Publications by Jan Willemson
1 Peer-reviewed papers
1.1 Journal papers
- Maarja Kruusmaa, Jan Willemson, Covering the path space: a casebase
analysis for mobile robot path planning, in Knowledge Based Systems,
Volume 16, Issues 5-6, Pages 235-242 (July 2003), Elsevier.
Available at
https://www.sciencedirect.com/science/article/pii/S0950705103000248.
- Dan Bogdanov, Margus Niitsoo, Tomas Toft, Jan Willemson, High-performance secure multi-party computation for data mining applications, in International Journal of Information Security, Springer, 2012, Volume 11, Number 6, pages 403-418, DOI: 10.1007/s10207-012-0177-2. Available at
- Liina Kamm, Jan Willemson, Secure floating point arithmetic and
private satellite collision analysis,
in International Journal of Information Security, November 2015, Volume 14, Issue 6, pp 531-548, Springer.
Available at
https://link.springer.com/article/10.1007/s10207-014-0271-8.
- Xun Yi, Athman Bouguettaya, Dimitrios Georgakopoulos, Andy Song, Jan Willemson,
Privacy Protection for Wireless Medical Sensor Data. IEEE Transactions on Dependable and Secure Computing
13(3): 369-380 (2016).
Available at
https://www.computer.org/csdl/trans/tq/2016/03/07047722-abs.html.
- Jan Willemson, Bits or Paper: which should get to carry your vote? Journal of Information Security and Applications, Elsevier, Volume 38, February 2018, Pages 124-131, DOI: https://doi.org/10.1016/j.jisa.2017.11.007. Available at
https://research.cyber.ee/~jan/publ/papervoting-jisa.pdf.
- Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson, DiLizium: A Two-Party Lattice-Based Signature Scheme, in Entropy 2021, 23(8), 989, MDPI. DOI: https://doi.org/10.3390/e23080989. Available at
https://www.mdpi.com/1099-4300/23/8/989 and https://research.cyber.ee/~jan/publ/entropy-23-00989.pdf.
- Piret Ehin, Mihkel Solvak, Jan Willemson, Priit Vinkel, Internet voting in Estonia 2005-2019: Evidence from eleven elections, in Government Information Quarterly, 39(4): 101718 (2022). DOI: https://doi.org/10.1016/j.giq.2022.101718. Available at
https://www.sciencedirect.com/science/article/pii/S0740624X2200051X.
- Jan Willemson, Towards Identifying Social Factors behind (In)Efficiency of Voting Security Measures. In eJournal of eDemocracy and Open Government (JeDEM), vol. 14, no. 1 (2022), pages 72-85. DOI:
https://doi.org/10.29379/jedem.v14i1.673. Available at
https://jedem.org/index.php/jedem/article/view/673.
- Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik, Improved lattice-based mix-nets for electronic voting. In IET Information Security, Volume 17, Issue 1,
January 2023, pages 18-34. DOI: http://dx.doi.org/10.1049/ise2.12089. Available at https://research.cyber.ee/ jan/publ/IET-IS-lattice-mixnet.pdf.
- Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson, Comparing security levels of postal and Internet voting. In Information Security Journal: A Global Perspective, 2024. DOI: https://doi.org/10.1080/19393555.2024.2410332.
1.2 Peer-reviewed papers in scientific conferences
- Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Villemson, Time-Stamping with
Binary Linking Schemes, Advances in Cryptology - CRYPTO '98,
Springer-Verlag 1998, LNCS 1462, pp 486-501. Available at
https://research.cyber.ee/~jan/publ/bllv98.pdf.
- Margus Freudenthal, Sven Heiberg, Jan Willemson, Personal Security
Environment on Palm PDA, in Proceedings of 16th Annual Computer Security
Applications
Conference ACSAC'00, pp 366-372. December 2000, New Orleans, Louisiana, USA.
Available at
https://research.cyber.ee/~jan/publ/acsac_smartpalm.pdf.
- Arne Ansper, Ahto Buldas, Meelis Roos, Jan Willemson, Efficient long-term
validation of digital signatures, Advances in Cryptology - PKC 2001,
Springer-Verlag, LNCS 1992, pp 402-415, presented on PKC 2001, February
2001, Cheju Island, Korea. Available at
https://research.cyber.ee/~jan/publ/efficient.pdf.
- Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson, Improving the
availability of time-stamping services, in Information Security and Privacy,
6th Australasian Conference, ACISP 2001, July 11.-13.
2001, Sydney, Australia. Springer, LNCS 2119, pp. 360-375. Available at
https://research.cyber.ee/~jan/publ/ts_avail_final.ps.
- Ahto Buldas, Meelis Roos, Jan Willemson, Undeniable replies for database
queries, in Proceedings of the Fifth International Baltic Conference on DB and
IS, June
2002, Tallinn, Estonia, edited by Hele-Mai Haav and Ahto
Kalja, Vol. 2, pp. 215-226. Available at
https://research.cyber.ee/~jan/publ/dbart_2.ps
- Kristo Heero, Uuno Puus, Jan Willemson, XML based document management in
Estonian legislative system, in Proceedings of the Fifth International Baltic
Conference
on DB and IS, June 2002, Tallinn, Estonia, edited by Hele-Mai Haav and Ahto
Kalja, Vol. 1, pp. 321-330. Available at
https://research.cyber.ee/~jan/publ/estlaw3.ps
- Maarja Kruusmaa, Jan Willemson, Covering the Path Space: A Casebase
Analysis for Mobile Robot Path Planning. Research and Development in Intelligent
Systems
XIX, Proceedings
The Twenty-second SGAI International
Conference on Knowledge Based Systems and Applied Artificial Intelligence, BCS
Conference Series, Springer, pp. 1-16. Available at
https://research.cyber.ee/~jan/publ/robotpath7.pdf.
- Also published in Expert Update, spring 2003 (vol. 6, num. 1), ISSN
1465-4091, pp 31-43.
- Kristo Heero, Maarja Kruusmaa, Jan Willemson,
Path Selection for Mobile Robots in Dynamic Environments.
European Conference on Mobile Robots 2003. Available at
https://research.cyber.ee/~jan/publ/robotcomp.ps.
- Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson, Scalable and
Efficient PKI for Inter-Organizational Communication. Annual
Computer Security Applications Conference ACSAC 2003, pp 308-318.VotingCO2.tex
Available at
https://research.cyber.ee/~jan/publ/xroad.ps.
