Author of the publication

Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.

, , , , , , , , , and . IEEE Trans. Information Forensics and Security, 5 (1): 194 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes., , , , , , , , and . EVT, USENIX Association, (2008)Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 291-306. USENIX Association, (2010)Pattern Matching Encryption., and . IACR Cryptology ePrint Archive, (2014)Predicate Privacy in Encryption Systems., , and . TCC, volume 5444 of Lecture Notes in Computer Science, page 457-473. Springer, (2009)Strongly Unforgeable Signatures Based on Computational Diffie-Hellman., , and . Public Key Cryptography, volume 3958 of Lecture Notes in Computer Science, page 229-240. Springer, (2006)Forward-secure signatures with untrusted update., , , and . ACM Conference on Computer and Communications Security, page 191-200. ACM, (2006)Scantegrity Mock Election at Takoma Park., , , , , , , , , and 2 other author(s). Electronic Voting, volume P-167 of LNI, page 45-61. GI, (2010)Cryptographically Secure Computation., , , and . IEEE Computer, 48 (4): 78-81 (2015)A Bayesian Method for Auditing Elections., and . EVT/WOTE, USENIX Association, (2012)Computing the Margin of Victory in IRV Elections., , and . EVT/WOTE, USENIX Association, (2011)