Vanessa Teague

Orcid: 0000-0003-2648-2565

Affiliations:
  • University of Melbourne, School of Computing and Information Systems, Australia
  • Stanford University, USA (former)


According to our database1, Vanessa Teague authored at least 98 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bugs in our pockets: the risks of client-side scanning.
J. Cybersecur., January, 2024

MERGE: Matching Electronic Results with Genuine Evidence for verifiable voting in person at remote locations.
CoRR, 2024

Security analysis of the Australian Capital Territory's eVACS 2020/2024 paperless direct recording electronic voting system.
CoRR, 2024

Idiosyncratic properties of Australian STV election counting.
CoRR, 2024

RLAs for 2-Seat STV Elections: Revisited.
Proceedings of the Financial Cryptography and Data Security. FC 2024 International Workshops, 2024

2023
Risk-Limiting Audits for Condorcet Elections.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

Democratizing election verification: new methods for addressing an ancient attacker model.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Public comprehension of privacy protections applied to health data shared for research: An Australian cross-sectional study.
Int. J. Medical Informatics, 2022

Privacy Preserving Opinion Aggregation.
IACR Cryptol. ePrint Arch., 2022

Auditing Ranked Voting Elections with Dirichlet-Tree Models: First Steps.
CoRR, 2022

Assessing the accuracy of the Australian Senate count: Key steps for a rigorous and transparent audit.
CoRR, 2022

A First Approach to Risk-Limiting Audits for Single Transferable Vote Elections.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

Running the Race: A Swiss Voting Story.
Proceedings of the Electronic Voting - 7th International Joint Conference, 2022

Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree Model.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot.
IEEE Secur. Priv., 2021

Towards Verifiable Remote Voting with Paper Assurance.
CoRR, 2021

Auditing Hamiltonian Elections.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Assertion-Based Approaches to Auditing Complex Elections, with Application to Party-List Proportional Elections.
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021

Which E-Voting Problems Do We Need to Solve?
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
When is a test not a proof?
IACR Cryptol. ePrint Arch., 2020

Random errors are not politically neutral.
CoRR, 2020

You can do RLAs for IRV.
CoRR, 2020

When Is a Proof Actually Not?
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

How not to prove your election outcome.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Assessing Centrality Without Knowing Connections.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020

Random Errors Are Not Necessarily Politically Neutral.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020

Shifting the Balance-of-Power in STV Elections.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020

Did That Lost Ballot Box Cost Me a Seat? Computing Manipulations of STV Elections.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Toward Computing the Margin of Victory in Single Transferable Vote Elections.
INFORMS J. Comput., 2019

Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud.
IEEE Secur. Priv., 2019

Stop the Open Data Bus, We Want to Get Off.
CoRR, 2019

Risk-Limiting Audits for IRV Elections.
CoRR, 2019

Auditing Indian Elections.
CoRR, 2019

Auditing Indian Elections.
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019

Election Manipulation with Partial Information.
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019

Differentially-Private Two-Party Egocentric Betweenness Centrality.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Universally Verifiable MPC and IRV Ballot Counting.
Proceedings of the Financial Cryptography and Data Security, 2019

Election Manipulation 100.
Proceedings of the Financial Cryptography and Data Security, 2019

Receipt-Free, Universally and Individually Verifiable Poll Attendance.
Proceedings of the Australasian Computer Science Week Multiconference, 2019

2018
Universally Verifiable MPC with Applications to IRV Ballot Counting.
IACR Cryptol. ePrint Arch., 2018

Options for encoding names for data linking at the Australian Bureau of Statistics.
CoRR, 2018

Ballot-Polling Risk Limiting Audits for IRV Elections.
Proceedings of the Electronic Voting - Third International Joint Conference, 2018

Computing the Margin of Victory in Preferential Parliamentary Elections.
Proceedings of the Electronic Voting - Third International Joint Conference, 2018

2017
A Vote of Confidence?
IEEE Secur. Priv., 2017

Health Data in an Open World.
CoRR, 2017

Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the UK Office for National Statistics' Privacy-Preserving Record Linkage.
CoRR, 2017

Privacy Assessment of De-identified Opal Data: A report for Transport for NSW.
CoRR, 2017

Towards Computing Victory Margins in STV Elections.
CoRR, 2017

Trust Implications of DDoS Protection in Online Elections.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Public Evidence from Secret Ballots.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Privacy-Preserving Queries over Secret-Shared Graph-Structured Data.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Why Open Government is good for cybersecurity and public trust - now would be a good time to start.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

An analysis of New South Wales electronic vote counting.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Security and Privacy Implications of NFC-enabled Contactless Payment Systems.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Privately Matching k-mers.
IACR Cryptol. ePrint Arch., 2016

Auditing Australian Senate Ballots.
CoRR, 2016

A review of E-voting: the past, present and future.
Ann. des Télécommunications, 2016

Strategies for Voter-Initiated Election Audits.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Efficient Computation of Exact IRV Margins.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

2015
vVote: A Verifiable Voting System.
ACM Trans. Inf. Syst. Secur., 2015

End-to-End Verifiability in Voting Systems, from Theory to Practice.
IEEE Secur. Priv., 2015

End-to-end verifiability.
CoRR, 2015

Extending Helios Towards Private Eligibility Verifiability.
Proceedings of the E-Voting and Identity - 5th International Conference, 2015

The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election.
Proceedings of the E-Voting and Identity - 5th International Conference, 2015

2014
Special Section on Vote-ID 2013.
J. Inf. Secur. Appl., 2014

Cryptographic protocols with everyday objects.
Formal Aspects Comput., 2014

vVote: a Verifiable Voting System (DRAFT).
CoRR, 2014

Faster Print on Demand for Prêt à Voter.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014

2013
End-to-End Verifiable Postal Voting (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

Verifiable Postal Voting.
Proceedings of the Security Protocols XXI, 2013

2012
Using Prêt à Voter in Victoria State Elections.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

Efficiently Shuffling in Public.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

2011
On the Side-Effects of Introducing E-Voting.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Towards Best Practice for E-election Systems - Lessons from Trial and Error in Australian Elections.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

2010
Virtually Perfect Democracy.
Proceedings of the Security Protocols XVIII, 2010

Pretty Good Democracy for More Expressive Voting Schemes.
Proceedings of the Computer Security, 2010

2009
Shuffle-sum: coercion-resistant verifiable tallying for STV voting.
IEEE Trans. Inf. Forensics Secur., 2009

Permutations in Prêt à Voter.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Pretty Good Democracy.
Proceedings of the Security Protocols XVII, 2009

2008
Coercion-Resistant Tallying for STV Voting.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

2007
Secure random number agreement for peer-to-peer applications.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

On The Complexity of Manipulating Elections.
Proceedings of the Theory of Computing 2007. Proceedings of the Thirteenth Computing: The Australasian Theory Symposium (CATS2007). January 30, 2007

A Secure Group Agreement (SGA) Protocol for Peer-to-Peer Applications.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks.
Proceedings of the Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30, 2007

2006
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols.
Theor. Comput. Sci., 2006

A Secure Event Agreement (SEA) protocol for peer-to-peer games.
Proceedings of the The First International Conference on Availability, 2006

2005
Combining cryptography and game theory in distributed algorithms.
PhD thesis, 2005

2004
Rational secret sharing and multiparty computation: extended abstract.
Proceedings of the 36th Annual ACM Symposium on Theory of Computing, 2004

Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols.
Proceedings of the Foundations of Software Science and Computation Structures, 2004

Selecting Correlated Random Actions.
Proceedings of the Financial Cryptography, 2004

2002
Autonomous Nodes and Distributed Mechanisms.
Proceedings of the Software Security -- Theories and Systems, 2002

2001
Anti-persistence: History Independent Data Structures.
IACR Cryptol. ePrint Arch., 2001

Linear Arboricity and Linear k-Arboricity of Regular Graphs.
Graphs Comb., 2001

A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report).
Proceedings of the Seventeenth Conference on the Mathematical Foundations of Programming Semantics, 2001

Anti-presistence: history independent data structures.
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001

Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis.
Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science, 2001


  Loading...