BibTeX records: Vanessa Teague

download as .bib file

@article{DBLP:journals/cybersecurity/AbelsonABBBCDLNRSSTT24,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Jon Callas and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Vanessa Teague and
                  Carmela Troncoso},
  title        = {Bugs in our pockets: the risks of client-side scanning},
  journal      = {J. Cybersecur.},
  volume       = {10},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1093/cybsec/tyad020},
  doi          = {10.1093/CYBSEC/TYAD020},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBCDLNRSSTT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-03707,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  title        = {RLAs for 2-Seat {STV} Elections: Revisited},
  journal      = {CoRR},
  volume       = {abs/2402.03707},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.03707},
  doi          = {10.48550/ARXIV.2402.03707},
  eprinttype    = {arXiv},
  eprint       = {2402.03707},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-03707.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/Teague23,
  author       = {Vanessa Teague},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Democratizing election verification: new methods for addressing an
                  ancient attacker model},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {552},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3596443},
  doi          = {10.1145/3579856.3596443},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/Teague23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BlomSTV23,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  editor       = {Aleksander Essex and
                  Shin'ichiro Matsuo and
                  Oksana Kulyk and
                  Lewis Gudgeon and
                  Ariah Klages{-}Mundt and
                  Daniel Perez and
                  Sam Werner and
                  Andrea Bracciali and
                  Geoff Goodell},
  title        = {Risk-Limiting Audits for Condorcet Elections},
  booktitle    = {Financial Cryptography and Data Security. {FC} 2023 International
                  Workshops - Voting, CoDecFin, DeFi, WTSC, Bol, Bra{\v{c}}, Croatia,
                  May 5, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13953},
  pages        = {79--94},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48806-1\_6},
  doi          = {10.1007/978-3-031-48806-1\_6},
  timestamp    = {Mon, 18 Dec 2023 16:44:30 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/BlomSTV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-10509,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  title        = {Risk-Limiting Audits for Condorcet Elections},
  journal      = {CoRR},
  volume       = {abs/2303.10509},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.10509},
  doi          = {10.48550/ARXIV.2303.10509},
  eprinttype    = {arXiv},
  eprint       = {2303.10509},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-10509.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/CormanCCT22,
  author       = {Amy Beth Corman and
                  Rachel Canaway and
                  Chris Culnane and
                  Vanessa Teague},
  title        = {Public comprehension of privacy protections applied to health data
                  shared for research: An Australian cross-sectional study},
  journal      = {Int. J. Medical Informatics},
  volume       = {167},
  pages        = {104859},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijmedinf.2022.104859},
  doi          = {10.1016/J.IJMEDINF.2022.104859},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmi/CormanCCT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/EverestBSSTV22,
  author       = {Floyd Everest and
                  Michelle L. Blom and
                  Philip B. Stark and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge and
                  Massimiliano Albanese and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla},
  title        = {Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree
                  Model},
  booktitle    = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS
                  2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE
                  2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September
                  26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13785},
  pages        = {525--540},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25460-4\_30},
  doi          = {10.1007/978-3-031-25460-4\_30},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/EverestBSSTV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/HainesPT22,
  author       = {Thomas Haines and
                  Olivier Pereira and
                  Vanessa Teague},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  David Duenas{-}Cid and
                  Peter B. R{\o}nne and
                  Micha Germann},
  title        = {Running the Race: {A} Swiss Voting Story},
  booktitle    = {Electronic Voting - 7th International Joint Conference, E-Vote-ID
                  2022, Bregenz, Austria, October 4-7, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13553},
  pages        = {53--69},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15911-4\_4},
  doi          = {10.1007/978-3-031-15911-4\_4},
  timestamp    = {Mon, 24 Oct 2022 20:50:57 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/HainesPT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BlomSTV22,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  editor       = {Shin'ichiro Matsuo and
                  Lewis Gudgeon and
                  Ariah Klages{-}Mundt and
                  Daniel Perez Hernandez and
                  Sam Werner and
                  Thomas Haines and
                  Aleksander Essex and
                  Andrea Bracciali and
                  Massimiliano Sala},
  title        = {A First Approach to Risk-Limiting Audits for Single Transferable Vote
                  Elections},
  booktitle    = {Financial Cryptography and Data Security. {FC} 2022 International
                  Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13412},
  pages        = {366--380},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32415-4\_25},
  doi          = {10.1007/978-3-031-32415-4\_25},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BlomSTV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-14634,
  author       = {Michelle L. Blom and
                  Philip B. Stark and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  title        = {Assessing the accuracy of the Australian Senate count: Key steps for
                  a rigorous and transparent audit},
  journal      = {CoRR},
  volume       = {abs/2205.14634},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.14634},
  doi          = {10.48550/ARXIV.2205.14634},
  eprinttype    = {arXiv},
  eprint       = {2205.14634},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-14634.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-14605,
  author       = {Floyd Everest and
                  Michelle L. Blom and
                  Philip B. Stark and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  title        = {Auditing Ranked Voting Elections with Dirichlet-Tree Models: First
                  Steps},
  journal      = {CoRR},
  volume       = {abs/2206.14605},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.14605},
  doi          = {10.48550/ARXIV.2206.14605},
  eprinttype    = {arXiv},
  eprint       = {2206.14605},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-14605.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-03881,
  author       = {Floyd Everest and
                  Michelle L. Blom and
                  Philip B. Stark and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  title        = {Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree
                  Model},
  journal      = {CoRR},
  volume       = {abs/2209.03881},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.03881},
  doi          = {10.48550/ARXIV.2209.03881},
  eprinttype    = {arXiv},
  eprint       = {2209.03881},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-03881.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasTL22,
  author       = {Aggelos Kiayias and
                  Vanessa Teague and
                  Orfeas Stefanos Thyfronitis Litos},
  title        = {Privacy Preserving Opinion Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {760},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/760},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BenalohFSTW21,
  author       = {Josh Benaloh and
                  Kammi Foote and
                  Philip B. Stark and
                  Vanessa Teague and
                  Dan S. Wallach},
  title        = {VAULT-Style Risk-Limiting Audits and the Inyo County Pilot},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {8--18},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3075107},
