Sriramkrishnan Srinivasan

According to our database1, Sriramkrishnan Srinivasan authored at least 15 papers between 2007 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Solving the Discrete Logarithm Problem for Packing Candidate Preferences.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Using Prêt à Voter in Victoria State Elections.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

Analysis on Token-Controlled Public Key Encryption.
Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks, 2012

A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

2011
Prêt á Voter with Write-Ins.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Authentication Codes.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

Focus group views on Prêt à Voter 1.0.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011

2010
Identity based encryption: Progress and challenges.
Inf. Secur. Tech. Rep., 2010

Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups.
Des. Codes Cryptogr., 2009

Building Key-Private Public-Key Encryption Schemes.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.
Proceedings of the Pairing-Based Cryptography, 2008

2007
Can Autonomic and Strategic Routing Benefit Internet Autonomous Systems?
Proceedings of IEEE International Conference on Communications, 2007


  Loading...