Vanessa Teague
Vanessa Teague
Thinking Cybersecurity and The Australian National University
Bestätigte E-Mail-Adresse bei anu.edu.au - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Rational secret sharing and multiparty computation
J Halpern, V Teague
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
4202004
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
JC Mitchell, A Ramanathan, A Scedrov, V Teague
Theoretical Computer Science 353 (1-3), 118-164, 2006
193*2006
Pretty good democracy
PYA Ryan, V Teague
International Workshop on Security Protocols, 111-130, 2009
1032009
Anti-persistence: History independent data structures
M Naor, V Teague
Proceedings of the thirty-third annual ACM symposium on Theory of computing …, 2001
932001
vVote: a verifiable voting system
C Culnane, PYA Ryan, S Schneider, V Teague
ACM Transactions on Information and System Security (TISSEC) 18 (1), 1-30, 2015
652015
Probabilistic bisimulation and equivalence for security analysis of network protocols
A Ramanathan, J Mitchell, A Scedrov, V Teague
International Conference on Foundations of Software Science and Computation …, 2004
552004
A secure event agreement (SEA) protocol for peer-to-peer games
AB Corman, S Douglas, P Schachte, V Teague
First International Conference on Availability, Reliability and Security …, 2006
492006
Using pret a voter in victorian state elections
C Burton, C Culnane, JA Heather, T Peacock, PYA Ryan, SA Schneider, ...
472012
A review of e-voting: the past, present and future
JP Gibson, R Krimmer, V Teague, J Pomares
Annals of Telecommunications 71 (7-8), 279-286, 2016
452016
Public evidence from secret ballots
M Bernhard, J Benaloh, JA Halderman, RL Rivest, PYA Ryan, PB Stark, ...
International Joint Conference on Electronic Voting, 84-109, 2017
39*2017
Shuffle-sum: coercion-resistant verifiable tallying for STV voting
J Benaloh, T Moran, L Naish, K Ramchen, V Teague
IEEE Transactions on Information Forensics and Security 4 (4), 685-698, 2009
392009
A Secure Group Agreement (SGA) protocol for peer-to-peer applications
AB Corman, P Schachte, V Teague
21st International Conference on Advanced Information Networking and …, 2007
352007
Coercion-Resistant Tallying for STV Voting.
V Teague, K Ramchen, L Naish
EVT 36, 231, 2008
342008
Linear arboricity and linear k-arboricity of regular graphs
N Alon, VJ Teague, NC Wormald
Graphs and Combinatorics 17 (1), 11-16, 2001
342001
End-to-end verifiability
J Benaloh, R Rivest, PYA Ryan, P Stark, V Teague, P Vora
arXiv preprint arXiv:1504.03778, 2015
312015
A supervised verifiable voting protocol for the victorian electoral commission
C Burton, C Culane, J Heather, T Peacock, PYA Ryan, S Schneider, ...
5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012
312012
On the complexity of manipulating elections
T Coleman, V Teague
Proceedings of the thirteenth Australasian symposium on Theory of computing …, 2007
312007
Health data in an open world
C Culnane, BIP Rubinstein, V Teague
arXiv preprint arXiv:1712.05627, 2017
292017
Extending helios towards private eligibility verifiability
O Kulyk, V Teague, M Volkamer
International Conference on E-Voting and Identity, 57-73, 2015
282015
Pretty good democracy for more expressive voting schemes
J Heather, PYA Ryan, V Teague
European Symposium on Research in Computer Security, 405-423, 2010
272010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20