On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups KG Paterson, S Srinivasan Designs, Codes and Cryptography 52 (2), 219-241, 2009 | 75 | 2009 |
Using pret a voter in victorian state elections C Burton, C Culnane, JA Heather, T Peacock, PYA Ryan, SA Schneider, ... 2012 Electronic Voting Technology/Workshop on Electronic Voting, ?-?, 2012 | 58 | 2012 |
A supervised verifiable voting protocol for the Victorian Electoral Commission C Burton, C Culnane, J Heather, T Peacock, P Ryan, S Schneider, ... Lecture Notes in Informatics 205, 82-95, 2012 | 38 | 2012 |
Security and anonymity of identity-based encryption with multiple trusted authorities KG Paterson, S Srinivasan International Conference on Pairing-Based Cryptography, 354-375, 2008 | 34 | 2008 |
Versatile Prêt à Voter: Handling multiple election methods with a unified interface Z Xia, C Culnane, J Heather, H Jonker, PYA Ryan, S Schneider, ... International Conference on Cryptology in India, 98-114, 2010 | 28 | 2010 |
Focus group views on Prêt à Voter 1.0 S Schneider, M Llewellyn, C Culnane, J Heather, S Srinivasan, Z Xia 2011 International Workshop on Requirements Engineering for Electronic …, 2011 | 26 | 2011 |
Building key-private public-key encryption schemes KG Paterson, S Srinivasan Australasian Conference on Information Security and Privacy, 276-292, 2009 | 12 | 2009 |
Identity based encryption: Progress and challenges S Srinivasan Information Security Technical Report 15 (1), 33-40, 2010 | 10 | 2010 |
Testing voters' understanding of a security mechanism used in verifiable voting M Llewellyn, S Schneider, Z Xia, C Culnane, J Heather, PYA Ryan, ... 2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2013 | 8 | 2013 |
Countering ballot stuffing and incorporating eligibility verifiability in Helios S Srinivasan, C Culnane, J Heather, S Schneider, Z Xia International Conference on Network and System Security, 335-348, 2015 | 7 | 2015 |
Prêt á Voter with write-ins S Schneider, S Srinivasan, C Culnane, J Heather, Z Xia International Conference on E-Voting and Identity, 174-189, 2011 | 6 | 2011 |
Authentication codes C Culnane, D Bismark, J Heather, S Schneider, S Srinivasan, Z Xia 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2011 | 6 | 2011 |
Flexible and secure communications in an identity-based coalition environment KD Boklan, Z Klagsbrun, KG Paterson, S Srinivasan MILCOM 2008-2008 IEEE Military Communications Conference, 1-6, 2008 | 6 | 2008 |
New Security Notions For Identity Based Encryption S Srinivasan University of London, 2010 | 4 | 2010 |
Analysis on token-controlled public key encryption C Lin, Y Li, S Srinivasan, L Lu 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN …, 2012 | 1 | 2012 |
Automated Troubleshooting of Live Site Issues S Srinivasan | | 2017 |
Solving the Discrete Logarithm Problem for Packing Candidate Preferences J Heather, C Culnane, S Schneider, S Srinivasan, Z Xia International Conference on Availability, Reliability, and Security, 209-221, 2013 | | 2013 |
Workshop Program E Foner | | 2012 |
Using Prêt à Voter in Victorian State Elections P Ryan, S Schneider, T Peacock, J Heather, S Srinivasan, V Teague, ... Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2012 | | 2012 |
Trustworthy Voting Systems Technical Report: System Design C Culnane, J Heather, S Schneider, S Srinivasan, Z Xia Department of Computing, University of Surrey, 2010 | | 2010 |