메뉴 건너뛰기




Volumn 3444, Issue , 2005, Pages 186-200

Analysis of an electronic voting protocol in the applied pi calculus

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; COMPUTER SCIENCE; COMPUTER SIMULATION; DATA PRIVACY;

EID: 23144432349     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-31987-0_14     Document Type: Conference Paper
Times cited : (164)

References (16)
  • 1
    • 35048861871 scopus 로고    scopus 로고
    • Just fast keying in the pi calculus
    • David Schmidt, editor, 13th European Symposium on Programming (ESOP'04), Barcelona, Spain, March Springer
    • Martín Abadi, Bruno Blanchet, and Cedric Fournet. Just fast keying in the pi calculus. In David Schmidt, editor, 13th European Symposium on Programming (ESOP'04), volume 2986 of Lecture Notes in Computer Science, pages 340-354, Barcelona, Spain, March 2004. Springer.
    • (2004) Lecture Notes in Computer Science , vol.2986 , pp. 340-354
    • Abadi, M.1    Blanchet, B.2    Fournet, C.3
  • 2
    • 35048822401 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • Josep Diaz, Juhani Karhumäki, Arto Lepistö, and Don Sannella, editors, 31st Int. Coll. Automata, Languages, and Programming (ICALP'04), Turku, Finland, July Springer
    • Martín Abadi and Véronique Cortier. Deciding knowledge in security protocols under equational theories. In Josep Diaz, Juhani Karhumäki, Arto Lepistö, and Don Sannella, editors, 31st Int. Coll. Automata, Languages, and Programming (ICALP'04), volume 3142 of Lecture Notes in Computer Science, pages 46-58, Turku, Finland, July 2004. Springer.
    • (2004) Lecture Notes in Computer Science , vol.3142 , pp. 46-58
    • Abadi, M.1    Cortier, V.2
  • 4
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • Steve Schneider, editor, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society Press
    • Bruno Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In Steve Schneider, editor, 14th IEEE Computer Security Foundations Workshop, pages 82-96, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society Press.
    • 14th IEEE Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 5
    • 3543058869 scopus 로고    scopus 로고
    • Automatic proof of strong secrecy for security protocols
    • Oakland, California, May
    • Bruno Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. In IEEE Symposium on Security and Privacy, pages 86-100, Oakland, California, May 2004.
    • (2004) IEEE Symposium on Security and Privacy , pp. 86-100
    • Blanchet, B.1
  • 6
    • 4944247375 scopus 로고    scopus 로고
    • Formal analysis of multi-party contract signing
    • Riccardo Focardi, editor, Asilomar, CA, USA, June 2004. IEEE Computer Society Press
    • Rohit Chadha, Steve Kremer, and Andre Scedrov. Formal analysis of multi-party contract signing. In Riccardo Focardi, editor, 17th IEEE Computer Security Foundations Workshop, pages 266-279, Asilomar, CA, USA, June 2004. IEEE Computer Society Press.
    • 17th IEEE Computer Security Foundations Workshop , pp. 266-279
    • Chadha, R.1    Kremer, S.2    Scedrov, A.3
  • 9
    • 24644449338 scopus 로고    scopus 로고
    • Personal communication
    • Véronique Cortier. Personal communication, 2004.
    • (2004)
    • Cortier, V.1
  • 10
    • 4944242015 scopus 로고    scopus 로고
    • A theory of dictionary attacks and its complexity
    • Riccardo Focardi, editor, Asilomar, Pacific Grove, CA, USA, June IEEE Computer Society Press
    • Stéphanie Delaune and Florent Jacquemard. A theory of dictionary attacks and its complexity. In Riccardo Focardi, editor, 17th IEEE Computer Security Foundations Workshop, pages 2-15, Asilomar, Pacific Grove, CA, USA, June 2004. IEEE Computer Society Press.
    • (2004) 17th IEEE Computer Security Foundations Workshop , pp. 2-15
    • Delaune, S.1    Jacquemard, F.2
  • 12
    • 77954124943 scopus 로고
    • A practical secret voting scheme for large scale elections
    • J. Seberry and Y. Zheng, editors, Advances in Cryptology - AUSCRYPT '92, Springer
    • Atsushi Fujioka, Tatsuaki Okamoto, and Kazui Ohta. A practical secret voting scheme for large scale elections. In J. Seberry and Y. Zheng, editors, Advances in Cryptology - AUSCRYPT '92, volume 718 of Lecture Notes in Computer Science, pages 244-251. Springer, 1992.
    • (1992) Lecture Notes in Computer Science , vol.718 , pp. 244-251
    • Fujioka, A.1    Okamoto, T.2    Ohta, K.3
  • 14
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • Gavin Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56:131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 16
    • 33749663619 scopus 로고    scopus 로고
    • Master's thesis, Comenius University
    • Zuzana Rjaskova. Electronic voting schemes. Master's thesis, Comenius University, 2002. www.tes.hut.fi/~helger/crypto/link/protocols/voting.html.
    • (2002) Electronic Voting Schemes
    • Rjaskova, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.