Author of the publication

Privacy and verifiability in voting systems: Methods, developments and trends.

, , and . Comput. Sci. Rev., (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic and Relational Spaces in Science of Science: Deep Learning Models for Article Vectorisation., , , and . CoRR, (2020)Privacy and verifiability in voting systems: Methods, developments and trends., , and . Comput. Sci. Rev., (2013)DeepCity: A Feature Learning Framework for Mining Location Check-Ins., and . ICWSM, page 652-655. AAAI Press, (2017)A Strand Space Approach to Provable Anonymity., and . FTSCS, volume 419 of Communications in Computer and Information Science, page 71-87. Springer, (2013)The Persuasive Impact of Emoticons in Online Word-of-Mouth Communication., , , and . PACIS, page 122. (2016)Game-Based Verification of Multi-Party Contract Signing Protocols., , , and . Formal Aspects in Security and Trust, volume 5983 of Lecture Notes in Computer Science, page 186-200. Springer, (2009)Cones and foci: A mechanical framework for protocol verification., , and . Formal Methods Syst. Des., 29 (1): 1-31 (2006)Sequential Control of Boolean Networks with Temporary and Permanent Perturbations., and . CoRR, (2020)Adapting the UPPAAL Model of a Distributed Lift System., , and . FSEN, volume 4767 of Lecture Notes in Computer Science, page 81-97. Springer, (2007)Formal modelling and analysis of receipt-free auction protocols in applied pi., , and . Comput. Secur., (2017)