Author of the publication

Multi-Autority Secret-Ballot Elections with Linear Work.

, , , and . EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 72-83. Springer, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure hypergraphs: privacy from partial broadcast (Extended Abstract)., and . STOC, page 36-44. ACM, (1995)Enhancing privacy and trust in electronic communities., , and . EC, page 78-86. ACM, (1999)Cryptology As a Network Service., , , , and . NDSS, The Internet Society, (2001)Efficient and Secure Evaluation of Multivariate Polynomials and Applications., and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 236-254. (2010)The Blinding of Weak Signatures (Extended Abstract)., and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 67-76. Springer, (1994)Edge Eavesdropping Games., and . SCN, volume 4116 of Lecture Notes in Computer Science, page 1-17. Springer, (2006)Secure Linear Algebra Using Linearly Recurrent Sequences., , , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 291-310. Springer, (2007)Commital Deniable Proofs and Electronic Campaign Finance., and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 373-387. Springer, (2000)The Design and Implementation of a Secure Auction Service., and . IEEE Trans. Software Eng., 22 (5): 302-312 (1996)Protecting privacy while sharing information in electronic communities., , and . CFP, page 73-75. ACM, (2000)