Author of the publication

Cryptographic Voting Protocols: A Systems Perspective.

, , and . USENIX Security Symposium, USENIX Association, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security considerations for IEEE 802.15.4 networks., and . Workshop on Wireless Security, page 32-42. ACM, (2004)Secure Verification of Location Claims, , and . Proceedings of the 2Nd ACM Workshop on Wireless Security, page 1--10. New York, NY, USA, ACM, (September 2003)Design and implementation of a sensor network system for vehicle tracking and autonomous interception., , , , , , and . EWSN, page 93-107. IEEE, (2005)TinySec: a link layer security architecture for wireless sensor networks., , and . SenSys, page 162-175. ACM, (2004)Designing voting machines for verification, , and . USENIX Security 2006, (2006)Designing Voting Machines for Verification.. USENIX Security Symposium, USENIX Association, (2006)Distillation Codes and Applications to DoS Resistant Multicast Authentication., , , , and . NDSS, The Internet Society, (2004)Cryptographic Voting Protocols: A Systems Perspective., , and . USENIX Security Symposium, USENIX Association, (2005)Scrash: A System for Generating Secure Crash Information., , and . USENIX Security Symposium, USENIX Association, (2003)