Author of the publication

Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger.

, , , , , , , and . ICDCS, page 1167-1168. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lessons Learnt from a 2FA roll out within a higher education organisation., , , and . CoRR, (2020)Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger., , , , , , , and . ICDCS, page 1167-1168. IEEE, (2020)Towards End-to-End Verifiable Online Voting: Adding Verifiability to Established Voting Systems., , , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3357-3374 (July 2024)Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches., , , and . EuroS&P, page 425-444. IEEE, (2020)Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme., , , , , and . AsiaCCS, page 784-798. ACM, (2020)Anonymous Single Sign-on with Proxy Re-Verification., , , , , and . CoRR, (2018)Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices., , , , and . AsiaCCS, page 884-898. ACM, (2023)An Interoperable Architecture for Usable Password-Less Authentication., , , , and . ETAA@ESORICS, volume 12515 of Lecture Notes in Computer Science, page 16-32. Springer, (2020)A Step towards Merging xUML and CSP || \| \ B., , , , and . Rigorous Methods for Software Construction and Analysis, volume 5115 of Lecture Notes in Computer Science, page 130-146. Springer, (2009)Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol., , , and . MM&Sec, page 205-214. ACM, (2008)