Josh Benaloh

Affiliations:
  • Microsoft Research


According to our database1, Josh Benaloh authored at least 32 papers between 1979 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bugs in our pockets: the risks of client-side scanning.
J. Cybersecur., January, 2024

2021
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot.
IEEE Secur. Priv., 2021

STROBE-Voting: Send Two, Receive One Ballot Encoding.
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021

2017
A Vote of Confidence?
IEEE Secur. Priv., 2017

Public Evidence from Secret Ballots.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

The Weakness of Cumulative Voting.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015

End-to-end verifiability.
CoRR, 2015

Keys under doormats.
Commun. ACM, 2015

2013
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Rethinking Voter Coercion: The Realities Imposed by Technology.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Verifiable Postal Voting.
Proceedings of the Security Protocols XXI, 2013

2012
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
CoRR, 2012

2011
Verifiable Elections and the Public (Dagstuhl Seminar 11281).
Dagstuhl Reports, 2011

SOBA: Secrecy-preserving Observable Ballot-level Audit.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

2009
Shuffle-sum: coercion-resistant verifiable tallying for STV voting.
IEEE Trans. Inf. Forensics Secur., 2009

On Subliminal Channels in Encrypt-on-Cast Voting Systems.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Patient controlled encryption: ensuring privacy of electronic medical records.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Administrative and Public Verifiability: Can We Have Both?
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

2007
Ballot Casting Assurance via Voter-Initiated Poll Station Auditing.
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007

2006
Simple Verifiable Elections.
Proceedings of the 2006 USENIX/ACCURATE Electronic Voting Technology Workshop, 2006

2003
Using Character Recognition and Segmentation to Tell Computer from Humans.
Proceedings of the 7th International Conference on Document Analysis and Recognition (ICDAR 2003), 2003

2002
A Secure Directory Service based on Exclusive Encryption.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web J., 1997

1994
Receipt-free secret-ballot elections (extended abstract).
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994

1993
One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993

1988
Generalized Secret Sharing and Monotone Functions.
Proceedings of the Advances in Cryptology, 1988

1986
Distributing the Power of a Government to Enhance the Privacy of Voters (Extended Abstract).
Proceedings of the Fifth Annual ACM Symposium on Principles of Distributed Computing, 1986

Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing.
Proceedings of the Advances in Cryptology, 1986

Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols.
Proceedings of the Advances in Cryptology, 1986

1985
A Robust and Verifiable Cryptographically Secure Election Scheme (Extended Abstract)
Proceedings of the 26th Annual Symposium on Foundations of Computer Science, 1985

1979
Algebraic extensions of arbitrary integral domains.
Proceedings of the Symbolic and Algebraic Computation, 1979


  Loading...