Ben Adida

According to our database1, Ben Adida authored at least 30 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
MERGE: Matching Electronic Results with Genuine Evidence for verifiable voting in person at remote locations.
CoRR, 2024

2012
The SMART Platform: early experience enabling substitutable applications for electronic health records.
J. Am. Medical Informatics Assoc., 2012

2011
Semantic Annotation and Retrieval: Web of Hypertext - RDFa and Microformats.
Proceedings of the Handbook of Semantic Web Technologies, 2011

2010
Practical Health Information Exchange using a Personally Controlled Health Record.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

2009
Rootkits for JavaScript Environments.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009

2008
hGRDDL: Bridging microformats and RDFa.
J. Web Semant., 2008

Efficient Receipt-Free Ballot Casting Resistant to Covert Channels.
IACR Cryptol. ePrint Arch., 2008

Bridging the Clickable and Semantic Webs with RDFa.
ERCIM News, 2008

Sessionlock: securing web sessions against eavesdropping.
Proceedings of the 17th International Conference on World Wide Web, 2008

Helios: Web-based Open-Audit Voting.
Proceedings of the 17th USENIX Security Symposium, 2008

2007
Offline/Online Mixing.
IACR Cryptol. ePrint Arch., 2007

Robbing the Bank with a Theorem Prover - (Abstract).
Proceedings of the Security Protocols, 2007

On the Security of the EMV Secure Messaging API (Extended Abstract).
Proceedings of the Security Protocols, 2007

Beamauth: two-factor web authentication with a bookmark.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Advances in cryptographic voting systems.
PhD thesis, 2006

Scratch & vote: self-contained paper-based cryptographic voting.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Ballot Casting Assurance.
Proceedings of the 2006 USENIX/ACCURATE Electronic Voting Technology Workshop, 2006

Phish and Chips.
Proceedings of the Security Protocols, 2006

Lightweight Email Signatures (Extended Abstract).
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

2005
How to Shuffle in Public.
IACR Cryptol. ePrint Arch., 2005

Lightweight Encryption for Email.
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005

2004
Evaluation of voting systems.
Commun. ACM, 2004

1998
Can Internet-Based Applications Be Engineered?
IEEE Softw., 1998

Weaving the Web: Handling the Load.
IEEE Internet Comput., 1998

1997
Weaving the Web: Database-Backed Web Sites.
IEEE Internet Comput., 1997

Weaving the Web: Identity Crisis on the Web.
IEEE Internet Comput., 1997

Weaving the Web: Securing the Web.
IEEE Internet Comput., 1997

Weaving the Web: Java: More Than A Revolution.
IEEE Internet Comput., 1997

Weaving the Web: Taking Web Clients to the Next Level.
IEEE Internet Comput., 1997

Weaving the Web: It All Starts at the Server.
IEEE Internet Comput., 1997


  Loading...