Reto E. Koenig

According to our database1, Reto E. Koenig authored at least 22 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Private Internet Voting on Untrusted Voting Devices.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

2020
CHVote: Sixteen Best Practices and Lessons Learned.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020

2019
How to Authenticate MQTT Sessions Without Channel- and Broker Security.
CoRR, 2019

2018
Process Models for Universally Verifiable Elections.
Proceedings of the Electronic Voting - Third International Joint Conference, 2018

2017
CHVote System Specification.
IACR Cryptol. ePrint Arch., 2017

Pseudo-Code Algorithms for Verifiable Re-encryption Mix-Nets.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Cast-as-Intended Verification in Electronic Elections Based on Oblivious Transfer.
Proceedings of the Electronic Voting - First International Joint Conference, 2016

Coercion-Resistant Internet Voting with Everlasting Privacy.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
IACR Cryptol. ePrint Arch., 2015

2013
Towards A Practical JCJ / Civitas Implementation.
IACR Cryptol. ePrint Arch., 2013

A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes.
Comput. Secur., 2013

Attacking the Verification Code Mechanism in the Norwegian Internet Voting System.
Proceedings of the E-Voting and Identify - 4th International Conference, 2013

Verifizierbare Internet-Wahlen an Schweizer Hochschulen mit UniVote.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

Machbarkeitsanalyse der scannergestützten Stimmzettelanalyse mittels VividForms und UniWahl4.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

2012
How to Store some Secrets.
IACR Cryptol. ePrint Arch., 2012

Achieving Meaningful Efficiency in Coercion-Resistant, Verifiable Internet Voting.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

2011
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Efficient Vote Authorization in Coercion-Resistant Internet Voting.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Why Public Registration Boards are Required in E-Voting Systems Based on Threshold Blind Signature Protocols.
Proceedings of the Electronic Voting 2010, 2010

2008
Strengths and weaknesses of software architectures for the rapid creation of tangible and multimodal interfaces.
Proceedings of the 2nd International Conference on Tangible and Embedded Interaction 2008, 2008


  Loading...