Follow
Mukesh Tiwari
Title
Cited by
Cited by
Year
Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information
M Tiwari, KV Arya, R Choudhari, KS Choudhary
2009 Fourth International Conference on Computer Sciences and Convergence …, 2009
902009
Verifpal: Cryptographic Protocol Analysis for the Real World
N Kobeissi, G Nicolas, M Tiwari
International Conference on Cryptology in India, 151-202, 2020
452020
Verified verifiers for verifying elections
T Haines, R Goré, M Tiwari
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
172019
Modular formalisation and verification of STV algorithms
MK Ghale, R Goré, D Pattinson, M Tiwari
Electronic Voting: Third International Joint Conference, E-Vote-ID 2018 …, 2018
122018
Verifiable homomorphic tallying for the Schulze vote counting scheme
T Haines, D Pattinson, M Tiwari
Verified Software. Theories, Tools, and Experiments: 11th International …, 2020
92020
Schulze voting as evidence carrying computation
D Pattinson, M Tiwari
Interactive Theorem Proving: 8th International Conference, ITP 2017 …, 2017
82017
Verifpal: Cryptographic Protocol Analysis for Students and Engineers.
N Kobeissi
IACR Cryptol. ePrint Arch. 2019, 971, 2019
62019
Verifpal: Cryptographic Protocol Analysis for Students and Engineers.
N Kobeissi
IACR Cryptol. ePrint Arch. 2019, 971, 2019
62019
No more excuses: Automated synthesis of practical and verifiable vote-counting programs for complex voting schemes
L Bennett Moses, R Goré, R Levy, D Pattinson, M Tiwari
Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017
52017
Verifpal
N Kobeissi, G Nicolas, M Tiwari
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security …, 2020
22020
Performance Evaluation of SCTP-Sec: A Secure SCTP Mechanism
R Choudhari, KV Arya, M Tiwari, KS Choudhary
2009 Fourth International Conference on Computer Sciences and Convergence …, 2009
22009
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications (Extended Version)
T Murray, M Tiwari, G Ernst, DA Naumann
arXiv preprint arXiv:2309.03442, 2023
12023
Machine Checked Properties of the Schulze Method
M Tiwari, D Pattinson
7th Workshop on Hot Issues in Security Principles and Trust, 2021
12021
Formally Verified Verifiable Electronic Voting Scheme
M Tiwari
PQDT-Global, 2021
12021
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications
T Murray, M Tiwari, G Ernst, DA Naumann
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
2023
Machine-checking {Multi-Round} Proofs of Shuffle:{Terelius-Wikstrom} and {Bayer-Groth}
T Haines, R Goré, M Tiwari
32nd USENIX Security Symposium (USENIX Security 23), 6471-6488, 2023
2023
Verifying the Security of a PGP Keyserver (Abstract for the VerifyThis challenge 2020)
G Ernst, T Murray, M Tiwari
Submitted and Presented Solutions (Online Presentation, 27 April 2020), 14, 2020
2020
PI in Cryptography
M Tiwari
The system can't perform the operation now. Try again later.
Articles 1–18