  doi          = {10.1109/MSEC.2021.3075107},
  timestamp    = {Wed, 14 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BenalohFSTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Teague21,
  author       = {Vanessa Teague},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Which E-Voting Problems Do We Need to Solve?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {3--7},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_1},
  doi          = {10.1007/978-3-030-84242-0\_1},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Teague21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/BlomBRSSTV21,
  author       = {Michelle L. Blom and
                  Jurlind Budurushi and
                  Ronald L. Rivest and
                  Philip B. Stark and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  David Duenas{-}Cid and
                  Oksana Kulyk and
                  Peter B. R{\o}nne and
                  Mihkel Solvak and
                  Micha Germann},
  title        = {Assertion-Based Approaches to Auditing Complex Elections, with Application
                  to Party-List Proportional Elections},
  booktitle    = {Electronic Voting - 6th International Joint Conference, E-Vote-ID
                  2021, Virtual Event, October 5-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12900},
  pages        = {47--62},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86942-7\_4},
  doi          = {10.1007/978-3-030-86942-7\_4},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/BlomBRSSTV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BlomSSTV21,
  author       = {Michelle L. Blom and
                  Philip B. Stark and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  Lewis Gudgeon and
                  Thomas Haines and
                  Ariah Klages{-}Mundt and
                  Shin'ichiro Matsuo and
                  Daniel Perez and
                  Massimiliano Sala and
                  Sam Werner},
  title        = {Auditing Hamiltonian Elections},
  booktitle    = {Financial Cryptography and Data Security. {FC} 2021 International
                  Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March
                  5, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12676},
  pages        = {235--250},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-63958-0\_21},
  doi          = {10.1007/978-3-662-63958-0\_21},
  timestamp    = {Wed, 27 Oct 2021 09:25:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BlomSSTV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-08510,
  author       = {Michelle L. Blom and
                  Philip B. Stark and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  title        = {Auditing Hamiltonian Elections},
  journal      = {CoRR},
  volume       = {abs/2102.08510},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.08510},
  eprinttype    = {arXiv},
  eprint       = {2102.08510},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-08510.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-11903,
  author       = {Michelle L. Blom and
                  Jurlind Budurushi and
                  Ronald L. Rivest and
                  Philip B. Stark and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  title        = {Assertion-based Approaches to Auditing Complex Elections, with application
                  to party-list proportional elections},
  journal      = {CoRR},
  volume       = {abs/2107.11903},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.11903},
  eprinttype    = {arXiv},
  eprint       = {2107.11903},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-11903.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-07450,
  author       = {Hal Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Jon Callas and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Vanessa Teague and
                  Carmela Troncoso},
  title        = {Bugs in our Pockets: The Risks of Client-Side Scanning},
  journal      = {CoRR},
  volume       = {abs/2110.07450},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.07450},
  eprinttype    = {arXiv},
  eprint       = {2110.07450},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-07450.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-04210,
  author       = {Eleanor McMurtry and
                  Xavier Boyen and
                  Chris Culnane and
                  Kristian Gj{\o}steen and
                  Thomas Haines and
                  Vanessa Teague},
  title        = {Towards Verifiable Remote Voting with Paper Assurance},
  journal      = {CoRR},
  volume       = {abs/2111.04210},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.04210},
  eprinttype    = {arXiv},
  eprint       = {2111.04210},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-04210.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-09921,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  title        = {A First Approach to Risk-Limiting Audits for Single Transferable Vote
                  Elections},
  journal      = {CoRR},
  volume       = {abs/2112.09921},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.09921},
  eprinttype    = {arXiv},
  eprint       = {2112.09921},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-09921.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/BlomCST20,
  author       = {Michelle L. Blom and
                  Andrew Conway and
                  Peter J. Stuckey and
                  Vanessa J. Teague},
  title        = {Did That Lost Ballot Box Cost Me a Seat? Computing Manipulations of
                  {STV} Elections},
  booktitle    = {The Thirty-Fourth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2020, The Thirty-Second Innovative Applications of Artificial Intelligence
                  Conference, {IAAI} 2020, The Tenth {AAAI} Symposium on Educational
                  Advances in Artificial Intelligence, {EAAI} 2020, New York, NY, USA,
                  February 7-12, 2020},
  pages        = {13235--13240},
  publisher    = {{AAAI} Press},
  year         = {2020},
  url          = {https://doi.org/10.1609/aaai.v34i08.7029},
  doi          = {10.1609/AAAI.V34I08.7029},
  timestamp    = {Mon, 04 Sep 2023 12:29:24 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/BlomCST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/McMurtryPT20,
  author       = {Eleanor McMurtry and
                  Olivier Pereira and
                  Vanessa Teague},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {When Is a Test Not a Proof?},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {23--41},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_2},
  doi          = {10.1007/978-3-030-59013-0\_2},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/McMurtryPT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/BlomCST20,
  author       = {Michelle L. Blom and
                  Andrew Conway and
                  Peter J. Stuckey and
                  Vanessa J. Teague},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Bernhard Beckert and
                  Ralf K{\"{u}}sters and
                  Oksana Kulyk and
                  David Duenas{-}Cid and
                  Mikhel Solvak},
  title        = {Shifting the Balance-of-Power in {STV} Elections},
  booktitle    = {Electronic Voting - 5th International Joint Conference, E-Vote-ID
                  2020, Bregenz, Austria, October 6-9, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12455},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60347-2\_1},
  doi          = {10.1007/978-3-030-60347-2\_1},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/evoteid/BlomCST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/BlomCSTV20,
  author       = {Michelle L. Blom and
                  Andrew Conway and
                  Peter J. Stuckey and
                  Vanessa J. Teague and
                  Damjan Vukcevic},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Bernhard Beckert and
                  Ralf K{\"{u}}sters and
                  Oksana Kulyk and
                  David Duenas{-}Cid and
                  Mikhel Solvak},
  title        = {Random Errors Are Not Necessarily Politically Neutral},
  booktitle    = {Electronic Voting - 5th International Joint Conference, E-Vote-ID
                  2020, Bregenz, Austria, October 6-9, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12455},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60347-2\_2},
  doi          = {10.1007/978-3-030-60347-2\_2},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/BlomCSTV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/HuangRSTV20,
  author       = {Zhuoqun Huang and
                  Ronald L. Rivest and
                  Philip B. Stark and
                  Vanessa J. Teague and
                  Damjan Vukcevic},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Bernhard Beckert and
                  Ralf K{\"{u}}sters and
                  Oksana Kulyk and
                  David Duenas{-}Cid and
                  Mikhel Solvak},
  title        = {A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing
                  Methods},
  booktitle    = {Electronic Voting - 5th International Joint Conference, E-Vote-ID
                  2020, Bregenz, Austria, October 6-9, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12455},
  pages        = {112--128},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60347-2\_8},
  doi          = {10.1007/978-3-030-60347-2\_8},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/HuangRSTV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/RoohiRT20,
  author       = {Leyla Roohi and
                  Benjamin I. P. Rubinstein and
                  Vanessa Teague},
  editor       = {Hady W. Lauw and
                  Raymond Chi{-}Wing Wong and
                  Alexandros Ntoulas and
                  Ee{-}Peng Lim and
                  See{-}Kiong Ng and
                  Sinno Jialin Pan},
  title        = {Assessing Centrality Without Knowing Connections},
  booktitle    = {Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia
                  Conference, {PAKDD} 2020, Singapore, May 11-14, 2020, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12085},
  pages        = {152--163},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-47436-2\_12},
  doi          = {10.1007/978-3-030-47436-2\_12},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/RoohiRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HainesLPT20,
  author       = {Thomas Haines and
                  Sarah Jamie Lewis and
                  Olivier Pereira and
                  Vanessa Teague},
  title        = {How not to prove your election outcome},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {644--660},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00048},
  doi          = {10.1109/SP40000.2020.00048},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/HainesLPT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/Teague20,
  author       = {Vanessa Teague},
  editor       = {Yuval Yarom and
                  Sarah Zennou},
  title        = {When Is a Proof Actually Not?},
  booktitle    = {14th {USENIX} Workshop on Offensive Technologies, {WOOT} 2020, August
                  11, 2020},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/woot20/presentation/teague},
  timestamp    = {Mon, 01 Feb 2021 08:41:50 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/Teague20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-00235,
  author       = {Michelle L. Blom and
                  Andrew Conway and
                  Dan King and
                  Laurent Sandrolini and
                  Philip B. Stark and
                  Peter J. Stuckey and
                  Vanessa Teague},
  title        = {You can do RLAs for {IRV}},
  journal      = {CoRR},
  volume       = {abs/2004.00235},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.00235},
  eprinttype    = {arXiv},
  eprint       = {2004.00235},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-00235.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-13787,
  author       = {Leyla Roohi and
                  Benjamin I. P. Rubinstein and
                  Vanessa Teague},
  title        = {Assessing Centrality Without Knowing Connections},
  journal      = {CoRR},
  volume       = {abs/2005.13787},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.13787},
  eprinttype    = {arXiv},
  eprint       = {2005.13787},
  timestamp    = {Wed, 03 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-13787.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-00854,
  author       = {Michelle L. Blom and
                  Andrew Conway and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Damjan Vukcevic},
  title        = {Random errors are not politically neutral},
  journal      = {CoRR},
  volume       = {abs/2007.00854},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.00854},
  eprinttype    = {arXiv},
  eprint       = {2007.00854},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-00854.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-08536,
  author       = {Zhuoqun Huang and
                  Ronald L. Rivest and
                  Philip B. Stark and
                  Vanessa Teague and
                  Damjan Vukcevic},
  title        = {A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing
                  Methods},
  journal      = {CoRR},
  volume       = {abs/2008.08536},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.08536},
  eprinttype    = {arXiv},
  eprint       = {2008.08536},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-08536.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McMurtryPT20,
  author       = {Eleanor McMurtry and
                  Olivier Pereira and
                  Vanessa Teague},
  title        = {When is a test not a proof?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {909},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/909},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McMurtryPT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CulnaneELPT19,
  author       = {Chris Culnane and
                  Aleksander Essex and
                  Sarah Jamie Lewis and
                  Olivier Pereira and
                  Vanessa Teague},
  title        = {Knights and Knaves Run Elections: Internet Voting and Undetectable
                  Electoral Fraud},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {62--70},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2915398},
  doi          = {10.1109/MSEC.2019.2915398},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CulnaneELPT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informs/BlomST19,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa J. Teague},
  title        = {Toward Computing the Margin of Victory in Single Transferable Vote
                  Elections},
  journal      = {{INFORMS} J. Comput.},
  volume       = {31},
  number       = {4},
  pages        = {636--653},
  year         = {2019},
  url          = {https://doi.org/10.1287/ijoc.2018.0853},
  doi          = {10.1287/IJOC.2018.0853},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informs/BlomST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/AkinyokunT19,
  author       = {Nicholas Akinyokun and
                  Vanessa Teague},
  title        = {Receipt-Free, Universally and Individually Verifiable Poll Attendance},
  booktitle    = {Proceedings of the Australasian Computer Science Week Multiconference,
                  {ACSW} 2019, Sydney, NSW, Australia, January 29-31, 2019},
  pages        = {5:1--5:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290688.3290696},
  doi          = {10.1145/3290688.3290696},
  timestamp    = {Mon, 14 Jan 2019 08:35:38 +0100},
  biburl       = {https://dblp.org/rec/conf/acsw/AkinyokunT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BlomST19,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa J. Teague},
  editor       = {Andrea Bracciali and
                  Jeremy Clark and
                  Federico Pintore and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Election Manipulation 100},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2019 International
                  Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February
                  18-22, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11599},
  pages        = {211--225},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43725-1\_15},
  doi          = {10.1007/978-3-030-43725-1\_15},
  timestamp    = {Mon, 03 Jan 2022 22:29:34 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/BlomST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RamchenCPT19,
  author       = {Kim Ramchen and
                  Chris Culnane and
                  Olivier Pereira and
                  Vanessa Teague},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {Universally Verifiable {MPC} and {IRV} Ballot Counting},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {301--319},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_19},
  doi          = {10.1007/978-3-030-32101-7\_19},
  timestamp    = {Wed, 12 Aug 2020 17:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RamchenCPT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/RoohiRT19,
  author       = {Leyla Roohi and
                  Benjamin I. P. Rubinstein and
                  Vanessa Teague},
  title        = {Differentially-Private Two-Party Egocentric Betweenness Centrality},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {2233--2241},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737405},
  doi          = {10.1109/INFOCOM.2019.8737405},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/RoohiRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/BlomST19,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa J. Teague},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  V{\'{e}}ronique Cortier and
                  Bernhard Beckert and
                  Ralf K{\"{u}}sters and
                  Uwe Serd{\"{u}}lt and
                  David Duenas{-}Cid},
  title        = {Election Manipulation with Partial Information},
  booktitle    = {Electronic Voting - 4th International Joint Conference, E-Vote-ID
                  2019, Bregenz, Austria, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11759},
  pages        = {32--49},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30625-0\_3},
  doi          = {10.1007/978-3-030-30625-0\_3},
  timestamp    = {Sun, 02 Oct 2022 16:16:57 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/BlomST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/MohantyCST19,
  author       = {Vishal Mohanty and
                  Chris Culnane and
                  Philip B. Stark and
                  Vanessa Teague},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  V{\'{e}}ronique Cortier and
                  Bernhard Beckert and
                  Ralf K{\"{u}}sters and
                  Uwe Serd{\"{u}}lt and
                  David Duenas{-}Cid},
  title        = {Auditing Indian Elections},
  booktitle    = {Electronic Voting - 4th International Joint Conference, E-Vote-ID
                  2019, Bregenz, Austria, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11759},
  pages        = {150--165},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30625-0\_10},
  doi          = {10.1007/978-3-030-30625-0\_10},
  timestamp    = {Sat, 12 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/MohantyCST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2018w,
  editor       = {Aviv Zohar and
                  Ittay Eyal and
                  Vanessa Teague and
                  Jeremy Clark and
                  Andrea Bracciali and
                  Federico Pintore and
                  Massimiliano Sala},
  title        = {Financial Cryptography and Data Security - {FC} 2018 International
                  Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March
                  2, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10958},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-662-58820-8},
  doi          = {10.1007/978-3-662-58820-8},
  isbn         = {978-3-662-58819-2},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/2018w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-03108,
  author       = {Vishal Mohanty and
                  Nicholas Akinyokun and
                  Andrew Conway and
                  Chris Culnane and
                  Philip B. Stark and
                  Vanessa Teague},
  title        = {Auditing Indian Elections},
  journal      = {CoRR},
  volume       = {abs/1901.03108},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.03108},
  eprinttype    = {arXiv},
  eprint       = {1901.03108},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-03108.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-05562,
  author       = {Leyla Roohi and
                  Benjamin I. P. Rubinstein and
                  Vanessa Teague},
  title        = {Differentially-Private Two-Party Egocentric Betweenness Centrality},
  journal      = {CoRR},
  volume       = {abs/1901.05562},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.05562},
  eprinttype    = {arXiv},
  eprint       = {1901.05562},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-05562.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-08804,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa Teague},
  title        = {Risk-Limiting Audits for {IRV} Elections},
  journal      = {CoRR},
  volume       = {abs/1903.08804},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.08804},
  eprinttype    = {arXiv},
  eprint       = {1903.08804},
  timestamp    = {Mon, 01 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-08804.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-05004,
  author       = {Chris Culnane and
                  Benjamin I. P. Rubinstein and
                  Vanessa Teague},
  title        = {Stop the Open Data Bus, We Want to Get Off},
  journal      = {CoRR},
  volume       = {abs/1908.05004},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.05004},
  eprinttype    = {arXiv},
  eprint       = {1908.05004},
  timestamp    = {Mon, 19 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-05004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/BlomST18,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa J. Teague},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  V{\'{e}}ronique Cortier and
                  Rajeev Gor{\'{e}} and
                  Manik Hapsara and
                  Uwe Serd{\"{u}}lt and
                  David Duenas{-}Cid},
  title        = {Computing the Margin of Victory in Preferential Parliamentary Elections},
  booktitle    = {Electronic Voting - Third International Joint Conference, E-Vote-ID
                  2018, Bregenz, Austria, October 2-5, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11143},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00419-4\_1},
  doi          = {10.1007/978-3-030-00419-4\_1},
  timestamp    = {Sun, 02 Oct 2022 16:16:57 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/BlomST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/BlomST18a,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa J. Teague},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  V{\'{e}}ronique Cortier and
                  Rajeev Gor{\'{e}} and
                  Manik Hapsara and
                  Uwe Serd{\"{u}}lt and
                  David Duenas{-}Cid},
  title        = {Ballot-Polling Risk Limiting Audits for {IRV} Elections},
  booktitle    = {Electronic Voting - Third International Joint Conference, E-Vote-ID
                  2018, Bregenz, Austria, October 2-5, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11143},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00419-4\_2},
  doi          = {10.1007/978-3-030-00419-4\_2},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/BlomST18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-07975,
  author       = {Chris Culnane and
                  Benjamin I. P. Rubinstein and
                  Vanessa Teague},
  title        = {Options for encoding names for data linking at the Australian Bureau
                  of Statistics},
  journal      = {CoRR},
  volume       = {abs/1802.07975},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.07975},
  eprinttype    = {arXiv},
  eprint       = {1802.07975},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-07975.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CulnanePRT18,
  author       = {Chris Culnane and
                  Olivier Pereira and
                  Kim Ramchen and
                  Vanessa Teague},
  title        = {Universally Verifiable {MPC} with Applications to {IRV} Ballot Counting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CulnanePRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BenalohRST17,
  author       = {Josh Benaloh and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {A Vote of Confidence?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {3},
  pages        = {12--13},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.53},
  doi          = {10.1109/MSP.2017.53},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BenalohRST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AkinyokunT17,
  author       = {Nicholas Akinyokun and
                  Vanessa Teague},
  title        = {Security and Privacy Implications of NFC-enabled Contactless Payment
                  Systems},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {47:1--47:10},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3103161},
  doi          = {10.1145/3098954.3103161},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AkinyokunT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/ConwayBNT17,
  author       = {Andrew Conway and
                  Michelle L. Blom and
                  Lee Naish and
                  Vanessa Teague},
  title        = {An analysis of New South Wales electronic vote counting},
  booktitle    = {Proceedings of the Australasian Computer Science Week Multiconference,
                  {ACSW} 2017, Geelong, Australia, January 31 - February 3, 2017},
  pages        = {24:1--24:5},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3014812.3014837},
  doi          = {10.1145/3014812.3014837},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsw/ConwayBNT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/CulnaneT17,
  author       = {Chris Culnane and
                  Vanessa Teague},
  editor       = {Steven Furnell and
                  Nathan L. Clarke},
  title        = {Why Open Government is good for cybersecurity and public trust - now
