Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Options for encoding names for data linking at the Australian Bureau of Statistics., , and . CoRR, (2018)Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the UK Office for National Statistics' Privacy-Preserving Record Linkage., , and . CoRR, (2017)Auditing Australian Senate Ballots., , , , , , , , and . CoRR, (2016)Health Data in an Open World., , and . CoRR, (2017)Privacy Assessment of De-identified Opal Data: A report for Transport for NSW., , and . CoRR, (2017)Shuffle-sum: coercion-resistant verifiable tallying for STV voting., , , , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 685-698 (2009)Anti-presistence: history independent data structures., and . STOC, page 492-501. ACM, (2001)A First Approach to Risk-Limiting Audits for Single Transferable Vote Elections., , , and . CoRR, (2021)Assessing the accuracy of the Australian Senate count: Key steps for a rigorous and transparent audit., , , , and . CoRR, (2022)A review of E-voting: the past, present and future., , , and . Ann. des Télécommunications, 71 (7-8): 279-286 (2016)