Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Vanessa Teague
@article{DBLP:journals/cybersecurity/AbelsonABBBCDLNRSSTT24, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Jon Callas and Whitfield Diffie and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Vanessa Teague and Carmela Troncoso}, title = {Bugs in our pockets: the risks of client-side scanning}, journal = {J. Cybersecur.}, volume = {10}, number = {1}, year = {2024}, url = {https://doi.org/10.1093/cybsec/tyad020}, doi = {10.1093/CYBSEC/TYAD020}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBCDLNRSSTT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-03707, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, title = {RLAs for 2-Seat {STV} Elections: Revisited}, journal = {CoRR}, volume = {abs/2402.03707}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.03707}, doi = {10.48550/ARXIV.2402.03707}, eprinttype = {arXiv}, eprint = {2402.03707}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-03707.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/Teague23, author = {Vanessa Teague}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Democratizing election verification: new methods for addressing an ancient attacker model}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {552}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3596443}, doi = {10.1145/3579856.3596443}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/Teague23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BlomSTV23, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, editor = {Aleksander Essex and Shin'ichiro Matsuo and Oksana Kulyk and Lewis Gudgeon and Ariah Klages{-}Mundt and Daniel Perez and Sam Werner and Andrea Bracciali and Geoff Goodell}, title = {Risk-Limiting Audits for Condorcet Elections}, booktitle = {Financial Cryptography and Data Security. {FC} 2023 International Workshops - Voting, CoDecFin, DeFi, WTSC, Bol, Bra{\v{c}}, Croatia, May 5, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13953}, pages = {79--94}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48806-1\_6}, doi = {10.1007/978-3-031-48806-1\_6}, timestamp = {Mon, 18 Dec 2023 16:44:30 +0100}, biburl = {https://dblp.org/rec/conf/fc/BlomSTV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-10509, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, title = {Risk-Limiting Audits for Condorcet Elections}, journal = {CoRR}, volume = {abs/2303.10509}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.10509}, doi = {10.48550/ARXIV.2303.10509}, eprinttype = {arXiv}, eprint = {2303.10509}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-10509.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/CormanCCT22, author = {Amy Beth Corman and Rachel Canaway and Chris Culnane and Vanessa Teague}, title = {Public comprehension of privacy protections applied to health data shared for research: An Australian cross-sectional study}, journal = {Int. J. Medical Informatics}, volume = {167}, pages = {104859}, year = {2022}, url = {https://doi.org/10.1016/j.ijmedinf.2022.104859}, doi = {10.1016/J.IJMEDINF.2022.104859}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmi/CormanCCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/EverestBSSTV22, author = {Floyd Everest and Michelle L. Blom and Philip B. Stark and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Christos Kalloniatis and John Mylopoulos and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge and Massimiliano Albanese and Basel Katt and Sandeep Pirbhulal and Ankur Shukla}, title = {Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree Model}, booktitle = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS 2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE 2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13785}, pages = {525--540}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25460-4\_30}, doi = {10.1007/978-3-031-25460-4\_30}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/EverestBSSTV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/HainesPT22, author = {Thomas Haines and Olivier Pereira and Vanessa Teague}, editor = {Robert Krimmer and Melanie Volkamer and David Duenas{-}Cid and Peter B. R{\o}nne and Micha Germann}, title = {Running the Race: {A} Swiss Voting Story}, booktitle = {Electronic Voting - 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13553}, pages = {53--69}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15911-4\_4}, doi = {10.1007/978-3-031-15911-4\_4}, timestamp = {Mon, 24 Oct 2022 20:50:57 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/HainesPT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BlomSTV22, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, editor = {Shin'ichiro Matsuo and Lewis Gudgeon and Ariah Klages{-}Mundt and Daniel Perez Hernandez and Sam Werner and Thomas Haines and Aleksander Essex and Andrea Bracciali and Massimiliano Sala}, title = {A First Approach to Risk-Limiting Audits for Single Transferable Vote Elections}, booktitle = {Financial Cryptography and Data Security. {FC} 2022 International Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13412}, pages = {366--380}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32415-4\_25}, doi = {10.1007/978-3-031-32415-4\_25}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BlomSTV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-14634, author = {Michelle L. Blom and Philip B. Stark and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, title = {Assessing the accuracy of the Australian Senate count: Key steps for a rigorous and transparent audit}, journal = {CoRR}, volume = {abs/2205.14634}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.14634}, doi = {10.48550/ARXIV.2205.14634}, eprinttype = {arXiv}, eprint = {2205.14634}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-14634.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-14605, author = {Floyd Everest and Michelle L. Blom and Philip B. Stark and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, title = {Auditing Ranked Voting Elections with Dirichlet-Tree Models: First Steps}, journal = {CoRR}, volume = {abs/2206.14605}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.14605}, doi = {10.48550/ARXIV.2206.14605}, eprinttype = {arXiv}, eprint = {2206.14605}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-14605.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-03881, author = {Floyd Everest and Michelle L. Blom and Philip B. Stark and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, title = {Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree Model}, journal = {CoRR}, volume = {abs/2209.03881}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.03881}, doi = {10.48550/ARXIV.2209.03881}, eprinttype = {arXiv}, eprint = {2209.03881}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-03881.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasTL22, author = {Aggelos Kiayias and Vanessa Teague and Orfeas Stefanos Thyfronitis Litos}, title = {Privacy Preserving Opinion Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {760}, year = {2022}, url = {https://eprint.iacr.org/2022/760}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BenalohFSTW21, author = {Josh Benaloh and Kammi Foote and Philip B. Stark and Vanessa Teague and Dan S. Wallach}, title = {VAULT-Style Risk-Limiting Audits and the Inyo County Pilot}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {8--18}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3075107}, doi = {10.1109/MSEC.2021.3075107}, timestamp = {Wed, 14 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BenalohFSTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Teague21, author = {Vanessa Teague}, editor = {Tal Malkin and Chris Peikert}, title = {Which E-Voting Problems Do We Need to Solve?}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {3--7}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_1}, doi = {10.1007/978-3-030-84242-0\_1}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Teague21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/BlomBRSSTV21, author = {Michelle L. Blom and Jurlind Budurushi and Ronald L. Rivest and Philip B. Stark and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, editor = {Robert Krimmer and Melanie Volkamer and David Duenas{-}Cid and Oksana Kulyk and Peter B. R{\o}nne and Mihkel Solvak and Micha Germann}, title = {Assertion-Based Approaches to Auditing Complex Elections, with Application to Party-List Proportional Elections}, booktitle = {Electronic Voting - 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12900}, pages = {47--62}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86942-7\_4}, doi = {10.1007/978-3-030-86942-7\_4}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/BlomBRSSTV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BlomSSTV21, author = {Michelle L. Blom and Philip B. Stark and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, editor = {Matthew Bernhard and Andrea Bracciali and Lewis Gudgeon and Thomas Haines and Ariah Klages{-}Mundt and Shin'ichiro Matsuo and Daniel Perez and Massimiliano Sala and Sam Werner}, title = {Auditing Hamiltonian Elections}, booktitle = {Financial Cryptography and Data Security. {FC} 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12676}, pages = {235--250}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-63958-0\_21}, doi = {10.1007/978-3-662-63958-0\_21}, timestamp = {Wed, 27 Oct 2021 09:25:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BlomSSTV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-08510, author = {Michelle L. Blom and Philip B. Stark and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, title = {Auditing Hamiltonian Elections}, journal = {CoRR}, volume = {abs/2102.08510}, year = {2021}, url = {https://arxiv.org/abs/2102.08510}, eprinttype = {arXiv}, eprint = {2102.08510}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-08510.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-11903, author = {Michelle L. Blom and Jurlind Budurushi and Ronald L. Rivest and Philip B. Stark and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, title = {Assertion-based Approaches to Auditing Complex Elections, with application to party-list proportional elections}, journal = {CoRR}, volume = {abs/2107.11903}, year = {2021}, url = {https://arxiv.org/abs/2107.11903}, eprinttype = {arXiv}, eprint = {2107.11903}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-11903.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-07450, author = {Hal Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Jon Callas and Whitfield Diffie and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Vanessa Teague and Carmela Troncoso}, title = {Bugs in our Pockets: The Risks of Client-Side Scanning}, journal = {CoRR}, volume = {abs/2110.07450}, year = {2021}, url = {https://arxiv.org/abs/2110.07450}, eprinttype = {arXiv}, eprint = {2110.07450}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-07450.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-04210, author = {Eleanor McMurtry and Xavier Boyen and Chris Culnane and Kristian Gj{\o}steen and Thomas Haines and Vanessa Teague}, title = {Towards Verifiable Remote Voting with Paper Assurance}, journal = {CoRR}, volume = {abs/2111.04210}, year = {2021}, url = {https://arxiv.org/abs/2111.04210}, eprinttype = {arXiv}, eprint = {2111.04210}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-04210.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-09921, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, title = {A First Approach to Risk-Limiting Audits for Single Transferable Vote Elections}, journal = {CoRR}, volume = {abs/2112.09921}, year = {2021}, url = {https://arxiv.org/abs/2112.09921}, eprinttype = {arXiv}, eprint = {2112.09921}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-09921.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/BlomCST20, author = {Michelle L. Blom and Andrew Conway and Peter J. Stuckey and Vanessa J. Teague}, title = {Did That Lost Ballot Box Cost Me a Seat? Computing Manipulations of {STV} Elections}, booktitle = {The Thirty-Fourth {AAAI} Conference on Artificial Intelligence, {AAAI} 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, {IAAI} 2020, The Tenth {AAAI} Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2020, New York, NY, USA, February 7-12, 2020}, pages = {13235--13240}, publisher = {{AAAI} Press}, year = {2020}, url = {https://doi.org/10.1609/aaai.v34i08.7029}, doi = {10.1609/AAAI.V34I08.7029}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/BlomCST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/McMurtryPT20, author = {Eleanor McMurtry and Olivier Pereira and Vanessa Teague}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {When Is a Test Not a Proof?}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {23--41}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_2}, doi = {10.1007/978-3-030-59013-0\_2}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/McMurtryPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/BlomCST20, author = {Michelle L. Blom and Andrew Conway and Peter J. Stuckey and Vanessa J. Teague}, editor = {Robert Krimmer and Melanie Volkamer and Bernhard Beckert and Ralf K{\"{u}}sters and Oksana Kulyk and David Duenas{-}Cid and Mikhel Solvak}, title = {Shifting the Balance-of-Power in {STV} Elections}, booktitle = {Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12455}, pages = {1--18}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60347-2\_1}, doi = {10.1007/978-3-030-60347-2\_1}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/evoteid/BlomCST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/BlomCSTV20, author = {Michelle L. Blom and Andrew Conway and Peter J. Stuckey and Vanessa J. Teague and Damjan Vukcevic}, editor = {Robert Krimmer and Melanie Volkamer and Bernhard Beckert and Ralf K{\"{u}}sters and Oksana Kulyk and David Duenas{-}Cid and Mikhel Solvak}, title = {Random Errors Are Not Necessarily Politically Neutral}, booktitle = {Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12455}, pages = {19--35}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60347-2\_2}, doi = {10.1007/978-3-030-60347-2\_2}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/BlomCSTV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/HuangRSTV20, author = {Zhuoqun Huang and Ronald