                  would be a good time to start},
  booktitle    = {Eleventh International Symposium on Human Aspects of Information Security
                  {\&} Assurance, {HAISA} 2017, Adelaide, Australia, November 28-30,
                  2017, Proceedings},
  pages        = {236--250},
  publisher    = {University of Plymouth},
  year         = {2017},
  url          = {http://www.cscan.org/openaccess/?paperid=367},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/CulnaneT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RoohiT17,
  author       = {Leyla Roohi and
                  Vanessa Teague},
  title        = {Privacy-Preserving Queries over Secret-Shared Graph-Structured Data},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {955--960},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.336},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.336},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RoohiT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/BernhardBHRRSTV17,
  author       = {Matthew Bernhard and
                  Josh Benaloh and
                  J. Alex Halderman and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Philip B. Stark and
                  Vanessa Teague and
                  Poorvi L. Vora and
                  Dan S. Wallach},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Nadja Braun Binder and
                  Norbert Kersting and
                  Olivier Pereira and
                  Carsten Sch{\"{u}}rmann},
  title        = {Public Evidence from Secret Ballots},
  booktitle    = {Electronic Voting - Second International Joint Conference, E-Vote-ID
                  2017, Bregenz, Austria, October 24-27, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10615},
  pages        = {84--109},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68687-5\_6},
  doi          = {10.1007/978-3-319-68687-5\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/BernhardBHRRSTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/CulnaneEET17,
  author       = {Chris Culnane and
                  Mark Eldridge and
                  Aleksander Essex and
                  Vanessa Teague},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Nadja Braun Binder and
                  Norbert Kersting and
                  Olivier Pereira and
                  Carsten Sch{\"{u}}rmann},
  title        = {Trust Implications of DDoS Protection in Online Elections},
  booktitle    = {Electronic Voting - Second International Joint Conference, E-Vote-ID
                  2017, Bregenz, Austria, October 24-27, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10615},
  pages        = {127--145},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68687-5\_8},
  doi          = {10.1007/978-3-319-68687-5\_8},
  timestamp    = {Thu, 19 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/CulnaneEET17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2017w,
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70278-0},
  doi          = {10.1007/978-3-319-70278-0},
  isbn         = {978-3-319-70277-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2017w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/voteid/2016,
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Jordi Barrat and
                  Josh Benaloh and
                  Nicole J. Goodman and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  title        = {Electronic Voting - First International Joint Conference, E-Vote-ID
                  2016, Bregenz, Austria, October 18-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10141},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52240-1},
  doi          = {10.1007/978-3-319-52240-1},
  isbn         = {978-3-319-52239-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlomST17,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa J. Teague},
  title        = {Towards Computing Victory Margins in {STV} Elections},
  journal      = {CoRR},
  volume       = {abs/1703.03511},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.03511},
  eprinttype    = {arXiv},
  eprint       = {1703.03511},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlomST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CulnaneRT17,
  author       = {Chris Culnane and
                  Benjamin I. P. Rubinstein and
                  Vanessa Teague},
  title        = {Privacy Assessment of De-identified Opal Data: {A} report for Transport
                  for {NSW}},
  journal      = {CoRR},
  volume       = {abs/1704.08547},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.08547},
  eprinttype    = {arXiv},
  eprint       = {1704.08547},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CulnaneRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BenalohBHRRSTVW17,
  author       = {Josh Benaloh and
                  Matthew Bernhard and
                  J. Alex Halderman and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Philip B. Stark and
                  Vanessa Teague and
                  Poorvi L. Vora and
                  Dan S. Wallach},
  title        = {Public Evidence from Secret Ballots},
  journal      = {CoRR},
  volume       = {abs/1707.08619},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.08619},
  eprinttype    = {arXiv},
  eprint       = {1707.08619},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BenalohBHRRSTVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-00121,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa Teague},
  title        = {Computing the Margin of Victory in Preferential Parliamentary Elections},
  journal      = {CoRR},
  volume       = {abs/1708.00121},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.00121},
  eprinttype    = {arXiv},
  eprint       = {1708.00121},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-00121.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-00991,
  author       = {Chris Culnane and
                  Mark Eldridge and
                  Aleksander Essex and
                  Vanessa Teague},
  title        = {Trust Implications of DDoS Protection in Online Elections},
  journal      = {CoRR},
  volume       = {abs/1708.00991},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.00991},
  eprinttype    = {arXiv},
  eprint       = {1708.00991},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-00991.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-00871,
  author       = {Chris Culnane and
                  Benjamin I. P. Rubinstein and
                  Vanessa Teague},
  title        = {Vulnerabilities in the use of similarity tables in combination with
                  pseudonymisation to preserve data privacy in the {UK} Office for National
                  Statistics' Privacy-Preserving Record Linkage},
  journal      = {CoRR},
  volume       = {abs/1712.00871},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.00871},
  eprinttype    = {arXiv},
  eprint       = {1712.00871},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-00871.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-05627,
  author       = {Chris Culnane and
                  Benjamin I. P. Rubinstein and
                  Vanessa Teague},
  title        = {Health Data in an Open World},
  journal      = {CoRR},
  volume       = {abs/1712.05627},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.05627},
  eprinttype    = {arXiv},
  eprint       = {1712.05627},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-05627.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/GibsonKTP16,
  author       = {J. Paul Gibson and
                  Robert Krimmer and
                  Vanessa Teague and
                  Julia Pomares},
  title        = {A review of E-voting: the past, present and future},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {71},
  number       = {7-8},
  pages        = {279--286},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12243-016-0525-8},
  doi          = {10.1007/S12243-016-0525-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/GibsonKTP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/BlomTST16,
  author       = {Michelle L. Blom and
                  Vanessa Teague and
                  Peter J. Stuckey and
                  Ron Tidhar},
  editor       = {Gal A. Kaminka and
                  Maria Fox and
                  Paolo Bouquet and
                  Eyke H{\"{u}}llermeier and
                  Virginia Dignum and
                  Frank Dignum and
                  Frank van Harmelen},
  title        = {Efficient Computation of Exact {IRV} Margins},
  booktitle    = {{ECAI} 2016 - 22nd European Conference on Artificial Intelligence,
                  29 August-2 September 2016, The Hague, The Netherlands - Including
                  Prestigious Applications of Artificial Intelligence {(PAIS} 2016)},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {285},
  pages        = {480--488},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-672-9-480},
  doi          = {10.3233/978-1-61499-672-9-480},
  timestamp    = {Tue, 02 Nov 2021 15:59:05 +0100},
  biburl       = {https://dblp.org/rec/conf/ecai/BlomTST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CulnaneT16,
  author       = {Chris Culnane and
                  Vanessa Teague},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Strategies for Voter-Initiated Election Audits},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {235--247},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_14},
  doi          = {10.1007/978-3-319-47413-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/CulnaneT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChilingirianPRB16,
  author       = {Berj Chilingirian and
                  Zara Perumal and
                  Ronald L. Rivest and
                  Grahame Bowland and
                  Andrew Conway and
                  Philip B. Stark and
                  Michelle L. Blom and
                  Chris Culnane and
                  Vanessa Teague},
  title        = {Auditing Australian Senate Ballots},
  journal      = {CoRR},
  volume       = {abs/1610.00127},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.00127},
  eprinttype    = {arXiv},
  eprint       = {1610.00127},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChilingirianPRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ConwayBNT16,
  author       = {Andrew Conway and
                  Michelle L. Blom and
                  Lee Naish and
                  Vanessa Teague},
  title        = {An analysis of New South Wales electronic vote counting},
  journal      = {CoRR},
  volume       = {abs/1611.02015},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.02015},
  eprinttype    = {arXiv},
  eprint       = {1611.02015},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ConwayBNT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BedoCRT16,
  author       = {Justin Bedo and
                  Thomas C. Conway and
                  Kim Ramchen and
                  Vanessa Teague},
  title        = {Privately Matching k-mers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {781},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/781},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BedoCRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RyanST15,
  author       = {Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {End-to-End Verifiability in Voting Systems, from Theory to Practice},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {3},
  pages        = {59--62},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.54},
  doi          = {10.1109/MSP.2015.54},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RyanST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CulnaneRST15,
  author       = {Chris Culnane and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {vVote: {A} Verifiable Voting System},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {3:1--3:30},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746338},
  doi          = {10.1145/2746338},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CulnaneRST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/HaldermanT15,
  author       = {J. Alex Halderman and
                  Vanessa Teague},
  editor       = {Rolf Haenni and
                  Reto E. Koenig and
                  Douglas Wikstr{\"{o}}m},
  title        = {The New South Wales iVote System: Security Failures and Verification
                  Flaws in a Live Online Election},
  booktitle    = {E-Voting and Identity - 5th International Conference, VoteID 2015,
                  Bern, Switzerland, September 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9269},
  pages        = {35--53},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22270-7\_3},
  doi          = {10.1007/978-3-319-22270-7\_3},
  timestamp    = {Thu, 27 Feb 2020 12:57:39 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/HaldermanT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/KulykTV15,
  author       = {Oksana Kulyk and
                  Vanessa Teague and
                  Melanie Volkamer},
  editor       = {Rolf Haenni and
                  Reto E. Koenig and
                  Douglas Wikstr{\"{o}}m},
  title        = {Extending Helios Towards Private Eligibility Verifiability},
  booktitle    = {E-Voting and Identity - 5th International Conference, VoteID 2015,
                  Bern, Switzerland, September 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9269},
  pages        = {57--73},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22270-7\_4},
  doi          = {10.1007/978-3-319-22270-7\_4},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/KulykTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BenalohRRSTV15,
  author       = {Josh Benaloh and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Philip B. Stark and
                  Vanessa Teague and
                  Poorvi L. Vora},
  title        = {End-to-end verifiability},
  journal      = {CoRR},
  volume       = {abs/1504.03778},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.03778},
  eprinttype    = {arXiv},
  eprint       = {1504.03778},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BenalohRRSTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HaldermanT15,
  author       = {J. Alex Halderman and
                  Vanessa Teague},
  title        = {The New South Wales iVote System: Security Failures and Verification
                  Flaws in a Live Online Election},
  journal      = {CoRR},
  volume       = {abs/1504.05646},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.05646},
  eprinttype    = {arXiv},
  eprint       = {1504.05646},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HaldermanT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlomSTT15,
  author       = {Michelle L. Blom and
                  Peter J. Stuckey and
                  Vanessa Teague and
                  Ron Tidhar},
  title        = {Efficient Computation of Exact {IRV} Margins},
  journal      = {CoRR},
  volume       = {abs/1508.04885},
  year         = {2015},
  url          = {http://arxiv.org/abs/1508.04885},
  eprinttype    = {arXiv},
  eprint       = {1508.04885},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlomSTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/HeatherST14,
  author       = {James Heather and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {Cryptographic protocols with everyday objects},
  journal      = {Formal Aspects Comput.},
  volume       = {26},
  number       = {1},
  pages        = {37--62},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00165-013-0274-7},
  doi          = {10.1007/S00165-013-0274-7},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/HeatherST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SchneiderTCH14,
  author       = {Steve A. Schneider and
                  Vanessa Teague and
                  Chris Culnane and
                  James Heather},
  title        = {Special Section on Vote-ID 2013},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {2},
  pages        = {103--104},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.06.002},
  doi          = {10.1016/J.JISA.2014.06.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SchneiderTCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CulnaneHJRST14,
  author       = {Chris Culnane and
                  James Heather and
                  Rui Joaquim and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {Faster Print on Demand for Pr{\^{e}}t {\`{a}} Voter},
  booktitle    = {2014 Electronic Voting Technology Workshop/Workshop on Trustworthy
                  Elections, {EVT/WOTE} '14, San Diego, CA, USA, August 18-19, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/evtwote14/workshop-program/presentation/culnane},
  timestamp    = {Mon, 01 Feb 2021 08:42:52 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CulnaneHJRST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CulnaneRST14,
  author       = {Chris Culnane and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {vVote: a Verifiable Voting System {(DRAFT)}},
  journal      = {CoRR},
  volume       = {abs/1404.6822},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.6822},
  eprinttype    = {arXiv},
  eprint       = {1404.6822},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CulnaneRST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BenalohRT13,
  author       = {Josh Benaloh and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Verifiable Postal Voting},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {54--65},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_8},
  doi          = {10.1007/978-3-642-41717-7\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BenalohRT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Teague13,
  author       = {Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {End-to-End Verifiable Postal Voting (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {66--70},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_9},
  doi          = {10.1007/978-3-642-41717-7\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Teague13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/voteid/2013,
  editor       = {James Heather and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {E-Voting and Identify - 4th International Conference, VoteID 2013,
                  Guildford, UK, July 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7985},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39185-9},
  doi          = {10.1007/978-3-642-39185-9},
  isbn         = {978-3-642-39184-2},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/BurtonCHPRSSTWX12,
  author       = {Craig Burton and
                  Chris Culnane and
                  James Heather and
                  Thea Peacock and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan and
                  Vanessa Teague and
                  Roland Wen and
                  Zhe Xia},
  editor       = {Manuel J. Kripp and
                  Melanie Volkamer and
                  R{\"{u}}diger Grimm},
  title        = {A Supervised Verifiable Voting Protocol for the Victorian Electoral
                  Commission},
  booktitle    = {5th International Conference on Electronic Voting 2012, {(EVOTE} 2012),
                  Co-organized by the Council of Europe, Gesellschaft f{\"{u}}r
                  Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz,
                  Austria},
  series       = {{LNI}},
  volume       = {{P-205}},
  pages        = {81--94},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18227},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/BurtonCHPRSSTWX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ParampalliRT12,
  author       = {Udaya Parampalli and
                  Kim Ramchen and
                  Vanessa Teague},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Efficiently Shuffling in Public},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {431--448},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_26},
  doi          = {10.1007/978-3-642-30057-8\_26},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ParampalliRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BurtonCHPRSTWXS12,
  author       = {Craig Burton and
                  Chris Culnane and
                  James Heather and
                  Thea Peacock and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague and
                  Roland Wen and
                  Zhe Xia and
                  Sriramkrishnan Srinivasan},
  editor       = {J. Alex Halderman and
                  Olivier Pereira},
  title        = {Using Pr{\^{e}}t {\`{a}} Voter in Victoria State Elections},
  booktitle    = {2012 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '12, Bellevue, WA, USA, August 6-7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/evtwote12/workshop-program/presentation/burton},
  timestamp    = {Mon, 01 Feb 2021 08:43:08 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BurtonCHPRSTWXS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/BucklandTW11,
  author       = {Richard Buckland and
                  Vanessa Teague and
                  Roland Wen},
  editor       = {Aggelos Kiayias and
                  Helger Lipmaa},
  title        = {Towards Best Practice for E-election Systems - Lessons from Trial
                  and Error in Australian Elections},
  booktitle    = {E-Voting and Identity - Third International Conference, VoteID 2011,
                  Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  pages        = {224--241},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32747-6\_14},
  doi          = {10.1007/978-3-642-32747-6\_14},
  timestamp    = {Thu, 27 Feb 2020 12:57:38 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/BucklandTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/HeatherLTW11,
  author       = {James Heather and
                  Morgan Llewellyn and
                  Vanessa Teague and
                  Roland Wen},
  editor       = {Aggelos Kiayias and
                  Helger Lipmaa},
  title        = {On the Side-Effects of Introducing E-Voting},
  booktitle    = {E-Voting and Identity - Third International Conference, VoteID 2011,
                  Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  pages        = {242--256},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32747-6\_15},
  doi          = {10.1007/978-3-642-32747-6\_15},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/HeatherLTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2011evt,
  editor       = {Hovav Shacham and
                  Vanessa Teague},
  title        = {2011 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '11, San Francisco, CA, USA, August 8-9, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/evtwote11},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2011evt.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HeatherRT10,
  author       = {James Heather and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Pretty Good Democracy for More Expressive Voting Schemes},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {405--423},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_25},
  doi          = {10.1007/978-3-642-15497-3\_25},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HeatherRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaRT10,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Virtually Perfect Democracy},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {161--166},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_24},
  doi          = {10.1007/978-3-662-45921-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BenalohMNRT09,
  author       = {Josh Benaloh and
                  Tal Moran and
                  Lee Naish and
                  Kim Ramchen and
                  Vanessa Teague},
  title        = {Shuffle-sum: coercion-resistant verifiable tallying for {STV} voting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {685--698},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033757},
  doi          = {10.1109/TIFS.2009.2033757},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BenalohMNRT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RyanT09,
  author       = {Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Pretty Good Democracy},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {111--130},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_15},
  doi          = {10.1007/978-3-642-36213-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RyanT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RyanT09,
  author       = {Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {David Jefferson and
                  Joseph Lorenzo Hall and
                  Tal Moran},
  title        = {Permutations in Pr{\^{e}}t {\`{a}} Voter},
  booktitle    = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/evtwote-09/permutations-pr\%C3\%AAt-\%C3\%A0-voter},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RyanT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TeagueRN08,
  author       = {Vanessa Teague and
                  Kim Ramchen and
                  Lee Naish},
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {Coercion-Resistant Tallying for {STV} Voting},
  booktitle    = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/evt08/tech/full\_papers/teague/teague.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TeagueRN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsc/CormanST07,
  author       = {Amy Beth Corman and
                  Peter Schachte and
                  Vanessa Teague},
  editor       = {Gillian Dobbie},
  title        = {{QUIP:} {A} Protocol For Securing Content in Peer-To-Peer Publish/Subscribe
                  Overlay Networks},
  booktitle    = {Computer Science 2007. Proceedings of the Thirtieth Australasian Computer
                  Science Conference {(ACSC2007).} Ballarat, Victoria, Australia, January
                  30 - February 2, 2007. Proceedings},
  series       = {{CRPIT}},
  volume       = {62},
  pages        = {35--40},
  publisher    = {Australian Computer Society},
  year         = {2007},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV62Corman.html},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsc/CormanST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/CormanST07,
  author       = {Amy Beth Corman and
                  Peter Schachte and
                  Vanessa Teague},
  title        = {A Secure Group Agreement {(SGA)} Protocol for Peer-to-Peer Applications},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {24--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.53},
  doi          = {10.1109/AINAW.2007.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/CormanST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cats/ColemanT07,
