default search action
Rolf Haenni
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2016
- [j17]Philipp Locher, Rolf Haenni:
Receipt-free remote electronic elections with everlasting privacy. Ann. des Télécommunications 71(7-8): 323-336 (2016) - 2013
- [j16]Rolf Haenni, Reto E. Koenig:
A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes. Comput. Secur. 33: 59-69 (2013) - 2009
- [j15]Fábio Gagliardi Cozman, Rolf Haenni, Jan-Willem Romeijn, Federica Russo, Gregory R. Wheeler, Jon Williamson:
Combining Probability and Logic. J. Appl. Log. 7(2): 131-135 (2009) - [j14]Rolf Haenni:
Probabilistic argumentation. J. Appl. Log. 7(2): 155-176 (2009) - 2006
- [j13]Rolf Haenni, Stephan Hartmann:
Modeling partially reliable information sources: A general approach based on Dempster-Shafer theory. Inf. Fusion 7(4): 361-379 (2006) - [j12]Rolf Haenni, Stephan Hartmann:
Special Issue of Minds and Machines on Causality, Uncertainty and Ignorance. Minds Mach. 16(3): 237-238 (2006) - 2005
- [j11]Rolf Haenni:
Using probabilistic argumentation for key validation in public-key cryptography. Int. J. Approx. Reason. 38(3): 355-376 (2005) - 2004
- [j10]Rolf Haenni:
Ordered valuation algebras: a generic framework for approximating inference. Int. J. Approx. Reason. 37(1): 1-41 (2004) - 2003
- [j9]Rolf Haenni, Norbert Lehmann:
Implementing belief function computations. Int. J. Intell. Syst. 18(1): 31-49 (2003) - [j8]Rolf Haenni, Norbert Lehmann:
Probabilistic argumentation systems: a new perspective on the dempster-shafer theory. Int. J. Intell. Syst. 18(1): 93-106 (2003) - [j7]Rolf Haenni:
Anytime argumentative and abductive reasoning. Soft Comput. 8(2): 142-149 (2003) - 2002
- [j6]Jürg Kohlas, Dritan Berzati, Rolf Haenni:
Probabilistic Argumentation Systems and Abduction. Ann. Math. Artif. Intell. 34(1-3): 177-195 (2002) - [j5]Rolf Haenni, Norbert Lehmann:
Resource bounded and anytime approximation of belief function computations. Int. J. Approx. Reason. 31(1-2): 103-154 (2002) - [j4]Rolf Haenni:
Are alternatives to Dempster's rule of combination real alternatives?: Comments on "About the belief function combination and the conflict management problem" - Lefevre et al. Inf. Fusion 3(3): 237-239 (2002) - 2001
- [j3]Rolf Haenni:
Cost-bounded argumentation. Int. J. Approx. Reason. 26(2): 101-127 (2001) - 1999
- [j2]Jürg Kohlas, Rolf Haenni, Serafín Moral:
Propositional Information Systems. J. Log. Comput. 9(5): 651-681 (1999) - 1998
- [j1]Jürg Kohlas, Bernhard Anrig, Rolf Haenni, Paul-André Monney:
Model-Based Diagnostics and Probabilistic Assumption-Based Reasoning. Artif. Intell. 104(1-2): 71-106 (1998)
Conference and Workshop Papers
- 2023
- [c48]Rolf Haenni, Reto E. Koenig, Philipp Locher:
Private Internet Voting on Untrusted Voting Devices. FC Workshops 2023: 47-62 - 2020
- [c47]Rolf Haenni, Eric Dubuis, Reto E. Koenig, Philipp Locher:
CHVote: Sixteen Best Practices and Lessons Learned. E-VOTE-ID 2020: 95-111 - [c46]Rolf Haenni, Philipp Locher:
Performance of Shuffling: Taking It to the Limits. Financial Cryptography Workshops 2020: 369-385 - 2019
- [c45]Rolf Haenni, Philipp Locher, Nicolas Gailly:
Improving the Performance of Cryptographic Voting Protocols. Financial Cryptography Workshops 2019: 272-288 - 2018
- [c44]Pascal Mainini, Rolf Haenni:
Outsourcing Modular Exponentiation in Cryptographic Web Applications. Financial Cryptography Workshops 2018: 181-195 - [c43]Severin Hauser, Rolf Haenni:
Modeling a Bulletin Board Service Based on Broadcast Channels with Memory. Financial Cryptography Workshops 2018: 232-246 - [c42]Rolf Haenni, Eric Dubuis, Reto E. Koenig, Philipp Locher:
