On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups KG Paterson, S Srinivasan Designs, Codes and Cryptography 52, 219-241, 2009 | 81 | 2009 |
Using Prêt à Voter in Victoria State Elections. C Burton, C Culnane, J Heather, T Peacock, PYA Ryan, SA Schneider, ... EVT/WOTE 2, 2012 | 64 | 2012 |
A supervised verifiable voting protocol for the Victorian Electoral Commission C Burton, C Culane, J Heather, T Peacock, PYA Ryan, S Schneider, ... Gesellschaft für Informatik eV, 2012 | 42 | 2012 |
Security and anonymity of identity-based encryption with multiple trusted authorities KG Paterson, S Srinivasan Pairing-Based Cryptography–Pairing 2008: Second International Conference …, 2008 | 40 | 2008 |
Focus group views on Prêt à Voter 1.0 S Schneider, M Llewellyn, C Culnane, J Heather, S Srinivasan, Z Xia 2011 International Workshop on Requirements Engineering for Electronic …, 2011 | 33 | 2011 |
Versatile Prêt à Voter: Handling multiple election methods with a unified interface Z Xia, C Culnane, J Heather, H Jonker, PYA Ryan, S Schneider, ... Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 30 | 2010 |
Building key-private public-key encryption schemes KG Paterson, S Srinivasan Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009 | 14 | 2009 |
Testing voters' understanding of a security mechanism used in verifiable voting M Llewellyn, S Schneider, Z Xia, C Culnane, J Heather, PYA Ryan, ... 2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2013 | 9 | 2013 |
Identity based encryption: Progress and challenges S Srinivasan Information Security Technical Report 15 (1), 33-40, 2010 | 8 | 2010 |
Countering ballot stuffing and incorporating eligibility verifiability in Helios S Srinivasan, C Culnane, J Heather, S Schneider, Z Xia Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014 | 7 | 2014 |
Prêt á voter with write-ins S Schneider, S Srinivasan, C Culnane, J Heather, Z Xia E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn …, 2012 | 6 | 2012 |
Authentication codes C Culnane, D Bismark, J Heather, S Schneider, S Srinivasan, Z Xia 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2011 | 6 | 2011 |
Flexible and secure communications in an identity-based coalition environment KD Boklan, Z Klagsbrun, KG Paterson, S Srinivasan MILCOM 2008-2008 IEEE Military Communications Conference, 1-6, 2008 | 6 | 2008 |
Solving the discrete logarithm problem for packing candidate preferences J Heather, C Culnane, S Schneider, S Srinivasan, Z Xia Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013 | 4 | 2013 |
New Security Notions For Identity Based Encryption S Srinivasan University of London, 2010 | 4 | 2010 |
Analysis on token-controlled public key encryption C Lin, Y Li, S Srinivasan, L Lu 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN …, 2012 | 1 | 2012 |
Workshop program RK Long, D Johnson, A Guloy, O Yaghi, L Soderholm, W Buhro | | 2021 |
Automated Troubleshooting of Live Site Issues S Srinivasan | | 2017 |
Workshop Program GB Foyer, C Burton, C Culnane, J Heather, T Peacock, PYA Ryan, ... | | 2012 |
Using Prêt à Voter in Victorian State Elections P Ryan, S Schneider, T Peacock, J Heather, S Srinivasan, V Teague, ... Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2012 | | 2012 |