default search action
Vanessa Teague
Person information
- affiliation: University of Melbourne, School of Computing and Information Systems, Australia
- affiliation (former): Stanford University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - [c60]Michelle L. Blom, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
RLAs for 2-Seat STV Elections: Revisited. FC Workshops 2024: 3-17 - [e9]Qiang Tang, Vanessa Teague:
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14601, Springer 2024, ISBN 978-3-031-57720-8 [contents] - [e8]Qiang Tang, Vanessa Teague:
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14602, Springer 2024, ISBN 978-3-031-57721-5 [contents] - [e7]Qiang Tang, Vanessa Teague:
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14603, Springer 2024, ISBN 978-3-031-57724-6 [contents] - [e6]Qiang Tang, Vanessa Teague:
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 14604, Springer 2024, ISBN 978-3-031-57727-7 [contents] - [i41]Michelle L. Blom, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
RLAs for 2-Seat STV Elections: Revisited. CoRR abs/2402.03707 (2024) - [i40]Andrew Conway, Michelle L. Blom, Alexander Ek, Peter J. Stuckey, Vanessa J. Teague, Damjan Vukcevic:
Idiosyncratic properties of Australian STV election counting. CoRR abs/2409.11627 (2024) - [i39]Chris Culnane, Andrew Conway, Vanessa Teague, Ty Wilson-Brown:
Security analysis of the Australian Capital Territory's eVACS 2020/2024 paperless direct recording electronic voting system. CoRR abs/2409.13570 (2024) - [i38]Ben Adida, John Caron, Arash Mirzaei, Vanessa Teague:
MERGE: Matching Electronic Results with Genuine Evidence for verifiable voting in person at remote locations. CoRR abs/2410.06705 (2024) - 2023
- [c59]Vanessa Teague:
Democratizing election verification: new methods for addressing an ancient attacker model. AsiaCCS 2023: 552 - [c58]Michelle L. Blom, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Risk-Limiting Audits for Condorcet Elections. FC Workshops 2023: 79-94 - [i37]Michelle L. Blom, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Risk-Limiting Audits for Condorcet Elections. CoRR abs/2303.10509 (2023) - 2022
- [j13]Amy Beth Corman, Rachel Canaway, Chris Culnane, Vanessa Teague:
Public comprehension of privacy protections applied to health data shared for research: An Australian cross-sectional study. Int. J. Medical Informatics 167: 104859 (2022) - [c57]Floyd Everest, Michelle L. Blom, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree Model. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 525-540 - [c56]Thomas Haines, Olivier Pereira, Vanessa Teague:
Running the Race: A Swiss Voting Story. E-Vote-ID 2022: 53-69 - [c55]Michelle L. Blom, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
A First Approach to Risk-Limiting Audits for Single Transferable Vote Elections. Financial Cryptography Workshops 2022: 366-380 - [i36]Michelle L. Blom, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Assessing the accuracy of the Australian Senate count: Key steps for a rigorous and transparent audit. CoRR abs/2205.14634 (2022) - [i35]Floyd Everest, Michelle L. Blom, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Auditing Ranked Voting Elections with Dirichlet-Tree Models: First Steps. CoRR abs/2206.14605 (2022) - [i34]Floyd Everest, Michelle L. Blom, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree Model. CoRR abs/2209.03881 (2022) - [i33]Aggelos Kiayias, Vanessa Teague, Orfeas Stefanos Thyfronitis Litos:
Privacy Preserving Opinion Aggregation. IACR Cryptol. ePrint Arch. 2022: 760 (2022) - 2021
- [j12]Josh Benaloh, Kammi Foote, Philip B. Stark, Vanessa Teague, Dan S. Wallach:
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot. IEEE Secur. Priv. 19(4): 8-18 (2021) - [c54]Vanessa Teague:
Which E-Voting Problems Do We Need to Solve? CRYPTO (1) 2021: 3-7 - [c53]Michelle L. Blom, Jurlind Budurushi, Ronald L. Rivest, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Assertion-Based Approaches to Auditing Complex Elections, with Application to Party-List Proportional Elections. E-VOTE-ID 2021: 47-62 - [c52]Michelle L. Blom, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Auditing Hamiltonian Elections. Financial Cryptography Workshops 2021: 235-250 - [i32]Michelle L. Blom, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Auditing Hamiltonian Elections. CoRR abs/2102.08510 (2021) - [i31]Michelle L. Blom, Jurlind Budurushi, Ronald L. Rivest, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Assertion-based Approaches to Auditing Complex Elections, with application to party-list proportional elections. CoRR abs/2107.11903 (2021) - [i30]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021) - [i29]Eleanor McMurtry, Xavier Boyen, Chris Culnane, Kristian Gjøsteen, Thomas Haines, Vanessa Teague:
Towards Verifiable Remote Voting with Paper Assurance. CoRR abs/2111.04210 (2021) - [i28]Michelle L. Blom, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
A First Approach to Risk-Limiting Audits for Single Transferable Vote Elections. CoRR abs/2112.09921 (2021) - 2020
- [c51]Michelle L. Blom, Andrew Conway, Peter J. Stuckey, Vanessa J. Teague:
Did That Lost Ballot Box Cost Me a Seat? Computing Manipulations of STV Elections. AAAI 2020: 13235-13240 - [c50]Eleanor McMurtry, Olivier Pereira, Vanessa Teague:
When Is a Test Not a Proof? ESORICS (2) 2020: 23-41 - [c49]Michelle L. Blom, Andrew Conway, Peter J. Stuckey, Vanessa J. Teague:
Shifting the Balance-of-Power in STV Elections. E-VOTE-ID 2020: 1-18 - [c48]Michelle L. Blom, Andrew Conway, Peter J. Stuckey, Vanessa J. Teague, Damjan Vukcevic:
Random Errors Are Not Necessarily Politically Neutral. E-VOTE-ID 2020: 19-35 - [c47]Zhuoqun Huang, Ronald L. Rivest, Philip B. Stark, Vanessa J. Teague, Damjan Vukcevic:
A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods. E-VOTE-ID 2020: 112-128 - [c46]Leyla Roohi, Benjamin I. P. Rubinstein, Vanessa Teague:
Assessing Centrality Without Knowing Connections. PAKDD (2) 2020: 152-163 - [c45]Thomas Haines, Sarah Jamie Lewis, Olivier Pereira, Vanessa Teague:
How not to prove your election outcome. SP 2020: 644-660 - [c44]Vanessa Teague:
When Is a Proof Actually Not? WOOT @ USENIX Security Symposium 2020 - [i27]Michelle L. Blom, Andrew Conway, Dan King, Laurent Sandrolini, Philip B. Stark, Peter J. Stuckey, Vanessa Teague:
You can do RLAs for IRV. CoRR abs/2004.00235 (2020) - [i26]Leyla Roohi, Benjamin I. P. Rubinstein, Vanessa Teague:
Assessing Centrality Without Knowing Connections. CoRR abs/2005.13787 (2020) - [i25]Michelle L. Blom, Andrew Conway, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Random errors are not politically neutral. CoRR abs/2007.00854 (2020) - [i24]Zhuoqun Huang, Ronald L. Rivest, Philip B. Stark, Vanessa Teague, Damjan Vukcevic:
A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods. CoRR abs/2008.08536 (2020) - [i23]Eleanor McMurtry, Olivier Pereira, Vanessa Teague:
When is a test not a proof? IACR Cryptol. ePrint Arch. 2020: 909 (2020)
2010 – 2019
- 2019
- [j11]Chris Culnane, Aleksander Essex, Sarah Jamie Lewis, Olivier Pereira, Vanessa Teague:
Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud. IEEE Secur. Priv. 17(4): 62-70 (2019) - [j10]Michelle L. Blom, Peter J. Stuckey, Vanessa J. Teague:
Toward Computing the Margin of Victory in Single Transferable Vote Elections. INFORMS J. Comput. 31(4): 636-653 (2019) - [c43]Nicholas Akinyokun, Vanessa Teague:
Receipt-Free, Universally and Individually Verifiable Poll Attendance. ACSW 2019: 5:1-5:10 - [c42]Michelle L. Blom, Peter J. Stuckey, Vanessa J. Teague:
Election Manipulation 100. Financial Cryptography Workshops 2019: 211-225 - [c41]Kim Ramchen, Chris Culnane, Olivier Pereira, Vanessa Teague:
Universally Verifiable MPC and IRV Ballot Counting. Financial Cryptography 2019: 301-319 - [c40]Leyla Roohi, Benjamin I. P. Rubinstein, Vanessa Teague:
Differentially-Private Two-Party Egocentric Betweenness Centrality. INFOCOM 2019: 2233-2241 - [c39]Michelle L. Blom, Peter J. Stuckey, Vanessa J. Teague:
Election Manipulation with Partial Information. E-VOTE-ID 2019: 32-49 - [c38]Vishal Mohanty, Chris Culnane, Philip B. Stark, Vanessa Teague:
Auditing Indian Elections. E-VOTE-ID 2019: 150-165 - [e5]Aviv Zohar, Ittay Eyal, Vanessa Teague, Jeremy Clark, Andrea Bracciali, Federico Pintore, Massimiliano Sala:
Financial Cryptography and Data Security - FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers. Lecture Notes in Computer Science 10958, Springer 2019, ISBN 978-3-662-58819-2 [contents] - [i22]Vishal Mohanty, Nicholas Akinyokun, Andrew Conway, Chris Culnane, Philip B. Stark, Vanessa Teague:
Auditing Indian Elections. CoRR abs/1901.03108 (2019) - [i21]Leyla Roohi, Benjamin I. P. Rubinstein, Vanessa Teague:
Differentially-Private Two-Party Egocentric Betweenness Centrality. CoRR abs/1901.05562 (2019) - [i20]Michelle L. Blom, Peter J. Stuckey, Vanessa Teague:
Risk-Limiting Audits for IRV Elections. CoRR abs/1903.08804 (2019) - [i19]Chris Culnane, Benjamin I. P. Rubinstein, Vanessa Teague:
Stop the Open Data Bus, We Want to Get Off. CoRR abs/1908.05004 (2019) - 2018
- [c37]Michelle L. Blom, Peter J. Stuckey, Vanessa J. Teague:
Computing the Margin of Victory in Preferential Parliamentary Elections. E-Vote-ID 2018: 1-16 - [c36]Michelle L. Blom, Peter J. Stuckey, Vanessa J. Teague:
Ballot-Polling Risk Limiting Audits for IRV Elections. E-Vote-ID 2018: 17-34 - [i18]Chris Culnane, Benjamin I. P. Rubinstein, Vanessa Teague:
Options for encoding names for data linking at the Australian Bureau of Statistics. CoRR abs/1802.07975 (2018) - [i17]Chris Culnane, Olivier Pereira, Kim Ramchen, Vanessa Teague:
Universally Verifiable MPC with Applications to IRV Ballot Counting. IACR Cryptol. ePrint Arch. 2018: 246 (2018) - 2017
- [j9]Josh Benaloh, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
A Vote of Confidence? IEEE Secur. Priv. 15(3): 12-13 (2017) - [c35]Nicholas Akinyokun, Vanessa Teague:
Security and Privacy Implications of NFC-enabled Contactless Payment Systems. ARES 2017: 47:1-47:10 - [c34]Andrew Conway, Michelle L. Blom, Lee Naish, Vanessa Teague:
An analysis of New South Wales electronic vote counting. ACSW 2017: 24:1-24:5 - [c33]Chris Culnane, Vanessa Teague:
Why Open Government is good for cybersecurity and public trust - now would be a good time to start. HAISA 2017: 236-250 - [c32]Leyla Roohi, Vanessa Teague:
Privacy-Preserving Queries over Secret-Shared Graph-Structured Data. TrustCom/BigDataSE/ICESS 2017: 955-960 - [c31]Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. E-VOTE-ID 2017: 84-109 - [c30]Chris Culnane, Mark Eldridge, Aleksander Essex, Vanessa Teague:
Trust Implications of DDoS Protection in Online Elections. E-VOTE-ID 2017: 127-145 - [e4]Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, Markus Jakobsson:
Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10323, Springer 2017, ISBN 978-3-319-70277-3 [contents] - [e3]Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole J. Goodman, Peter Y. A. Ryan, Vanessa Teague:
Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Lecture Notes in Computer Science 10141, Springer 2017, ISBN 978-3-319-52239-5 [contents] - [i16]Michelle L. Blom, Peter J. Stuckey, Vanessa J. Teague:
Towards Computing Victory Margins in STV Elections. CoRR abs/1703.03511 (2017) - [i15]Chris Culnane, Benjamin I. P. Rubinstein, Vanessa Teague:
Privacy Assessment of De-identified Opal Data: A report for Transport for NSW. CoRR abs/1704.08547 (2017) - [i14]Josh Benaloh, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. CoRR abs/1707.08619 (2017) - [i13]Michelle L. Blom, Peter J. Stuckey, Vanessa Teague:
