Search for persons
X
?
2023 IEEE 36th Computer Security Foundations Symposium (CSF) ,
1
Election Verifiability with ProVerif:
, In:
?
Financial Cryptography and Data Security. FC 2023 International Workshops; Lecture Notes in Computer Science ,
2
Belenios with Cast as Intended:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
3
A Toolbox for Verifiable Tally-Hiding E-Voting Systems:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
4
ProVerif with Lemmas, Induction, Fast Subsumption, and Much..:
, In:
?
2022 IEEE 35th Computer Security Foundations Symposium (CSF) ,
5
A small bound on the number of sessions for security protoc..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
6
Themis : An On-Site Voting System with Systematic Cast-a..:
, In:
?
Protocols, Strands, and Logic; Lecture Notes in Computer Science ,
7
How to Explain Security Protocols to Your Children:
, In:
?
2020 IEEE 33rd Computer Security Foundations Symposium (CSF) ,
8
Fifty Shades of Ballot Privacy: Privacy against a Malicious..:
, In:
?
Computer Security – ESORICS 2020; Lecture Notes in Computer Science ,
10
Automatic Generation of Sources Lemmas in Tamarin: Towards ..:
, In:
?
Foundations of Security, Protocols, and Equational Reasoning; Lecture Notes in Computer Science ,
11
Belenios: A Simple Private and Verifiable Electronic Voting..:
, In:
?
15
Electronic Voting
Third International Joint Conference, E-Vote-ID 2018, Brege...
Security and Cryptology ; 11143;SpringerLink, Bücher