Author of the publication

Deleting Secret Data with Public Verifiability.

, , and . IEEE Trans. Dependable Sec. Comput., 13 (6): 617-629 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifiable Classroom Voting in Practice., , , and . IACR Cryptology ePrint Archive, (2017)Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting., , , , , and . EVT/WOTE, USENIX Association, (2014)End to End Security is Not Enough (Transcript of Discussion).. Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 268-277. Springer, (2017)Analysis of Issues and Challenges of E-Voting in the UK., , and . Security Protocols Workshop, volume 7622 of Lecture Notes in Computer Science, page 126-135. Springer, (2012)Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion).. Security Protocols Workshop, volume 7622 of Lecture Notes in Computer Science, page 136-144. Springer, (2012)Proactive Fortification of Fault-Tolerant Services., , , and . OPODIS, volume 5923 of Lecture Notes in Computer Science, page 330-344. Springer, (2009)E-voting in Estonia., and . CoRR, (2016)FORTRESS: Adding Intrusion-Resilience to Primary-Backup Server Systems., and . SRDS, page 121-130. IEEE Computer Society, (2012)Cryptanalysis of the dragonfly key exchange protocol., and . IET Information Security, 8 (6): 283-289 (2014)End to End Security is Not Enough., and . Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 260-267. Springer, (2017)