Computing the Margin of Victory in Preferential Parliamentary Elections. CoRR abs/1708.00121 (2017) - [i12]Chris Culnane, Mark Eldridge, Aleksander Essex, Vanessa Teague:
Trust Implications of DDoS Protection in Online Elections. CoRR abs/1708.00991 (2017) - [i11]Chris Culnane, Benjamin I. P. Rubinstein, Vanessa Teague:
Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the UK Office for National Statistics' Privacy-Preserving Record Linkage. CoRR abs/1712.00871 (2017) - [i10]Chris Culnane, Benjamin I. P. Rubinstein, Vanessa Teague:
Health Data in an Open World. CoRR abs/1712.05627 (2017) - 2016
- [j8]J. Paul Gibson, Robert Krimmer, Vanessa Teague, Julia Pomares:
A review of E-voting: the past, present and future. Ann. des Télécommunications 71(7-8): 279-286 (2016) - [c29]Michelle L. Blom, Vanessa Teague, Peter J. Stuckey, Ron Tidhar:
Efficient Computation of Exact IRV Margins. ECAI 2016: 480-488 - [c28]Chris Culnane, Vanessa Teague:
Strategies for Voter-Initiated Election Audits. GameSec 2016: 235-247 - [i9]Berj Chilingirian, Zara Perumal, Ronald L. Rivest, Grahame Bowland, Andrew Conway, Philip B. Stark, Michelle L. Blom, Chris Culnane, Vanessa Teague:
Auditing Australian Senate Ballots. CoRR abs/1610.00127 (2016) - [i8]Andrew Conway, Michelle L. Blom, Lee Naish, Vanessa Teague:
An analysis of New South Wales electronic vote counting. CoRR abs/1611.02015 (2016) - [i7]Justin Bedo, Thomas C. Conway, Kim Ramchen, Vanessa Teague:
Privately Matching k-mers. IACR Cryptol. ePrint Arch. 2016: 781 (2016) - 2015
- [j7]Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
End-to-End Verifiability in Voting Systems, from Theory to Practice. IEEE Secur. Priv. 13(3): 59-62 (2015) - [j6]Chris Culnane, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
vVote: A Verifiable Voting System. ACM Trans. Inf. Syst. Secur. 18(1): 3:1-3:30 (2015) - [c27]J. Alex Halderman, Vanessa Teague:
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. VoteID 2015: 35-53 - [c26]Oksana Kulyk, Vanessa Teague, Melanie Volkamer:
Extending Helios Towards Private Eligibility Verifiability. VoteID 2015: 57-73 - [i6]Josh Benaloh, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora:
End-to-end verifiability. CoRR abs/1504.03778 (2015) - [i5]J. Alex Halderman, Vanessa Teague:
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. CoRR abs/1504.05646 (2015) - [i4]Michelle L. Blom, Peter J. Stuckey, Vanessa Teague, Ron Tidhar:
Efficient Computation of Exact IRV Margins. CoRR abs/1508.04885 (2015) - 2014
- [j5]James Heather, Steve A. Schneider, Vanessa Teague:
Cryptographic protocols with everyday objects. Formal Aspects Comput. 26(1): 37-62 (2014) - [j4]Steve A. Schneider, Vanessa Teague, Chris Culnane, James Heather:
Special Section on Vote-ID 2013. J. Inf. Secur. Appl. 19(2): 103-104 (2014) - [c25]Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
Faster Print on Demand for Prêt à Voter. EVT/WOTE 2014 - [i3]Chris Culnane, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
vVote: a Verifiable Voting System (DRAFT). CoRR abs/1404.6822 (2014) - 2013
- [c24]Josh Benaloh, Peter Y. A. Ryan, Vanessa Teague:
Verifiable Postal Voting. Security Protocols Workshop 2013: 54-65 - [c23]Vanessa Teague:
End-to-End Verifiable Postal Voting (Transcript of Discussion). Security Protocols Workshop 2013: 66-70 - [e2]James Heather, Steve A. Schneider, Vanessa Teague:
E-Voting and Identify - 4th International Conference, VoteID 2013, Guildford, UK, July 17-19, 2013. Proceedings. Lecture Notes in Computer Science 7985, Springer 2013, ISBN 978-3-642-39184-2 [contents] - 2012
- [c22]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan, Vanessa Teague, Roland Wen, Zhe Xia:
A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. Electronic Voting 2012: 81-94 - [c21]Udaya Parampalli, Kim Ramchen, Vanessa Teague:
Efficiently Shuffling in Public. Public Key Cryptography 2012: 431-448 - [c20]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague, Roland Wen, Zhe Xia, Sriramkrishnan Srinivasan:
Using Prêt à Voter in Victoria State Elections. EVT/WOTE 2012 - 2011
- [c19]Richard Buckland, Vanessa Teague, Roland Wen:
Towards Best Practice for E-election Systems - Lessons from Trial and Error in Australian Elections. VoteID 2011: 224-241 - [c18]James Heather, Morgan Llewellyn, Vanessa Teague, Roland Wen:
On the Side-Effects of Introducing E-Voting. VoteID 2011: 242-256 - [e1]Hovav Shacham, Vanessa Teague:
2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '11, San Francisco, CA, USA, August 8-9, 2011. USENIX Association 2011 [contents] - 2010
- [c17]James Heather, Peter Y. A. Ryan, Vanessa Teague:
Pretty Good Democracy for More Expressive Voting Schemes. ESORICS 2010: 405-423 - [c16]Giampaolo Bella, Peter Y. A. Ryan, Vanessa Teague:
Virtually Perfect Democracy. Security Protocols Workshop 2010: 161-166
2000 – 2009
- 2009
- [j3]Josh Benaloh, Tal Moran, Lee Naish, Kim Ramchen, Vanessa Teague:
Shuffle-sum: coercion-resistant verifiable tallying for STV voting. IEEE Trans. Inf. Forensics Secur. 4(4): 685-698 (2009) - [c15]Peter Y. A. Ryan, Vanessa Teague:
Pretty Good Democracy. Security Protocols Workshop 2009: 111-130 - [c14]Peter Y. A. Ryan, Vanessa Teague:
Permutations in Prêt à Voter. EVT/WOTE 2009 - 2008
- [c13]Vanessa Teague, Kim Ramchen, Lee Naish:
Coercion-Resistant Tallying for STV Voting. EVT 2008 - 2007
- [c12]Amy Beth Corman, Peter Schachte, Vanessa Teague:
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks. ACSC 2007: 35-40 - [c11]Amy Beth Corman, Peter Schachte, Vanessa Teague:
A Secure Group Agreement (SGA) Protocol for Peer-to-Peer Applications. AINA Workshops (1) 2007: 24-29 - [c10]Tom Coleman, Vanessa Teague:
On The Complexity of Manipulating Elections. CATS 2007: 25-33 - [c9]Amy Beth Corman, Peter Schachte, Vanessa Teague:
Secure random number agreement for peer-to-peer applications. ICPADS 2007: 1-8 - 2006
- [j2]John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague:
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theor. Comput. Sci. 353(1-3): 118-164 (2006) - [c8]Amy Beth Corman, Scott Douglas, Peter Schachte, Vanessa Teague:
A Secure Event Agreement (SEA) protocol for peer-to-peer games. ARES 2006: 34-41 - [i2]Joseph Y. Halpern, Vanessa Teague:
Rational Secret Sharing and Multiparty Computation: Extended Abstract. CoRR abs/cs/0609035 (2006) - 2005
- [b1]Vanessa Teague:
Combining cryptography and game theory in distributed algorithms. Stanford University, USA, 2005 - 2004
- [c7]Vanessa Teague:
Selecting Correlated Random Actions. Financial Cryptography 2004: 181-195 - [c6]Ajith Ramanathan, John C. Mitchell, Andre Scedrov, Vanessa Teague:
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. FoSSaCS 2004: 468-483 - [c5]Joseph Y. Halpern, Vanessa Teague:
Rational secret sharing and multiparty computation: extended abstract. STOC 2004: 623-632 - 2002
- [c4]John C. Mitchell, Vanessa Teague:
Autonomous Nodes and Distributed Mechanisms. ISSS 2002: 58-83 - 2001
- [j1]Noga Alon, Vanessa Teague, Nicholas C. Wormald:
Linear Arboricity and Linear k-Arboricity of Regular Graphs. Graphs Comb. 17(1): 11-16 (2001) - [c3]John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague:
Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis. LICS 2001: 3-5 - [c2]Moni Naor, Vanessa Teague:
Anti-presistence: history independent data structures. STOC 2001: 492-501 - [c1]John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague:
A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report). MFPS 2001: 280-310 - [i1]Moni Naor, Vanessa Teague:
Anti-persistence: History Independent Data Structures. IACR Cryptol. ePrint Arch. 2001: 36 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint