Vanessa Teague
Orcid: 0000-0003-2648-2565Affiliations:
- University of Melbourne, School of Computing and Information Systems, Australia
- Stanford University, USA (former)
According to our database1,
Vanessa Teague
authored at least 98 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Cybersecur., January, 2024
MERGE: Matching Electronic Results with Genuine Evidence for verifiable voting in person at remote locations.
CoRR, 2024
Security analysis of the Australian Capital Territory's eVACS 2020/2024 paperless direct recording electronic voting system.
CoRR, 2024
Proceedings of the Financial Cryptography and Data Security. FC 2024 International Workshops, 2024
2023
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023
Democratizing election verification: new methods for addressing an ancient attacker model.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Public comprehension of privacy protections applied to health data shared for research: An Australian cross-sectional study.
Int. J. Medical Informatics, 2022
Assessing the accuracy of the Australian Senate count: Key steps for a rigorous and transparent audit.
CoRR, 2022
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022
Proceedings of the Electronic Voting - 7th International Joint Conference, 2022
Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree Model.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Assertion-Based Approaches to Auditing Complex Elections, with Application to Party-List Proportional Elections.
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
INFORMS J. Comput., 2019
IEEE Secur. Priv., 2019
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Australasian Computer Science Week Multiconference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
CoRR, 2018
Proceedings of the Electronic Voting - Third International Joint Conference, 2018
Proceedings of the Electronic Voting - Third International Joint Conference, 2018
2017
Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the UK Office for National Statistics' Privacy-Preserving Record Linkage.
CoRR, 2017
CoRR, 2017
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Why Open Government is good for cybersecurity and public trust - now would be a good time to start.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017
Proceedings of the Australasian Computer Science Week Multiconference, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Ann. des Télécommunications, 2016
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016
2015
IEEE Secur. Priv., 2015
Proceedings of the E-Voting and Identity - 5th International Conference, 2015
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election.
Proceedings of the E-Voting and Identity - 5th International Conference, 2015
2014
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014
2013
Proceedings of the Security Protocols XXI, 2013
2012
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
2011
Proceedings of the E-Voting and Identity - Third International Conference, 2011
Towards Best Practice for E-election Systems - Lessons from Trial and Error in Australian Elections.
Proceedings of the E-Voting and Identity - Third International Conference, 2011
2010
Proceedings of the Computer Security, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
2008
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
2007
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007
Proceedings of the Theory of Computing 2007. Proceedings of the Thirteenth Computing: The Australasian Theory Symposium (CATS2007). January 30, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks.
Proceedings of the Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30, 2007
2006
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols.
Theor. Comput. Sci., 2006
Proceedings of the The First International Conference on Availability, 2006
2005
2004
Proceedings of the 36th Annual ACM Symposium on Theory of Computing, 2004
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols.
Proceedings of the Foundations of Software Science and Computation Structures, 2004
2002
Proceedings of the Software Security -- Theories and Systems, 2002
2001
IACR Cryptol. ePrint Arch., 2001
A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report).
Proceedings of the Seventeenth Conference on the Mathematical Foundations of Programming Semantics, 2001
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001
Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science, 2001