Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co., , , , , , , and . CSF, page 335-347. IEEE, (2022)Machine-Checked Proofs of Accountability: How to sElect Who is to Blame., , , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 471-491. Springer, (2023)Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme., , and . NordSec, volume 12556 of Lecture Notes in Computer Science, page 92-107. Springer, (2020)Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study., , and . E-Vote-ID, volume 14230 of Lecture Notes in Computer Science, page 69-86. Springer, (2023)