default search action
Thomas Haines
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Tingfeng Yu, James Henderson, Alwen Tiu, Thomas Haines:
Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System. USENIX Security Symposium 2024 - 2023
- [j3]Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-checked proofs of privacy against malicious boards for Selene & Co. J. Comput. Secur. 31(5): 469-499 (2023) - [j2]Thomas Haines, Rafieh Mosaheb, Johannes Müller, Ivan Pryvalov:
SoK: Secure E-Voting with Everlasting Privacy. Proc. Priv. Enhancing Technol. 2023(1): 279-293 (2023) - [c32]Constantin Catalin Dragan, François Dupressoir, Kristian Gjøsteen, Thomas Haines, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame. ESORICS (3) 2023: 471-491 - [c31]Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg:
Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study. E-Vote-ID 2023: 69-86 - [c30]Anggrio Sutopo, Thomas Haines, Peter B. Rønne:
On the Auditability of the Estonian IVXV System - And an Attack on Individual Verifiability. FC Workshops 2023: 19-33 - [c29]Thomas Haines, Johannes Müller, Iñigo Querejeta-Azurmendi:
Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions. SAC 2023: 1576-1584 - [c28]Thomas Haines, Rajeev Goré, Mukesh Tiwari:
Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth. USENIX Security Symposium 2023: 6471-6488 - [e2]Shin'ichiro Matsuo, Lewis Gudgeon, Ariah Klages-Mundt, Daniel Perez Hernandez, Sam Werner, Thomas Haines, Aleksander Essex, Andrea Bracciali, Massimiliano Sala:
Financial Cryptography and Data Security. FC 2022 International Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13412, Springer 2023, ISBN 978-3-031-32414-7 [contents] - [i20]Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg:
Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study. IACR Cryptol. ePrint Arch. 2023: 1102 (2023) - 2022
- [c27]Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter B. Rønne, Tjerand Silde:
Verifiable Decryption in the Head. ACISP 2022: 355-374 - [c26]Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. CSF 2022: 335-347 - [c25]Thomas Haines, Olivier Pereira, Vanessa Teague:
Running the Race: A Swiss Voting Story. E-Vote-ID 2022: 53-69 - [i19]Tingfeng Yu, James Henderson, Alwen Tiu, Thomas Haines:
Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System. CoRR abs/2210.14702 (2022) - [i18]Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. IACR Cryptol. ePrint Arch. 2022: 1182 (2022) - 2021
- [c24]Thomas Haines, Johannes Müller:
Optimal Randomized Partial Checking for Decryption Mix Nets. ACISP 2021: 277-292 - [c23]Thomas Haines, Johannes Müller:
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose. ACISP 2021: 293-308 - [c22]Xavier Boyen, Thomas Haines, Johannes Müller:
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting. EuroS&P 2021: 272-291 - [c21]Thomas Haines, Peter B. Rønne:
New Standards for E-Voting Systems: Reflections on Source Code Examinations. Financial Cryptography Workshops 2021: 279-289 - [c20]Thomas Haines, Rajeev Goré, Bhavesh Sharma:
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting. SP 2021: 1748-1765 - [e1]Matthew Bernhard, Andrea Bracciali, Lewis Gudgeon, Thomas Haines, Ariah Klages-Mundt, Shin'ichiro Matsuo, Daniel Perez, Massimiliano Sala, Sam Werner:
Financial Cryptography and Data Security. FC 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers. Lecture Notes in Computer Science 12676, Springer 2021, ISBN 978-3-662-63957-3 [contents] - [i17]Eleanor McMurtry, Xavier Boyen, Chris Culnane, Kristian Gjøsteen, Thomas Haines, Vanessa Teague:
Towards Verifiable Remote Voting with Paper Assurance. CoRR abs/2111.04210 (2021) - [i16]Xavier Boyen, Thomas Haines, Johannes Müller:
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting. IACR Cryptol. ePrint Arch. 2021: 304 (2021) - [i15]Thomas Haines, Peter B. Rønne:
New Standards for E-Voting Systems: Reflections on Source Code Examinations. IACR Cryptol. ePrint Arch. 2021: 391 (2021) - [i14]Thomas Haines, Johannes Müller:
Optimal Randomized Partial Checking for Decryption Mix Nets. IACR Cryptol. ePrint Arch. 2021: 520 (2021) - [i13]Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter B. Rønne, Tjerand Silde:
Verifiable Decryption in the Head. IACR Cryptol. ePrint Arch. 2021: 558 (2021) - [i12]Thomas Haines, Johannes Müller:
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose. IACR Cryptol. ePrint Arch. 2021: 588 (2021) - [i11]Thomas Haines, Rajeev Goré:
Improved Verifiability for BeleniosVS. IACR Cryptol. ePrint Arch. 2021: 1071 (2021) - 2020
- [c19]Thomas Haines, Johannes Müller:
SoK: Techniques for Verifiable Mix Nets. CSF 2020: 49-64 - [c18]Xavier Boyen, Thomas Haines, Johannes Müller:
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. ESORICS (2) 2020: 336-356 - [c17]Ehsan Estaji, Thomas Haines, Kristian Gjøsteen, Peter B. Rønne, Peter Y. A. Ryan, Najmeh Soroush:
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. E-VOTE-ID 2020: 50-66 - [c16]Colin Boyd, Thomas Haines, Peter B. Rønne:
Vote Selling Resistant Voting. Financial Cryptography Workshops 2020: 345-359 - [c15]Thomas Haines, Olivier Pereira, Peter B. Rønne:
Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities. Financial Cryptography Workshops 2020: 360-368 - [c14]Thomas Haines, Rajeev Goré, Jack Stodart:
Machine-Checking the Universal Verifiability of ElectionGuard. NordSec 2020: 57-73 - [c13]Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg:
Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. NordSec 2020: 92-107 - [c12]Thomas Haines, Sarah Jamie Lewis, Olivier Pereira, Vanessa Teague:
How not to prove your election outcome. SP 2020: 644-660 - [i10]Xavier Boyen, Thomas Haines, Johannes Müller:
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. IACR Cryptol. ePrint Arch. 2020: 115 (2020) - [i9]Thomas Haines, Johannes Müller:
SoK: Techniques for Verifiable Mix Nets. IACR Cryptol. ePrint Arch. 2020: 490 (2020) - [i8]Thomas Haines, Rajeev Goré, Bhavesh Sharma:
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting. IACR Cryptol. ePrint Arch. 2020: 1114 (2020) - [i7]Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg:
Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme. IACR Cryptol. ePrint Arch. 2020: 1331 (2020) - [i6]Thomas Haines, Rajeev Goré, Jack Stodart:
Machine-checking the universal verifiability of ElectionGuard. IACR Cryptol. ePrint Arch. 2020: 1477 (2020)
2010 – 2019
- 2019
- [c11]Thomas Haines, Rajeev Goré, Mukesh Tiwari:
Verified Verifiers for Verifying Elections. CCS 2019: 685-702 - [c10]Colin Boyd, Kristian Gjøsteen, Clémentine Gritti, Thomas Haines:
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. INDOCRYPT 2019: 250-270 - [c9]Thomas Haines:
Cronus: Everlasting Privacy with Audit and Cast. NordSec 2019: 53-68 - [c8]Thomas Haines, Clémentine Gritti:
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs. E-VOTE-ID 2019: 116-133 - [c7]Thomas Haines, Dirk Pattinson, Mukesh Tiwari:
Verifiable Homomorphic Tallying for the Schulze Vote Counting Scheme. VSTTE 2019: 36-53 - [i5]Thomas Haines:
A Description and Proof of a Generalised and Optimised Variant of Wikström's Mixnet. CoRR abs/1901.08371 (2019) - [i4]Thomas Haines, Clémentine Gritti:
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs. IACR Cryptol. ePrint Arch. 2019: 901 (2019) - 2018
- [j1]Xavier Boyen, Thomas Haines:
Forward-Secure Linkable Ring Signatures from Bilinear Maps. Cryptogr. 2(4): 35 (2018) - [c6]Xavier Boyen, Thomas Haines:
Forward-Secure Linkable Ring Signatures. ACISP 2018: 245-264 - [c5]Sowmya Ramachandran, Randy Jensen, Jeremy Ludwig, Eric Domeshek, Thomas Haines:
ITADS: A Real-World Intelligent Tutor to Train Troubleshooting Skills. AIED (2) 2018: 463-468 - [c4]Xavier Boyen, Christopher Carr, Thomas Haines:
Graphchain: a Blockchain-Free Scalable Decentralised Ledger. BCC@AsiaCCS 2018: 21-33 - 2017
- [i3]Christopher Carr, Colin Boyd, Xavier Boyen, Thomas Haines:
Bitcoin Unchained. ERCIM News 2017(110) (2017) - [i2]Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines:
Key Recovery: Inert and Public. IACR Cryptol. ePrint Arch. 2017: 243 (2017) - 2016
- [c3]Thomas Haines, Xavier Boyen:
VOTOR: conceptually simple remote voting against tiny tyrants. ACSW 2016: 32 - [c2]Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines:
Key Recovery: Inert and Public. Mycrypt 2016: 111-126 - [c1]Thomas Haines, Xavier Boyen:
Truly Multi-authority 'Prêt-à-Voter'. E-VOTE-ID 2016: 56-72 - [i1]Xavier Boyen, Christopher Carr, Thomas Haines:
Blockchain-Free Cryptocurrencies. A Rational Framework for Truly Decentralised Fast Transactions. IACR Cryptol. ePrint Arch. 2016: 871 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint