Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards., , , , , , , , and . EVT, USENIX Association, (2008)Dependable Decentralized Cooperation with the Help of Reliability Estimation., , and . SSS, volume 8756 of Lecture Notes in Computer Science, page 283-298. Springer, (2014)Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting., , , , , , and . ACSAC, page 30-39. IEEE Computer Society, (2007)Dealing with Undependable Workers in Decentralized Network Supercomputing., , , and . ICDCN, volume 7730 of Lecture Notes in Computer Science, page 27-41. Springer, (2013)Estimating Reliability of Workers for Cooperative Distributed Computing., , and . ISPDC, page 101-108. IEEE, (2013)Automating Voting Terminal Event Log Analysis., , , , , , , and . EVT/WOTE, USENIX Association, (2009)Technical Report: Dealing with Undependable Workers in Decentralized Network Supercomputing., , , and . CoRR, (2014)Taking total control of voting systems: firmware manipulations on an optical scan voting terminal., , , , , , , , and . SAC, page 2049-2053. ACM, (2009)Integrity of electronic voting systems: fallacious use of cryptography., , , , and . SAC, page 1486-1493. ACM, (2012)State-wide elections, optical scan voting systems, and the pursuit of integrity., , , , , , , and . IEEE Trans. Information Forensics and Security, 4 (4): 597-610 (2009)