Process Models for Universally Verifiable Elections. E-Vote-ID 2018: 84-99 - 2017
- [c41]Rolf Haenni, Philipp Locher, Reto E. Koenig, Eric Dubuis:
Pseudo-Code Algorithms for Verifiable Re-encryption Mix-Nets. Financial Cryptography Workshops 2017: 370-384 - 2016
- [c40]Severin Hauser, Rolf Haenni:
A Generic Interface for the Public Bulletin Board Used in UniVote. CeDEM 2016: 49-56 - [c39]Philipp Locher, Rolf Haenni, Reto E. Koenig:
Coercion-Resistant Internet Voting with Everlasting Privacy. Financial Cryptography Workshops 2016: 161-175 - [c38]Rolf Haenni, Reto E. Koenig, Eric Dubuis:
Cast-as-Intended Verification in Electronic Elections Based on Oblivious Transfer. E-VOTE-ID 2016: 73-91 - 2015
- [c37]Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. ARES 2015: 224-229 - [c36]Philipp Locher, Rolf Haenni:
Verifiable Internet Elections with Everlasting Privacy and Minimal Trust. VoteID 2015: 74-91 - 2014
- [c35]Philipp Locher, Rolf Haenni:
A Lightweight Implementation of a Shuffle Proof for Electronic Voting Systems. GI-Jahrestagung 2014: 1391-1400 - 2013
- [c34]Eric Dubuis, Stephan Fischli, Rolf Haenni, Severin Hauser, Reto E. Koenig, Philipp Locher, J. Ritter, Philémon von Bergen:
Verifizierbare Internet-Wahlen an Schweizer Hochschulen mit UniVote. GI-Jahrestagung 2013: 767-788 - [c33]Reto E. Koenig, Philipp Locher, Rolf Haenni:
Attacking the Verification Code Mechanism in the Norwegian Internet Voting System. VoteID 2013: 76-92 - 2012
- [c32]Oliver Spycher, Reto E. Koenig, Rolf Haenni, Michael Schläpfer:
Achieving Meaningful Efficiency in Coercion-Resistant, Verifiable Internet Voting. Electronic Voting 2012: 113-125 - 2011
- [c31]Oliver Spycher, Reto E. Koenig, Rolf Haenni, Michael Schläpfer:
A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time. Financial Cryptography 2011: 182-189 - [c30]Reto E. Koenig, Rolf Haenni, Stephan Fischli:
Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes. SEC 2011: 116-127 - [c29]Rolf Haenni, Oliver Spycher:
Secure Internet Voting on Limited Devices with Anonymized DSA Public Keys. EVT/WOTE 2011 - [c28]Michael Schläpfer, Rolf Haenni, Reto E. Koenig, Oliver Spycher:
Efficient Vote Authorization in Coercion-Resistant Internet Voting. VoteID 2011: 71-88 - 2010
- [c27]Reto E. Koenig, Eric Dubuis, Rolf Haenni:
Why Public Registration Boards are Required in E-Voting Systems Based on Threshold Blind Signature Protocols. Electronic Voting 2010: 255-266 - [c26]Oliver Spycher, Rolf Haenni, Eric Dubuis:
Coercion-Resistant Hybrid Voting Systems. Electronic Voting 2010: 269-282 - [c25]Oliver Spycher, Rolf Haenni:
A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting System. ISSA 2010 - [c24]Raouia Ayachi, Nahla Ben Amor, Salem Benferhat, Rolf Haenni:
Compiling Possibilistic Networks: Alternative Approaches to Possibilistic Inference. UAI 2010: 40-47 - 2008
- [c23]Reto Kohlas, Jacek Jonczy, Rolf Haenni:
A Trust Evaluation Method Based on Logic and Probability Theory. IFIPTM 2008: 17-32 - 2007
- [c22]Michael Wachter, Rolf Haenni:
Multi-state Directed Acyclic Graphs. Canadian AI 2007: 464-475 - [c21]Michael Wachter, Rolf Haenni:
Logical Compilation of Bayesian Networks with Discrete Variables. ECSQARU 2007: 536-547 - [c20]Reto Kohlas, Jacek Jonczy, Rolf Haenni:
A New Model for Public-Key Authentication. KiVS 2007: 213-224 - [c19]Michael Wachter, Rolf Haenni, Marc Pouly:
Optimizing Inference in Bayesian Networks and Semiring Valuation Algebras. MICAI 2007: 236-247 - [c18]Marc Pouly, Rolf Haenni, Michael Wachter:
