Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anti-presistence: history independent data structures., and . STOC, page 492-501. ACM, (2001)Shuffle-sum: coercion-resistant verifiable tallying for STV voting., , , , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 685-698 (2009)A First Approach to Risk-Limiting Audits for Single Transferable Vote Elections., , , and . CoRR, (2021)Assessing the accuracy of the Australian Senate count: Key steps for a rigorous and transparent audit., , , , and . CoRR, (2022)Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the UK Office for National Statistics' Privacy-Preserving Record Linkage., , and . CoRR, (2017)Health Data in an Open World., , and . CoRR, (2017)Auditing Australian Senate Ballots., , , , , , , , and . CoRR, (2016)Privacy Assessment of De-identified Opal Data: A report for Transport for NSW., , and . CoRR, (2017)Options for encoding names for data linking at the Australian Bureau of Statistics., , and . CoRR, (2018)A review of E-voting: the past, present and future., , , and . Ann. des Télécommunications, 71 (7-8): 279-286 (2016)