L. Rivest and Philip B. Stark and Vanessa J. Teague and Damjan Vukcevic}, editor = {Robert Krimmer and Melanie Volkamer and Bernhard Beckert and Ralf K{\"{u}}sters and Oksana Kulyk and David Duenas{-}Cid and Mikhel Solvak}, title = {A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods}, booktitle = {Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12455}, pages = {112--128}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60347-2\_8}, doi = {10.1007/978-3-030-60347-2\_8}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/HuangRSTV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/RoohiRT20, author = {Leyla Roohi and Benjamin I. P. Rubinstein and Vanessa Teague}, editor = {Hady W. Lauw and Raymond Chi{-}Wing Wong and Alexandros Ntoulas and Ee{-}Peng Lim and See{-}Kiong Ng and Sinno Jialin Pan}, title = {Assessing Centrality Without Knowing Connections}, booktitle = {Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia Conference, {PAKDD} 2020, Singapore, May 11-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12085}, pages = {152--163}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-47436-2\_12}, doi = {10.1007/978-3-030-47436-2\_12}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/RoohiRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HainesLPT20, author = {Thomas Haines and Sarah Jamie Lewis and Olivier Pereira and Vanessa Teague}, title = {How not to prove your election outcome}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {644--660}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00048}, doi = {10.1109/SP40000.2020.00048}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/HainesLPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/Teague20, author = {Vanessa Teague}, editor = {Yuval Yarom and Sarah Zennou}, title = {When Is a Proof Actually Not?}, booktitle = {14th {USENIX} Workshop on Offensive Technologies, {WOOT} 2020, August 11, 2020}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/woot20/presentation/teague}, timestamp = {Mon, 01 Feb 2021 08:41:50 +0100}, biburl = {https://dblp.org/rec/conf/woot/Teague20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-00235, author = {Michelle L. Blom and Andrew Conway and Dan King and Laurent Sandrolini and Philip B. Stark and Peter J. Stuckey and Vanessa Teague}, title = {You can do RLAs for {IRV}}, journal = {CoRR}, volume = {abs/2004.00235}, year = {2020}, url = {https://arxiv.org/abs/2004.00235}, eprinttype = {arXiv}, eprint = {2004.00235}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-00235.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-13787, author = {Leyla Roohi and Benjamin I. P. Rubinstein and Vanessa Teague}, title = {Assessing Centrality Without Knowing Connections}, journal = {CoRR}, volume = {abs/2005.13787}, year = {2020}, url = {https://arxiv.org/abs/2005.13787}, eprinttype = {arXiv}, eprint = {2005.13787}, timestamp = {Wed, 03 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-13787.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-00854, author = {Michelle L. Blom and Andrew Conway and Peter J. Stuckey and Vanessa Teague and Damjan Vukcevic}, title = {Random errors are not politically neutral}, journal = {CoRR}, volume = {abs/2007.00854}, year = {2020}, url = {https://arxiv.org/abs/2007.00854}, eprinttype = {arXiv}, eprint = {2007.00854}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-00854.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-08536, author = {Zhuoqun Huang and Ronald L. Rivest and Philip B. Stark and Vanessa Teague and Damjan Vukcevic}, title = {A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods}, journal = {CoRR}, volume = {abs/2008.08536}, year = {2020}, url = {https://arxiv.org/abs/2008.08536}, eprinttype = {arXiv}, eprint = {2008.08536}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-08536.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McMurtryPT20, author = {Eleanor McMurtry and Olivier Pereira and Vanessa Teague}, title = {When is a test not a proof?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {909}, year = {2020}, url = {https://eprint.iacr.org/2020/909}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McMurtryPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CulnaneELPT19, author = {Chris Culnane and Aleksander Essex and Sarah Jamie Lewis and Olivier Pereira and Vanessa Teague}, title = {Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {62--70}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2915398}, doi = {10.1109/MSEC.2019.2915398}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CulnaneELPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informs/BlomST19, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa J. Teague}, title = {Toward Computing the Margin of Victory in Single Transferable Vote Elections}, journal = {{INFORMS} J. Comput.}, volume = {31}, number = {4}, pages = {636--653}, year = {2019}, url = {https://doi.org/10.1287/ijoc.2018.0853}, doi = {10.1287/IJOC.2018.0853}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informs/BlomST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/AkinyokunT19, author = {Nicholas Akinyokun and Vanessa Teague}, title = {Receipt-Free, Universally and Individually Verifiable Poll Attendance}, booktitle = {Proceedings of the Australasian Computer Science Week Multiconference, {ACSW} 2019, Sydney, NSW, Australia, January 29-31, 2019}, pages = {5:1--5:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290688.3290696}, doi = {10.1145/3290688.3290696}, timestamp = {Mon, 14 Jan 2019 08:35:38 +0100}, biburl = {https://dblp.org/rec/conf/acsw/AkinyokunT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BlomST19, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa J. Teague}, editor = {Andrea Bracciali and Jeremy Clark and Federico Pintore and Peter B. R{\o}nne and Massimiliano Sala}, title = {Election Manipulation 100}, booktitle = {Financial Cryptography and Data Security - {FC} 2019 International Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11599}, pages = {211--225}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43725-1\_15}, doi = {10.1007/978-3-030-43725-1\_15}, timestamp = {Mon, 03 Jan 2022 22:29:34 +0100}, biburl = {https://dblp.org/rec/conf/fc/BlomST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RamchenCPT19, author = {Kim Ramchen and Chris Culnane and Olivier Pereira and Vanessa Teague}, editor = {Ian Goldberg and Tyler Moore}, title = {Universally Verifiable {MPC} and {IRV} Ballot Counting}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {301--319}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_19}, doi = {10.1007/978-3-030-32101-7\_19}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/RamchenCPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/RoohiRT19, author = {Leyla Roohi and Benjamin I. P. Rubinstein and Vanessa Teague}, title = {Differentially-Private Two-Party Egocentric Betweenness Centrality}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {2233--2241}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737405}, doi = {10.1109/INFOCOM.2019.8737405}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/RoohiRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/BlomST19, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa J. Teague}, editor = {Robert Krimmer and Melanie Volkamer and V{\'{e}}ronique Cortier and Bernhard Beckert and Ralf K{\"{u}}sters and Uwe Serd{\"{u}}lt and David Duenas{-}Cid}, title = {Election Manipulation with Partial Information}, booktitle = {Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11759}, pages = {32--49}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30625-0\_3}, doi = {10.1007/978-3-030-30625-0\_3}, timestamp = {Sun, 02 Oct 2022 16:16:57 +0200}, biburl = {https://dblp.org/rec/conf/voteid/BlomST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/MohantyCST19, author = {Vishal Mohanty and Chris Culnane and Philip B. Stark and Vanessa Teague}, editor = {Robert Krimmer and Melanie Volkamer and V{\'{e}}ronique Cortier and Bernhard Beckert and Ralf K{\"{u}}sters and Uwe Serd{\"{u}}lt and David Duenas{-}Cid}, title = {Auditing Indian Elections}, booktitle = {Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11759}, pages = {150--165}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30625-0\_10}, doi = {10.1007/978-3-030-30625-0\_10}, timestamp = {Sat, 12 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/MohantyCST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2018w, editor = {Aviv Zohar and Ittay Eyal and Vanessa Teague and Jeremy Clark and Andrea Bracciali and Federico Pintore and Massimiliano Sala}, title = {Financial Cryptography and Data Security - {FC} 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10958}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-662-58820-8}, doi = {10.1007/978-3-662-58820-8}, isbn = {978-3-662-58819-2}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2018w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-03108, author = {Vishal Mohanty and Nicholas Akinyokun and Andrew Conway and Chris Culnane and Philip B. Stark and Vanessa Teague}, title = {Auditing Indian Elections}, journal = {CoRR}, volume = {abs/1901.03108}, year = {2019}, url = {http://arxiv.org/abs/1901.03108}, eprinttype = {arXiv}, eprint = {1901.03108}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-03108.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-05562, author = {Leyla Roohi and Benjamin I. P. Rubinstein and Vanessa Teague}, title = {Differentially-Private Two-Party Egocentric Betweenness Centrality}, journal = {CoRR}, volume = {abs/1901.05562}, year = {2019}, url = {http://arxiv.org/abs/1901.05562}, eprinttype = {arXiv}, eprint = {1901.05562}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-05562.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-08804, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa Teague}, title = {Risk-Limiting Audits for {IRV} Elections}, journal = {CoRR}, volume = {abs/1903.08804}, year = {2019}, url = {http://arxiv.org/abs/1903.08804}, eprinttype = {arXiv}, eprint = {1903.08804}, timestamp = {Mon, 01 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-08804.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-05004, author = {Chris Culnane and Benjamin I. P. Rubinstein and Vanessa Teague}, title = {Stop the Open Data Bus, We Want to Get Off}, journal = {CoRR}, volume = {abs/1908.05004}, year = {2019}, url = {http://arxiv.org/abs/1908.05004}, eprinttype = {arXiv}, eprint = {1908.05004}, timestamp = {Mon, 19 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-05004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/BlomST18, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa J. Teague}, editor = {Robert Krimmer and Melanie Volkamer and V{\'{e}}ronique Cortier and Rajeev Gor{\'{e}} and Manik Hapsara and Uwe Serd{\"{u}}lt and David Duenas{-}Cid}, title = {Computing the Margin of Victory in Preferential Parliamentary Elections}, booktitle = {Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11143}, pages = {1--16}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00419-4\_1}, doi = {10.1007/978-3-030-00419-4\_1}, timestamp = {Sun, 02 Oct 2022 16:16:57 +0200}, biburl = {https://dblp.org/rec/conf/voteid/BlomST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/BlomST18a, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa J. Teague}, editor = {Robert Krimmer and Melanie Volkamer and V{\'{e}}ronique Cortier and Rajeev Gor{\'{e}} and Manik Hapsara and Uwe Serd{\"{u}}lt and David Duenas{-}Cid}, title = {Ballot-Polling Risk Limiting Audits for {IRV} Elections}, booktitle = {Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11143}, pages = {17--34}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00419-4\_2}, doi = {10.1007/978-3-030-00419-4\_2}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/BlomST18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-07975, author = {Chris Culnane and Benjamin I. P. Rubinstein and Vanessa Teague}, title = {Options for encoding names for data linking at the Australian Bureau of Statistics}, journal = {CoRR}, volume = {abs/1802.07975}, year = {2018}, url = {http://arxiv.org/abs/1802.07975}, eprinttype = {arXiv}, eprint = {1802.07975}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-07975.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CulnanePRT18, author = {Chris Culnane and Olivier Pereira and Kim Ramchen and Vanessa Teague}, title = {Universally Verifiable {MPC} with Applications to {IRV} Ballot Counting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2018}, url = {http://eprint.iacr.org/2018/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CulnanePRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BenalohRST17, author = {Josh Benaloh and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {A Vote of Confidence?}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {3}, pages = {12--13}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.53}, doi = {10.1109/MSP.2017.53}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BenalohRST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AkinyokunT17, author = {Nicholas Akinyokun and Vanessa Teague}, title = {Security and Privacy Implications of NFC-enabled Contactless Payment Systems}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {47:1--47:10}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3103161}, doi = {10.1145/3098954.3103161}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AkinyokunT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/ConwayBNT17, author = {Andrew Conway and Michelle L. Blom and Lee Naish and Vanessa Teague}, title = {An analysis of New South Wales electronic vote counting}, booktitle = {Proceedings of the Australasian Computer Science Week Multiconference, {ACSW} 2017, Geelong, Australia, January 31 - February 3, 2017}, pages = {24:1--24:5}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3014812.3014837}, doi = {10.1145/3014812.3014837}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsw/ConwayBNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/CulnaneT17, author = {Chris Culnane and Vanessa Teague}, editor = {Steven Furnell and Nathan L. Clarke}, title = {Why Open Government is good for cybersecurity and public trust - now would be a good time to start}, booktitle = {Eleventh International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2017, Adelaide, Australia, November 28-30, 2017, Proceedings}, pages = {236--250}, publisher = {University of Plymouth}, year = {2017}, url = {http://www.cscan.org/openaccess/?paperid=367}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/CulnaneT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RoohiT17, author = {Leyla Roohi and Vanessa Teague}, title = {Privacy-Preserving Queries over Secret-Shared Graph-Structured Data}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {955--960}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.336}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.336}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RoohiT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/BernhardBHRRSTV17, author = {Matthew Bernhard and Josh Benaloh and J. Alex Halderman and Ronald L. Rivest and Peter Y. A. Ryan and Philip B. Stark and Vanessa Teague and Poorvi L. Vora and Dan S. Wallach}, editor = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann}, title = {Public Evidence from Secret Ballots}, booktitle = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10615}, pages = {84--109}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68687-5\_6}, doi = {10.1007/978-3-319-68687-5\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/BernhardBHRRSTV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/CulnaneEET17, author = {Chris Culnane and Mark Eldridge and Aleksander Essex and Vanessa Teague}, editor = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann}, title = {Trust Implications of DDoS Protection in Online Elections}, booktitle = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10615}, pages = {127--145}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68687-5\_8}, doi = {10.1007/978-3-319-68687-5\_8}, timestamp = {Thu, 19 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/CulnaneEET17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2017w, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0}, doi = {10.1007/978-3-319-70278-0}, isbn = {978-3-319-70277-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2017w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/voteid/2016, editor = {Robert Krimmer and Melanie Volkamer and Jordi Barrat and Josh Benaloh and Nicole J. Goodman and Peter Y. A. Ryan and Vanessa Teague}, title = {Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10141}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52240-1}, doi = {10.1007/978-3-319-52240-1}, isbn = {978-3-319-52239-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlomST17, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa J. Teague}, title = {Towards Computing Victory Margins in {STV} Elections}, journal = {CoRR}, volume = {abs/1703.03511}, year = {2017}, url = {http://arxiv.org/abs/1703.03511}, eprinttype = {arXiv}, eprint = {1703.03511}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlomST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CulnaneRT17, author = {Chris Culnane and Benjamin I. P. Rubinstein and Vanessa Teague}, title = {Privacy Assessment of De-identified Opal Data: {A} report for Transport for {NSW}}, journal = {CoRR}, volume = {abs/1704.08547}, year = {2017}, url = {http://arxiv.org/abs/1704.08547}, eprinttype = {arXiv}, eprint = {1704.08547}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CulnaneRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BenalohBHRRSTVW17, author = {Josh Benaloh and Matthew Bernhard and J. Alex Halderman and Ronald L. Rivest and Peter Y. A. Ryan and Philip B. Stark and Vanessa Teague and Poorvi L. Vora and Dan S. Wallach}, title = {Public Evidence from Secret Ballots}, journal = {CoRR}, volume = {abs/1707.08619}, year = {2017}, url = {http://arxiv.org/abs/1707.08619}, eprinttype = {arXiv}, eprint = {1707.08619}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BenalohBHRRSTVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-00121, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa Teague}, title = {Computing the Margin of Victory in Preferential Parliamentary Elections}, journal = {CoRR}, volume = {abs/1708.00121}, year = {2017}, url = {http://arxiv.org/abs/1708.00121}, eprinttype = {arXiv}, eprint = {1708.00121}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-00121.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-00991, author = {Chris Culnane and Mark Eldridge and Aleksander Essex and Vanessa Teague}, title = {Trust Implications of DDoS Protection in Online Elections}, journal = {CoRR}, volume = {abs/1708.00991}, year = {2017}, url = {http://arxiv.org/abs/1708.00991}, eprinttype = {arXiv}, eprint = {1708.00991}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-00991.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-00871, author = {Chris Culnane and Benjamin I. P. Rubinstein and Vanessa Teague}, title = {Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the {UK} Office for National Statistics' Privacy-Preserving Record Linkage}, journal = {CoRR}, volume = {abs/1712.00871}, year = {2017}, url = {http://arxiv.org/abs/1712.00871}, eprinttype = {arXiv}, eprint = {1712.00871}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-00871.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-05627, author = {Chris Culnane and Benjamin I. P. Rubinstein and Vanessa Teague}, title = {Health Data in an Open World}, journal = {CoRR}, volume = {abs/1712.05627}, year = {2017}, url = {http://arxiv.org/abs/1712.05627}, eprinttype = {arXiv}, eprint = {1712.05627}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-05627.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/GibsonKTP16, author = {J. Paul Gibson and Robert Krimmer and Vanessa Teague and Julia Pomares}, title = {A review of E-voting: the past, present and future}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {71}, number = {7-8}, pages = {279--286}, year = {2016}, url = {https://doi.org/10.1007/s12243-016-0525-8}, doi = {10.1007/S12243-016-0525-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/GibsonKTP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/BlomTST16, author = {Michelle L. Blom and Vanessa Teague and Peter J. Stuckey and Ron Tidhar}, editor = {Gal A. Kaminka and Maria Fox and Paolo Bouquet and Eyke H{\"{u}}llermeier and Virginia Dignum and Frank Dignum and Frank van Harmelen}, title = {Efficient Computation of Exact {IRV} Margins}, booktitle = {{ECAI} 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands - Including Prestigious Applications of Artificial Intelligence {(PAIS} 2016)}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {285}, pages = {480--488}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-672-9-480}, doi = {10.3233/978-1-61499-672-9-480}, timestamp = {Tue, 02 Nov 2021 15:59:05 +0100}, biburl = {https://dblp.org/rec/conf/ecai/BlomTST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CulnaneT16, author = {Chris Culnane and Vanessa Teague}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Strategies for Voter-Initiated Election Audits}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {235--247}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_14}, doi = {10.1007/978-3-319-47413-7\_14}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/CulnaneT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChilingirianPRB16, author = {Berj Chilingirian and Zara Perumal and Ronald L. Rivest and Grahame Bowland and Andrew Conway and Philip B. Stark and Michelle L. Blom and Chris Culnane and Vanessa Teague}, title = {Auditing Australian Senate Ballots}, journal = {CoRR}, volume = {abs/1610.00127}, year = {2016}, url = {http://arxiv.org/abs/1610.00127}, eprinttype = {arXiv}, eprint = {1610.00127}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChilingirianPRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ConwayBNT16, author = {Andrew Conway and Michelle L. Blom and Lee Naish and Vanessa Teague}, title = {An analysis of New South Wales electronic vote counting}, journal = {CoRR}, volume = {abs/1611.02015}, year = {2016}, url = {http://arxiv.org/abs/1611.02015}, eprinttype = {arXiv}, eprint = {1611.02015}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ConwayBNT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BedoCRT16, author = {Justin Bedo and Thomas C. Conway and Kim Ramchen and Vanessa Teague}, title = {Privately Matching k-mers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {781}, year = {2016}, url = {http://eprint.iacr.org/2016/781}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BedoCRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RyanST15, author = {Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {End-to-End Verifiability in Voting Systems, from Theory to Practice}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {3}, pages = {59--62}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.54}, doi = {10.1109/MSP.2015.54}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RyanST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CulnaneRST15, author = {Chris Culnane and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {vVote: {A} Verifiable Voting System}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {1}, pages = {3:1--3:30}, year = {2015}, url = {https://doi.org/10.1145/2746338}, doi = {10.1145/2746338}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CulnaneRST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/HaldermanT15, author = {J. Alex Halderman and Vanessa Teague}, editor = {Rolf Haenni and Reto E. Koenig and Douglas Wikstr{\"{o}}m}, title = {The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election}, booktitle = {E-Voting and Identity - 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9269}, pages = {35--53}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22270-7\_3}, doi = {10.1007/978-3-319-22270-7\_3}, timestamp = {Thu, 27 Feb 2020 12:57:39 +0100}, biburl = {https://dblp.org/rec/conf/voteid/HaldermanT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/KulykTV15, author = {Oksana Kulyk and Vanessa Teague and Melanie Volkamer}, editor = {Rolf Haenni and Reto E. Koenig and Douglas Wikstr{\"{o}}m}, title = {Extending Helios Towards Private Eligibility Verifiability}, booktitle = {E-Voting and Identity - 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9269}, pages = {57--73}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22270-7\_4}, doi = {10.1007/978-3-319-22270-7\_4}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/KulykTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BenalohRRSTV15, author = {Josh Benaloh and Ronald L. Rivest and Peter Y. A. Ryan and Philip B. Stark and Vanessa Teague and Poorvi L. Vora}, title = {End-to-end verifiability}, journal = {CoRR}, volume = {abs/1504.03778}, year = {2015}, url = {http://arxiv.org/abs/1504.03778}, eprinttype = {arXiv}, eprint = {1504.03778}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BenalohRRSTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HaldermanT15, author = {J. Alex Halderman and Vanessa Teague}, title = {The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election}, journal = {CoRR}, volume = {abs/1504.05646}, year = {2015}, url = {http://arxiv.org/abs/1504.05646}, eprinttype = {arXiv}, eprint = {1504.05646}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HaldermanT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlomSTT15, author = {Michelle L. Blom and Peter J. Stuckey and Vanessa Teague and Ron Tidhar}, title = {Efficient Computation of Exact {IRV} Margins}, journal = {CoRR}, volume = {abs/1508.04885}, year = {2015}, url = {http://arxiv.org/abs/1508.04885}, eprinttype = {arXiv}, eprint = {1508.04885}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlomSTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/HeatherST14, author = {James Heather and Steve A. Schneider and Vanessa Teague}, title = {Cryptographic protocols with everyday objects}, journal = {Formal Aspects Comput.}, volume = {26}, number = {1}, pages = {37--62}, year = {2014}, url = {https://doi.org/10.1007/s00165-013-0274-7}, doi = {10.1007/S00165-013-0274-7}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/HeatherST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SchneiderTCH14, author = {Steve A. Schneider and Vanessa Teague and Chris Culnane and James Heather}, title = {Special Section on Vote-ID 2013}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {2}, pages = {103--104}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.06.002}, doi = {10.1016/J.JISA.2014.06.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SchneiderTCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CulnaneHJRST14, author = {Chris Culnane and James Heather and Rui Joaquim and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {Faster Print on Demand for Pr{\^{e}}t {\`{a}} Voter}, booktitle = {2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, {EVT/WOTE} '14, San Diego, CA, USA, August 18-19, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/evtwote14/workshop-program/presentation/culnane}, timestamp = {Mon, 01 Feb 2021 08:42:52 +0100}, biburl = {https://dblp.org/rec/conf/uss/CulnaneHJRST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CulnaneRST14, author = {Chris Culnane and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague}, title = {vVote: a Verifiable Voting System {(DRAFT)}}, journal = {CoRR}, volume = {abs/1404.6822}, year = {2014}, url = {http://arxiv.org/abs/1404.6822}, eprinttype = {arXiv}, eprint = {1404.6822}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CulnaneRST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BenalohRT13, author = {Josh Benaloh and Peter Y. A. Ryan and Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Verifiable Postal Voting}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {54--65}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_8}, doi = {10.1007/978-3-642-41717-7\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BenalohRT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Teague13, author = {Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {End-to-End Verifiable Postal Voting (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {66--70}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_9}, doi = {10.1007/978-3-642-41717-7\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Teague13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/voteid/2013, editor = {James Heather and Steve A. Schneider and Vanessa Teague}, title = {E-Voting and Identify - 4th International Conference, VoteID 2013, Guildford, UK, July 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7985}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39185-9}, doi = {10.1007/978-3-642-39185-9}, isbn = {978-3-642-39184-2}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/BurtonCHPRSSTWX12, author = {Craig Burton and Chris Culnane and James Heather and Thea Peacock and Peter Y. A. Ryan and Steve A. Schneider and Sriramkrishnan Srinivasan and Vanessa Teague and Roland Wen and Zhe Xia}, editor = {Manuel J. Kripp and Melanie Volkamer and R{\"{u}}diger Grimm}, title = {A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission}, booktitle = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012), Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-205}}, pages = {81--94}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18227}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/BurtonCHPRSSTWX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ParampalliRT12, author = {Udaya Parampalli and Kim Ramchen and Vanessa Teague}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Efficiently Shuffling in Public}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {431--448}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_26}, doi = {10.1007/978-3-642-30057-8\_26}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ParampalliRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BurtonCHPRSTWXS12, author = {Craig Burton and Chris Culnane and James Heather and Thea Peacock and Peter Y. A. Ryan and Steve A. Schneider and Vanessa Teague and Roland Wen and Zhe Xia and Sriramkrishnan Srinivasan}, editor = {J. Alex Halderman and Olivier Pereira}, title = {Using Pr{\^{e}}t {\`{a}} Voter in Victoria State Elections}, booktitle = {2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '12, Bellevue, WA, USA, August 6-7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/evtwote12/workshop-program/presentation/burton}, timestamp = {Mon, 01 Feb 2021 08:43:08 +0100}, biburl = {https://dblp.org/rec/conf/uss/BurtonCHPRSTWXS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/BucklandTW11, author = {Richard Buckland and Vanessa Teague and Roland Wen}, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {Towards Best Practice for E-election Systems - Lessons from Trial and Error in Australian Elections}, booktitle = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, pages = {224--241}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32747-6\_14}, doi = {10.1007/978-3-642-32747-6\_14}, timestamp = {Thu, 27 Feb 2020 12:57:38 +0100}, biburl = {https://dblp.org/rec/conf/voteid/BucklandTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/HeatherLTW11, author = {James Heather and Morgan Llewellyn and Vanessa Teague and Roland Wen}, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {On the Side-Effects of Introducing E-Voting}, booktitle = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, pages = {242--256}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32747-6\_15}, doi = {10.1007/978-3-642-32747-6\_15}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/HeatherLTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2011evt, editor = {Hovav Shacham and Vanessa Teague}, title = {2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '11, San Francisco, CA, USA, August 8-9, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/evtwote11}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2011evt.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HeatherRT10, author = {James Heather and Peter Y. A. Ryan and Vanessa Teague}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Pretty Good Democracy for More Expressive Voting Schemes}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {405--423}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_25}, doi = {10.1007/978-3-642-15497-3\_25}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HeatherRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaRT10, author = {Giampaolo Bella and Peter Y. A. Ryan and Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm}, title = {Virtually Perfect Democracy}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {161--166}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_24}, doi = {10.1007/978-3-662-45921-8\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BenalohMNRT09, author = {Josh Benaloh and Tal Moran and Lee Naish and Kim Ramchen and Vanessa Teague}, title = {Shuffle-sum: coercion-resistant verifiable tallying for {STV} voting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {685--698}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033757}, doi = {10.1109/TIFS.2009.2033757}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BenalohMNRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RyanT09, author = {Peter Y. A. Ryan and Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Pretty Good Democracy}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {111--130}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_15}, doi = {10.1007/978-3-642-36213-2\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/RyanT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RyanT09, author = {Peter Y. A. Ryan and Vanessa Teague}, editor = {David Jefferson and Joseph Lorenzo Hall and Tal Moran}, title = {Permutations in Pr{\^{e}}t {\`{a}} Voter}, booktitle = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/evtwote-09/permutations-pr\%C3\%AAt-\%C3\%A0-voter}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/RyanT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TeagueRN08, author = {Vanessa Teague and Kim Ramchen and Lee Naish}, editor = {David L. Dill and Tadayoshi Kohno}, title = {Coercion-Resistant Tallying for {STV} Voting}, booktitle = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/evt08/tech/full\_papers/teague/teague.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/TeagueRN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsc/CormanST07, author = {Amy Beth Corman and Peter Schachte and Vanessa Teague}, editor = {Gillian Dobbie}, title = {{QUIP:} {A} Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks}, booktitle = {Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference {(ACSC2007).} Ballarat, Victoria, Australia, January 30 - February 2, 2007. Proceedings}, series = {{CRPIT}}, volume = {62}, pages = {35--40}, publisher = {Australian Computer Society}, year = {2007}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV62Corman.html}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsc/CormanST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CormanST07, author = {Amy Beth Corman and Peter Schachte and Vanessa Teague}, title = {A Secure Group Agreement {(SGA)} Protocol for Peer-to-Peer Applications}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada}, pages = {24--29}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINAW.2007.53}, doi = {10.1109/AINAW.2007.