On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups KG Paterson, S Srinivasan Designs, Codes and Cryptography 52, 219-241, 2009 | 77 | 2009 |
Using pret a voter in victorian state elections C Burton, C Culnane, JA Heather, T Peacock, PYA Ryan, SA Schneider, ... 2012 Electronic Voting Technology/Workshop on Electronic Voting, ?-?, 2012 | 63 | 2012 |
A supervised verifiable voting protocol for the Victorian Electoral Commission C Burton, C Culnane, J Heather, T Peacock, P Ryan, S Schneider, ... Lecture Notes in Informatics 205, 82-95, 2012 | 41 | 2012 |
Security and anonymity of identity-based encryption with multiple trusted authorities KG Paterson, S Srinivasan Pairing-Based Cryptography–Pairing 2008: Second International Conference …, 2008 | 36 | 2008 |
Versatile Prêt à Voter: Handling multiple election methods with a unified interface Z Xia, C Culnane, J Heather, H Jonker, PYA Ryan, S Schneider, ... Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 31 | 2010 |
Focus group views on Prêt à Voter 1.0 S Schneider, M Llewellyn, C Culnane, J Heather, S Srinivasan, Z Xia 2011 International Workshop on Requirements Engineering for Electronic …, 2011 | 28 | 2011 |
Building key-private public-key encryption schemes KG Paterson, S Srinivasan Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009 | 12 | 2009 |
Countering ballot stuffing and incorporating eligibility verifiability in Helios S Srinivasan, C Culnane, J Heather, S Schneider, Z Xia Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014 | 9 | 2014 |
Testing voters' understanding of a security mechanism used in verifiable voting M Llewellyn, S Schneider, Z Xia, C Culnane, J Heather, PYA Ryan, ... 2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2013 | 8 | 2013 |
Authentication codes C Culnane, D Bismark, JA Heather, SA Schneider, S Srinivasan, Z Xia Electronic Voting Technology Workshop on Trustworthy Elections, 2011 | 8 | 2011 |
Identity based encryption: Progress and challenges S Srinivasan Information Security Technical Report 15 (1), 33-40, 2010 | 8 | 2010 |
Prêt á voter with write-ins S Schneider, S Srinivasan, C Culnane, J Heather, Z Xia E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn …, 2012 | 6 | 2012 |
Flexible and secure communications in an identity-based coalition environment KD Boklan, Z Klagsbrun, KG Paterson, S Srinivasan MILCOM 2008-2008 IEEE Military Communications Conference, 1-6, 2008 | 6 | 2008 |
New Security Notions For Identity Based Encryption S Srinivasan University of London, 2010 | 4 | 2010 |
Solving the Discrete Logarithm Problem for Packing Candidate Preferences J Heather, C Culnane, S Schneider, S Srinivasan, Z Xia Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013 | 3 | 2013 |
Analysis on token-controlled public key encryption C Lin, Y Li, S Srinivasan, L Lu 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN …, 2012 | 1 | 2012 |
Workshop program RK Long, D Johnson, A Guloy, O Yaghi, L Soderholm, W Buhro | | 2021 |
Automated Troubleshooting of Live Site Issues S Srinivasan | | 2017 |
Workshop Program GB Foyer, C Burton, C Culnane, J Heather, T Peacock, PYA Ryan, ... | | 2012 |
Using Prêt à Voter in Victorian State Elections P Ryan, S Schneider, T Peacock, J Heather, S Srinivasan, V Teague, ... Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2012 | | 2012 |