CHVote - Sixteen Best Practices and Lessons Learned. | 0 | 0.34 | 2020 |
Performance of Shuffling - Taking It to the Limits. | 1 | 0.35 | 2020 |
Improving the Performance of Cryptographic Voting Protocols. | 0 | 0.34 | 2019 |
Process Models for Universally Verifiable Elections. | 0 | 0.34 | 2018 |
Outsourcing Modular Exponentiation in Cryptographic Web Applications. | 0 | 0.34 | 2018 |
Modeling a Bulletin Board Service Based on Broadcast Channels with Memory. | 0 | 0.34 | 2018 |
CHVote System Specification. | 0 | 0.34 | 2017 |
Pseudo-Code Algorithms for Verifiable Re-encryption Mix-Nets. | 1 | 0.41 | 2017 |
Cast-as-Intended Verification in Electronic Elections Based on Oblivious Transfer. | 0 | 0.34 | 2016 |
A Generic Interface for the Public Bulletin Board Used in UniVote | 0 | 0.34 | 2016 |
Receipt-free remote electronic elections with everlasting privacy. | 2 | 0.37 | 2016 |
Coercion-Resistant Internet Voting with Everlasting Privacy. | 6 | 0.42 | 2016 |
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. | 0 | 0.34 | 2015 |
Verifiable Internet Elections with Everlasting Privacy and Minimal Trust | 5 | 0.51 | 2015 |
A Lightweight Implementation of a Shuffle Proof for Electronic Voting Systems. | 2 | 0.45 | 2014 |
Verifizierbare Internet-Wahlen an Schweizer Hochschulen mit UniVote. | 1 | 0.36 | 2013 |
Attacking the verification code mechanism in the norwegian internet voting system | 3 | 0.40 | 2013 |
A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes | 7 | 0.42 | 2013 |
How to Store some Secrets. | 2 | 0.36 | 2012 |
Achieving Meaningful Efficiency in Coercion-Resistant, Verifiable Internet Voting. | 3 | 0.38 | 2012 |
Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes. | 10 | 0.58 | 2011 |
Efficient vote authorization in coercion-resistant internet voting | 9 | 0.48 | 2011 |
Secure internet voting on limited devices with anonymized DSA public keys | 8 | 0.49 | 2011 |
A new approach towards coercion-resistant remote e-voting in linear time | 27 | 0.80 | 2011 |
Compiling Possibilistic Networks: Alternative Approaches to Possibilistic Inference | 13 | 0.72 | 2010 |
A novel protocol to allow revocation of votes a hybrid voting system | 2 | 0.37 | 2010 |
Coercion-Resistant Hybrid Voting Systems | 4 | 0.41 | 2010 |
Why Public Registration Boards are Required in E-Voting Systems Based on Threshold Blind Signature Protocols | 1 | 0.35 | 2010 |
Combining Probability and Logic | 1 | 0.37 | 2009 |
Probabilistic argumentation | 3 | 0.41 | 2009 |
A Trust Evaluation Method Based on Logic and Probability Theory. | 2 | 0.38 | 2008 |
Logical Compilation of Bayesian Networks with Discrete Variables | 5 | 0.57 | 2007 |
Compiling solution configurations in semiring valuation systems | 0 | 0.34 | 2007 |
A New Model for Public-Key Authentication | 1 | 0.36 | 2007 |
Optimizing inference in Bayesian networks and semiring valuation algebras | 0 | 0.34 | 2007 |
Multi-state Directed Acyclic Graphs | 6 | 0.59 | 2007 |
Modeling partially reliable information sources: A general approach based on Dempster-Shafer theory | 13 | 0.85 | 2006 |
Implementing Credential Networks | 3 | 0.50 | 2006 |
Special Issue of Minds and Machines on Causality, Uncertainty and Ignorance | 1 | 0.42 | 2006 |
Towards a precise semantics for authenticity and trust | 0 | 0.34 | 2006 |
Uncover Dempster'S Rule Where It Is Hidden | 3 | 0.46 | 2006 |
Propositional DAGs: A New Graph-Based Language for Representing Boolean Functions | 15 | 0.75 | 2006 |
Unifying logical and probabilistic reasoning | 5 | 0.52 | 2005 |
Towards A Unifying Theory Of Logical And Probabilistic Reasoning | 12 | 0.80 | 2005 |
Credential Networks: a General Model for Distributed Trust and Authenticity Management | 8 | 0.60 | 2005 |
Using probabilistic argumentation for key validation in public-key cryptography | 9 | 0.51 | 2005 |
Ordered valuation algebras: a generic framework for approximating inference | 7 | 0.61 | 2004 |
Probabilistic Argumentation Systems: A New Perspective On The Dempster-Shafer Theory | 18 | 1.65 | 2003 |
Anytime argumentative and abductive reasoning | 6 | 0.47 | 2003 |
Web of Trust: Applying Probabilistic Argumentation to Public-Key Cryptography | 2 | 0.38 | 2003 |