Author of the publication

Measuring vote privacy, revisited.

, , , and . ACM Conference on Computer and Communications Security, page 941-952. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Limitations of the Fiat­ - Shamir Transformation., and . IACR Cryptology ePrint Archive, (2015)Security analysis of cryptographically controlled access to XML documents., and . J. ACM, 55 (2): 6:1-6:29 (2008)Security analysis of cryptographically controlled access to XML documents., and . PODS, page 108-117. ACM, (2005)Password-Based Encryption Analyzed., and . ICALP, volume 3580 of Lecture Notes in Computer Science, page 664-676. Springer, (2005)Symbolic Methods for Provable Security.. ProvSec, volume 5848 of Lecture Notes in Computer Science, page 2. Springer, (2009)On the Minimal Assumptions of Group Signature Schemes., and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 1-13. Springer, (2004)Lifting Standard Model Reductions to Common Setup Assumptions., , and . IACR Cryptol. ePrint Arch., (2021)Provably-Secure Remote Memory Attestation for Heap Overflow Protection., , , and . SCN, volume 9841 of Lecture Notes in Computer Science, page 83-103. Springer, (2016)A Computational Analysis of the Needham-Schröeder-(Lowe) Protocol.. CSFW, page 248-. IEEE Computer Society, (2003)Key Exchange Protocols: Security Definition, Proof Method and Applications., , , and . IACR Cryptology ePrint Archive, (2006)