2024
Efficient Cleansing in Coercion-Resistant Voting.
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024
2023
Thwarting Last-Minute Voter Coercion.
IACR Cryptol. ePrint Arch., 2023
Receipt-Free Electronic Voting from zk-SNARK.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Local Differential Privacy in Voting.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023
2022
Modelling human threats in security ceremonies.
J. Comput. Secur., 2022
Secure Internet Exams Despite Coercion.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
POSTER: Enabling User-Accountable Mechanisms in Decision Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
Security Protocols as Choreographies.
Proceedings of the Protocols, Strands, and Logic, 2021
2020
Fixing Vulnerabilities Automatically with Linters.
Proceedings of the Network and System Security - 14th International Conference, 2020
Privacy-Preserving Dispute Resolution in the Improved Bingo Voting.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020
2019
A Security Analysis of the Danish Deposit Return System.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019
What Are the Threats? (Charting the Threat Models of Security Ceremonies).
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
Modelling and Verification of Secure Exams
Information Security and Cryptography, Springer, ISBN: 978-3-319-67106-2, 2018
Invalid certificates in modern browsers: A socio-technical analysis.
J. Comput. Secur., 2018
2017
Trustworthy exams without trusted parties.
Comput. Secur., 2017
Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets.
Proceedings of the Secure IT Systems, 2017
Automated Analysis of Accountability.
Proceedings of the Information Security - 20th International Conference, 2017
Idea: A Unifying Theory for Evaluation Systems.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
2016
Threats to 5G Group-based Authentication.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
A Secure Group-Based AKA Protocol for Machine-Type Communications.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
2015
On the Possibility of Non-Interactive E-Voting in the Public-key Setting.
IACR Cryptol. ePrint Arch., 2015
Design and Analysis of Secure Exam Protocols.
CoRR, 2015
A Secure Exam Protocol Without Trusted Parties.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
A Framework for Analyzing Verifiability in Traditional and Electronic Exams.
Proceedings of the Information Security Practice and Experience, 2015
2014
Remark!: A Secure Protocol for Remote Exams.
Proceedings of the Security Protocols XXII, 2014
Remark!: A Secure Protocol for Remote Exams (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014
Formal Analysis of Electronic Exams.
Proceedings of the SECRYPT 2014, 2014
Secure exams despite malicious management.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Formal Security Analysis of Traditional and Electronic Exams.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
A Socio-technical Methodology for the Security and Privacy Analysis of Services.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2013
Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Socio-technical formal analysis of TLS certificate validation in modern browsers.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
A Socio-technical Understanding of TLS Certificate Validation.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
What security for electronic exams?
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
2011
Enforcing privacy in e-commerce by balancing anonymity and trust.
Comput. Secur., 2011