Fadi Salo, Ali Bou Nassif, Aleksander Essex. Dimensionality Reduction with IG-PCA and Ensemble Classifiers for Network Intrusion Detection. Neurocomputing. In submission.
Aleksander Essex. Detecting the Detectable: Unintended Consequences of Cryptographic Election Verification. IEEE Security & Privacy, 15(3), pp. 30-38, 2017.
Geoffrey M Jacquez, Aleksander Essex, Andrew Curtis and others. Geospatial cryptography: Accelerating human subjects research in cancer control and surveillance. International Journal of Geographic Information Science.19(3) pp. 197-220, 2017
Khaled El Emam, Hanna Farah, Saeed Samet, Aleksander Essex, Elizabeth Jonker, Murat Kantarcioglu, Craig C. Earle. A Privacy Preserving Protocol for Tracking Participants in Phase I Clinical Trials. Journal of Biomedical Informatics (BMI). Journal of Biomedical Informatics (BMI) 57, pp.145-162, 2015.
Ester Moher, Jeremy Clark, Aleksander Essex. Diffusion of Voter Responsibility: Potential Failings in E2E Receipt Checking. Journal of Election Technology and Systems (JETS) 3(1), 2014.
Khaled El Emam, Luk Arbuckle, Aleksander Essex, Saeed Samet, Benjamin Eze, Grant Middleton, David Buckeridge, Elizabeth Jonker, Ester Moher, Craig Earle. Secure Surveillance of Antimicrobial Resistant Organism Colonization or Infection in Ontario Long Term Care Homes. Public Library of Science ONE (PLoS One) 9(5), 2014.
Aleksander Essex. Homomorphic Threshold Functions for Approximate String Matching and Privacy-Preserving Record Linkage. Financial Cryptography (FC 2018). In submission.
Rhys Carlton, Aleksander Essex and Krzysztof Kapulkin. Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comaprisons. RSA Cryptographer’s Track (RSA-CT 2018). In submission.
Chris Culnane, Mark Eldridge, Aleksander Essex and Vanessa Teague. Trust Implications of DDoS Protection in Online Elections. International Joint Conference on Electronic Voting (E-Vote-ID), LNCS vol. 10615, pp.127-145, 2017.
Kristen Dorey, Nicholas Chang-Fong and Aleksander Essex. Indiscreet Logs: Diffie-Hellman Backdoors in TLS. Network and Distributed System Security Symposium (NDSS), 2017. (A/R: 16%, Tier-1 Security conference)
Nicholas Chang-Fong and Aleksander Essex. The Cloudier Side of Cryptographic End-to-end Verifiable Voting: A Security Analysis of Helios. 32nd Annual Conference on Security Applications Conference (ACSAC), 2016. (A/R: 21%)
Filip Zagorski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, and Poorvi Vora. Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System (ACNS), 2013.