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/CormanST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cats/ColemanT07, author = {Tom Coleman and Vanessa Teague}, editor = {Joachim Gudmundsson and C. Barry Jay}, title = {On The Complexity of Manipulating Elections}, booktitle = {Theory of Computing 2007. Proceedings of the Thirteenth Computing: The Australasian Theory Symposium {(CATS2007).} January 30 - Febuary 2, 2007, Ballarat, Victoria, Australia, Proceedings}, series = {{CRPIT}}, volume = {65}, pages = {25--33}, publisher = {Australian Computer Society}, year = {2007}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV65Coleman.html}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cats/ColemanT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/CormanST07, author = {Amy Beth Corman and Peter Schachte and Vanessa Teague}, title = {Secure random number agreement for peer-to-peer applications}, booktitle = {13th International Conference on Parallel and Distributed Systems, {ICPADS} 2007, Hsinchu, Taiwan, December 5-7, 2007}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICPADS.2007.4447820}, doi = {10.1109/ICPADS.2007.4447820}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/CormanST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/MitchellRST06, author = {John C. Mitchell and Ajith Ramanathan and Andre Scedrov and Vanessa Teague}, title = {A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols}, journal = {Theor. Comput. Sci.}, volume = {353}, number = {1-3}, pages = {118--164}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2005.10.044}, doi = {10.1016/J.TCS.2005.10.044}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/MitchellRST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CormanDST06, author = {Amy Beth Corman and Scott Douglas and Peter Schachte and Vanessa Teague}, title = {A Secure Event Agreement {(SEA)} protocol for peer-to-peer games}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {34--41}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.15}, doi = {10.1109/ARES.2006.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/CormanDST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0609035, author = {Joseph Y. Halpern and Vanessa Teague}, title = {Rational Secret Sharing and Multiparty Computation: Extended Abstract}, journal = {CoRR}, volume = {abs/cs/0609035}, year = {2006}, url = {http://arxiv.org/abs/cs/0609035}, eprinttype = {arXiv}, eprint = {cs/0609035}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0609035.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Teague05, author = {Vanessa Teague}, title = {Combining cryptography and game theory in distributed algorithms}, school = {Stanford University, {USA}}, year = {2005}, url = {https://searchworks.stanford.edu/view/5815184}, timestamp = {Wed, 31 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Teague05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Teague04, author = {Vanessa Teague}, editor = {Ari Juels}, title = {Selecting Correlated Random Actions}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {181--195}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_20}, doi = {10.1007/978-3-540-27809-2\_20}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Teague04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/RamanathanMST04, author = {Ajith Ramanathan and John C. Mitchell and Andre Scedrov and Vanessa Teague}, editor = {Igor Walukiewicz}, title = {Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols}, booktitle = {Foundations of Software Science and Computation Structures, 7th International Conference, {FOSSACS} 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2987}, pages = {468--483}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24727-2\_33}, doi = {10.1007/978-3-540-24727-2\_33}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/RamanathanMST04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/HalpernT04, author = {Joseph Y. Halpern and Vanessa Teague}, editor = {L{\'{a}}szl{\'{o}} Babai}, title = {Rational secret sharing and multiparty computation: extended abstract}, booktitle = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing, Chicago, IL, USA, June 13-16, 2004}, pages = {623--632}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1007352.1007447}, doi = {10.1145/1007352.1007447}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/HalpernT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isss2/MitchellT02, author = {John C. Mitchell and Vanessa Teague}, editor = {Mitsuhiro Okada and Benjamin C. Pierce and Andre Scedrov and Hideyuki Tokuda and Akinori Yonezawa}, title = {Autonomous Nodes and Distributed Mechanisms}, booktitle = {Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2609}, pages = {58--83}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36532-X\_5}, doi = {10.1007/3-540-36532-X\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/isss2/MitchellT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gc/AlonTW01, author = {Noga Alon and Vanessa Teague and Nicholas C. Wormald}, title = {Linear Arboricity and Linear k-Arboricity of Regular Graphs}, journal = {Graphs Comb.}, volume = {17}, number = {1}, pages = {11--16}, year = {2001}, url = {https://doi.org/10.1007/PL00007233}, doi = {10.1007/PL00007233}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gc/AlonTW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/MitchellRST01, author = {John C. Mitchell and Ajith Ramanathan and Andre Scedrov and Vanessa Teague}, title = {Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis}, booktitle = {16th Annual {IEEE} Symposium on Logic in Computer Science, Boston, Massachusetts, USA, June 16-19, 2001, Proceedings}, pages = {3--5}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/LICS.2001.932477}, doi = {10.1109/LICS.2001.932477}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/MitchellRST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorT01, author = {Moni Naor and Vanessa Teague}, editor = {Jeffrey Scott Vitter and Paul G. Spirakis and Mihalis Yannakakis}, title = {Anti-presistence: history independent data structures}, booktitle = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing, July 6-8, 2001, Heraklion, Crete, Greece}, pages = {492--501}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/380752.380844}, doi = {10.1145/380752.380844}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MitchellRST01, author = {John C. Mitchell and Ajith Ramanathan and Andre Scedrov and Vanessa Teague}, editor = {Stephen D. Brookes and Michael W. Mislove}, title = {A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report)}, booktitle = {Seventeenth Conference on the Mathematical Foundations of Programming Semantics, {MFPS} 2001, Aarhus, Denmark, May 23-26, 2001}, series = {Electronic Notes in Theoretical Computer Science}, volume = {45}, pages = {280--310}, publisher = {Elsevier}, year = {2001}, url = {https://doi.org/10.1016/S1571-0661(04)80968-X}, doi = {10.1016/S1571-0661(04)80968-X}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/MitchellRST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorT01, author = {Moni Naor and Vanessa Teague}, title = {Anti-persistence: History Independent Data Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2001}, url = {http://eprint.iacr.org/2001/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.