Personal information

Cryptography, Information Flow Security, Electronic Voting, Formal Verification, Theorem Proving
United Kingdom

Activities

Works (9)

Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications

2023-11-15 | Conference paper
Contributors: Toby Murray; Mukesh Tiwari; Gidon Ernst; David A. Naumann
Source: check_circle
Crossref

Verifiable homomorphic tallying for the schulze vote counting scheme

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2020 | Book
EID:

2-s2.0-85082459194

Part of ISBN:

16113349 03029743

Contributors: Haines, T.; Pattinson, D.; Tiwari, M.
Source: Self-asserted source
Mukesh Tiwari via Scopus - Elsevier

Verifpal: Cryptographic Protocol Analysis for the Real World

Progress in Cryptology – INDOCRYPT 2020
2020 | Book chapter
Part of ISBN: 9783030652760
Part of ISBN: 9783030652777
Part of ISSN: 0302-9743
Part of ISSN: 1611-3349
Contributors: Mukesh Tiwari; Nadim Kobeissi; Georgio Nicolas; Mukesh Tiwari
Source: Self-asserted source
Mukesh Tiwari

Verified verifiers for verifying elections

Proceedings of the ACM Conference on Computer and Communications Security
2019 | Conference paper
EID:

2-s2.0-85075921528

Contributors: Haines, T.; Goré, R.; Tiwari, M.
Source: Self-asserted source
Mukesh Tiwari via Scopus - Elsevier

Modular Formalisation and Verification of STV Algorithms

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018 | Book
EID:

2-s2.0-85054750846

Contributors: Ghale, M.K.; Goré, R.; Pattinson, D.; Tiwari, M.
Source: Self-asserted source
Mukesh Tiwari via Scopus - Elsevier

No more excuses: Automated synthesis of practical and verifiable vote-counting programs for complex voting schemes

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Book
EID:

2-s2.0-85032489717

Contributors: Bennett Moses, L.; Goré, R.; Levy, R.; Pattinson, D.; Tiwari, M.
Source: Self-asserted source
Mukesh Tiwari via Scopus - Elsevier

Schulze voting as evidence carrying computation

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Book
EID:

2-s2.0-85029506121

Contributors: Pattinson, D.; Tiwari, M.
Source: Self-asserted source
Mukesh Tiwari via Scopus - Elsevier

Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information

2009 Fourth International Conference on Computer Sciences and Convergence Information Technology
2009 | Conference paper
Contributors: Mukesh Tiwari; Mukesh Tiwari; Karm Veer Arya; Rahul Choudhari; Kumar Sidharth Choudhary
Source: Self-asserted source
Mukesh Tiwari

Performance Evaluation of SCTP-Sec: A Secure SCTP Mechanism

2009 Fourth International Conference on Computer Sciences and Convergence Information Technology
2009 | Conference paper
Contributors: Mukesh Tiwari; Rahul Choudhari; K. V. Arya; Mukesh Tiwari; Kumar Sidharth Choudhary
Source: Self-asserted source
Mukesh Tiwari

Peer review (1 review for 1 publication/grant)

Review activity for Sādhanā. (1)