Author of the publication

Analysis of Issues and Challenges of E-Voting in the UK.

, , and . Security Protocols Workshop, volume 7622 of Lecture Notes in Computer Science, page 126-135. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

End to End Security is Not Enough., and . Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 260-267. Springer, (2017)Bitcoin: Perils of an Unregulated Global P2P Currency., , and . Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 283-293. Springer, (2015)Authenticated Key Exchange over Bitcoin., , , and . SSR, volume 9497 of Lecture Notes in Computer Science, page 3-20. Springer, (2015)Self-enforcing Electronic Voting., , and . Security Protocols Workshop, volume 7622 of Lecture Notes in Computer Science, page 23-31. Springer, (2012)Verifiable Classroom Voting: Where Cryptography Meets Pedagogy., , and . Security Protocols Workshop, volume 8263 of Lecture Notes in Computer Science, page 245-254. Springer, (2013)Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion).. Security Protocols Workshop, volume 7622 of Lecture Notes in Computer Science, page 136-144. Springer, (2012)End to End Security is Not Enough (Transcript of Discussion).. Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 268-277. Springer, (2017)Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting., , , , , and . EVT/WOTE, USENIX Association, (2014)Analysis of Issues and Challenges of E-Voting in the UK., , and . Security Protocols Workshop, volume 7622 of Lecture Notes in Computer Science, page 126-135. Springer, (2012)Cryptanalysis of the dragonfly key exchange protocol., and . IET Inf. Secur., 8 (6): 283-289 (2014)