Reto E. Koenig

According to our database1, Reto E. Koenig authored at least 22 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
How to Authenticate MQTT Sessions Without Channel- and Broker Security.
CoRR, 2019

2018
Process Models for Universally Verifiable Elections.
Proceedings of the Electronic Voting - Third International Joint Conference, 2018

2017
CHVote System Specification.
IACR Cryptology ePrint Archive, 2017

Pseudo-Code Algorithms for Verifiable Re-encryption Mix-Nets.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Cast-as-Intended Verification in Electronic Elections Based on Oblivious Transfer.
Proceedings of the Electronic Voting - First International Joint Conference, 2016

Coercion-Resistant Internet Voting with Everlasting Privacy.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
IACR Cryptology ePrint Archive, 2015

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2013
Towards A Practical JCJ / Civitas Implementation.
IACR Cryptology ePrint Archive, 2013

A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes.
Computers & Security, 2013

Attacking the Verification Code Mechanism in the Norwegian Internet Voting System.
Proceedings of the E-Voting and Identify, 2013

Towards A Practical JCJ / Civitas Implementation.
Proceedings of the Informatik 2013, 2013

Verifizierbare Internet-Wahlen an Schweizer Hochschulen mit UniVote.
Proceedings of the Informatik 2013, 2013

Machbarkeitsanalyse der scannergestützten Stimmzettelanalyse mittels VividForms und UniWahl4.
Proceedings of the Informatik 2013, 2013

2012
How to Store some Secrets.
IACR Cryptology ePrint Archive, 2012

Achieving Meaningful Efficiency in Coercion-Resistant, Verifiable Internet Voting.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

2011
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
Proceedings of the E-Voting and Identity, 2011

Efficient Vote Authorization in Coercion-Resistant Internet Voting.
Proceedings of the E-Voting and Identity, 2011

Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Why Public Registration Boards are Required in E-Voting Systems Based on Threshold Blind Signature Protocols.
Proceedings of the Electronic Voting 2010, 2010

2008
Strengths and weaknesses of software architectures for the rapid creation of tangible and multimodal interfaces.
Proceedings of the 2nd International Conference on Tangible and Embedded Interaction 2008, 2008


  Loading...