Author of the publication

Cryptographic Voting Protocols: A Systems Perspective.

, , and . USENIX Security Symposium, USENIX Association, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Verification of Location Claims, , and . Proceedings of the 2Nd ACM Workshop on Wireless Security, page 1--10. New York, NY, USA, ACM, (September 2003)Security considerations for IEEE 802.15.4 networks., and . Workshop on Wireless Security, page 32-42. ACM, (2004)Design and implementation of a sensor network system for vehicle tracking and autonomous interception., , , , , , and . EWSN, page 93-107. IEEE, (2005)TinySec: a link layer security architecture for wireless sensor networks., , and . SenSys, page 162-175. ACM, (2004)Distillation Codes and Applications to DoS Resistant Multicast Authentication., , , , and . NDSS, The Internet Society, (2004)Designing Voting Machines for Verification.. USENIX Security Symposium, USENIX Association, (2006)Cryptographic Voting Protocols: A Systems Perspective., , and . USENIX Security Symposium, USENIX Association, (2005)Scrash: A System for Generating Secure Crash Information., , and . USENIX Security Symposium, USENIX Association, (2003)Designing voting machines for verification, , and . USENIX Security 2006, (2006)