default search action
Josh Benaloh
Person information
- affiliation: Microsoft Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - [c23]Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach:
ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections. USENIX Security Symposium 2024 - [i8]Josh Benaloh, Michael Naehrig, Olivier Pereira:
REACTIVE: Rethinking Effective Approaches Concerning Trustees in Verifiable Elections. IACR Cryptol. ePrint Arch. 2024: 915 (2024) - [i7]Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach:
ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections. IACR Cryptol. ePrint Arch. 2024: 955 (2024) - 2021
- [j6]Josh Benaloh, Kammi Foote, Philip B. Stark, Vanessa Teague, Dan S. Wallach:
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot. IEEE Secur. Priv. 19(4): 8-18 (2021) - [c22]Josh Benaloh:
STROBE-Voting: Send Two, Receive One Ballot Encoding. E-VOTE-ID 2021: 33-46 - [i6]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021)
2010 – 2019
- 2017
- [j5]Josh Benaloh, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
A Vote of Confidence? IEEE Secur. Priv. 15(3): 12-13 (2017) - [c21]Josh Benaloh:
The Weakness of Cumulative Voting. E-VOTE-ID 2017: 57-65 - [c20]Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. E-VOTE-ID 2017: 84-109 - [e3]Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole J. Goodman, Peter Y. A. Ryan, Vanessa Teague:
Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Lecture Notes in Computer Science 10141, Springer 2017, ISBN 978-3-319-52239-5 [contents] - [i5]Josh Benaloh, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. CoRR abs/1707.08619 (2017) - 2015
- [j4]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j3]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [i4]Josh Benaloh, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora:
End-to-end verifiability. CoRR abs/1504.03778 (2015) - 2014
- [e2]Josh Benaloh:
Topics in Cryptology - CT-RSA 2014 - The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings. Lecture Notes in Computer Science 8366, Springer 2014, ISBN 978-3-319-04851-2 [contents] - 2013
- [c19]Josh Benaloh, Peter Y. A. Ryan, Vanessa Teague:
Verifiable Postal Voting. Security Protocols Workshop 2013: 54-65 - [c18]Josh Benaloh:
Rethinking Voter Coercion: The Realities Imposed by Technology. EVT/WOTE 2013 - [c17]Josh Benaloh, Michael D. Byrne, Bryce Eakin, Philip T. Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, Dan S. Wallach, Gail Fisher, Julian Montoya, Michelle Parker, Michael Winn:
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. EVT/WOTE 2013 - 2012
- [i3]Josh Benaloh, Mike Byrne, Philip T. Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, Dan S. Wallach:
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. CoRR abs/1211.1904 (2012) - 2011
- [c16]Josh Benaloh, Douglas W. Jones, Eric Lazarus, Mark Lindeman, Philip B. Stark:
SOBA: Secrecy-preserving Observable Ballot-level Audit. EVT/WOTE 2011 - [i2]Josh Benaloh, Douglas W. Jones, Eric Lazarus, Mark Lindeman, Philip B. Stark:
SOBA: Secrecy-preserving Observable Ballot-level Audit. CoRR abs/1105.5803 (2011) - [i1]R. Michael Alvarez, Josh Benaloh, Alon Rosen, Peter Y. A. Ryan:
Verifiable Elections and the Public (Dagstuhl Seminar 11281). Dagstuhl Reports 1(7): 36-52 (2011) - 2010
- [e1]David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida:
Towards Trustworthy Elections, New Directions in Electronic Voting. Lecture Notes in Computer Science 6000, Springer 2010, ISBN 978-3-642-12979-7 [contents]
2000 – 2009
- 2009
- [j2]Josh Benaloh, Tal Moran, Lee Naish, Kim Ramchen, Vanessa Teague:
Shuffle-sum: coercion-resistant verifiable tallying for STV voting. IEEE Trans. Inf. Forensics Secur. 4(4): 685-698 (2009) - [c15]Josh Benaloh, Melissa Chase, Eric Horvitz, Kristin E. Lauter:
Patient controlled encryption: ensuring privacy of electronic medical records. CCSW 2009: 103-114 - [c14]Ariel J. Feldman, Josh Benaloh:
On Subliminal Channels in Encrypt-on-Cast Voting Systems. EVT/WOTE 2009 - 2008
- [c13]Josh Benaloh:
Administrative and Public Verifiability: Can We Have Both? EVT 2008 - 2007
- [c12]Josh Benaloh:
Ballot Casting Assurance via Voter-Initiated Poll Station Auditing. EVT 2007 - 2006
- [c11]Josh Benaloh:
Simple Verifiable Elections. EVT 2006 - 2003
- [c10]Patrice Y. Simard, Richard Szeliski, Josh Benaloh, Julien Couvreur, Iulian Calinov:
Using Character Recognition and Segmentation to Tell Computer from Humans. ICDAR 2003: 418-423 - 2002
- [c9]John R. Douceur, Atul Adya, Josh Benaloh, William J. Bolosky, Gideon Yuval:
A Secure Directory Service based on Exclusive Encryption. ACSAC 2002: 172-182
1990 – 1999
- 1997
- [j1]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier:
The risks of key recovery, key escrow, and trusted third-party encryption. World Wide Web J. 2: 241-257 (1997) - 1994
- [c8]Josh Cohen Benaloh, Dwight Tuinstra:
Receipt-free secret-ballot elections (extended abstract). STOC 1994: 544-553 - 1993
- [c7]Josh Cohen Benaloh, Michael de Mare:
One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract). EUROCRYPT 1993: 274-285
1980 – 1989
- 1988
- [c6]Josh Cohen Benaloh, Jerry Leichter:
Generalized Secret Sharing and Monotone Functions. CRYPTO 1988: 27-35 - 1986
- [c5]Josh Cohen Benaloh:
Cryptographic Capsules: A Disjunctive Primative for Interactive Protocols. CRYPTO 1986: 213-222 - [c4]Josh Cohen Benaloh:
Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing. CRYPTO 1986: 251-260 - [c3]Josh Cohen Benaloh, Moti Yung:
Distributing the Power of a Government to Enhance the Privacy of Voters (Extended Abstract). PODC 1986: 52-62 - 1985
- [c2]Josh D. Cohen, Michael J. Fischer:
A Robust and Verifiable Cryptographically Secure Election Scheme (Extended Abstract). FOCS 1985: 372-382
1970 – 1979
- 1979
- [c1]Josh D. Cohen, David Y. Y. Yun:
Algebraic extensions of arbitrary integral domains. EUROSAM 1979: 134-139
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint