Chris Culnane

Orcid: 0000-0002-9543-1342

Affiliations:
  • University of Melbourne, School of Computing and Information Systems, Australia


According to our database1, Chris Culnane authored at least 41 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Public comprehension of privacy protections applied to health data shared for research: An Australian cross-sectional study.
Int. J. Medical Informatics, 2022

Using public data to measure diversity in computer science research communities: A critical data governance perspective.
Comput. Law Secur. Rev., 2022

2021
Towards Verifiable Remote Voting with Paper Assurance.
CoRR, 2021

Technical Report on a Virtual CTAP2 WebAuthn Authenticator.
CoRR, 2021

2020
Not fit for Purpose: A critical analysis of the 'Five Safes'.
CoRR, 2020

2019
Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud.
IEEE Secur. Priv., 2019

Stop the Open Data Bus, We Want to Get Off.
CoRR, 2019

Auditing Indian Elections.
CoRR, 2019

Auditing Indian Elections.
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019

Universally Verifiable MPC and IRV Ballot Counting.
Proceedings of the Financial Cryptography and Data Security, 2019

2018
Universally Verifiable MPC with Applications to IRV Ballot Counting.
IACR Cryptol. ePrint Arch., 2018

Options for encoding names for data linking at the Australian Bureau of Statistics.
CoRR, 2018

2017
Health Data in an Open World.
CoRR, 2017

Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the UK Office for National Statistics' Privacy-Preserving Record Linkage.
CoRR, 2017

Privacy Assessment of De-identified Opal Data: A report for Transport for NSW.
CoRR, 2017

Trust Implications of DDoS Protection in Online Elections.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Why Open Government is good for cybersecurity and public trust - now would be a good time to start.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

2016
vVote: Verifiable Electronic Voting in Practice.
IEEE Secur. Priv., 2016

Auditing Australian Senate Ballots.
CoRR, 2016

Strategies for Voter-Initiated Election Audits.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

2015
vVote: A Verifiable Voting System.
ACM Trans. Inf. Syst. Secur., 2015

Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election.
CoRR, 2015

2014
Special Section on Vote-ID 2013.
J. Inf. Secur. Appl., 2014

vVote: a Verifiable Voting System (DRAFT).
CoRR, 2014

Faster Print on Demand for Prêt à Voter.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014

Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Peered Bulletin Board for Robust Use in Verifiable Voting Systems.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Solving the Discrete Logarithm Problem for Packing Candidate Preferences.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
A Hybrid Touch Interface for Prêt à Voter.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

Using Prêt à Voter in Victoria State Elections.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

2011
Prêt á Voter with Write-Ins.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Authentication Codes.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

Focus group views on Prêt à Voter 1.0.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011

2010
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2008
Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol.
Proceedings of the 10th workshop on Multimedia & Security, 2008

2007
Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006


  Loading...