Author of the publication

A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission.

, , , , , , , , , and . Electronic Voting, volume P-205 of LNI, page 81-94. GI, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

vVote: a Verifiable Voting System (DRAFT)., , , and . CoRR, (2014)Verifying Authentication Protocol Implementations.. FMOODS, volume 209 of IFIP Conference Proceedings, page 5-24. Kluwer, (2002)Detecting Feature Interactions in the Terrestrial Trunked Radio (TETRA) Network Using Promela and Xspin., and . SPIN, volume 1680 of Lecture Notes in Computer Science, page 136-151. Springer, (1999)Automated anonymity verification of the ThreeBallot and VAV voting systems., , and . Softw. Syst. Model., 15 (4): 1049-1062 (2016)vVote: A Verifiable Voting System., , , and . ACM Trans. Inf. Syst. Secur., 18 (1): 3:1-3:30 (2015)Prêt à Voter with Re-encryption Mixes., and . ESORICS, volume 4189 of Lecture Notes in Computer Science, page 313-326. Springer, (2006)Security Properties and CSP.. S&P, page 174-187. IEEE Computer Society, (1996)Using a PVS Embedding of CSP to Verify Authentication Protocols., and . TPHOLs, volume 1275 of Lecture Notes in Computer Science, page 121-136. Springer, (1997)Fuzzy-Systeme zur Unterstützung von Entscheidungen in land- und forstwirtschaftlichen Logistik-Prozessen.. GIL Jahrestagung, volume P-211 of LNI, page 307-310. GI, (2013)Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election., , and . CoRR, (2015)