Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Peter Roenne"'
Publikováno v:
ACM Transactions on Computer-Human Interaction. 28:1-36
Internet voting can afford more inclusive and inexpensive elections. The flip side is that the integrity of the election can be compromised by adversarial attacks and malfunctioning voting infrastructure. Individual verifiability aims to protect agai
Autor:
David Duenas-Cid, Peter Roenne, Melanie Volkamer, Jurlind Budurushi, Michelle Blom, Adrià Rodríguez-Pérez, Iuliia Spycher-Krivonosova, Jordi Castellà Roca, Jordi Barrat Esteve
This open access book constitutes the proceedings of the 9th International Joint Conference on Electronic Voting, E-Vote-ID 2024, held in Tarragona, Spain, during October 2-4, 2024. The 10 full papers included in this book were carefully reviewed and
Autor:
Peter Roenne, Thomas Haines
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662639573
Financial Cryptography Workshops
Financial Cryptography Workshops
There is a difference between a system having no known attacks and the system being secure—as cryptographers know all too well. Once we begin talking about the implementations of systems this issue becomes even more prominent since the amount of ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::28f3a82c60d62d1800e2c6a3e0dd430a
https://doi.org/10.1007/978-3-662-63958-0_24
https://doi.org/10.1007/978-3-662-63958-0_24
Autor:
Dimiter Ostrev, Peter Y. A. Ryan, Najmeh Soroush, Fatima-Ezzahra El Orche, Peter Roenne, Philip B. Stark
Publikováno v:
Electronic Voting ISBN: 9783030869410
E-VOTE-ID
E-VOTE-ID
We consider elections that publish anonymised voted ballots or anonymised cast-vote records for transparency or verification purposes, investigating the implications for privacy, coercion, and vote selling and exploring how partially masking the ball
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::38ad77a03d5825a1ed91b1ee095e2618
https://doi.org/10.1007/978-3-030-86942-7_8
https://doi.org/10.1007/978-3-030-86942-7_8
Publikováno v:
Electronic Voting ISBN: 9783030306243
E-VOTE-ID
E-VOTE-ID
Many voter-verifiable, coercion-resistant schemes have been proposed, but even the most carefully designed systems necessarily leak information via the announced result. In corner cases, this may be problematic. For example, if all the votes go to on
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8cf947532ace1871090faf4c793c5306
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030453732
Public Key Cryptography (1)
Public Key Cryptography (1)
In the standard setting of functional encryption (FE), we assume both the Central Authority (CA) and the encryptors to run their respective algorithms faithfully. Badrinarayanan et al. [ASIACRYPT 2016] proposed the concept of verifiable FE, which ess
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f79ffbea0f144385fe83b54d9cb424b1
http://hdl.handle.net/11386/4771842
http://hdl.handle.net/11386/4771842
Autor:
Peter Roenne
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030437244
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7eccc6a1e4f9fa554e531c4b0fd2f1cc
https://doi.org/10.1007/978-3-030-43725-1
https://doi.org/10.1007/978-3-030-43725-1
Publikováno v:
The Journal of Engineering. 2018:824-829
The short-circuit response of a voltage source converter (VSC) can vary from each other significantly with different control strategies. This study investigates the performance of distance protection under unbalanced faults considering two control st
Autor:
Carine Lallemand, Peter Y. A. Ryan, Vincent Koenig, Peter Roenne, Verena Distler, Marie-Laure Zollinger
Publikováno v:
CHI
An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or blackboxed away from the user for the sake of usability. However, tying this question to pragmatic usability factors only might be simplisti
Autor:
Peter Y. A. Ryan, Yong Geng, Gabriele Lenzini, Jan P. F. Lagerwall, Peter Roenne, Samir Ouchani, JungHyun Noh
Publikováno v:
WIFS
We describe the application in security of shells of Cholesteric Liquid Crystals (ChLCs). Such shells have a diameter in the microns range and can be gathered in hundreds in a surface area as small as a nail's head. Because of their structural proper