Artículos
Tesis doctorales
Blockchain-based internet voting: systems’ compliance with international standards
Abramowicz W., Paschke A. (eds) Business Information Systems Workshops. BIS 2018. Lecture Notes in Business Information Processing, vol 339. Springer, Cham
wraudit: A Tool to Transparently Monitor Web Resources Integrity
Groza A., Prasath R. (eds) Mining Intelligence and Knowledge Exploration. MIKE 2018. Lecture Notes in Computer Science, vol 11308. Springer, Cham
Defining a national framework for online voting and meeting its requirements
Robert Krimmer, Melanie Volkamer, Véronique Cortier, David Duenas-Cid, Rajeev Goré, Manik Hapsara, Reto Koenig, Steven Martin, Ronan McDermott, Peter Roenne, Uwe Serdült, Tomasz Truderung (eds) Third International Joint Conference on Electronic Voting E-Vote-ID 2018 : 2–5 October 2018, Lochau/Bregenz, Austria: Proceedings, pp. 82-97
Improving Opinion Analysis through Statistical Disclosure Control in eVoting Scenarios
Kő A., Francesconi E. (eds) Electronic Government and the Information Systems Perspective. EGOVIS 2018. Lecture Notes in Computer Science, vol 11032. Springer, Cham
Proof of a shuffle for lattice-based cryptography
Lipmaa H., Mitrokotsa A., Matulevičius R. (eds) Secure IT Systems. NordSec 2017. Lecture Notes in Computer Science, vol 10674. Springer, Cham
Verifiability experiences in government online voting systems
Krimmer R., Volkamer M., Braun Binder N., Kersting N., Pereira O., Schürmann C. (eds) Electronic Voting. E-Vote-ID 2017. Lecture Notes in Computer Science, vol 10615. Springer, Cham
Distributed Immutabilization of Secure Logs
In Security and Trust Management Volume 9871 of the series Lecture Notes in Computer Science pp 122-137, Springer, 2016, proceedings of the Security and Trust Management (STM) conference, September 26-27 2016. Heraklion, Crete, Greece.
Transitioning to a Javascript Voting Client for Remote Online Voting
In Proceedings of the 13th International Joint Conference on Security and Cryptography (SECRYPT 2016). ISBN 978-989-758-196-0, pages 121-132. DOI: 10.5220/0005967301210132. July 2016, Portugal. (http://www.secrypt.icete.org/?y=2016)
How to challenge and cast your e-vote
20th International Conference on Financial Cryptography and Data Security (FC 2016). February 22-26 2016. Barbados.
Universal Cast-as-Intended Verifiability
1st Workshop on Advances in Secure Electronic Voting Schemes (VOTING'16). February 26th 2016. Barbados.
2015 Neuchâtel's Cast-as-Intended Verification Mechanism
VoteID 2015: The 5th International Conference on e-Voting and Identity. September 2-4 2015. Bern, Switzerland.
Response to the inaccuracies in the report by the US Vote Foundation and Galois Inc.
The future of voting end-to-end verifiable Internet Voting, Specification and feasibility assessment study, Barcelona, July 2015.
Almost IPP-codes or provably secure digital fingerprinting codes
Proceedings of IEEE International Symposium on Information Theory (ISIT 2015), Hong Kong, June 14-19, 2015
A comprehensive analysis of game-based ballot privacy definitions
Proceedings of 36th IEEE Symposium on Security and Privacy, S&P 2015, an Jose, California at The Fairmont, May 18-20, 2015
Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
Security Proofs for Embedded Systems PROOFS 2014, Busan, Korea, 2014
Virtual TPM for a secure cloud: fallacy or reality?
Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información : celebrado del 5 al 8 de septiembre 2014, Alicante, pp. 197-202
QR Steganography: A threat to new generation electronic voting systems
Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT 2014), pp. 484-491, SCITEPRESS, Vienna, Austria, 28-20 August 2014. (Copyrighted by SECRYPT)
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications
Proceedings of 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2014, Buenos Aires, Argentina, March 26-28, 2014
Fine-Tuning Groth-Sahai Proofs
Proceedings of 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2014, Buenos Aires, Argentina, March 26-28, 2014
MyUniversity eParticipation and decision making for higher education
Electronic Government and Electronic Participation: Joint Proceedings of Ongoing Research of IFIP EGOV and ePart 2013, Lecture Notes in Informatics, Vol. P-221, pp. 218-225 Köllen Verlag+Druck. Koblenz, Germany, September 2013.
E-democracy and e-voting: How to make them secure and transparent.
Latin American and Caribbean Consortium of Engineering Institutes Conference (LACCEI 2013). Cancun, Mexico, August 2013.
Cast-as-Intended Verification in Norway
Proceedings of the 5th Conference on Electronic Voting 2012 (EVOTE2012) P-167, LNI GI Series, Bonn. July 2012.
Cryptographic protocols for providing transparency and auditability in remote electronic voting schemes.
Spanish Cryptography Days (SCD 2011). Murcia, Spain. November 2011.
Las matemáticas en el mundo electoral
Más allá del simple recuento de votos.III Jornadas de la Red de Matemáticas en la Sociedad de la Información. Universitat Autònoma de Barcelona, November 2011.
Bringing Transparency to Internet Voting
TEDxBARCELONA Science 2011. Barcelona, Spain. November, 2011.
Internet Voting System with Cast as Intended Verification
VoteID 2011. Tallinn, Estonia, September 2011.
Practical considerations for the implementation of end-to-end verifiable eVoting
International eVoting PhD Workshop 2011 in Krems/Vienna (Austria). May 7-8, 2011
Implementación de la generación y firma RSA distribuida en procesos de voto electrónico.
Recsi 2010: XI Reunión española sobre criptología y seguridad de la información. Tarragona, September 2010.
Eficiencia y Privacidad en una Mixnet Universalmente Verificable
Recsi 2010: XI Reunión española sobre criptología y seguridad de la información. Tarragona, Septiembre 2010.
Verifiability on remote e-voting systems
Swiss E-Voting Workshop 2010. Friburg, September 2010.
Best practices in Internet Voting
NIST: Workshop on UOCAVA Remote Voting Systems. Washington DC, August 2010.
Universally Verifiable Efficient Re-encryption Mixnet
EVOTE2010: The 4th International Conference on Electronic Voting, Bregenz (Austria), July 2010.
Simple and Efficient Hash-based Verifiable Mixing for Remote Electronic Voting
Computer Communications, Volume 33, Issue 6, Pages 667-675, 15 April 2010.
Privacy and Anonymity Management in Electronic Voting
UPGRADE: Monographic in Identity and Privacy Management, Vol. XI, Issue 1, pages 59-95. February 2010.
New voter verification scheme using pre-encrypted ballots
Computer Communications, Volume 32, Issues 7-10, Pages 1219-1227, 28 May 2009.
Secure Remote Voter Registration
EVOTE08: The 3rd International Conference on Electronic Voting, Bregenz (Austria), August 2008.
Remote Voting Schemes: A Comparative Analysis
VOTE-ID 2007: First Conference on E-Voting and Identity, Bochum (Germany), October 2007.
Mobile Services for Parliamentarians: Drivers & Expectations
Sixth International EGOV Conference 2007 (EGOV 2007), Regensburg (Germany), September 2007.
Independent Voter Verifiability for Remote Electronic Voting
International Conference on Security and Cryptography (SECRYPT 2007), Barcelona (Spain), July 2007.
Technological Approach to Electronic Voting
Chapter of the book "El vot electronic a Catalunya: reptes i incerteses" ISBN 978-84-8334-808-6. Editorial Mediterrània/Fundació Jaume Bofill, April 2007.
Introduction to Remote Electronic Voting
esCERT Master on Information Security Technologies. (MTSI-5), Barcelona, January 2007.
Voter-Verifiability through Independent Electronic Verification Modules.
Workshop on Frontiers in Electronic Elections. (FEE 2005), Milan, September 2005.
Applied Cryptography Enabling Trustworthy Electronic Voting.
Workshop on Voter Verifiable Elections. Denver, July 2003
Advanced Security to Enable Trustworthy Electronic Voting.
3rd European Conference on e-Government. Trinity College , Dublin , June 2003.
Software Development for Online Voting. Conference "e-Voting: Challenges for the Society"
Praxis Center for Policy Studies. Tallinn, June 2003.
Internet Voting: Embracing Technology in Electoral Processes.
Chapter of the book "Electronic Government: Design, Application and Management". ISBN 1-930708-19-X. Idea Group Publishing, 2002.
Efficient Construction of Vote-Tags to Allow Open Objection to the Tally in Electronic Elections.
Information Processing Letters, Vol. 75, n. 4, pp. 211-215, October 2000.
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes.
Proceedings of the 1999 Network and Distributed Systems Security Symposium (NDSS'99), pp, 69-82. ISBN 1-891562-04-5, Internet Society, Reston, VA, 1999
An Uncoercible Verifiable Electronic Voting Scheme.
Proceedings of the IFIP TC11 14th International Conference on Information Security (SEC'98), pp. 349-362. ISBN 03-85403-116-5, Austrian Computer Society, Vienna, 1998.
Large Scale Elections by Coordinating Electoral Colleges.
Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC'97), pp. 349-362. ISBN 0-412-81780-2, Chapman & Hall, London, 1997
Individual Verifiability in Electronic Voting
Universitat Politècnica de Catalunya (UPC), Barcelona, 2016
Seguridad en los procesos de voto electrónico remoto: registro, votación, consolidación de resultados y auditoria.
ISBN 9788469225073, Publication Services of the UPC, Barcelona, 2009
Design of Implementable Solutions for Large Scale Electronic Voting Schemes.
ISBN 84-490-1810-2, Publication Services of the UAB, Bellaterra,1999.
Study and Development of a Cryptographic Scheme to Perform Secure Electronic Voting on a LAN.
ISBN 84-490-0763-1, Publication Services of the UAB, Bellaterra, 1996.