Towards Building Active Defense Systems for Software Applications
In: Dinur I., Dolev S., Lodha S. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2018. Lecture Notes in Computer Science, vol 10879. Springer, Cham
Zara Perumal and Kalyan Veeramachaneni
Publisher's website
Zara Perumal and Kalyan Veeramachaneni
The State and Local Election Cybersecurity Playbook
The State and Local Election Cybersecurity Playbook. Harvard Kennedy School Belfer Center for Science and International Affairs. February 2018. Accessed February 21, 2018. https://www.belfercenter.org/publication/state-and-local-election-cybersecurity-playbook.
Berger, Meredith, Charles Chretien, Caitlin Conley, Jordan D’Amato, Meredith Davis-Tavera, Corinna Fehst, Josh Feinblum, Kunal Kothari, Alexander Krey, Richard Kuzma, Ryan Macias, Katherine Mansted, Matthew McCalpin, Henry Miller, Jennifer Nam, Zara Perumal, Jonathan Pevarnek, Anu Saha, Mike Specter, and Sarah Starr.
Publisher's website
Berger, Meredith, Charles Chretien, Caitlin Conley, Jordan D’Amato, Meredith Davis-Tavera, Corinna Fehst, Josh Feinblum, Kunal Kothari, Alexander Krey, Richard Kuzma, Ryan Macias, Katherine Mansted, Matthew McCalpin, Henry Miller, Jennifer Nam, Zara Perumal, Jonathan Pevarnek, Anu Saha, Mike Specter, and Sarah Starr.
BatchVote: Voting rules designed for auditability
In International Conference on Financial Cryptography and Data Security, pp. 317-333. Springer, Cham, 2017.
Rivest, Ronald L., Philip B. Stark, and Zara Perumal
Publisher's website
Rivest, Ronald L., Philip B. Stark, and Zara Perumal
Auditing Australian Senate Ballots
Berj Chilingirian, Zara Perumal, Ronald L. Rivest, Grahame Bowland, Andrew Conway, Philip B. Stark, Michelle Blom, Chris Culnane, Vanessa Teague