• Publications
  • Influence
PrÊt À Voter: a Voter-Verifiable Voting System
TLDR
This paper presents the key elements of the approach and describes the evolution of the design and their suitability in various contexts. Expand
  • 172
  • 19
How to prevent type flaw attacks on security protocols
TLDR
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. Expand
  • 199
  • 13
  • PDF
Turnitoff: identifying and fixing a hole in current plagiarism detection software
TLDR
We demonstrate that, in its current incarnation, one can easily create a document that passes the plagiarism check regardless of how much copied material it contains; we then show how to improve the system to avoid such attacks. Expand
  • 36
  • 6
  • PDF
Decombinator: a tool for fast, efficient gene assignment in T-cell receptor sequences using a finite state machine
TLDR
SUMMARY High-throughput sequencing provides an opportunity to analyse the repertoire of antigen-specific receptors with an unprecedented breadth and depth. Expand
  • 84
  • 5
  • PDF
Epigenetic Control of Viral Life-Cycle by a DNA-Methylation Dependent Transcription Factor
Epstein-Barr virus (EBV) encoded transcription factor Zta (BZLF1, ZEBRA, EB1) is the prototype of a class of transcription factor (including C/EBPalpha) that interact with CpG-containing DNA responseExpand
  • 46
  • 5
  • PDF
How to prevent type flaw attacks on security protocols
TLDR
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. Expand
  • 48
  • 5
The Epstein–Barr virus lytic cycle activator Zta interacts with methylated ZRE in the promoter of host target gene egr1
Activation of the host gene egr1 is essential for the lytic replication of Epstein–Barr virus (EBV). egr1 is activated by Zta (BZLF1, ZEBRA). Zta interacts directly with DNA through a series ofExpand
  • 35
  • 3
Implementing STV securely in Pret a Voter
  • J. Heather
  • Computer Science
  • 20th IEEE Computer Security Foundations Symposium…
  • 6 July 2007
TLDR
This paper investigates the possibility of modifying Pret a Voter to cope with a single transferable vote system, in which the voter needs to indicate not just a single preferred candidate but a preference ranking of (some or all of) the candidates. Expand
  • 39
  • 2
  • PDF
The Prêt à Voter Verifiable Election System
The Prˆet `a Voter election system has undergone several revisions and enhancements since its inception in 2004, resulting in a family of election systems designed to provide end-to-end verifiabilityExpand
  • 32
  • 2
  • PDF
Towards automatic verification of authentication protocols on an unbounded network
TLDR
This paper presents a decision procedure by which one may either construct a rank function, proving correctness of the protocol, or show that no rank function exists. Expand
  • 56
  • 1
  • PDF