Vanessa Teague
#138,915
Most Influential Person Across History
Australian cryptographer
Vanessa Teague's AcademicInfluence.com Rankings
Vanessa Teaguecomputer-science Degrees
Computer Science
#6677
Historical Rank
Database
#9866
Historical Rank
Download Badge
Computer Science
Vanessa Teague's Degrees
- Bachelors Computer Science University of Melbourne
- PhD Computer Science University of Melbourne
Similar Degrees You Can Earn
Why Is Vanessa Teague Influential?
(Suggest an Edit or Addition)According to Wikipedia, Vanessa Joy Teague is an Australian cryptographer, known for her work on secret sharing, cryptographic protocols, and the security of electronic voting. She was an associate professor of computing and information systems at the University of Melbourne, until resigning in February 2020 and is an Adjunct Associate Professor at the ANU College of Engineering and Computer Science. She is a member of the Board of Advisors of the Verified Voting Foundation.
Vanessa Teague's Published Works
Published Works
- Rational secret sharing and multiparty computation: extended abstract (2004) (323)
- Ra-tional secret sharing and multiparty computation (2004) (111)
- A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols (2005) (96)
- The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election (2015) (94)
- Pretty Good Democracy (2009) (92)
- A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report) (2001) (87)
- Anti-persistence: history independent data structures (2001) (86)
- A review of E-voting: the past, present and future (2016) (71)
- Health Data in an Open World (2017) (68)
- vVote: A Verifiable Voting System (2014) (62)
- Public Evidence from Secret Ballots (2017) (58)
- Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols (2004) (53)
- A Secure Event Agreement (SEA) protocol for peer-to-peer games (2006) (46)
- Using Prêt à Voter in Victoria State Elections (2012) (46)
- Linear Arboricity and Linear k-Arboricity of Regular Graphs (2001) (42)
- Shuffle-Sum: Coercion-Resistant Verifiable Tallying for STV Voting (2009) (39)
- End-to-end verifiability (2015) (36)
- Coercion-Resistant Tallying for STV Voting (2008) (34)
- A Secure Group Agreement (SGA) Protocol for Peer-to-Peer Applications (2007) (33)
- On The Complexity of Manipulating Elections (2007) (31)
- How not to prove your election outcome (2020) (31)
- Extending Helios Towards Private Eligibility Verifiability (2015) (30)
- Verifiable European Elections: Risk-limiting Audits for D’Hondt and Its Relatives (2014) (29)
- End-to-End Verifiability in Voting Systems, from Theory to Practice (2015) (29)
- A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission (2012) (27)
- Autonomous Nodes and Distributed Mechanisms (2002) (22)
- Pretty Good Democracy for More Expressive Voting Schemes (2010) (21)
- Efficient Computation of Exact IRV Margins (2015) (20)
- Probabilistic polynomial-time process calculus and security protocol analysis (2001) (19)
- Security and Privacy Implications of NFC-enabled Contactless Payment Systems (2017) (18)
- Selecting Correlated Random Actions (2004) (15)
- Ballot permutations in prêt à voter (2009) (14)
- Trust Implications of DDoS Protection in Online Elections (2017) (13)
- Bugs in our Pockets: The Risks of Client-Side Scanning (2021) (12)
- Verifiable Postal Voting (2013) (12)
- Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud (2019) (12)
- vVote: a Verifiable Voting System (DRAFT) (2014) (12)
- Auditing Australian Senate Ballots (2016) (10)
- Computing the Margin of Victory in Preferential Parliamentary Elections (2017) (10)
- Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the UK Office for National Statistics' Privacy-Preserving Record Linkage (2017) (10)
- Ballot-Polling Risk Limiting Audits for IRV Elections (2018) (10)
- A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods (2020) (9)
- RAIRE: Risk-Limiting Audits for IRV Elections. (2019) (9)
- QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks (2007) (9)
- Cryptographic protocols with everyday objects (2013) (9)
- Investigating Commitment Flexibility in Multi-Agent Contracts (2002) (9)
- Stop the Open Data Bus, We Want to Get Off (2019) (7)
- Efficiently Shuffling in Public (2012) (7)
- Strategies for Voter-Initiated Election Audits (2016) (7)
- Assertion-based Approaches to Auditing Complex Elections, with application to party-list proportional elections (2021) (6)
- Universally Verifiable MPC and IRV Ballot Counting (2019) (6)
- Privacy Assessment of De-identified Opal Data: A report for Transport for NSW (2017) (6)
- Risk-Limiting Audits for IRV Elections (2019) (6)
- When is a test not a proof? (2020) (5)
- An analysis of New South Wales electronic vote counting (2016) (5)
- E-Voting and Identify (2013) (4)
- Differentially-Private Two-Party Egocentric Betweenness Centrality (2019) (4)
- Toward Computing the Margin of Victory in Single Transferable Vote Elections (2019) (4)
