Author of the publication

Automated anonymity verification of the ThreeBallot and VAV voting systems.

, , and . Softw. Syst. Model., 15 (4): 1049-1062 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Verification of Distributed Recovery Blocks with CSP., and . Formal Methods Syst. Des., 22 (3): 225-248 (2003)Specifying Authentication Using Signal Events in CSP., , and . CISC, volume 3822 of Lecture Notes in Computer Science, page 63-74. Springer, (2005)A Practical Voter-Verifiable Election Scheme., , and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 118-139. Springer, (2005)vVote: Verifiable Electronic Voting in Practice., , and . IEEE Secur. Priv., 14 (4): 64-73 (2016)May Testing, Non-interference, and Compositionality.. MFCSIT, volume 40 of Electronic Notes in Theoretical Computer Science, page 361-391. Elsevier, (2000)Process Algebra and Non-Interference., and . J. Comput. Secur., 9 (1/2): 75-103 (2001)A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols., and . Formal Aspects in Security and Trust, volume 3866 of Lecture Notes in Computer Science, page 34-46. Springer, (2005)Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior., , and . BMVC, page 283. BMVA Press, (2019)CSP and Anonymity., and . ESORICS, volume 1146 of Lecture Notes in Computer Science, page 198-218. Springer, (1996)A verified development of hardware using CSP∥B., and . MEMOCODE, page 81. IEEE Computer Society, (2006)