Search

Your search keyword '"Teague, Vanessa"' showing total 411 results

Search Constraints

Start Over You searched for: Author "Teague, Vanessa" Remove constraint Author: "Teague, Vanessa"
411 results on '"Teague, Vanessa"'

Search Results

1. MERGE: Matching Electronic Results with Genuine Evidence for verifiable voting in person at remote locations

2. Security analysis of the Australian Capital Territory's eVACS 2020/2024 paperless direct recording electronic voting system

3. Idiosyncratic properties of Australian STV election counting

4. RLAs for 2-Seat STV Elections: Revisited

5. Risk-Limiting Audits for Condorcet Elections

6. Risk-Limiting Audits for Condorcet Elections

7. Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree Model

8. Auditing Ranked Voting Elections with Dirichlet-Tree Models: First Steps

10. Assessing the accuracy of the Australian Senate count: Key steps for a rigorous and transparent audit

11. A First Approach to Risk-Limiting Audits for Single Transferable Vote Elections

12. Towards Verifiable Remote Voting with Paper Assurance

13. Bugs in our Pockets: The Risks of Client-Side Scanning

14. Assertion-Based Approaches to Auditing Complex Elections, with Application to Party-List Proportional Elections

16. Auditing Hamiltonian Elections

17. A First Approach to Risk-Limiting Audits for Single Transferable Vote Elections

18. Ballot-Polling Audits of Instant-Runoff Voting Elections with a Dirichlet-Tree Model

19. A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods

20. Random errors are not necessarily politically neutral

21. Assessing Centrality Without Knowing Connections

22. You can do RLAs for IRV

23. RAIRE: Risk-Limiting Audits for IRV Elections

24. Differentially-Private Two-Party Egocentric Betweenness Centrality

25. Auditing Indian Elections

28. Running the Race: A Swiss Voting Story

29. Options for encoding names for data linking at the Australian Bureau of Statistics

30. Health Data in an Open World

31. Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the UK Office for National Statistics' Privacy-Preserving Record Linkage

33. Trust Implications of DDoS Protection in Online Elections

34. Computing the Margin of Victory in Preferential Parliamentary Elections

35. Public Evidence from Secret Ballots

36. Privacy Assessment of De-identified Opal Data: A report for Transport for NSW

37. Towards Computing Victory Margins in STV Elections

38. Which E-Voting Problems Do We Need to Solve?

39. Shifting the Balance-of-Power in STV Elections

40. When Is a Test Not a Proof?

41. Election Manipulation 100

42. An analysis of New South Wales electronic vote counting

43. Auditing Australian Senate Ballots

45. Efficient Computation of Exact IRV Margins

46. The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election

47. End-to-end verifiability

48. Universally Verifiable MPC and IRV Ballot Counting

49. Election Manipulation with Partial Information

50. vVote: a Verifiable Voting System

Catalog

Books, media, physical & digital resources