Compiling Solution Configurations in Semiring Valuation Systems. MICAI 2007: 248-259 - 2006
- [c17]Rolf Haenni:
Uncover Dempster's Rule Where It Is Hidden. FUSION 2006: 1-8 - [c16]Jacek Jonczy, Rolf Haenni:
Implementing Credential Networks. iTrust 2006: 164-178 - [c15]Michael Wachter, Rolf Haenni:
Propositional DAGs: A New Graph-Based Language for Representing Boolean Functions. KR 2006: 277-285 - [c14]Reto Kohlas, Jacek Jonczy, Rolf Haenni:
Towards a precise semantics for authenticity and trust. PST 2006: 18 - 2005
- [c13]Rolf Haenni:
Unifying Logical and Probabilistic Reasoning. ECSQARU 2005: 788-799 - [c12]Rolf Haenni:
Towards a Unifying Theory of Logical and Probabilistic Reasoning. ISIPTA 2005: 193-202 - [c11]Jacek Jonczy, Rolf Haenni:
Credential Networks: a General Model for Distributed Trust and Authenticity Management. PST 2005 - 2003
- [c10]Rolf Haenni:
Web of Trust: Applying Probabilistic Argumentation to Public-Key Cryptography. ECSQARU 2003: 243-254 - [c9]Rolf Haenni, Norbert Lehmann:
ABEL: An Interactive Tool for Probabilistic Argumentative Reasoning. ECSQARU 2003: 588-593 - 2002
- [c8]Rolf Haenni:
Argumentative Reasoning with ABEL. JELIA 2002: 505-508 - [c7]Rolf Haenni:
A Query-Driven Anytime Algorithm for Argumentative and Abductive Reasoning. Soft-Ware 2002: 114-127 - 1999
- [c6]Norbert Lehmann, Rolf Haenni:
An Alternative to Outward Propagation for Dempster-Shafer Belief Functions. ESCQARU 1999: 256-267 - 1998
- [c5]Rolf Haenni:
Modelling uncertainty with propositional assumption-based systems. Applications of Uncertainty Formalisms 1998: 446-470 - [c4]Justin Picard, Rolf Haenni:
Modeling Information Retrieval with Probabilistic Argumentation Systems. BCS-IRSG Annual Colloquium on IR Research 1998 - [c3]Rolf Haenni:
Generating Diagnoses from Conflict Sets. FLAIRS 1998: 420-424 - 1997
- [c2]Bernhard Anrig, Rolf Haenni, Jürg Kohlas, Norbert Lehmann:
Assumption-Based Modeling Using ABEL. ECSQARU-FAPR 1997: 171-182 - 1995
- [c1]Jürg Kohlas, Paul-André Monney, Rolf Haenni, Norbert Lehmann:
Model-Based Diagnostics Using Hints. ECSQARU 1995: 259-266
Parts in Books or Collections
- 2009
- [p2]David-Olivier Jaquet-Chiffelle, Emmanuel Benoist, Rolf Haenni, Florent Wenger, Harald Zwingelberg:
Virtual Persons and Identities. The Future of Identity in the Information Society 2009: 75-122 - 2008
- [p1]Rolf Haenni, Jan-Willem Romeijn, Gregory R. Wheeler, Jon Williamson:
Possible Semantics for a Common Framework of Probabilistic Logics. Interval / Probabilistic Uncertainty and Non-Classical Logics 2008: 268-279
Editorship
- 2015
- [e1]Rolf Haenni, Reto E. Koenig, Douglas Wikström:
E-Voting and Identity - 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings. Lecture Notes in Computer Science 9269, Springer 2015, ISBN 978-3-319-22269-1 [contents]
Informal and Other Publications
- 2018
- [i5]Pascal Mainini, Rolf Haenni:
Outsourcing Modular Exponentiation in Cryptographic Web Applications. IACR Cryptol. ePrint Arch. 2018: 300 (2018) - 2017
- [i4]Rolf Haenni, Reto E. Koenig, Philipp Locher, Eric Dubuis:
CHVote System Specification. IACR Cryptol. ePrint Arch. 2017: 325 (2017) - 2015
- [i3]Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. IACR Cryptol. ePrint Arch. 2015: 558 (2015) - 2012
- [i2]Raouia Ayachi, Nahla Ben Amor, Salem Benferhat, Rolf Haenni:
Compiling Possibilistic Networks: Alternative Approaches to Possibilistic Inference. CoRR abs/1203.3465 (2012) - [i1]Reto E. Koenig, Rolf Haenni:
How to Store some Secrets. IACR Cryptol. ePrint Arch. 2012: 375 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint