Associate Professor Vanessa Teague

  • Room: Level: 09 Room: 9.29
  • Building: Doug McDonell Building
  • Campus: Parkville

Research interests

  • Electronic voting
  • IT security & privacy
  • cryptography
  • cybersecurity

Personal webpage

http://people.eng.unimelb.edu.au/vjteague/

Biography

Vanessa Teague is a Senior Lecturer in the Department of Computing and Information Systems at at The University of Melbourne. She did her Bachelor's Degree at The University of Melbourne and her Ph.D. in cryptography and game theory at Stanford University.

Her main research interest is in electronic voting, with a focus on cryptographic schemes for end-to-end verifiable elections and a special interest in complex voting schemes such as STV. She was a major contributor to the Victorian Electoral Commission's end-to-end verifiable electronic voting project, the first of its kind to run at a state level anywhere in the world, joint work with Chris Culnane, Peter Ryan and Steve Schneider. She recently discovered, with Alex Halderman, serious security vulnerabilities in the NSW iVote Internet voting system.

In an effort to comply with Australian law controlling the export of cryptography, all cryptography research for which she does not have an explicit permit is published openly online.  See https://www.sharelatex.com/project/56d7e2eb6eb914c61613fcdb   for the current un-licensed project.

She has been invited to appear before several parliamentary inquiries into elections at the state and federal level, to answer questions on electronic voting.

She is on the advisory board of Verified Voting and has been co-chair of the USENIX Electronic Voting Technologies Workshop and the International conference on E-voting and identity.

Recent publications

  1. Blom, M.; Stuckey, PJ.; Teague, VJ. Ballot-Polling Risk Limiting Audits for IRV Elections. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer. 2018, Vol. 11143 LNCS, pp. 17-34. DOI: 10.1007/978-3-030-00419-4_2
  2. Blom, M.; Stuckey, PJ.; Teague, VJ. Computing the Margin of Victory in Preferential Parliamentary Elections. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer. 2018, Vol. 11143 LNCS, pp. 1-16. DOI: 10.1007/978-3-030-00419-4_1
  3. Benaloh, J.; Ryan, PYA.; Schneider, S.; Teague, V. A Vote of Confidence?. IEEE Security & Privacy. 2017, Vol. 15, Issue 3, pp. 12-13. DOI: 10.1109/MSP.2017.53
  4. Conway, A.; Blom, M.; Naish, L.; Teague, V. An analysis of New South Wales electronic vote counting. ACM International Conference Proceeding Series. 2017. DOI: 10.1145/3014812.3014837
  5. Ryan, PYA.; Teague, V. Preface: VOTING 2017: Second workshop on advances in secure electronic voting schemes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2017, Vol. 10323 LNCS, pp. IX-X.
  6. Roohi, L.; Teague, V. Privacy-preserving queries over secret-shared graph-structured data. . 2017, pp. 955-960. DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.336
  7. Bernhard, M.; Benaloh, J.; Alex Halderman, J.; Rivest, RL.; Ryan, PYA.; Stark, PB.; Teague, V.; Vora, PL.; Wallach, DS. Public evidence from secret ballots. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). springer. 2017, Vol. 10615 LNCS, pp. 84-109. DOI: 10.1007/978-3-319-68687-5_6
  8. Akinyokun, N.; Teague, V. Security and privacy implications of NFC-enabled contactless payment systems. ACM International Conference Proceeding Series. Association for Computing Machinery (ACM). 2017, Vol. Part F130521. DOI: 10.1145/3098954.3103161
  9. Culnane, C.; Eldridge, M.; Essex, A.; Teague, V. Trust implications of DDoS protection in online elections. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER. 2017, Vol. 10615 LNCS, pp. 127-145. DOI: 10.1007/978-3-319-68687-5_8
  10. Gibson, JP.; Krimmer, R.; Teague, V.; Pomares, J. A review of E-voting: the past, present and future. Annals of Telecommunications. 2016, Vol. 71, Issue 7-8, pp. 279-286. DOI: 10.1007/s12243-016-0525-8
  11. Blom, M.; Teague, V.; Stuckey, PJ.; Tidhar, R. Efficient Computation of Exact IRV Margins. Frontiers in Artificial Intelligence and Applications. IOS PRESS. 2016, Vol. 285, pp. 480-488. DOI: 10.3233/978-1-61499-672-9-480
  12. Ryan, PYA.; Schneider, S.; Teague, V. Prêt à voter-the evolution of the species. . 2016, pp. 309-341. DOI: 10.1201/9781315371290
  13. Culnane, C.; Teague, V. Strategies for Voter-Initiated Election Audits. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER INT PUBLISHING AG. 2016, Vol. 9996, pp. 235-247. DOI: 10.1007/978-3-319-47413-7_14
  14. Ryan, PYA.; Schneider, S.; Teague, V. End-to-End Verifiability in Voting Systems, from Theory to Practice. IEEE Security & Privacy. IEEE COMPUTER SOC. 2015, Vol. 13, Issue 3, pp. 59-62. DOI: 10.1109/MSP.2015.54
  15. Kulyk, O.; Teague, V.; Volkamer, M. Extending Helios Towards Private Eligibility Verifiability. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER-VERLAG BERLIN. 2015, Vol. 9269, pp. 57-73. DOI: 10.1007/978-3-319-22270-7_4
  16. Halderman, JA.; Teague, V. The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). SPRINGER-VERLAG BERLIN. 2015, Vol. 9269, pp. 35-53. DOI: 10.1007/978-3-319-22270-7_3
  17. Culnane, C.; Ryan, PYA.; Schneider, S.; Teague, V. vVote: A Verifiable Voting System. ACM Transactions on Information and System Security. ASSOC COMPUTING MACHINERY. 2015, Vol. 18, Issue 1. DOI: 10.1145/2746338
  18. Heather, J.; Schneider, S.; Teague, V. Cryptographic protocols with everyday objects. Formal Aspects of Computing. SPRINGER. 2014, Vol. 26, Issue 1, pp. 37-62. DOI: 10.1007/s00165-013-0274-7
  19. Schneide, S.; Teague, V.; Culnane, C.; Heather, J. Special section on vote-ID 2013. Journal of Information Security and Applications. 2014, Vol. 19, Issue 2, pp. 103-104. DOI: 10.1016/j.jisa.2014.06.002
  20. Stark, PB.; Teague, V. Veriable European Elections: Risk-limiting Audits for D'Hondt and Its Relatives. Journal of Election Technology and Systems (JETS). USENIX. 2014, Vol. 3, Issue 1, pp. 18-39.

View a full list of publications on the University of Melbourne’s ‘Find An Expert’ profile