- Did That Lost Ballot Box Cost Me a Seat? Computing Manipulations of STV Elections (2020) (4)
- Receipt-Free, Universally and Individually Verifiable Poll Attendance (2019) (4)
- Faster Print on Demand for Prêt à Voter (2013) (3)
- Cryptographic Commitment and Simultaneous Exchange (2008) (3)
- THE FUTURE OF VOTING End-To-End Verifiable Internet Voting Expert Statements (2015) (3)
- Problems With Coordination in Two-Player Games: Comment on "Computational Complexity and Communication" (2008) (3)
- Veriable European Elections: Risk-limiting Audits for D'Hondt and Its Relatives (2014) (3)
- Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings (2017) (3)
- Auditing Hamiltonian Elections (2021) (3)
- Options for encoding names for data linking at the Australian Bureau of Statistics (2018) (2)
- A review of E-voting: the past, present and future (2016) (2)
- Towards Computing Victory Margins in STV Elections (2017) (2)
- A First Approach to Risk-Limiting Audits for Single Transferable Vote Elections (2021) (2)
- Towards Computing the Margin of Victory in STV Elections (2017) (2)
- Election Manipulation 100 (2019) (2)
- Election Manipulation with Partial Information (2019) (2)
- Universally Verifiable MPC with Applications to IRV Ballot Counting (2018) (2)
- Auditing Indian Elections (2019) (2)
- Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers (2019) (2)
- Permutations in Prêt à Voter (2009) (2)
- Privately Matching k-mers (2016) (2)
- You can do RLAs for IRV (2020) (2)
- A Secure Electronic Voting Scheme Using Identity based Public Key Cryptography (2007) (2)
- Towards Best Practice for E-election Systems - Lessons from Trial and Error in Australian Elections (2011) (2)
- Public comprehension of privacy protections applied to health data shared for research: An Australian cross-sectional study (2022) (2)
- Random Errors Are Not Necessarily Politically Neutral (2020) (1)
- CORE Submission to the Inquiry into the Administration of the 2011 NSW Election and Related Matters Problems with the iVote Internet Voting System (2012) (1)
- Virtually Perfect Democracy (2010) (1)
- Shifting the Balance-of-Power in STV Elections (2020) (1)
- Towards Verifiable Remote Voting with Paper Assurance (2021) (1)
- Auditing Ranked Voting Elections with Dirichlet-Tree Models: First Steps (2022) (1)
- 2012 LOCAL GOVERNMENT ELECTIONS (2013) (1)
- Special Section on Vote-ID 2013 (2014) (1)
- VAULT-Style Risk-Limiting Audits and the Inyo County Pilot (2021) (1)
- How not to prove your election outcome The use of non-adaptive zero knowledge proofs in the Scytl-SwissPost Internet voting system , and its implications for decryption proof soundness (2019) (1)
- Verifiable European Elections: Risk-limiting Audits and Universally Verifiable Tallies for D'Hondt and Its Relatives (2015) (0)
- Assessing the accuracy of the Australian Senate count: Key steps for a rigorous and transparent audit (2022) (0)
- CORE Supplementary Submission to the Inquiry into the 2010 Federal Election Best Practices for E-election Systems (2011) (0)
- Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections (2011) (0)
- Modern confidential: digital privacy today (2017) (0)
- Which E-Voting Problems Do We Need to Solve? (2021) (0)
- Assessing Centrality Without Knowing Connections (2020) (0)
- Running the Race: A Swiss Voting Story (2022) (0)
- Electronic Australian Elections: Verifiability of Accuracy is a Design Goal, which Must be Mandated by Law and Deliberately Designed into Electronic Electoral Processes (2020) (0)
- Modern confidential: digital privacy online (2017) (0)
- A Vote of Confidence (1891) (0)
- Privacy Preserving Opinion Aggregation (2022) (0)
- Risk-Limiting Audits for Condorcet Elections (2023) (0)
- Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree Model (2022) (0)
- When Is a Proof Actually Not? (2020) (0)
- End-to-End Verifiable Postal Voting (Transcript of Discussion) (2013) (0)
- Privacy-Preserving Queries over Secret-Shared Graph-Structured Data (2017) (0)
- Verification, Auditing, and Evidence: If We Didn’t Notice Anything Wrong, Is the Election Outcome Right? (2016) (0)
- Proceedings of the 4th international conference on E-Voting and Identity (2013) (0)
- Research Opportunities in Evidence-Based Elections (2022) (0)
- Secure random number agreement for peer-to-peer applications (2007) (0)
- Òøø¹ôö×××øøò Àà×øóöý Áòòòôòòòòø Øø Ëøöù Blockinøùöö× (2013) (0)
- Combining cryptography and game theory in distributed algorithms (2004) (0)
- Why Open Government is good for cybersecurity and public trust - now would be a good time to start (2017) (0)
- Cryptographic protocols with everyday objects (2013) (0)
- End-to-end verifiablity (2016) (0)
- Random errors are not politically neutral (2020) (0)
- On the Side-Effects of Introducing E-Voting (2011) (0)
This paper list is powered by the following services:
Other Resources About Vanessa Teague
What Schools Are Affiliated With Vanessa Teague?
Vanessa Teague is affiliated with the following schools: