The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Vanessa Teague: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Amy Beth Corman, Scott Douglas, Peter Schachte, Vanessa Teague
    A Secure Event Agreement (SEA) protocol for peer-to-peer games. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:34-41 [Conf]
  2. Amy Beth Corman, Peter Schachte, Vanessa Teague
    A Secure Group Agreement (SGA) Protocol for Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:24-29 [Conf]
  3. Vanessa Teague
    Selecting Correlated Random Actions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:181-195 [Conf]
  4. Ajith Ramanathan, John C. Mitchell, Andre Scedrov, Vanessa Teague
    Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2004, pp:468-483 [Conf]
  5. John C. Mitchell, Vanessa Teague
    Autonomous Nodes and Distributed Mechanisms. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:58-83 [Conf]
  6. John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague
    Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    LICS, 2001, pp:3-8 [Conf]
  7. Joseph Y. Halpern, Vanessa Teague
    Rational secret sharing and multiparty computation: extended abstract. [Citation Graph (0, 0)][DBLP]
    STOC, 2004, pp:623-632 [Conf]
  8. Moni Naor, Vanessa Teague
    Anti-presistence: history independent data structures. [Citation Graph (0, 0)][DBLP]
    STOC, 2001, pp:492-501 [Conf]
  9. John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague
    A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report). [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:45, n:, pp:- [Journal]
  10. Noga Alon, Vanessa Teague, Nicholas C. Wormald
    Linear Arboricity and Linear k-Arboricity of Regular Graphs. [Citation Graph (0, 0)][DBLP]
    Graphs and Combinatorics, 2001, v:17, n:1, pp:11-16 [Journal]
  11. John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague
    A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:353, n:1-3, pp:118-164 [Journal]
  12. Joseph Y. Halpern, Vanessa Teague
    Rational Secret Sharing and Multiparty Computation: Extended Abstract [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  13. QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks. [Citation Graph (, )][DBLP]


  14. On The Complexity of Manipulating Elections. [Citation Graph (, )][DBLP]


  15. Pretty Good Democracy for More Expressive Voting Schemes. [Citation Graph (, )][DBLP]


  16. Secure random number agreement for peer-to-peer applications. [Citation Graph (, )][DBLP]


  17. Coercion-Resistant Tallying for STV Voting. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002