estonia, edited by Hele-Mai Haav and Ahto Kalja, Vol. 1, pp. 321-330. Available at
    https://research.cyber.ee/~jan/publ/estlaw3.ps
  7. Maarja Kruusmaa, Jan Willemson, Covering the Path Space: A Casebase Analysis for Mobile Robot Path Planning. Research and Development in Intelligent Systems XIX, Proceedings The Twenty-second SGAI International Conference on Knowledge Based Systems and Applied Artificial Intelligence, BCS Conference Series, Springer, pp. 1-16. Available at
    https://research.cyber.ee/~jan/publ/robotpath7.pdf.
  8. Kristo Heero, Maarja Kruusmaa, Jan Willemson, Path Selection for Mobile Robots in Dynamic Environments. European Conference on Mobile Robots 2003. Available at
    https://research.cyber.ee/~jan/publ/robotcomp.ps.
  9. Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson, Scalable and Efficient PKI for Inter-Organizational Communication. Annual Computer Security Applications Conference ACSAC 2003, pp 308-318.VotingCO2.tex Available at
    https://research.cyber.ee/~jan/publ/xroad.ps.
  10. Meelis Roos, Jan Willemson, Peeter Laud, Improving the Gnutella protocol against poisoning. Proceedings of the Seventh Nordic Workshop on Secure IT Systems NordSec 2003, pp. 185-194. Available at
    https://research.cyber.ee/~jan/publ/gnutella.ps.
  11. Jelena Zaitseva, Jan Willemson, Jaanus Pöial, Tutorial Environment for Cryptographic Protocols. Proceedings of the Seventh Nordic Workshop on Secure IT Systems NordSec 2003, pp. 175-184. Available at
    https://research.cyber.ee/~jan/publ/tecp.pdf.
  12. Alvo Aablo, Kristo Heero, Maarja Kruusmaa, Jan Willemson, Robots Find a Better Way: A Learning Method for Mobile Robot Navigation in Partially Unknown Environemnts. In F.Groen, N. Amoto, A. Bonarini, E. Yoshida and B. Kröse, editors, Proceedings of the 8th Conference on Intelligent Autonomous Systems (IAS8), pp. 559-566, Amsterdam, The Netherlands, 2004. IOS Press. Available at
    https://research.cyber.ee/~jan/publ/02_Robots_Find_a_Better_Way.pdf.
  13. Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson, Universally Composable Time-Stamping Schemes with Audit. In Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao, editors, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. pp 359-373. LNCS 3650. Available at
    https://research.cyber.ee/~jan/publ/time_joint_final.pdf.
  14. Jan Willemson, Computer Clobber Tournament at Tartu University, in ICGA Journal, Vol. 28, No. 1, pp 51-54. Available at
    https://research.cyber.ee/~jan/publ/clobreport.ps.
  15. Jan Willemson, Maarja Kruusmaa, Algorithmic Generation of Path Fragment Covers for Mobile Robot Path Planning, in Proceedings of the 3rd IEEE Conference on Intelligent Systems, 4-6 September 2006, University of Westminster, London, UK, pp 673-678. Available at
    https://research.cyber.ee/~jan/publ/robotfrag10.ps.
  16. Jan Willemson, On the Gordon and Loeb Model for Information Security Investment, presented at The Fifth Workshop on the Economics of Information Security (WEIS 2006), University of Cambridge, England, UK, 26-28 June 2006. Available at
    https://research.cyber.ee/~jan/publ/economics.ps.
  17. Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson, Rational Choice of Security Measures via Multi-Parameter Attack Trees, in Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006. LNCS 4347, pp. 235-248. Available at
    https://research.cyber.ee/~jan/publ/attacks11.pdf.
  18. Aivo Jürgenson, Jan Willemson, Processing Multi-parameter Attacktrees with Estimated Parameter Values, in A. Miyaji, H. Kikuchi, and K. Rannenberg (Eds.): IWSEC 2007, LNCS 4752, pp. 308-319, 2007, Springer-Verlag. Available at
    https://research.cyber.ee/~jan/publ/attacktree_with_estimations.pdf.
  19. Jan Willemson, Arne Ansper, A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. In Proceedings of The Third International Conference on Availability, Reliability and Security ARES 2008, pp 572-577, IEEE Computer Society. Available at
    https://research.cyber.ee/~jan/publ/xroadares07final.pdf.
  20. Jaan Pruulmann, Jan Willemson, Implementing a Knowledge-driven Hierarchical Context Model in a Medical Laboratory Information System, in proceedings of The Third International Multi-Conference on Computing in the Global Information Technology (ICCGI 2008), pp 62-67, IEEE Computer Society Press. Available at
    https://research.cyber.ee/~jan/publ/context_iccgi_2008.pdf.
  21. Dan Bogdanov, Sven Laur, Jan Willemson, Sharemind: a framework for fast privacy-preserving computations, In Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008, volume 5283 of Lecture Notes in Computer Science, pages 192-206. Springer, 2008. Available at
    https://research.cyber.ee/~jan/publ/sharemind.pdf.
  22. Aivo Jürgenson, Jan Willemson, Computing Exact Outcomes of Multi-parameter Attack Trees, In On the Move to Meaningful Internet Systems: OTM 2008, IS 2008, Monterrey, Mexico, November 9-14, 2008, volume 5332 of Lecture Notes in Computer Science, pages 1036-1051. Available at
    https://research.cyber.ee/~jan/publ/JW08.pdf
  23. Aivo Jürgenson, Jan Willemson, Serial Model for Attack Tree Computations. In D. Lee and S. Hong (Eds.): ICISC 2009, Lecture Notes in Computer Science, volume 5984, pp. 118-128, Springer 2010. Available at
    https://research.cyber.ee/~jan/publ/serialattack.pdf
  24. Jan Willemson, Extending the Gordon&Loeb Model for Information Security Investment. In Proceedings of International Conference on Availability, Reliability and Security ARES 2010, IEEE Computer Society Press, pages 258-261. Available at
    https://research.cyber.ee/~jan/publ/aresGL.pdf
  25. Aivo Jürgenson, Jan Willemson, On Fast and Approximate Attack Tree Computations, in Information Security and Practice, 6th International Conference (ISPEC 2010), volume 6047 of LNCS, pages 56-66, Springer-Verlag, 2010. Available at
    https://research.cyber.ee/~jan/publ/approxtree_paper.pdf
  26. Jan Willemson, Pseudonymization Service for X-Road eGovernment Data Exchange Layer. In Kim Normann Andersen, Enrico Francesconi, Åke Grönlund, Tom M. van Engers (editors), Electronic Government and the Information Sytems Perspective. Second International Conference, EGOVIS 2011. LNCS 6866, pp. 135-145. Available at
    https://research.cyber.ee/~jan/publ/egovis_pseud.pdf
  27. Sven Laur, Jan Willemson and Bingsheng Zhang, Round-efficient Oblivious Database Manipulation. In Xuejia Lai, Jianying Zhou and Hui Li, editors, ISC 2011. Springer LNCS 7001, pp. 262-277 Available as
  28. Sven Heiberg, Peeter Laud and Jan Willemson, The Application of I-voting for Estonian Parliamentary Elections of 2011. In Aggelos Kiayias and Helger Lipmaa, editors, E-Voting and Identity, VoteID 2011, LNCS 7187, pp. 208-223. Springer, 2012. Available at
    https://research.cyber.ee/~jan/publ/evote2011.pdf
  29. Dan Bogdanov, Riivo Talviste, Jan Willemson, Deploying Secure Multi-Party Computation for Financial Data Analysis (Short Paper). In Angelos Keromytis, editor, Financial Cryptography and Data Security, LNCS 7397, pp. 57-64. Springer, 2012. Available as
  30. Sven Laur, Riivo Talviste, Jan Willemson, From oblivious AES to efficient and secure database join in the multiparty setting. In ACNS 2013, LNCS 7954, pp. 84-101. Springer, 2013. Available in
  31. Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson, High-Performance Qualified Digital Signatures for X-Road. In Hanne Riis Nielson and Dieter Gollmann, editors, Secure IT Systems. 18th Nordic Conference, NordSec 2013, LNCS 8208, pp. 123-138, Springer 2013. Available at
    https://research.cyber.ee/~jan/publ/batchsignatures.pdf.
  32. Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson, Protecting a Federated Database Infrastructure Against Denial-of-Service Attacks. In Eric Luiijf and Pieter Hartel (editors), CRITIS 2013, LNCS 8328, pp. 26-37, Springer 2013. Available at
    https://research.cyber.ee/~jan/publ/xroadavailability.pdf.
  33. Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt, Riivo Talviste and Jan Willemson, Privacy-preserving statistical data analysis on federated databases. In Bart Preneel, Demosthenes Ikonomou (Editors), Privacy Technologies and Policy. Second Annual Privacy Forum APF 2014, May 20-21, Athens, Greece, LNCS 8450, pp. 30-55, Springer 2014. Available at
    https://research.cyber.ee/~jan/publ/privacypreservingdatabases.pdf.
  34. Dan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka, Shin'ichiro Matsuo and Jan Willemson, A Secure Genetic Algorithm for the Subset Cover Problem and its Application to Privacy Protection. In Gerhard Goos, Juris Hartmanis and Jan van Leeuwen, editors, Information Security Theory and Practice, 8th IFIP WG 11.2 International Workshop, WISTP 2014, June 30 - July 2 2014; Heraklion, Greece, LNCS 8501, pp. 108-123, Springer 2014. Available at
    https://research.cyber.ee/~jan/publ/genetic-algorithms-smc-wistp.pdf.
  35. Sven Heiberg and Jan Willemson, Verifiable Internet Voting in Estonia. In: Krimmer, R., Volkamer, M.: 6th International Conference on Electronic Voting: Verifying the Vote, EVOTE 2014, IEEE, pp. 1-8. Available at
    https://research.cyber.ee/~jan/publ/mobileverification-ieee.pdf.
    Also published in Proceedings of Electronic Voting 2014 (EVOTE2014), TUT Press, Tallinn, p. 23-29.
  36. Aleksandr Lenin, Jan Willemson and Dyan Permata Sari, Attacker profiling in quantitative security assessment based on attack trees. In Karin Bernsmed and Simone Fischer-Hübner, editors, Secure IT Systems, 19th Nordic Conference, NordSec 2014, LNCS 8988, pp. 199-212, Springer 2014. Available at
    https://research.cyber.ee/~jan/publ/attackerprofiling.pdf.
  37. Toomas Krips and Jan Willemson, Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations. In Proceedings of ISC 2014, LNCS 8783, pp. 179-197, Springer 2014. Available in
  38. Peeter Laud and Jan Willemson, Composable Oblivious Extended Permutations. In Frdédéric Cuppens, Joaquin Garcia-Alfaro, Nur Zincir Heywood and Philip W. L. Fong (editors) Foundations and Practice of Security, Lecture Notes in Computer Science Volume 8930, pp 294-310, Springer 2015. Available at
    https://research.cyber.ee/~jan/publ/extendedpermutations.pdf.
  39. Sven Heiberg, Arnis Parsovs, Jan Willemson, Log Analysis of Estonian Internet Voting 2013-2014. In Rolf Haenni, Reto E. Koenig and Douglas Wikström (editors) E-Voting and Identity, Lecture Notes in Computer Science Volume 9269, pp 19-34, Springer 2015. Available in
  40. Aleksandr Lenin, Jan Willemson, Anton Charnamord, Genetic Approximations for the Failure-Free Security Games. In Khouzani, MHR, Panaousis, Emmanouil, Theodorakopoulos, George, editors, Decision and Game Theory for Security, 6th International Conference, GameSec 2015, Lecture Notes in Computer Science Volume 9406, pp 311-321, Springer 2015. Available at
    https://research.cyber.ee/~jan/publ/failurefree.pdf.
  41. Toomas Krips, Jan Willemson, Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation. In Joaquin Garcia-Alfaro, Evangelos Kranakis and Guillaume Bonfante, editors, oundations and Practice of Security: 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers. Volume 9482 of the Lecture Notes in Computer Science, Springer 2016, pp. 66-82. Available at
    https://research.cyber.ee/~jan/publ/PointCounting.pdf.
  42. Christian W. Probst, Jan Willemson, Wolter Pieters, The Attack Navigator. In Sjouke Mauw, Barbara Kordy, Sushil Jajodia, editors, Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Volume 9390 of LNCS, Springer, 2016, pp. 1-17. Available at
    https://research.cyber.ee/~jan/publ/theattacknavigator.pdf.
  43. Vassil Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson, Alternative Implementations of Secure Real Numbers. In Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi, editors, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), Vienna, Austria, October 24-28, 2016, pp. 553-564, ACM 2016. Available at
  44. Sven Heiberg, Tarvi Martens, Priit Vinkel, Jan Willemson, Improving the verifiability of the Estonian Internet Voting scheme. In Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole Goodman, Peter Y.A. Ryan, Oliver Spycher, Vanessa Teague, Gregor Wenda (Eds.), The International Conference on Electronic Voting E-Vote-ID 2016, 18-21 October 2016, Lochau/Bregenz, Austria. Published as Available at https://research.cyber.ee/~jan/publ/ivxv-evoteid.pdf.
  45. Margus Freudenthal, Jan Willemson, Challenges of Federating National Data Access Infrastructures. In Pooya Farshim, Emil Simion, editors, SecITC 2017: Innovative Security Solutions for Information Technology and Communications, June 8-9 2017, Bucharest, Romania, Springer LNCS 10543, pp. 104-114. Available at
    https://research.cyber.ee/~jan/publ/xroad-federation.pdf.
  46. Ahto Buldas, Aleksandr Lenin, Jan Willemson, and Anton Charnamord, Simple Infeasibility Certificates for Attack Trees. In Satoshi Obana and Koji Chida, editors, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Springer LNCS 10418, pp. 39-55. Available at
    https://research.cyber.ee/~jan/publ/costreduction.pdf.
  47. Ivo Kubjas, Tiit Pikma and Jan Willemson, Estonian Voting Verification Mechanism Revisited Again. In Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann, editors, Proceedings of the Second International Joint Conference E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, LNCS, volume 10615, pp. 306-317, Springer 2017.
    Available at Also printed in
  48. Jan Willemson, Bits or Paper: which should get to carry your vote? In Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann, editors, Proceedings of the Second International Joint Conference E-Vote-ID 2017, LNCS, volume 10615, pp. 292-305, Springer 2017. Available at
    https://research.cyber.ee/~jan/publ/papervoting.pdf.
    Also printed in
  49. Sven Heiberg, Ivo Kubjas, Janno Siim and Jan Willemson, On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards. In Robert Krimmer, Melanie Volkamer, Véronique Cortier, David Duenas-Cid, Rajeev Goré, Manik Hapsara, Reto Koenig, Steven Martin, Ronan McDermott, Peter Roenne, Uwe Serdült, Tomasz Truderung, editors, proceedings of the Third International Joint Conference on Electronic Voting E-Vote-ID 2018, 2–5 October 2018, Lochau/Bregenz, Austria, TUT press, pp. 259-276. Available at
  50. Kristjan Krips, Jan Willemson, Sebastian Värv, Implementing an audio side channel for paper voting. In Robert Krimmer, Melanie Volkamer, Véronique Cortier, Rajeev Goré, Manik Hapsara, Uwe Serdült, David Duenas-Cid, editors, Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings, Springer LNCS, volume 11143, pp. 132-145. Available at
    https://research.cyber.ee/~jan/publ/numberdetection.pdf.
  51. Kristjan Krips, Ivo Kubjas and Jan Willemson, An Internet Voting Protocol with Distributed Verification Receipt Generation. In Robert Krimmer, Melanie Volkamer, Véronique Cortier, David Duenas-Cid, Rajeev Goré, Manik Hapsara, Reto Koenig, Steven Martin, Ronan McDermott, Peter Roenne, Uwe Serdült, Tomasz Truderung, editors, proceedings of the Third International Joint Conference on Electronic Voting E-Vote-ID 2018, 2–5 October 2018, Lochau/Bregenz, Austria, TUT press, pp. 128-146. Available at
    https://research.cyber.ee/~jan/publ/utahvoting.pdf.
  52. Kristjan Krips, Jan Willemson, Sebastian Värv, Is your vote overheard? A new scalable side-channel attack against paper voting. In 4th IEEE European Symposium on Security and Privacy, June 17-19, 2019, Stockholm, Sweden, IEEE, pp. 621-634. Available at
    https://research.cyber.ee/~jan/publ/markdetection-opt.pdf.
  53. Jan Willemson, How not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Application. In Computer Security (CyberICPS 2019, SECPRE 2019, SPOSE 2019, ADIoT 2019, 26-27 September, 2019, Luxembourg), Lecture Notes in Computer Science, volume 11980, pp. 111-121, Springer 2020. Available at
    https://research.cyber.ee/~jan/publ/WrongSMC.pdf.
  54. Kristjan Krips, Jan Willemson, On practical aspects of coercion-resistant remote voting systems. International Joint Conference on Electronic Voting (E-Vote-ID 2019) 1-4 October 2019, Bregenz, Austria. In LNCS, volume 11759, pp 216-232. Available at
    https://research.cyber.ee/~jan/publ/coercion.pdf.
  55. Mart Oruaas, Jan Willemson, Developing requirements for the new encryption mechanisms in the Estonian eID infrastructure. Keynote paper at Baltic DB&IS 2020. Communications in Computer and Information Science vol. 1243, pp. 13-20, Springer 2020. Available at
    https://research.cyber.ee/~jan/publ/NewEstCDOC.pdf.
  56. Sven Heiberg, Kristjan Krips, Jan Willemson, Planning the next steps for Estonian Internet voting. In Robert Krimmer, Melanie Volkamer, Bernhard Beckert, Ardita Driza Maurer, David Dueñas-Cid, Stéphane Glondu, Iuliia Krivonosova, Oksana Kulyk, Ralf Küsters, Beata Martin-Rozumilowicz, Peter Rønne, Mihkel Solvak, Oliver Spycher, Proceedings of the Fifth International Joint Conference on Electronic Voting, E-Vote-ID 2020. TALTECH Press 2020, pp. 82-97. Available at
    https://research.cyber.ee/~jan/publ/planning.pdf.
  57. Valeh Farzaliyev, Kristjan Krips, Jan Willemson, Developing a Personal Voting Machine for the Estonian Internet Voting System. In Proceedings of the Computer Security track of ACM/SIGAPP Symposium On Applied Computing 2021, pp 1607-1616, ACM 2021. https://doi.org/10.1145/3412841.3442034; available at
    https://research.cyber.ee/~jan/publ/votingclient-final.pdf.
  58. Sven Heiberg, Kristjan Krips and Jan Willemson, Mobile Voting - Still Too Risky? In Financial Cryptography and Data Security. FC 2021 International Workshops. Springer LNCS 12676, pp. 263-278. https://doi.org/10.1007/978-3-662-63958-0_23; available at
    https://research.cyber.ee/~jan/publ/mvoting-design.pdf.
  59. Arne Koitmäe, Jan Willemson and Priit Vinkel, Vote Secrecy and Voter Feedback in Remote Voting - Can We Have Both? In Proceedings of E-Vote-ID 2021. Springer LNCS 12900, pp. 140-154. https://doi.org/10.1007/978-3-030-86942-7_10; available at
    https://research.cyber.ee/~jan/publ/Vote-Secrecy.pdf.
  60. Sven Heiberg, Kristjan Krips, Jan Willemson and Priit Vinkel, Facial Recognition for Remote Electronic Voting - Missing Piece of the Puzzle or Yet Another Liability? In 4th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021 (Co-Located with ESORICS 2021). Springer LNCS, volume 13136, pp 77-93. https://link.springer.com/chapter/10.1007/978-3-030-93747-8_6; available at
    https://research.cyber.ee/~jan/publ/facerec.pdf.
  61. Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik, Improved Lattice-Based Mix-Nets for Electronic Voting. In Information Security and Cryptology - ICISC 2021, Springer LNCS volume 13218, pp 119-136. DOI: https://doi.org/10.1007/978-3-031-08896-4_6 Available at
  62. Alisa Pankova, Jan Willemson, Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols. In ACNS 2022, Rome, Italy, June, 20-23, 2022, LNCS, volume 13269, pp. 313-333. DOI: https://doi.org/10.1007/978-3-031-09234-3_16. Available at
  63. Jan Willemson, Fifty Shades of Personal Data - Partial Re-Identification and GDPR. In APF 2022: Privacy Technologies and Policy pp 88-96, Springer LNSC,volume 13279. https://doi.org/10.1007/978-3-031-07315-1_6; available at https://research.cyber.ee/~jan/publ/50shades.pdf.
  64. Jelizaveta Vakarjuk, Nikita Snetkov and Jan Willemson, Russian Federal Remote E-voting Scheme of 2021 - Protocol Description and Analysis. Accepted to European Interdisciplinary Cybersecurity Conference 2022, 15-16 June 2022, Barcelona, Spain. Pp. 29-35, ACM. DOI: https://doi.org/10.1145/3528580.3528586. Available at
  65. Jan Willemson, Creating a Decryption Proof Verifier for the Estonian Internet Voting System. 18th International Conference on Availability, Reliability and Security ARES 2023, pp. 1-7. DOI: https://doi.org/10.1145/3600160.3605467. Available at
    https://research.cyber.ee/~jan/publ/DecProofVer.pdf.
  66. Jan Willemson and Kristjan Krips, Estimating carbon footprint of paper and Internet voting. International Joint Conference on Electronic Voting E-Vote-ID 2023. Lecture Notes in Computer Science, vol 14230. Springer, pp. 140-155. DOI: https://doi.org/10.1007/978-3-031-43756-4_9. Available at
    https://research.cyber.ee/~jan/publ/VotingCO2.pdf.
  67. Jan Willemson, Analysis of information security measures embedded in the GDPR. IEEE 31st International Requirements Engineering Conference Workshops (REW), Hannover, Germany, 2023, pp. 214-217. DOI: https://doi.org/10.1109/REW57809.2023.00043. Available at
    https://research.cyber.ee/~jan/publ/riskpriv-IEEE.pdf.
  68. Kristjan Krips, Nikita Snetkov, Jelizaveta Vakarjuk, Jan Willemson, Trust assumptions in voting systems. Computer Security. ESORICS 2023 International Workshops (SecAssure) pp 309-329, Springer LNCS 14399. DOI: https://doi.org/10.1007/978-3-031-54129-2_18. Available as
  69. Jan Willemson, Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System. International Workshop on Security and Trust Management STM 2023, LNCS 14336, pp 126-135. DOI: https://doi.org/10.1007/978-3-031-47198-8_8. Available as
  70. Tobias Hilt, Kati Sein, Tanel Mällo, Jan Willemson, Melanie Volkamer, Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol. Accepted to E-Vote-ID 2023. Available at
    https://research.cyber.ee/~jan/publ/voterperception.pdf.
  71. Petr Muzikant, Jan Willemson, Deploying Post-Quantum Algorithms in Existing Applications and Embedded Devices. International Conference on Ubiquitous Security 2023, Communications in Computer and Information Science, vol 2034, Springer, pp 147-162. DOI: https://doi.org/10.1007/978-981-97-1274-8_10. Available at
    https://research.cyber.ee/ jan/publ/pqauth.pdf

1.3  Papers in collections

  1. Ahto Buldas, Meelis Roos, Jan Willemson, Undeniable database queries, in H-M. Haav, A. Kalja (Eds), Databases and Information Systems II, Selected Papers from the Fifth International Baltic Conference, BalticDB&IS 2002, Kluwer Academic Publishers, 2002, ISBN 1-4020-1038-9, pp 43-54. Available at
    https://research.cyber.ee/~jan/publ/dbart_1.ps.
  2. Sven Heiberg, Jan Willemson, Modeling Threats of a Voting Method, Chapter 7 of Dimitrios Zissis and Dimitrios Lekkas (editors) Design, Development, and Use of Secure Electronic Voting Systems, IGI Global, 2014, pages 128-148. Available at

1.4  Notes, posters

  1. Jan Willemson and Yngvi Björnsson, Six wins hex tournament, in ICGA Journal, Vol. 27, No. 3, September 2004, pg 180.
  2. Jan Willemson and Mark Winands, MILA wins Clobber tournament, in ICGA Journal, Vol. 28, No. 3, September 2005, pg 188-190. Available at
    https://research.cyber.ee/~jan/publ/clobreport05.pdf
  3. Wolter Pieters, Dina Hadziosmanovic, Aleksandr Lenin, Lorena Montoya, Jan Willemson, TRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis. A poster presented at the 35th IEEE Symposium on Security and Privacy, 2014. Available at
    https://research.cyber.ee/~jan/publ/PIETE.pdf.

2  Books

  1. Baltic Way Mathematical Team Contest 1997-2001, Uve Nummert, Jan Willemson (Eds.), Estonian Mathematical Society 2002, ISBN 9985-9235-9-6, 85 pp.
  2. Võrratused, Jan Willemson, Indrek Zolk, Tartu Ülikool, Täppisteaduste Kool, 2003, ISBN 9985-4-0303-7, 98 pp.
  3. Graafid, Ahto Buldas, Peeter Laud, Jan Villemson. Tartu Ülikool, arvutiteaduse instituut, 2003. ISBN 9985-4-0355-X, 92 pp.
  4. Eesti Matemaatika Seltsi aastaraamat 2002-2003, Andi Kivinukk, Gert Tamberg, Jan Willemson (Eds.), Estonian Mathematical Society, 2007, ISSN 1406-4316, 178 pp.
  5. Võistlusmatemaatika põhivara, https://varamu.eu.

3  Non-peer-reviewed activities in scientific collections, conferences and workshops. Preprints

  1. Ahto Buldas, Valdo Praust, Meelis Roos, Jan Villemson, On Long-Term Validation of E-Documents, International Conference "Information Technologies and Telecommunications in the Baltic States - Baltic IT&T 2000", April 6-7, Radisson SAS Daugava Hotel, Riga, Latvia, pp. 104-108.
  2. Jan Willemson, Pourquoi les mathématiques sont-elles si compliquées?, presented on the conference "Relecture et découverte" of French Scientific Institute, September 21-22, Tartu, Estonia. Available at
    https://research.cyber.ee/~jan/publ/Janw.ps.
  3. Jelena Zaitseva, Jan Willemson, Cryptographic Protocols Tutorial Environment, poster presentation at 8th Estonian Winter School on Computer Science, 2.-7.03.2003, Palmse, Estonia.
  4. Jaan Pruulmann-Vengerfeldt, Jan Willemson, Reeglipõhine keeletarkvara, Riikliku programmi "Eesti keele keeletehnoloogiline tugi (2006-2010)" konverents, 19.21.11.2007, Tallinn. Presentation available at
    https://keeletehnoloogia.cs.ut.ee/konverents/slaidid/pruulmann.pdf
  5. Bingsheng Zhang, Zengpeng Li and Jan Willemson, UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System. arXiv preprint arXiv:2109.01994. Available at
    https://arxiv.org/abs/2109.01994.
  6. Jan Willemson, Elliptkõverate krüptograafia. Eesti Matemaatika Seltsi aastaraamat 2018, toimetajad Rainis Haller, Toivo Leiger ja Kaido Lätt, lk 23-39. Available at
    https://matemaatika.eu/emsar/ar2018/ar2018lk22.pdf.
  7. Jan Willemson, Kommentaare 2024. aasta matemaatikaolümpiaadi lõppvooru 12. klassi ülesannetele. Eesti Matemaatika Seltsi aastaraamat 2024, toimetaja Rainis Haller. Available at
    https://matemaatika.eu/wp-content/uploads/2024/04/loppvoor2024m2.pdf.

4  Theses

  1. Jan Willemson, Cube graphs and their generalizations as vertex-transitive permutation graphs, MSc thesis, Tartu 1998. In Estonian. Available at
    https://research.cyber.ee/~jan/publ/magtoo.pdf.
  2. Jan Willemson, Size-efficient interval time stamps, PhD thesis, Tartu 2002. Available at
    https://research.cyber.ee/~jan/publ/janPhD2.pdf.

5  Technical reports

  1. Jan Willemson, Certificate Revocation Paradigms, Technical Report, Cybernetica 1999, available at
    https://xxx.lanl.gov/ps/cs.CR/9909012, 14 pp
  2. Ahto Buldas, Meelis Roos, Jan Willemson, Notarizing Digital Signatures - Elimination of Certificate Revocation Lists, Cybernetica 1999, Technical Report DO-UA-X-22-1299, 26 pp
  3. Arne Ansper, Ahto Buldas and Jan Willemson, General linking schemes in ISO/IEC standard on digital time-stamping. National Body Comments from Estonia on ISO/IEC WD 18014 (SC 27 N 2357). Attachment 2 to SC 27 N 2380, pages 4-20. August 1999
  4. Ahto Buldas, Meelis Roos and Jan Willemson, Notarizing Digital Signatures - Elimination of Certificate Revocation Lists. Technical Report DO-UA-X-22-1299. Küberneetika AS, 1999
  5. Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Villemson. Ajatempli protokollid, turvavajadused ja tehnilised nõuded. Küberneetika AS, Infotehnoloogia osakond, DO-LU-X-22-1297, 1998
  6. Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Villemson. Ajatemplisüsteemide teoreetilised alused. Küberneetika AS, Infotehnoloogia osakond, DO-AR-X-14-0698, 1998
  7. Ahto Buldas, Peeter Laud, Alar Leibak, Helger Lipmaa, Jan Villemson, Krüptograafiliste protokollide formaalne turvaanalüüs. Küberneetika AS, Infotehnoloogia osakond, DO-AR-T-28-1298, 1998
  8. Arne Ansper, Ahto Buldas, Jaanus Kase, Peeter Laud, Meelis Roos, Asko Seeba, Jan Villemson, Ajatemplikeskuse eksperimentaalserver. Mitme serveriga ajatempliskeemid. Küberneetika AS, Infotehnoloogia osakond, DO-LU-T-11-0899, 1999
  9. Ahto Buldas, Helger Lipmaa, Meelis Roos, Jan Villemson. Turvalised ja efektiivsed ajatemplisüsteemid. Küberneetika AS, Infotehnoloogia osakond, DO-LU-T-30-1299, 1999
  10. Ahto Buldas, Helger Lipmaa, Jan Villemson. Avaliku võtme sertifikaatide haldus, kasutades vaidlustamatuid kehtivustõendeid. Küberneetika AS, Infotehnoloogia osakond, DO-AR-S-04-0500, 2000.
  11. Arne Ansper, Ahto Buldas, Meelis Roos, Jan Villemson. Efektiivsed ja skaleeruvad notariprotokollid. Küberneetika AS, Infotehnoloogia osakond, DO-AR-X-12-0900, 2000.
  12. Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Villemson. Sidusreziimis kehtivusprotokollid ja ja nende kasutamine avaliku võtme infrastruktuuri (PKI) usaldatavuse parandamiseks. Küberneetika AS, Infotehnoloogia osakond, DO-AR-T-02-0101, 2001.
  13. Arne Ansper, Ahto Buldas, Sven Heiberg, Monika Oit, Kaidi Oone, Olev Sepp, Jan Villemson. Digitaalallkirja juurutamine riigiasutustes: strateegiline plaan, 2001. Available at
    https://cyber.ee/research/reports/Digital-signatures-strat-plan-2001.pdf.
  14. Jan Villemson, Kristo Heero, Uuno Puus. Elektrooniline Riigi teataja. Vorminõuded. Cybernetica, Infoturbe osakond, IT-AA-A-006-0202, 2002.
  15. Jan Willemson. Juhend asjaajajale dokumendi vorminõuete spetsifitseerimiseks. Cybernetica, Infoturbe osakond, IT-AA-O-020-0205, 2002.
  16. Jan Willemson. Digitaaldokumentide halduseks vajalikud kesksed ressursid, nende haldamine ja kasutamine. Cybernetica, Infoturbe osakond, IT-AA-O-021-0205, 2002.
  17. Uuno Puus, Jan Willemson. Lähteülesanne riigiasutustes kasutatavate digitaaldokumentide standardite väljatöötamiseks. Cybernetica, Infoturbe osakond, IT-AA-O-12-0204, 2002.
  18. Kristo Heero, Uuno Puus, Jan Willemson. Standardi rakendamise eeskiri ja kasutusjuhend IT spetsialistile. Cybernetica, Infoturbe osakond, IT-AA-O-022-0205, 2002.
  19. Jan Willemson. Arvamus aruandest "Vabavara kasutamisest riigiasutustes". Cybernetica, Infoturbe osakond, IT-AA-A-064-021121, 2002.
  20. Ahto Buldas, Meelis Roos, Jan Willemson. Tarkvarapatentide eelised ja puudused Eesti kontekstis. Cybernetica, Infoturbe osakond, IT-AA-O-010-0303, 2003.
  21. Jan Willemson, Maarja Kruusmaa. Algorithmic Generation of Path Fragment Covers for Mobile Robot Path Planning, technical report, 2003, available at
    https://research.cyber.ee/~jan/publ/robotfrag6.ps.
  22. Arne Ansper, Ahto Buldas, Mart Oruaas, Jaan Priisalu, Anto Veldre, Jan Willemson, Kaur Virunurm, E-hääletamise kontseptsiooni turve: analüüs ja meetmed, Vabariigi Valimiskomisjon, EH-02-01, December 15th 2003.
  23. Jaanus Jaeger, Jan Willemson, Ülevaade VRP ja TSP ülesannete lahendusmeetoditest, Tartu Ülikooli Tehnoloogiainstituut, August 4th 2004.
  24. Jan Willemson, Arne Ansper, Monika Oit, Isikuandmete kaitse delikaatsetes registrites. Cybernetica, aruanne nr Y-97-8, 28.02.2006. Available at
    https://research.cyber.ee/~jan/publ/delikaatsedregistrid.pdf
  25. Arne Ansper, Jan Willemson, X-Road - A Complete Solution for Inter-organizational Information Exchange. Cybernetica, Infoturbe osakond, aruanne nr T-4-1, 24.11.2006. Available at
    https://cyber.ee/research/reports/T-4-1_X-Road_complete_solution_for_inter-organizational_information_exchange.pdf
  26. Jan Willemson, Kommentaare õppekavade projektile, 19. jaanuar 2007. Available at
    https://research.cyber.ee/~jan/publ/jwkommentaarid.pdf
  27. Jan Willemson, Räsifunktsioonide väljavahetamine X-tee infrastruktuuris. Cybernetica, aruanne nr Y-418-3, 24.05.2007.
  28. Aivo Jürgenson, Jan Willemson, Ründepuud: pooladaptiivne mudel ja ligikaudsed arvutused. Cybernetica, aruanne nr T-4-4, 26.02.2009. Available at
    https://research.cyber.ee/
  29. Aivo Jürgenson, Jan Willemson, Serial Model for Attack Tree Computations, Cybernetica, research report nr T-4-6, 2009. Available at
    https://research.cyber.ee/reports/T-4-6-Serial-Model-for-Attack-Tree-Computations.pdf
  30. Arne Ansper, Ahto Buldas, Aivo Jürgenson, Mart Oruaas, Jaan Priisalu, Kaido Raiend, Anto Veldre, Jan Willemson, Kaur Virunurm, E-voting concept security: analysis and measures, EH-02-02, 27 December 2010. Available at
    https://www.valimised.ee/sites/default/files/uploads/eng/E-voting_concept_security_analysis_and_measures_2010.pdf
  31. Jan Willemson, Peeter Laud, Aivo Jürgenson, Märt Laur, Krüptograafiliste algoritmide kasutusvaldkondade ja elutsükli uuring. Cybernetica aruanne A-60-1, 2011. Available at
    https://www.ria.ee/sites/default/files/content-editors/publikatsioonid/kryptoalgoritmide_elutsykli_uuring_15-07-2011.pdf
  32. Krüptograafiliste algoritmide kasutusvldkondade ja elutsükli uuring. Cybernetica aruanne A-77-5, 2013. Available at
    https://www.ria.ee/sites/default/files/content-editors/publikatsioonid/kruptograafiliste_algoritmide_elutsukli_uuring_ii.pdf
  33. Krüptograafiliste algoritmide elutsükli uuring. Cybernetica aruanne A-101-1, 2015. Available at
    https://www.ria.ee/sites/default/files/content-editors/publikatsioonid/kruptograafiliste_algoritmide_uuring_2015.pdf
  34. Ahto Buldas, Kristo Heero, Peeter Laud, Riivo Talviste, Jan Willemson, Cryptographic algorithms lifecycle report 2016. Cybernetica research report A-101-3, 2016. Available at
    https://www.ria.ee/sites/default/files/content-editors/publikatsioonid/cryptographic_algorithms_lifecycle_report_2016.pdf
  35. Arne Ansper, Ahto Buldas, Jan Willemson, Cryptographic algorithms lifecycle report, Krüptograafiliste algoritmide elutsükli uuring. Cybernetica aruanne A-101-9, 2017. Cybernetica research report A-101-9, 2017. Available
  36. Alisa Pankova, Jan Willemson, Ahto Buldas, Postkvant-krüptograafia ülevaade. Cybernetica aruanne A-101-10, 2018. Available at
    https://www.ria.ee/sites/default/files/content-editors/publikatsioonid/postkvant-kruptograafia-ulevaade-2018.pdf
  37. Ahto Buldas, Tarmo Kalvet, Peeter Laud, Alisa Pankova, Marek Tiits, Jan Willemson, Development and application of cryptography in the Estonian public and private sectors, Cybernetica research report A-116-1, 2019. Available at
    https://www.etag.ee/wp-content/uploads/2019/05/Krypto_KAM.pdf
  38. E-valimiste turvalisuse töörühma koondaruanne. Report on e-voting security, December 2019, Ministry of Economic Affairs and Comminucations. Available at
    https://www.mkm.ee/sites/default/files/content-editors/e-valimiste_tooruhma_koondaruanne_12.12.2019_0.pdf
  39. Arne Ansper, Kristjan Krips, Mart Oruaas, Tea Lindorg, Jan Willemson, CDOC 2.0 analüüs. Cybernetica aruanne T-184-5, 2020.
  40. Kristjan Krips, Mart Oruaas, Mart Sõmermaa, Alisa Pankova, Jan Willemson, Analysis of planned architectural changes in Open-eID, Cybernetica report T-176-1, 2020. Available at
    https://web-eid.gitlab.io/analysis/webextensions-main.pdf
  41. Ahto Buldas, Sven Heiberg, Kristjan Krips, Jan Willemson, Mobile voting feasibility study and risk analysis, Cybernetica report T-184-5, 2020. Available at
    https://www.valimised.ee/sites/default/files/uploads/eng/2020_m-voting-report.pdf
  42. Mart Oruaas, Aivo Kalu, Jaak Pruulmann-Vengerfeldt, Kristjan Krips, Jan Willemson, Krüptoalgoritmid ning nende tugi teekides ja infosüsteemides. Cybernetica report T-184-7, 2021. Available at
    https://www.ria.ee/sites/default/files/pictures/cryptoreport2021.pdf
  43. Biomeetrilise näotuvastusmeetme rakendamine elektroonilisel hääletamisel. Cybernetica research report D-16-12, 2021. Available at
    https://www.ria.ee/sites/default/files/content-editors/publikatsioonid/biomeetria-aruanne.pdf.
  44. Elektrooniliste häälte töötlemise protsesside analüüs. Cybernetica research report D-16-174, 2022. Available at
    https://www.valimised.ee/sites/default/files/2023-02/Hääletamisprotsesside_analüüs_v10.pdf.

