Scantegrity: End-to-end voter-verifiable optical-scan voting D Chaum, A Essex, R Carback, J Clark, S Popoveniuc, A Sherman, ... IEEE Security & Privacy 6 (3), 40-46, 2008 | 250 | 2008 |
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. D Chaum, R Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ... EVT 8 (1), 13, 2008 | 230 | 2008 |
Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection F Salo, AB Nassif, A Essex Computer Networks 148, 164-175, 2019 | 180 | 2019 |
Scantegrity II municipal election at Takoma Park: the first E2E binding governmental election with ballot privacy R Carback, D Chaum, J Clark, J Conway, A Essex, P Hernson, ... USENIX Security Symposium, 2010 | 154 | 2010 |
Commitcoin: Carbon dating commitments with bitcoin J Clark, A Essex International conference on financial cryptography and data security, 390-398, 2012 | 126 | 2012 |
Scantegrity II: End-to-end verifiability by voters of optical scan elections through confirmation codes D Chaum, RT Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ... IEEE transactions on information forensics and security 4 (4), 611-627, 2009 | 123 | 2009 |
Remotegrity: Design and use of an end-to-end verifiable remote voting system F Zagórski, RT Carback, D Chaum, J Clark, A Essex, PL Vora International Conference on Applied Cryptography and Network Security, 441-457, 2013 | 96 | 2013 |
Data mining techniques in intrusion detection systems: A systematic literature review F Salo, M Injadat, AB Nassif, A Shami, A Essex IEEE Access 6, 56046-56058, 2018 | 86 | 2018 |
Bayesian optimization with machine learning algorithms towards anomaly detection MN Injadat, F Salo, AB Nassif, A Essex, A Shami 2018 IEEE global communications conference (GLOBECOM), 1-6, 2018 | 57 | 2018 |
Punchscan in practice: An E2E election case study A Essex, J Clark, R Carback, S Popoveniuc Proceedings of Workshop on Trustworthy Elections, 2007 | 49 | 2007 |
Secure linkage of databases K El Emam, A Essex, B Eze, M Tucciarone US Patent 9,503,432, 2016 | 33 | 2016 |
Eperio: Mitigating technical complexity in cryptographic election verification A Essex, C Adams 2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2010 | 32 | 2010 |
A protocol for the secure linking of registries for HPV surveillance K El Emam, S Samet, J Hu, L Peyton, C Earle, GC Jayaraman, T Wong, ... PLoS One 7 (7), e39915, 2012 | 31 | 2012 |
The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios N Chang-Fong, A Essex Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 30 | 2016 |
Verifiable European Elections: Risk-limiting Audits for {D’Hondt} and Its Relatives PB Stark, V Teague, A Essex USENIX Journal of Election Technology and Systems (JETS) 1, 18-39, 2014 | 27 | 2014 |
Cobra: Toward Concurrent Ballot Authorization for Internet Voting A Essex, J Clark, U Hengartner EVT/WOTE, 2012 | 27 | 2012 |
Scantegrity mock election at Takoma Park AT Sherman, R Carback, D Chaum, J Clark, A Essex, PS Herrnson, ... 4th International Conference on Electronic Voting 2010, 2010 | 27 | 2010 |
Secure and observable auditing of electronic voting systems using stock indices J Clark, A Essex, C Adams 2007 Canadian Conference on Electrical and Computer Engineering, 788-791, 2007 | 24 | 2007 |
How to print a secret A Essex, J Clark, U Hengartner, C Adams Proceedings of the 4th USENIX conference on Hot topics in security, Hot-Sec …, 2009 | 22 | 2009 |
On the security of ballot receipts in E2E voting systems J Clark, A Essex, C Adams Proceedings of Workshop on Trustworthy Elections, 2007 | 21 | 2007 |