- Meelis Roos, Jan Willemson, Peeter Laud, Improving the Gnutella
protocol against poisoning. Proceedings of the Seventh
Nordic Workshop on Secure IT Systems NordSec 2003, pp. 185-194. Available at
https://research.cyber.ee/~jan/publ/gnutella.ps.
- Jelena Zaitseva, Jan Willemson, Jaanus Pöial, Tutorial Environment for
Cryptographic Protocols. Proceedings of the Seventh
Nordic Workshop on Secure IT Systems NordSec 2003, pp. 175-184. Available at
https://research.cyber.ee/~jan/publ/tecp.pdf.
- Alvo Aablo, Kristo Heero, Maarja Kruusmaa, Jan Willemson, Robots Find a
Better Way: A Learning Method for Mobile Robot Navigation in Partially
Unknown Environemnts. In F.Groen, N. Amoto, A. Bonarini, E. Yoshida and
B. Kröse, editors, Proceedings of the 8th Conference on Intelligent
Autonomous Systems (IAS8), pp. 559-566, Amsterdam, The Netherlands, 2004.
IOS Press. Available at
https://research.cyber.ee/~jan/publ/02_Robots_Find_a_Better_Way.pdf.
- Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson, Universally
Composable Time-Stamping Schemes with Audit. In Jianying Zhou, Javier
Lopez,
Robert H. Deng, Feng Bao, editors, Information Security: 8th International
Conference, ISC 2005, Singapore, September 20-23, 2005. pp 359-373. LNCS 3650.
Available at
https://research.cyber.ee/~jan/publ/time_joint_final.pdf.
- Jan Willemson, Computer Clobber Tournament at Tartu
University, in ICGA
Journal, Vol. 28, No. 1, pp 51-54. Available at
https://research.cyber.ee/~jan/publ/clobreport.ps.
- Jan Willemson, Maarja Kruusmaa, Algorithmic Generation of Path Fragment
Covers for Mobile Robot Path Planning, in Proceedings of the
3rd IEEE Conference on Intelligent Systems, 4-6 September 2006, University of
Westminster, London, UK, pp 673-678.
Available at
https://research.cyber.ee/~jan/publ/robotfrag10.ps.
- Jan Willemson, On the Gordon and Loeb Model for Information Security
Investment, presented at The Fifth Workshop on the Economics of
Information
Security (WEIS 2006), University of Cambridge, England, UK, 26-28 June 2006.
Available at
https://research.cyber.ee/~jan/publ/economics.ps.
- Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan
Willemson, Rational Choice of Security Measures via Multi-Parameter
Attack Trees, in Critical Information Infrastructures Security
First International Workshop, CRITIS 2006, Samos Island, Greece, August 31
- September 1, 2006. LNCS 4347, pp. 235-248. Available at
https://research.cyber.ee/~jan/publ/attacks11.pdf.
- Aivo Jürgenson, Jan Willemson, Processing Multi-parameter Attacktrees with
Estimated
Parameter Values, in A. Miyaji, H. Kikuchi, and K. Rannenberg (Eds.):
IWSEC 2007, LNCS 4752, pp. 308-319, 2007, Springer-Verlag. Available at
https://research.cyber.ee/~jan/publ/attacktree_with_estimations.pdf.
- Jan Willemson, Arne Ansper, A Secure and Scalable Infrastructure for
Inter-Organizational Data Exchange and eGovernment Applications. In Proceedings
of The
Third International Conference on Availability, Reliability and Security ARES
2008, pp 572-577, IEEE Computer Society. Available at
https://research.cyber.ee/~jan/publ/xroadares07final.pdf.
- Jaan Pruulmann, Jan Willemson, Implementing a Knowledge-driven Hierarchical Context Model in
a Medical Laboratory Information System, in proceedings of The Third
International Multi-Conference on
Computing in the Global Information Technology (ICCGI 2008), pp 62-67, IEEE Computer
Society Press. Available at
https://research.cyber.ee/~jan/publ/context_iccgi_2008.pdf.
- Dan Bogdanov, Sven Laur, Jan Willemson, Sharemind: a framework for fast
privacy-preserving computations, In Computer Security - ESORICS 2008, 13th
European Symposium on Research in Computer Security, Málaga, Spain,
October 6-8, 2008, volume 5283 of Lecture Notes in Computer Science, pages
192-206. Springer, 2008. Available at
https://research.cyber.ee/~jan/publ/sharemind.pdf.
- Aivo Jürgenson, Jan Willemson, Computing Exact Outcomes of Multi-parameter Attack Trees, In On the Move to Meaningful Internet Systems: OTM 2008, IS 2008, Monterrey, Mexico, November 9-14, 2008, volume 5332 of Lecture Notes in Computer Science, pages 1036-1051. Available at
https://research.cyber.ee/~jan/publ/JW08.pdf
- Aivo Jürgenson, Jan Willemson, Serial Model for Attack Tree
Computations. In D. Lee and S. Hong (Eds.): ICISC 2009, Lecture Notes in Computer Science, volume 5984, pp. 118-128, Springer 2010. Available at
https://research.cyber.ee/~jan/publ/serialattack.pdf
- Jan Willemson, Extending the Gordon&Loeb Model for Information Security Investment. In Proceedings of International Conference on Availability, Reliability and Security ARES 2010, IEEE Computer
Society Press, pages 258-261. Available at
https://research.cyber.ee/~jan/publ/aresGL.pdf
- Aivo Jürgenson, Jan Willemson, On Fast and Approximate Attack Tree Computations, in Information Security and Practice, 6th International Conference (ISPEC 2010), volume 6047 of LNCS, pages 56-66, Springer-Verlag, 2010. Available at
https://research.cyber.ee/~jan/publ/approxtree_paper.pdf
- Jan Willemson, Pseudonymization Service for X-Road eGovernment Data Exchange Layer. In Kim Normann Andersen, Enrico Francesconi, Åke Grönlund, Tom M. van Engers (editors), Electronic Government and the Information Sytems Perspective. Second International Conference, EGOVIS 2011. LNCS 6866, pp. 135-145. Available at
https://research.cyber.ee/~jan/publ/egovis_pseud.pdf
- Sven Laur, Jan Willemson and Bingsheng Zhang, Round-efficient Oblivious Database Manipulation. In Xuejia Lai, Jianying Zhou and Hui Li, editors, ISC 2011. Springer LNCS 7001, pp. 262-277 Available as
- Sven Heiberg, Peeter Laud and Jan Willemson, The Application of I-voting for Estonian Parliamentary Elections of 2011. In Aggelos Kiayias and Helger Lipmaa, editors, E-Voting and Identity, VoteID 2011, LNCS 7187, pp. 208-223. Springer, 2012. Available at
https://research.cyber.ee/~jan/publ/evote2011.pdf
- Dan Bogdanov, Riivo Talviste, Jan Willemson, Deploying Secure Multi-Party Computation for Financial Data Analysis (Short Paper). In Angelos Keromytis, editor, Financial Cryptography and Data Security, LNCS 7397, pp. 57-64. Springer, 2012. Available as
- Sven Laur, Riivo Talviste, Jan Willemson, From oblivious AES to efficient and secure database join in the multiparty setting. In ACNS 2013, LNCS 7954, pp. 84-101. Springer, 2013. Available in
- Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson, High-Performance Qualified Digital Signatures for X-Road. In Hanne Riis Nielson and Dieter Gollmann, editors, Secure IT Systems. 18th Nordic Conference, NordSec 2013, LNCS 8208, pp. 123-138, Springer 2013. Available at
https://research.cyber.ee/~jan/publ/batchsignatures.pdf.
- Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson, Protecting a Federated Database Infrastructure Against Denial-of-Service Attacks. In Eric Luiijf and Pieter Hartel (editors), CRITIS 2013, LNCS 8328, pp. 26-37, Springer 2013. Available at
https://research.cyber.ee/~jan/publ/xroadavailability.pdf.
- Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt, Riivo Talviste and
Jan Willemson, Privacy-preserving statistical data analysis on federated databases.
In Bart Preneel, Demosthenes Ikonomou (Editors), Privacy Technologies and Policy.
Second Annual Privacy Forum APF 2014, May 20-21, Athens, Greece, LNCS 8450, pp. 30-55, Springer 2014.
Available at
https://research.cyber.ee/~jan/publ/privacypreservingdatabases.pdf.
- Dan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka,
Shin'ichiro Matsuo and Jan Willemson,
A Secure Genetic Algorithm for the Subset Cover Problem and its Application to
Privacy Protection. In Gerhard Goos, Juris Hartmanis and Jan van Leeuwen, editors, Information Security Theory and Practice,
8th IFIP WG 11.2 International Workshop, WISTP 2014, June 30 - July 2 2014; Heraklion, Greece, LNCS 8501, pp. 108-123,
Springer 2014.
Available at
https://research.cyber.ee/~jan/publ/genetic-algorithms-smc-wistp.pdf.
- Sven Heiberg and Jan Willemson,
Verifiable Internet Voting in Estonia.
In: Krimmer, R., Volkamer, M.: 6th International Conference on Electronic Voting: Verifying the Vote,
EVOTE 2014, IEEE, pp. 1-8.
Available at
https://research.cyber.ee/~jan/publ/mobileverification-ieee.pdf.
Also published in Proceedings of Electronic Voting 2014
(EVOTE2014), TUT Press, Tallinn, p. 23-29.
- Aleksandr Lenin, Jan Willemson and Dyan Permata Sari,
Attacker profiling in quantitative security assessment based on attack trees.
In Karin Bernsmed and Simone Fischer-Hübner, editors, Secure IT Systems,
19th Nordic Conference, NordSec 2014, LNCS 8988, pp. 199-212, Springer 2014.
Available at
https://research.cyber.ee/~jan/publ/attackerprofiling.pdf.
- Toomas Krips and Jan Willemson,
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations.
In Proceedings of ISC 2014, LNCS 8783, pp. 179-197, Springer 2014. Available in
- Peeter Laud and Jan Willemson,
Composable Oblivious Extended Permutations.
In Frdédéric Cuppens, Joaquin Garcia-Alfaro, Nur Zincir Heywood and Philip W. L. Fong (editors)
Foundations and Practice of Security,
Lecture Notes in Computer Science Volume 8930, pp 294-310, Springer 2015.
Available at
https://research.cyber.ee/~jan/publ/extendedpermutations.pdf.
- Sven Heiberg, Arnis Parsovs, Jan Willemson, Log Analysis of Estonian Internet Voting 2013-2014. In Rolf Haenni, Reto E. Koenig and Douglas Wikström (editors)
E-Voting and Identity, Lecture Notes in Computer Science Volume 9269, pp 19-34, Springer 2015.
Available in
- Aleksandr Lenin, Jan Willemson, Anton Charnamord, Genetic Approximations for the Failure-Free Security Games.
In Khouzani, MHR, Panaousis, Emmanouil, Theodorakopoulos, George, editors,
Decision and Game Theory for Security, 6th International Conference, GameSec 2015,
Lecture Notes in Computer Science Volume 9406, pp 311-321, Springer 2015.
Available at
https://research.cyber.ee/~jan/publ/failurefree.pdf.
- Toomas Krips, Jan Willemson, Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation.
In Joaquin Garcia-Alfaro, Evangelos Kranakis and Guillaume Bonfante, editors,
oundations and Practice of Security: 8th International Symposium,
FPS 2015, Clermont-Ferrand, France, October 26-28, 2015,
Revised Selected Papers. Volume 9482 of the Lecture Notes in Computer Science,
Springer 2016, pp. 66-82.
Available at
https://research.cyber.ee/~jan/publ/PointCounting.pdf.
- Christian W. Probst, Jan Willemson, Wolter Pieters, The Attack Navigator.
In Sjouke Mauw, Barbara Kordy, Sushil Jajodia, editors, Second International
Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers.
Volume 9390 of LNCS, Springer, 2016, pp. 1-17.
Available at
https://research.cyber.ee/~jan/publ/theattacknavigator.pdf.
- Vassil Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson, Alternative Implementations of Secure Real Numbers. In Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi, editors, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), Vienna, Austria, October 24-28, 2016, pp. 553-564, ACM 2016.
Available at
- Sven Heiberg, Tarvi Martens, Priit Vinkel, Jan Willemson, Improving the verifiability of the Estonian Internet Voting scheme. In Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole Goodman, Peter Y.A. Ryan, Oliver Spycher, Vanessa Teague, Gregor Wenda (Eds.), The International Conference on Electronic Voting E-Vote-ID 2016, 18-21 October 2016, Lochau/Bregenz, Austria. Published as
- The International Conference on Electronic Voting E-Vote-ID 2016, TUT Press, pp. 213-229, ISBN 978-9949-83-022-0 (pdf), and
- Electronic Voting, First International Joint Conference, E-Vote-ID 2016, Springer LNCS 10141, pp. 92-107.
Available at https://research.cyber.ee/~jan/publ/ivxv-evoteid.pdf.
- Margus Freudenthal, Jan Willemson, Challenges of Federating National Data Access Infrastructures. In Pooya Farshim, Emil Simion, editors, SecITC 2017: Innovative Security Solutions for Information Technology and Communications, June 8-9 2017, Bucharest, Romania, Springer LNCS 10543, pp. 104-114.
Available at
https://research.cyber.ee/~jan/publ/xroad-federation.pdf.
- Ahto Buldas, Aleksandr Lenin, Jan Willemson, and Anton Charnamord, Simple Infeasibility Certificates for Attack Trees. In Satoshi Obana and Koji Chida, editors, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Springer LNCS 10418, pp. 39-55. Available at
https://research.cyber.ee/~jan/publ/costreduction.pdf.
- Ivo Kubjas, Tiit Pikma and Jan Willemson, Estonian Voting Verification Mechanism Revisited Again. In Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann, editors, Proceedings of the Second International Joint Conference E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, LNCS, volume 10615, pp. 306-317, Springer 2017.
Available at
Also printed in
- TUT Press Proceedings of the Second International Conference on Electronic Voting (E-Vote-ID), pp. 274-287.
- Jan Willemson, Bits or Paper: which should get to carry your vote? In Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann, editors, Proceedings of the Second International Joint Conference E-Vote-ID 2017, LNCS, volume 10615, pp. 292-305, Springer 2017. Available at
https://research.cyber.ee/~jan/publ/papervoting.pdf.
Also printed in
- TUT Press Proceedings of the Second International Conference on Electronic Voting (E-Vote-ID), pp. 156-169.
- Sven Heiberg, Ivo Kubjas, Janno Siim and Jan Willemson, On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards. In Robert Krimmer, Melanie Volkamer, Véronique Cortier, David Duenas-Cid, Rajeev Goré, Manik Hapsara, Reto Koenig, Steven Martin, Ronan McDermott, Peter Roenne, Uwe Serdült, Tomasz Truderung, editors, proceedings of the Third International Joint Conference on Electronic Voting E-Vote-ID 2018, 2–5 October 2018, Lochau/Bregenz, Austria, TUT press,
pp. 259-276. Available at
- Kristjan Krips, Jan Willemson, Sebastian Värv, Implementing an audio side channel for paper voting. In Robert Krimmer, Melanie Volkamer, Véronique Cortier, Rajeev Goré, Manik Hapsara, Uwe Serdült, David Duenas-Cid, editors, Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings, Springer LNCS, volume 11143, pp. 132-145. Available at
https://research.cyber.ee/~jan/publ/numberdetection.pdf.
- Kristjan Krips, Ivo Kubjas and Jan Willemson, An Internet Voting Protocol with Distributed Verification Receipt Generation. In Robert Krimmer, Melanie Volkamer, Véronique Cortier, David Duenas-Cid, Rajeev Goré, Manik Hapsara, Reto Koenig, Steven Martin, Ronan McDermott, Peter Roenne, Uwe Serdült, Tomasz Truderung, editors, proceedings of the Third International Joint Conference on Electronic Voting E-Vote-ID 2018, 2–5 October 2018, Lochau/Bregenz, Austria, TUT press,
pp. 128-146. Available at
https://research.cyber.ee/~jan/publ/utahvoting.pdf.
- Kristjan Krips, Jan Willemson, Sebastian Värv, Is your vote overheard? A new scalable side-channel attack against paper voting. In 4th IEEE European Symposium on Security and Privacy, June 17-19, 2019, Stockholm, Sweden, IEEE, pp. 621-634. Available at
https://research.cyber.ee/~jan/publ/markdetection-opt.pdf.
- Jan Willemson, How not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Application. In Computer Security (CyberICPS 2019, SECPRE 2019, SPOSE 2019, ADIoT 2019, 26-27 September, 2019, Luxembourg), Lecture Notes in Computer Science, volume 11980, pp. 111-121, Springer 2020. Available at
https://research.cyber.ee/~jan/publ/WrongSMC.pdf.
- Kristjan Krips, Jan Willemson, On practical aspects of coercion-resistant remote voting systems. International Joint Conference on Electronic Voting (E-Vote-ID 2019) 1-4 October 2019, Bregenz, Austria. In LNCS, volume 11759, pp 216-232. Available at
https://research.cyber.ee/~jan/publ/coercion.pdf.
- Mart Oruaas, Jan Willemson, Developing requirements for the new encryption mechanisms in the Estonian eID infrastructure. Keynote paper at Baltic DB&IS 2020. Communications in Computer and Information Science vol. 1243, pp. 13-20, Springer 2020. Available at
https://research.cyber.ee/~jan/publ/NewEstCDOC.pdf.
- Sven Heiberg, Kristjan Krips, Jan Willemson, Planning the next steps for Estonian Internet voting. In Robert Krimmer, Melanie Volkamer, Bernhard Beckert, Ardita Driza Maurer, David Dueñas-Cid, Stéphane
Glondu, Iuliia Krivonosova, Oksana Kulyk, Ralf Küsters, Beata Martin-Rozumilowicz, Peter Rønne, Mihkel Solvak, Oliver Spycher, Proceedings of the Fifth International Joint Conference on Electronic Voting, E-Vote-ID 2020. TALTECH Press 2020, pp. 82-97. Available at
https://research.cyber.ee/~jan/publ/planning.pdf.
- Valeh Farzaliyev, Kristjan Krips, Jan Willemson, Developing a Personal Voting Machine for the Estonian Internet Voting System. In Proceedings of the Computer Security track of ACM/SIGAPP Symposium On Applied Computing 2021, pp 1607-1616, ACM 2021. https://doi.org/10.1145/3412841.3442034; available at
https://research.cyber.ee/~jan/publ/votingclient-final.pdf.
- Sven Heiberg, Kristjan Krips and Jan Willemson, Mobile Voting - Still Too Risky? In Financial Cryptography and Data Security. FC 2021 International Workshops. Springer LNCS 12676, pp. 263-278. https://doi.org/10.1007/978-3-662-63958-0_23; available at
https://research.cyber.ee/~jan/publ/mvoting-design.pdf.
- Arne Koitmäe, Jan Willemson and Priit Vinkel, Vote Secrecy and Voter Feedback in Remote
Voting - Can We Have Both? In Proceedings of E-Vote-ID 2021. Springer LNCS 12900, pp. 140-154. https://doi.org/10.1007/978-3-030-86942-7_10; available at
https://research.cyber.ee/~jan/publ/Vote-Secrecy.pdf.
- Sven Heiberg, Kristjan Krips, Jan Willemson and Priit Vinkel, Facial Recognition for Remote Electronic Voting - Missing Piece of the Puzzle or Yet Another Liability?
In 4th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021
(Co-Located with ESORICS 2021). Springer LNCS, volume 13136, pp 77-93. https://link.springer.com/chapter/10.1007/978-3-030-93747-8_6; available at
https://research.cyber.ee/~jan/publ/facerec.pdf.
- Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik, Improved Lattice-Based Mix-Nets for Electronic Voting. In Information Security and Cryptology - ICISC 2021, Springer LNCS volume 13218, pp 119-136. DOI: https://doi.org/10.1007/978-3-031-08896-4_6 Available at
- Alisa Pankova, Jan Willemson, Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols. In ACNS 2022, Rome, Italy, June, 20-23, 2022, LNCS, volume 13269, pp. 313-333. DOI: https://doi.org/10.1007/978-3-031-09234-3_16. Available at
- Jan Willemson, Fifty Shades of Personal Data - Partial Re-Identification and GDPR. In APF 2022: Privacy Technologies and Policy pp 88-96, Springer LNSC,volume 13279. https://doi.org/10.1007/978-3-031-07315-1_6; available at https://research.cyber.ee/~jan/publ/50shades.pdf.
- Jelizaveta Vakarjuk, Nikita Snetkov and Jan Willemson, Russian Federal Remote E-voting Scheme of 2021 - Protocol Description and Analysis. Accepted to European Interdisciplinary Cybersecurity Conference 2022, 15-16 June 2022, Barcelona, Spain. Pp. 29-35, ACM. DOI: https://doi.org/10.1145/3528580.3528586. Available at
- Jan Willemson, Creating a Decryption Proof Verifier for the Estonian Internet Voting System. 18th International Conference on Availability, Reliability and Security ARES 2023, pp. 1-7. DOI: https://doi.org/10.1145/3600160.3605467. Available at
https://research.cyber.ee/~jan/publ/DecProofVer.pdf.
- Jan Willemson and Kristjan Krips, Estimating carbon footprint of paper and Internet voting. International Joint Conference on Electronic Voting E-Vote-ID 2023. Lecture Notes in Computer Science, vol 14230. Springer, pp. 140-155. DOI: https://doi.org/10.1007/978-3-031-43756-4_9. Available at
https://research.cyber.ee/~jan/publ/VotingCO2.pdf.
- Jan Willemson, Analysis of information security measures embedded in the GDPR. IEEE 31st International Requirements Engineering Conference Workshops (REW), Hannover, Germany, 2023, pp. 214-217. DOI: https://doi.org/10.1109/REW57809.2023.00043. Available at
https://research.cyber.ee/~jan/publ/riskpriv-IEEE.pdf.
- Kristjan Krips, Nikita Snetkov, Jelizaveta Vakarjuk, Jan Willemson, Trust assumptions in voting systems. Computer Security. ESORICS 2023 International Workshops (SecAssure) pp 309-329, Springer LNCS 14399. DOI: https://doi.org/10.1007/978-3-031-54129-2_18. Available as
- Jan Willemson, Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System. International Workshop on Security and Trust Management STM 2023, LNCS 14336, pp 126-135. DOI: https://doi.org/10.1007/978-3-031-47198-8_8. Available as
- Tobias Hilt, Kati Sein, Tanel Mällo, Jan Willemson, Melanie Volkamer, Voter Perception of Cast-as-Intended Verifiability in the
Estonian I-Vote Protocol. Accepted to E-Vote-ID 2023. Available at
https://research.cyber.ee/~jan/publ/voterperception.pdf.
- Petr Muzikant, Jan Willemson, Deploying Post-Quantum Algorithms in Existing Applications and Embedded Devices. International Conference on Ubiquitous Security 2023, Communications in Computer and Information Science, vol 2034, Springer, pp 147-162. DOI: https://doi.org/10.1007/978-981-97-1274-8_10. Available at
https://research.cyber.ee/ jan/publ/pqauth.pdf
- Petr Tuma, Jan Hajny, Petr Muzikant, Jan Havlin, Lukas Malina, Patrik Dobias, Jan Willemson, Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment. In Proceedings of the 21st International Conference on Security and Cryptography SECRYPT, Volume 1, 826-831, 2024, Dijon, France. DOI: https://doi.org/10.5220/0012839200003767.
1.3 Papers in collections
- Ahto Buldas, Meelis Roos, Jan Willemson, Undeniable database queries, in
H-M. Haav, A. Kalja (Eds), Databases and Information Systems II, Selected
Papers from the Fifth International Baltic Conference, BalticDB&IS 2002,
Kluwer Academic Publishers, 2002, ISBN 1-4020-1038-9, pp 43-54. Available at
https://research.cyber.ee/~jan/publ/dbart_1.ps.
- Sven Heiberg, Jan Willemson, Modeling Threats of a Voting Method,
Chapter 7 of Dimitrios Zissis and Dimitrios Lekkas (editors)
Design, Development, and Use of Secure Electronic Voting Systems,
IGI Global, 2014, pages 128-148. Available at
1.4 Notes, posters
- Jan Willemson and Yngvi Björnsson, Six wins hex tournament, in ICGA
Journal, Vol. 27, No. 3, September 2004, pg 180.
- Jan Willemson and Mark Winands, MILA wins Clobber tournament, in
ICGA Journal, Vol. 28, No. 3, September 2005, pg 188-190. Available at
https://research.cyber.ee/~jan/publ/clobreport05.pdf
- Wolter Pieters, Dina Hadziosmanovic, Aleksandr Lenin, Lorena Montoya, Jan Willemson,
TRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis.
A poster presented at the 35th IEEE Symposium on Security and Privacy, 2014. Available at
https://research.cyber.ee/~jan/publ/PIETE.pdf.
2 Books
- Baltic Way Mathematical Team Contest 1997-2001, Uve Nummert, Jan Willemson (Eds.),
Estonian Mathematical Society 2002, ISBN 9985-9235-9-6, 85 pp.
- Võrratused, Jan Willemson, Indrek Zolk, Tartu Ülikool, Täppisteaduste Kool,
2003, ISBN 9985-4-0303-7, 98 pp.
- Graafid, Ahto Buldas, Peeter Laud, Jan Villemson. Tartu Ülikool,
arvutiteaduse instituut, 2003. ISBN 9985-4-0355-X, 92 pp.
- 2nd, corrected and improved print, 2008, ISBN 978-9949-11-818-2,
111 pp.
- Eesti Matemaatika Seltsi aastaraamat 2002-2003, Andi Kivinukk, Gert
Tamberg, Jan Willemson (Eds.), Estonian Mathematical Society, 2007, ISSN
1406-4316, 178 pp.
- Võistlusmatemaatika põhivara, https://varamu.eu.
3 Non-peer-reviewed activities in scientific collections, conferences and workshops. Preprints
- Ahto Buldas, Valdo Praust, Meelis Roos, Jan Villemson,
On Long-Term Validation of E-Documents, International Conference
"Information Technologies and Telecommunications in the Baltic States -
Baltic IT&T 2000", April 6-7, Radisson SAS Daugava Hotel, Riga, Latvia, pp.
104-108.
- Jan Willemson, Pourquoi les mathématiques sont-elles si compliquées?, presented
on the conference "Relecture et découverte" of French Scientific Institute, September
21-22, Tartu, Estonia. Available at
https://research.cyber.ee/~jan/publ/Janw.ps.
- Jelena Zaitseva, Jan Willemson, Cryptographic Protocols Tutorial
Environment, poster presentation at 8th Estonian Winter School on Computer
Science, 2.-7.03.2003, Palmse, Estonia.
- Jaan Pruulmann-Vengerfeldt, Jan Willemson, Reeglipõhine keeletarkvara,
Riikliku programmi "Eesti keele keeletehnoloogiline tugi (2006-2010)"
konverents, 19.21.11.2007, Tallinn. Presentation available at
https://keeletehnoloogia.cs.ut.ee/konverents/slaidid/pruulmann.pdf
- Bingsheng Zhang, Zengpeng Li and Jan Willemson, UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System. arXiv preprint arXiv:2109.01994. Available at
https://arxiv.org/abs/2109.01994.
- Jan Willemson, Elliptkõverate krüptograafia. Eesti Matemaatika Seltsi aastaraamat 2018, toimetajad Rainis Haller, Toivo Leiger ja Kaido Lätt, lk 23-39. Available at
https://matemaatika.eu/emsar/ar2018/ar2018lk22.pdf.
- Jan Willemson, Kommentaare 2024. aasta
matemaatikaolümpiaadi lõppvooru 12. klassi
ülesannetele. Eesti Matemaatika Seltsi aastaraamat 2024, toimetaja Rainis Haller. Available at
https://matemaatika.eu/wp-content/uploads/2024/04/loppvoor2024m2.pdf.
4 Theses
- Jan Willemson, Cube graphs and their generalizations as vertex-transitive
permutation graphs, MSc thesis, Tartu 1998. In Estonian. Available at
https://research.cyber.ee/~jan/publ/magtoo.pdf.
- Jan Willemson, Size-efficient interval time stamps, PhD thesis, Tartu
2002. Available at
https://research.cyber.ee/~jan/publ/janPhD2.pdf.
5 Technical reports
- Jan Willemson, Certificate Revocation Paradigms, Technical Report,
Cybernetica 1999, available at
https://xxx.lanl.gov/ps/cs.CR/9909012, 14 pp
- Ahto Buldas, Meelis Roos, Jan Willemson, Notarizing Digital Signatures -
Elimination of Certificate Revocation Lists, Cybernetica 1999, Technical Report
DO-UA-X-22-1299, 26 pp
- Arne Ansper, Ahto Buldas and Jan Willemson,
General linking schemes in ISO/IEC standard on digital time-stamping.
National Body Comments from Estonia on ISO/IEC WD 18014 (SC 27 N 2357).
Attachment 2 to SC 27 N 2380, pages 4-20. August 1999
- Ahto Buldas, Meelis Roos and Jan Willemson,
Notarizing Digital Signatures - Elimination of Certificate Revocation Lists.
Technical Report DO-UA-X-22-1299. Küberneetika AS, 1999
- Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Villemson.
Ajatempli protokollid, turvavajadused ja tehnilised nõuded. Küberneetika AS,
Infotehnoloogia osakond, DO-LU-X-22-1297, 1998
- Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Villemson.
Ajatemplisüsteemide teoreetilised alused. Küberneetika AS, Infotehnoloogia
osakond, DO-AR-X-14-0698, 1998
- Ahto Buldas, Peeter Laud, Alar Leibak, Helger Lipmaa, Jan Villemson,
Krüptograafiliste protokollide formaalne turvaanalüüs. Küberneetika AS,
Infotehnoloogia osakond, DO-AR-T-28-1298, 1998
- Arne Ansper, Ahto Buldas, Jaanus Kase, Peeter Laud, Meelis Roos,
Asko Seeba, Jan Villemson,
Ajatemplikeskuse eksperimentaalserver. Mitme serveriga ajatempliskeemid.
Küberneetika AS, Infotehnoloogia osakond, DO-LU-T-11-0899, 1999
- Ahto Buldas, Helger Lipmaa, Meelis Roos, Jan Villemson.
Turvalised ja efektiivsed ajatemplisüsteemid.
Küberneetika AS, Infotehnoloogia osakond, DO-LU-T-30-1299, 1999
- Ahto Buldas, Helger Lipmaa, Jan Villemson. Avaliku võtme sertifikaatide
haldus, kasutades vaidlustamatuid kehtivustõendeid. Küberneetika AS,
Infotehnoloogia osakond, DO-AR-S-04-0500, 2000.
- Arne Ansper, Ahto Buldas, Meelis Roos, Jan Villemson. Efektiivsed ja
skaleeruvad notariprotokollid. Küberneetika AS,
Infotehnoloogia osakond, DO-AR-X-12-0900, 2000.
- Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Villemson.
Sidusreziimis
kehtivusprotokollid ja ja nende kasutamine avaliku võtme
infrastruktuuri (PKI)
usaldatavuse parandamiseks. Küberneetika AS,
Infotehnoloogia osakond, DO-AR-T-02-0101, 2001.
- Arne Ansper, Ahto Buldas, Sven Heiberg, Monika Oit, Kaidi Oone, Olev Sepp, Jan Villemson. Digitaalallkirja juurutamine riigiasutustes: strateegiline plaan,
2001. Available at
https://cyber.ee/research/reports/Digital-signatures-strat-plan-2001.pdf.
- Jan Villemson, Kristo Heero, Uuno Puus. Elektrooniline Riigi teataja.
Vorminõuded. Cybernetica, Infoturbe osakond, IT-AA-A-006-0202, 2002.
- Jan Willemson. Juhend asjaajajale dokumendi vorminõuete
spetsifitseerimiseks. Cybernetica, Infoturbe osakond, IT-AA-O-020-0205, 2002.
- Jan Willemson. Digitaaldokumentide halduseks vajalikud kesksed ressursid,
nende haldamine ja kasutamine. Cybernetica, Infoturbe osakond,
IT-AA-O-021-0205,
2002.
- Uuno Puus, Jan Willemson. Lähteülesanne riigiasutustes
kasutatavate digitaaldokumentide standardite väljatöötamiseks.
Cybernetica, Infoturbe osakond, IT-AA-O-12-0204,
2002.
- Kristo Heero, Uuno Puus, Jan Willemson. Standardi rakendamise
eeskiri ja kasutusjuhend IT spetsialistile.
Cybernetica, Infoturbe osakond, IT-AA-O-022-0205,
2002.
- Jan Willemson. Arvamus aruandest "Vabavara kasutamisest riigiasutustes".
Cybernetica, Infoturbe osakond, IT-AA-A-064-021121, 2002.
- Ahto Buldas, Meelis Roos, Jan Willemson. Tarkvarapatentide eelised ja
puudused Eesti kontekstis. Cybernetica, Infoturbe osakond,
IT-AA-O-010-0303, 2003.
- Jan Willemson, Maarja Kruusmaa. Algorithmic Generation of Path Fragment
Covers for Mobile Robot Path Planning, technical report, 2003, available at
https://research.cyber.ee/~jan/publ/robotfrag6.ps.
- Arne Ansper, Ahto Buldas, Mart Oruaas, Jaan Priisalu, Anto Veldre,
Jan Willemson, Kaur Virunurm, E-hääletamise kontseptsiooni turve:
analüüs ja meetmed, Vabariigi Valimiskomisjon, EH-02-01, December 15th 2003.
- Jaanus Jaeger, Jan Willemson, Ülevaade VRP ja TSP ülesannete
lahendusmeetoditest, Tartu Ülikooli Tehnoloogiainstituut, August 4th 2004.
- Jan Willemson, Arne Ansper, Monika Oit, Isikuandmete kaitse
delikaatsetes registrites. Cybernetica, aruanne nr Y-97-8, 28.02.2006. Available
at
https://research.cyber.ee/~jan/publ/delikaatsedregistrid.pdf
- Arne Ansper, Jan Willemson, X-Road - A Complete Solution for
Inter-organizational Information Exchange.
Cybernetica, Infoturbe osakond, aruanne nr T-4-1, 24.11.2006. Available at
https://cyber.ee/research/reports/T-4-1_X-Road_complete_solution_for_inter-organizational_information_exchange.pdf
- Jan Willemson, Kommentaare õppekavade projektile, 19. jaanuar 2007.
Available at
https://research.cyber.ee/~jan/publ/jwkommentaarid.pdf
- Jan Willemson, Räsifunktsioonide väljavahetamine
X-tee infrastruktuuris. Cybernetica, aruanne nr Y-418-3,
24.05.2007.
- Aivo Jürgenson, Jan Willemson, Ründepuud: pooladaptiivne mudel ja
ligikaudsed arvutused. Cybernetica, aruanne nr T-4-4, 26.02.2009. Available at
https://research.cyber.ee/
- Aivo Jürgenson, Jan Willemson, Serial Model for Attack Tree Computations, Cybernetica, research report nr T-4-6, 2009. Available at
https://research.cyber.ee/reports/T-4-6-Serial-Model-for-Attack-Tree-Computations.pdf
- Arne Ansper, Ahto Buldas, Aivo Jürgenson, Mart Oruaas, Jaan Priisalu, Kaido Raiend, Anto Veldre,
Jan Willemson, Kaur Virunurm, E-voting concept security: analysis and measures, EH-02-02, 27 December 2010. Available at
https://www.valimised.ee/sites/default/files/uploads/eng/E-voting_concept_security_analysis_and_measures_2010.pdf
- Jan Willemson, Peeter Laud, Aivo Jürgenson, Märt Laur, Krüptograafiliste algoritmide kasutusvaldkondade ja elutsükli uuring. Cybernetica aruanne A-60-1, 2011. Available at
https://www.ria.ee/sites/default/files/content-editors/publikatsioonid/kryptoalgoritmide_elutsykli_uuring_15-07-2011.pdf
- Krüptograafiliste algoritmide kasutusvldkondade ja elutsükli uuring. Cybernetica aruanne A-77-5, 2013. Available at
https://www.ria.ee/sites/default/files/content-editors/publikatsioonid/kruptograafiliste_algoritmide_elutsukli_uuring_ii.pdf
- Krüptograafiliste algoritmide elutsükli uuring. Cybernetica aruanne A-101-1, 2015. Available at
https://www.ria.ee/sites/default/files/content-editors/publikatsioonid/kruptograafiliste_algoritmide_uuring_2015.pdf
- Ahto Buldas, Kristo Heero, Peeter Laud, Riivo Talviste, Jan Willemson, Cryptographic algorithms lifecycle report 2016. Cybernetica research report A-101-3, 2016. Available at
https://www.ria.ee/sites/default/files/content-editors/publikatsioonid/cryptographic_algorithms_lifecycle_report_2016.pdf
- Arne Ansper, Ahto Buldas, Jan Willemson, Cryptographic algorithms lifecycle report, Krüptograafiliste algoritmide elutsükli uuring. Cybernetica aruanne A-101-9, 2017. Cybernetica research report A-101-9, 2017. Available
- Alisa Pankova, Jan Willemson, Ahto Buldas, Postkvant-krüptograafia ülevaade. Cybernetica aruanne A-101-10, 2018. Available at
https://www.ria.ee/sites/default/files/content-editors/publikatsioonid/postkvant-kruptograafia-ulevaade-2018.pdf
- Ahto Buldas, Tarmo Kalvet, Peeter Laud, Alisa Pankova, Marek Tiits, Jan Willemson, Development and application of cryptography in the Estonian public and private sectors, Cybernetica research report A-116-1, 2019. Available at
https://www.etag.ee/wp-content/uploads/2019/05/Krypto_KAM.pdf
- E-valimiste turvalisuse töörühma koondaruanne. Report on e-voting security, December 2019, Ministry of Economic Affairs and Comminucations. Available at
https://www.mkm.ee/sites/default/files/content-editors/e-valimiste_tooruhma_koondaruanne_12.12.2019_0.pdf
- Arne Ansper, Kristjan Krips, Mart Oruaas, Tea Lindorg, Jan Willemson, CDOC 2.0 analüüs. Cybernetica aruanne T-184-5, 2020.
- Kristjan Krips, Mart Oruaas, Mart Sõmermaa, Alisa Pankova, Jan Willemson, Analysis of planned architectural changes in Open-eID, Cybernetica report T-176-1, 2020. Available at
https://web-eid.gitlab.io/analysis/webextensions-main.pdf
- Ahto Buldas, Sven Heiberg, Kristjan Krips, Jan Willemson, Mobile voting feasibility study and risk
analysis, Cybernetica report T-184-5, 2020. Available at
https://www.valimised.ee/sites/default/files/uploads/eng/2020_m-voting-report.pdf
- Mart Oruaas, Aivo Kalu, Jaak Pruulmann-Vengerfeldt, Kristjan Krips, Jan Willemson, Krüptoalgoritmid ning nende tugi teekides ja infosüsteemides. Cybernetica report T-184-7, 2021. Available at
https://www.ria.ee/sites/default/files/pictures/cryptoreport2021.pdf
- Biomeetrilise näotuvastusmeetme rakendamine elektroonilisel hääletamisel. Cybernetica research report D-16-12, 2021. Available at
https://www.ria.ee/sites/default/files/content-editors/publikatsioonid/biomeetria-aruanne.pdf.
- Elektrooniliste häälte töötlemise protsesside analüüs. Cybernetica research report D-16-174, 2022. Available at
https://www.valimised.ee/sites/default/files/2023-02/Hääletamisprotsesside_analüüs_v10.pdf.
6 Other publications
- Uve Nummert, Jan Villemson, Baltic Way Team Competition 1990-1993, Tartu
University Publishing, 1994, 64 pp.
- Elts Abel, Mati Abel, Kalle Kaarli, Lea Lepmann, Tiit Lepmann, Härmel Nestra, Uve Nummert, Jan Villemson, Agnis Andzans, Matemaatikaolümpiaadid Eestis 1993/94 õ.-a. : ülesanded ja lahendused. Tartu Ülikool, 1995, 47 pp.
- Jan Willemson, Dokumendiformaadid ja nende turvaprobleemid, Arvutimaailm
9-2000, pp 19-22. Available at
https://research.cyber.ee/~jan/publ/docform.pdf.
- Jan Willemson, XML-põhise dokumendihalduse võimalikkusest Eesti
Wabariigis, report for Estonian State Chancellery, Febryary 7th, 2001.
Available at
https://research.cyber.ee/~jan/publ/XMLdokhald.pdf
- Jan Willemson, Haridus kui reklaamikampaania? Õpetajate leht, 16.06.2000.
Available
at
https://www.opleht.ee/Arhiiv/2000/16.06.00/tekstid/elu/1.html
- Jan Willemson, Miks matemaatika nii keeruline on? Õpetajate leht,
4.10.2002.
- Baltic Way 2002, Proposed Problems with Solutions, Jan Willemson (Ed.),
Tartu
University 2002, 72 pp.
- Jan Willemson, Tarkvaraga targu talita, Õpetajate leht, 21.11.2003.
Available at
https://www.opleht.ee/Arhiiv/2003/21.11.03/tekstid/peamearu/1.html
- Kaie Kubjas, Jan Willemson, Matemaatikaolümpiaadi ootuses Mehhikosse,
Horisont 5/2005
- Jan Willemson, Matemaatika õpetamisest ja ainekava tööversioonist,
Õpetajate Leht, 26.01.2007, pg 16. Available at
https://research.cyber.ee/~jan/publ/arvamus.txt
- Jan Willemson, Mida külvad, seda lõikad,
Õpetajate Leht, 23.03.2007, pg 6. Available at
https://research.cyber.ee/~jan/publ/midakylvad.txt
- Jan Willemson, Eksamid stabiilsed, tunde liiga vähe
Õpetajate Leht, 15.06.2007, pg 6. Available at
https://research.cyber.ee/~jan/publ/opleht150607.txt
- Jan Willemson, Kuidas kasutatakse kogutud infot?
Õpetajate Leht, 17.08.2007, pg 7. Available at
https://www.opleht.ee/Arhiiv/2007/17.08.07/dialoog/3.shtml
- Jan Willemson, Hanoi reisikiri,
Õpetajate Leht, 24.08.2007, pg 9. Full version available at
https://research.cyber.ee/~jan/hanoireisikiri
- Jan Willemson, Mitmekülgsus ja kahepalgelisus. Arvutimaailm, September
2007, pg 28-29. Available at
https://research.cyber.ee/~jan/publ/am092007.html
- Jan Willemson, Erasmus Mundus programm. Universitas Tartuensis,
28.09.2007. Available at
https://www.ajaleht.ut.ee/287818
- Jan Willemson, Mis juhtus Hanois. Rahvusvaheline matemaatikaolümpiaad,
Horisont 6/2007, pg 43-44. Available at
https://horisont.ee/node/298
- Jan Willemson, Kuidas kindlustada matemaatikaeksami ebapopulaarsus,
Õpetajate Leht, 15.02.2008, pg 12. Available at
https://research.cyber.ee/~jan/publ/mataeksam.txt
- Jan Willemson, Puudub ka pall, millega õhku kinni pidada, Õpetajate
Leht, 14.03.2008, pg 7. Available at
https://research.cyber.ee/~jan/publ/opleht140308.html
- Jan Willemson, Haridussüsteemi eesmärkidest, nende saavutamisest ja
mõõtmisest, Õpetajate leht, 22.03.2008, pg 9. Available at
https://research.cyber.ee/~jan/publ/haridusemootmine.txt
- Jan Wilemson, Tehnoloogiaskeptiku paberblogi, Arvutimaailm, 03.2008,
pp 28-29. Available at
https://research.cyber.ee/~jan/publ/tehnoloogia.txt
- Jan Willemson, Andmekogude turvaline koondamine, Eesti infoühiskonna aastaraamat 2011/2012, pg 84. Available at
https://www.riso.ee/et/files/infoühiskonna aastaraamat_2011-2012 EST FINAL.pdf.
File translated from
TEX
by
TTH,
version 4.16.