6  Other publications

  1. Uve Nummert, Jan Villemson, Baltic Way Team Competition 1990-1993, Tartu University Publishing, 1994, 64 pp.
  2. Elts Abel, Mati Abel, Kalle Kaarli, Lea Lepmann, Tiit Lepmann, Härmel Nestra, Uve Nummert, Jan Villemson, Agnis Andzans, Matemaatikaolümpiaadid Eestis 1993/94 õ.-a. : ülesanded ja lahendused. Tartu Ülikool, 1995, 47 pp.
  3. Jan Willemson, Dokumendiformaadid ja nende turvaprobleemid, Arvutimaailm 9-2000, pp 19-22. Available at
    https://research.cyber.ee/~jan/publ/docform.pdf.
  4. Jan Willemson, XML-põhise dokumendihalduse võimalikkusest Eesti Wabariigis, report for Estonian State Chancellery, Febryary 7th, 2001. Available at
    https://research.cyber.ee/~jan/publ/XMLdokhald.pdf
  5. Jan Willemson, Haridus kui reklaamikampaania? Õpetajate leht, 16.06.2000. Available at
    https://www.opleht.ee/Arhiiv/2000/16.06.00/tekstid/elu/1.html
  6. Jan Willemson, Miks matemaatika nii keeruline on? Õpetajate leht, 4.10.2002.
  7. Baltic Way 2002, Proposed Problems with Solutions, Jan Willemson (Ed.), Tartu University 2002, 72 pp.
  8. Jan Willemson, Tarkvaraga targu talita, Õpetajate leht, 21.11.2003. Available at
    https://www.opleht.ee/Arhiiv/2003/21.11.03/tekstid/peamearu/1.html
  9. Kaie Kubjas, Jan Willemson, Matemaatikaolümpiaadi ootuses Mehhikosse, Horisont 5/2005
  10. Jan Willemson, Matemaatika õpetamisest ja ainekava tööversioonist, Õpetajate Leht, 26.01.2007, pg 16. Available at
    https://research.cyber.ee/~jan/publ/arvamus.txt
  11. Jan Willemson, Mida külvad, seda lõikad, Õpetajate Leht, 23.03.2007, pg 6. Available at
    https://research.cyber.ee/~jan/publ/midakylvad.txt
  12. Jan Willemson, Eksamid stabiilsed, tunde liiga vähe Õpetajate Leht, 15.06.2007, pg 6. Available at
    https://research.cyber.ee/~jan/publ/opleht150607.txt
  13. Jan Willemson, Kuidas kasutatakse kogutud infot? Õpetajate Leht, 17.08.2007, pg 7. Available at
    https://www.opleht.ee/Arhiiv/2007/17.08.07/dialoog/3.shtml
  14. Jan Willemson, Hanoi reisikiri, Õpetajate Leht, 24.08.2007, pg 9. Full version available at
    https://research.cyber.ee/~jan/hanoireisikiri
  15. Jan Willemson, Mitmekülgsus ja kahepalgelisus. Arvutimaailm, September 2007, pg 28-29. Available at
    https://research.cyber.ee/~jan/publ/am092007.html
  16. Jan Willemson, Erasmus Mundus programm. Universitas Tartuensis, 28.09.2007. Available at
    https://www.ajaleht.ut.ee/287818
  17. Jan Willemson, Mis juhtus Hanois. Rahvusvaheline matemaatikaolümpiaad, Horisont 6/2007, pg 43-44. Available at
    https://horisont.ee/node/298
  18. Jan Willemson, Kuidas kindlustada matemaatikaeksami ebapopulaarsus, Õpetajate Leht, 15.02.2008, pg 12. Available at
    https://research.cyber.ee/~jan/publ/mataeksam.txt
  19. Jan Willemson, Puudub ka pall, millega õhku kinni pidada, Õpetajate Leht, 14.03.2008, pg 7. Available at
    https://research.cyber.ee/~jan/publ/opleht140308.html
  20. Jan Willemson, Haridussüsteemi eesmärkidest, nende saavutamisest ja mõõtmisest, Õpetajate leht, 22.03.2008, pg 9. Available at
    https://research.cyber.ee/~jan/publ/haridusemootmine.txt
  21. Jan Wilemson, Tehnoloogiaskeptiku paberblogi, Arvutimaailm, 03.2008, pp 28-29. Available at
    https://research.cyber.ee/~jan/publ/tehnoloogia.txt
  22. Jan Willemson, Andmekogude turvaline koondamine, Eesti infoühiskonna aastaraamat 2011/2012, pg 84. Available at
    https://www.riso.ee/et/files/infoühiskonna aastaraamat_2011-2012 EST FINAL.pdf.



File translated from TEX by TTH, version 4.16.