Aleksander Essex

Orcid: 0000-0002-0228-0371

According to our database1, Aleksander Essex authored at least 41 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure similar patients query with homomorphically evaluated thresholds.
J. Inf. Secur. Appl., 2024

2023
Secure Function Extensions to Additively Homomorphic Cryptosystems.
IACR Cryptol. ePrint Arch., 2023

Verifiability Experiences in Ontario's 2022 Online Elections.
Proceedings of the Electronic Voting: 8th International Joint Conference, 2023

Online Voting in Ontario Municipalities: A Standards-Based Review.
Proceedings of the Electronic Voting: 8th International Joint Conference, 2023

2022
Review Your Choices: When Confirmation Pages Break Ballot Secrecy in Online Elections.
Proceedings of the Electronic Voting - 7th International Joint Conference, 2022

2021
A Security and Privacy Scoring System for Contact Tracing Apps.
J. Cybersecur. Priv., October, 2021

2020
Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review.
CoRR, 2020

2019
Secure Approximate String Matching for Privacy-Preserving Record Linkage.
IEEE Trans. Inf. Forensics Secur., 2019

Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud.
IEEE Secur. Priv., 2019

Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection.
Comput. Networks, 2019

Online Voting in Ontario Municipal Elections: A Conflict of Legal Principles and Technology?
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019

Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons.
IACR Cryptol. ePrint Arch., 2018

Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review.
IEEE Access, 2018

The Threat of SSL/TLS Stripping to Online Voting.
Proceedings of the Electronic Voting - Third International Joint Conference, 2018

Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention.
J. Geogr. Syst., 2017

Detecting the Detectable: Unintended Consequences of Cryptographic Election Verification.
IEEE Secur. Priv., 2017

Trust Implications of DDoS Protection in Online Elections.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Indiscreet Logs: Diffie-Hellman Backdoors in TLS.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS.
IACR Cryptol. ePrint Arch., 2016

The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
A privacy preserving protocol for tracking participants in phase I clinical trials.
J. Biomed. Informatics, 2015

2013
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System.
IACR Cryptol. ePrint Arch., 2013

2012
Cryptographic End-to-end Verification for Real-world Elections.
PhD thesis, 2012

Hover: Trustworthy Elections with Hash-Only Verification.
IEEE Secur. Priv., 2012

Eperio: Mitigating Technical Complexity in Cryptographic Election Verification.
IACR Cryptol. ePrint Arch., 2012

Cobra: Toward Concurrent Ballot Authorization for Internet Voting.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

Oblivious Printing of Secret Messages in a Multi-party Setting.
Proceedings of the Financial Cryptography and Data Security, 2012

CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Single Layer Optical-scan Voting with Fully Distributed Trust.
IACR Cryptol. ePrint Arch., 2011

CommitCoin: Carbon Dating Commitments with Bitcoin.
IACR Cryptol. ePrint Arch., 2011

2010
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2010

Securing Optical-Scan Voting.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Aperio: High Integrity Elections for Developing Countries.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Eperio: Mitigating Technical Complexity in Cryptographic Election Verification.
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010

Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.
Proceedings of the 19th USENIX Security Symposium, 2010


2009
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2009

2008
Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting.
IEEE Secur. Priv., 2008

Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008


  Loading...