Home > Research > Browse

Results for Auditing

Publications & Outputs

  1. A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Private lenders’ demand for audit

    Baylis, R., Burnap, P., Clatworthy, M., Gad Mahmoud, M. & Pong, C., 08/2017, In: Journal of Accounting and Economics. 64, 1, p. 78-97 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review