Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
1
Encryption Mechanisms for Receipt-Free and Perfectly Privat..:
, In:
?
Financial Cryptography and Data Security. FC 2022 International Workshops; Lecture Notes in Computer Science ,
3
Individual Verifiability and Revoting in the Estonian Inter..:
, In:
?
Electronic Voting; Lecture Notes in Computer Science ,
4
Running the Race: A Swiss Voting Story:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
5
How to Verifiably Encrypt Many Bits for an Election?:
, In:
?
2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON) ,
6
Homomorphic Encryption for Privacy-Friendly Augmented Democ..:
, In:
?
Advances in Cryptology – ASIACRYPT 2022; Lecture Notes in Computer Science ,
7
Traceable Receipt-Free Encryption:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
8
Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
9
CLAPS: Client-Location-Aware Path Selection in Tor:
, In:
?
Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science ,
10
Mode-Level vs. Implementation-Level Physical Security in Sy..:
, In:
?
Computer Security – ESORICS 2020; Lecture Notes in Computer Science ,
11
When Is a Test Not a Proof?:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
12