  author       = {Tom Coleman and
                  Vanessa Teague},
  editor       = {Joachim Gudmundsson and
                  C. Barry Jay},
  title        = {On The Complexity of Manipulating Elections},
  booktitle    = {Theory of Computing 2007. Proceedings of the Thirteenth Computing:
                  The Australasian Theory Symposium {(CATS2007).} January 30 - Febuary
                  2, 2007, Ballarat, Victoria, Australia, Proceedings},
  series       = {{CRPIT}},
  volume       = {65},
  pages        = {25--33},
  publisher    = {Australian Computer Society},
  year         = {2007},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV65Coleman.html},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cats/ColemanT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/CormanST07,
  author       = {Amy Beth Corman and
                  Peter Schachte and
                  Vanessa Teague},
  title        = {Secure random number agreement for peer-to-peer applications},
  booktitle    = {13th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2007, Hsinchu, Taiwan, December 5-7, 2007},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICPADS.2007.4447820},
  doi          = {10.1109/ICPADS.2007.4447820},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/CormanST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/MitchellRST06,
  author       = {John C. Mitchell and
                  Ajith Ramanathan and
                  Andre Scedrov and
                  Vanessa Teague},
  title        = {A probabilistic polynomial-time process calculus for the analysis
                  of cryptographic protocols},
  journal      = {Theor. Comput. Sci.},
  volume       = {353},
  number       = {1-3},
  pages        = {118--164},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2005.10.044},
  doi          = {10.1016/J.TCS.2005.10.044},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/MitchellRST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CormanDST06,
  author       = {Amy Beth Corman and
                  Scott Douglas and
                  Peter Schachte and
                  Vanessa Teague},
  title        = {A Secure Event Agreement {(SEA)} protocol for peer-to-peer games},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {34--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.15},
  doi          = {10.1109/ARES.2006.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CormanDST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0609035,
  author       = {Joseph Y. Halpern and
                  Vanessa Teague},
  title        = {Rational Secret Sharing and Multiparty Computation: Extended Abstract},
  journal      = {CoRR},
  volume       = {abs/cs/0609035},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0609035},
  eprinttype    = {arXiv},
  eprint       = {cs/0609035},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0609035.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Teague05,
  author       = {Vanessa Teague},
  title        = {Combining cryptography and game theory in distributed algorithms},
  school       = {Stanford University, {USA}},
  year         = {2005},
  url          = {https://searchworks.stanford.edu/view/5815184},
  timestamp    = {Wed, 31 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Teague05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Teague04,
  author       = {Vanessa Teague},
  editor       = {Ari Juels},
  title        = {Selecting Correlated Random Actions},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_20},
  doi          = {10.1007/978-3-540-27809-2\_20},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Teague04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/RamanathanMST04,
  author       = {Ajith Ramanathan and
                  John C. Mitchell and
                  Andre Scedrov and
                  Vanessa Teague},
  editor       = {Igor Walukiewicz},
  title        = {Probabilistic Bisimulation and Equivalence for Security Analysis of
                  Network Protocols},
  booktitle    = {Foundations of Software Science and Computation Structures, 7th International
                  Conference, {FOSSACS} 2004, Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2004, Barcelona, Spain,
                  March 29 - April 2, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2987},
  pages        = {468--483},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24727-2\_33},
  doi          = {10.1007/978-3-540-24727-2\_33},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/RamanathanMST04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/HalpernT04,
  author       = {Joseph Y. Halpern and
                  Vanessa Teague},
  editor       = {L{\'{a}}szl{\'{o}} Babai},
  title        = {Rational secret sharing and multiparty computation: extended abstract},
  booktitle    = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing,
                  Chicago, IL, USA, June 13-16, 2004},
  pages        = {623--632},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1007352.1007447},
  doi          = {10.1145/1007352.1007447},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/HalpernT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isss2/MitchellT02,
  author       = {John C. Mitchell and
                  Vanessa Teague},
  editor       = {Mitsuhiro Okada and
                  Benjamin C. Pierce and
                  Andre Scedrov and
                  Hideyuki Tokuda and
                  Akinori Yonezawa},
  title        = {Autonomous Nodes and Distributed Mechanisms},
  booktitle    = {Software Security -- Theories and Systems, Mext-NSF-JSPS International
                  Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2609},
  pages        = {58--83},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36532-X\_5},
  doi          = {10.1007/3-540-36532-X\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/isss2/MitchellT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gc/AlonTW01,
  author       = {Noga Alon and
                  Vanessa Teague and
                  Nicholas C. Wormald},
  title        = {Linear Arboricity and Linear k-Arboricity of Regular Graphs},
  journal      = {Graphs Comb.},
  volume       = {17},
  number       = {1},
  pages        = {11--16},
  year         = {2001},
  url          = {https://doi.org/10.1007/PL00007233},
  doi          = {10.1007/PL00007233},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/gc/AlonTW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/MitchellRST01,
  author       = {John C. Mitchell and
                  Ajith Ramanathan and
                  Andre Scedrov and
                  Vanessa Teague},
  title        = {Probabilistic Polynominal-Time Process Calculus and Security Protocol
                  Analysis},
  booktitle    = {16th Annual {IEEE} Symposium on Logic in Computer Science, Boston,
                  Massachusetts, USA, June 16-19, 2001, Proceedings},
  pages        = {3--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/LICS.2001.932477},
  doi          = {10.1109/LICS.2001.932477},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/MitchellRST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorT01,
  author       = {Moni Naor and
                  Vanessa Teague},
  editor       = {Jeffrey Scott Vitter and
                  Paul G. Spirakis and
                  Mihalis Yannakakis},
  title        = {Anti-presistence: history independent data structures},
  booktitle    = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing,
                  July 6-8, 2001, Heraklion, Crete, Greece},
  pages        = {492--501},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/380752.380844},
  doi          = {10.1145/380752.380844},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MitchellRST01,
  author       = {John C. Mitchell and
                  Ajith Ramanathan and
                  Andre Scedrov and
                  Vanessa Teague},
  editor       = {Stephen D. Brookes and
                  Michael W. Mislove},
  title        = {A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic
                  Protocols (Preliminary Report)},
  booktitle    = {Seventeenth Conference on the Mathematical Foundations of Programming
                  Semantics, {MFPS} 2001, Aarhus, Denmark, May 23-26, 2001},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {45},
  pages        = {280--310},
  publisher    = {Elsevier},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0661(04)80968-X},
  doi          = {10.1016/S1571-0661(04)80968-X},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/MitchellRST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorT01,
  author       = {Moni Naor and
                  Vanessa Teague},
  title        = {Anti-persistence: History Independent Data Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics