default search action
Aleksander Essex
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Mounika Pratapa, Aleksander Essex:
Secure similar patients query with homomorphically evaluated thresholds. J. Inf. Secur. Appl. 85: 103861 (2024) - [e2]Aleksander Essex, Shin'ichiro Matsuo, Oksana Kulyk, Lewis Gudgeon, Ariah Klages-Mundt, Daniel Perez, Sam Werner, Andrea Bracciali, Geoff Goodell:
Financial Cryptography and Data Security. FC 2023 International Workshops - Voting, CoDecFin, DeFi, WTSC, Bol, Brač, Croatia, May 5, 2023, Revised Selected Papers. Lecture Notes in Computer Science 13953, Springer 2024, ISBN 978-3-031-48805-4 [contents] - 2023
- [c23]James Brunet, Aleksander Essex:
Online Voting in Ontario Municipalities: A Standards-Based Review. E-Vote-ID 2023: 52-68 - [c22]Nicole Goodman, Iuliia Spycher-Krivonosova, Aleksander Essex, James Brunet:
Verifiability Experiences in Ontario's 2022 Online Elections. E-Vote-ID 2023: 87-105 - [c21]Mounika Pratapa, Aleksander Essex:
Secure Function Extensions to Additively Homomorphic Cryptosystems. SAC 2023: 346-366 - [e1]Shin'ichiro Matsuo, Lewis Gudgeon, Ariah Klages-Mundt, Daniel Perez Hernandez, Sam Werner, Thomas Haines, Aleksander Essex, Andrea Bracciali, Massimiliano Sala:
Financial Cryptography and Data Security. FC 2022 International Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13412, Springer 2023, ISBN 978-3-031-32414-7 [contents] - [i10]Mounika Pratapa, Aleksander Essex:
Secure Function Extensions to Additively Homomorphic Cryptosystems. IACR Cryptol. ePrint Arch. 2023: 1155 (2023) - 2022
- [c20]James Brunet, Athanasios Demetri Pananos, Aleksander Essex:
Review Your Choices: When Confirmation Pages Break Ballot Secrecy in Online Elections. E-Vote-ID 2022: 36-52 - 2021
- [j12]Leah Krehling, Aleksander Essex:
A Security and Privacy Scoring System for Contact Tracing Apps. J. Cybersecur. Priv. 1(4): 597-614 (2021) - 2020
- [i9]Fadi Salo, MohammadNoor Injadat, Ali Bou Nassif, Aleksander Essex:
Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review. CoRR abs/2005.12267 (2020) - [i8]MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami:
Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection. CoRR abs/2008.02327 (2020)
2010 – 2019
- 2019
- [j11]Fadi Salo, Ali Bou Nassif, Aleksander Essex:
Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput. Networks 148: 164-175 (2019) - [j10]Chris Culnane, Aleksander Essex, Sarah Jamie Lewis, Olivier Pereira, Vanessa Teague:
Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud. IEEE Secur. Priv. 17(4): 62-70 (2019) - [j9]Aleksander Essex:
Secure Approximate String Matching for Privacy-Preserving Record Linkage. IEEE Trans. Inf. Forensics Secur. 14(10): 2623-2632 (2019) - [c19]Fadi Salo, MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Aleksander Essex:
Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection. ICNC 2019: 276-281 - [c18]Anthony Cardillo, Nicholas Akinyokun, Aleksander Essex:
Online Voting in Ontario Municipal Elections: A Conflict of Legal Principles and Technology? E-VOTE-ID 2019: 67-82 - 2018
- [j8]Fadi Salo, MohammadNoor Injadat, Ali Bou Nassif, Abdallah Shami, Aleksander Essex:
Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review. IEEE Access 6: 56046-56058 (2018) - [c17]Rhys Carlton, Aleksander Essex, Krzysztof Kapulkin:
Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons. CT-RSA 2018: 137-156 - [c16]MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami:
Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection. GLOBECOM 2018: 1-6 - [c15]Anthony Cardillo, Aleksander Essex:
The Threat of SSL/TLS Stripping to Online Voting. E-Vote-ID 2018: 35-50 - [i7]Rhys Carlton, Aleksander Essex, Krzysztof Kapulkin:
Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons. IACR Cryptol. ePrint Arch. 2018: 224 (2018) - 2017
- [j7]Aleksander Essex:
Detecting the Detectable: Unintended Consequences of Cryptographic Election Verification. IEEE Secur. Priv. 15(3): 30-38 (2017) - [j6]Geoffrey M. Jacquez, Aleksander Essex, Andrew Curtis, Betsy Kohler, Recinda Sherman, Khaled El Emam, Chen Shi, Andy Kaufmann, Linda Beale, Thomas W. Cusick, Daniel W. Goldberg, Pierre Goovaerts:
Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention. J. Geogr. Syst. 19(3): 197-220 (2017) - [c14]Kristen Dorey, Nicholas Chang-Fong, Aleksander Essex:
Indiscreet Logs: Diffie-Hellman Backdoors in TLS. NDSS 2017 - [c13]Chris Culnane, Mark Eldridge, Aleksander Essex, Vanessa Teague:
Trust Implications of DDoS Protection in Online Elections. E-VOTE-ID 2017: 127-145 - [i6]Chris Culnane, Mark Eldridge, Aleksander Essex, Vanessa Teague:
Trust Implications of DDoS Protection in Online Elections. CoRR abs/1708.00991 (2017) - 2016
- [c12]Nicholas Chang-Fong, Aleksander Essex:
The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios. ACSAC 2016: 324-335 - [i5]Kristen Dorey, Nicholas Chang-Fong, Aleksander Essex:
Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS. IACR Cryptol. ePrint Arch. 2016: 999 (2016) - 2015
- [j5]Khaled El Emam, Hanna Farah, Saeed Samet, Aleksander Essex, Elizabeth Jonker, Murat Kantarcioglu, Craig Earle:
A privacy preserving protocol for tracking participants in phase I clinical trials. J. Biomed. Informatics 57: 145-162 (2015) - 2013
- [c11]Filip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora:
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System. ACNS 2013: 441-457 - [i4]Filip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora:
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System. IACR Cryptol. ePrint Arch. 2013: 214 (2013) - 2012
- [b1]Aleksander Essex:
Cryptographic End-to-end Verification for Real-world Elections. University of Waterloo, Ontario, Canada, 2012 - [j4]Aleksander Essex, Urs Hengartner:
Hover: Trustworthy Elections with Hash-Only Verification. IEEE Secur. Priv. 10(5): 18-24 (2012) - [c10]Aleksander Essex, Urs Hengartner:
Oblivious Printing of Secret Messages in a Multi-party Setting. Financial Cryptography 2012: 359-373 - [c9]Jeremy Clark, Aleksander Essex:
CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper). Financial Cryptography 2012: 390-398 - [c8]Aleksander Essex, Jeremy Clark, Urs Hengartner:
Cobra: Toward Concurrent Ballot Authorization for Internet Voting. EVT/WOTE 2012 - [i3]Aleksander Essex, Jeremy Clark, Urs Hengartner, Carlisle Adams:
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification. IACR Cryptol. ePrint Arch. 2012: 178 (2012) - 2011
- [c7]Aleksander Essex, Christian Henrich, Urs Hengartner:
Single Layer Optical-Scan Voting with Fully Distributed Trust. VoteID 2011: 122-139 - [i2]Aleksander Essex, Christian Henrich, Urs Hengartner:
Single Layer Optical-scan Voting with Fully Distributed Trust. IACR Cryptol. ePrint Arch. 2011: 568 (2011) - [i1]Jeremy Clark, Aleksander Essex:
CommitCoin: Carbon Dating Commitments with Bitcoin. IACR Cryptol. ePrint Arch. 2011: 677 (2011) - 2010
- [j3]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Trans. Inf. Forensics Secur. 5(1): 194 (2010) - [c6]Alan T. Sherman, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Bimal Sinha, Poorvi L. Vora:
Scantegrity Mock Election at Takoma Park. Electronic Voting 2010: 45-61 - [c5]Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy. USENIX Security Symposium 2010: 291-306 - [c4]Aleksander Essex, Carlisle Adams:
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification. EVT/WOTE 2010 - [c3]Stefan Popoveniuc, Jeremy Clark, Richard Carback, Aleksander Essex, David Chaum:
Securing Optical-Scan Voting. Towards Trustworthy Elections 2010: 357-369 - [c2]Aleksander Essex, Jeremy Clark, Carlisle Adams:
Aperio: High Integrity Elections for Developing Countries. Towards Trustworthy Elections 2010: 388-401
2000 – 2009
- 2009
- [j2]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Trans. Inf. Forensics Secur. 4(4): 611-627 (2009) - 2008
- [j1]David Chaum, Aleksander Essex, Richard Carback, Jeremy Clark, Stefan Popoveniuc, Alan T. Sherman, Poorvi L. Vora:
Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting. IEEE Secur. Priv. 6(3): 40-46 (2008) - [c1]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman:
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. EVT 2008
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint