Author of the publication

Improving the Farnel Voting Scheme.

, and . Electronic Voting, volume P-131 of LNI, page 169-182. GI, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Vote of Confidence?, , , and . IEEE Secur. Priv., 15 (3): 12-13 (2017)Remodelling the Attacker in Voting Protocols.. Security Protocols Workshop, volume 6615 of Lecture Notes in Computer Science, page 232-234. Springer, (2008)HoneyPAKEs (Transcript of Discussion).. Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 78-83. Springer, (2018)Securing the Foundations of Democracy.. SECITC, volume 10543 of Lecture Notes in Computer Science, page 52-66. Springer, (2017)Anonymous voting by two-round public discussion., , and . IET Inf. Secur., 4 (2): 62-67 (2010)A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips., , , , and . CoRR, (2020)Security Characterization of J-PAKE and its Variants., , , , and . IACR Cryptol. ePrint Arch., (2021)Editorial message: special track on computer security., and . SAC, page 321-322. ACM, (2006)Process Algebra and Non-Interference., and . CSFW, page 214-227. IEEE Computer Society, (1999)Universal Unconditional Verifiability in E-Voting without Trusted Parties., , , and . CSF, page 33-48. IEEE, (2020)