Author of the publication

Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.

, , , , , , , , , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 611-627 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistical Techniques for Language Recognition: an Empirical Study Using Real and Simulated English., and . Cryptologia, 18 (4): 289-331 (1994)How to Break Gifford's Cipher., and . Cryptologia, 21 (3): 237-286 (1997)How we Solved the $100, 000 Decipher Puzzle (16 Hours too late)., and . Cryptologia, 14 (3): 258-284 (1990)Cybersecurity: Exploring core concepts through six scenarios., , , , , , , and . Cryptologia, 42 (4): 337-377 (2018)A Note on Bennett's Time-Space Tradeoff for Reversible Computation., and . SIAM J. Comput., 19 (4): 673-677 (1990)Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper)., , , and . TRUST, volume 6740 of Lecture Notes in Computer Science, page 294-301. Springer, (2011)Is DES a Pure Cipher? (Results of More Cycling Experiments on DES)., , and . CRYPTO, volume 218 of Lecture Notes in Computer Science, page 212-226. Springer, (1985)*Socrates 2.0 Beats Grandmaster Sagalchik., and . J. Int. Comput. Games Assoc., 18 (2): 124 (1995)Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting., , , , , , and . IEEE Secur. Priv., 6 (3): 40-46 (2008)Scantegrity Mock Election at Takoma Park., , , , , , , , , and 2 other author(s). Electronic Voting, volume P-167 of LNI, page 45-61. GI, (2010)