-
2
-
-
33646028830
-
A practical, voter-verifiable election scheme
-
[CRS05], number 3679 in Lecture Notes in Computer Science. Springer-Verlag
-
[CRS05] D. Chaum, P.Y.A. Ryan, and S. Schneider. A practical, voter-verifiable election scheme. In European Symposium on Research in Computer Security, number 3679 in Lecture Notes in Computer Science. Springer-Verlag, 2005.
-
(2005)
European Symposium on Research in Computer Security
-
-
Chaum, D.1
Ryan, P.Y.A.2
Schneider, S.3
-
3
-
-
20444507015
-
Universal re-encryption for mixnets
-
[GJJS04], San Francisco, USA, February
-
[GJJS04] P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal re-encryption for mixnets. In Proceedings of the 2004 RSA Conference, Cryptographers' track, San Francisco, USA, February 2004.
-
(2004)
Proceedings of the 2004 RSA Conference, Cryptographers' Track
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
6
-
-
85084162002
-
Making mix nets robust for electronic voting by randomized partial checking
-
[JJR02]
-
[JJR02] A. Jakobsson, A. Juels, and R. Rivest. Making mix nets robust for electronic voting by randomized partial checking. In USENIX Security '02, 2002.
-
(2002)
USENIX Security '02
-
-
Jakobsson, A.1
Juels, A.2
Rivest, R.3
-
7
-
-
85077591735
-
Cryptographic voting protocols: A systems perspective
-
[KSW05], number 3444 in Lecture Notes in Computer Science. Springer-Verlag
-
[KSW05] C. Karlof, N. Sastry, and D. Wagner. Cryptographic voting protocols: A systems perspective. In USENIX Security Symposium, number 3444 in Lecture Notes in Computer Science, pages 186-200. Springer-Verlag, 2005.
-
(2005)
USENIX Security Symposium
, pp. 186-200
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
10
-
-
34748853423
-
Prêt à voter: A systems perspective
-
[RP05], University of Newcastle upon Tyne
-
[RP05] P.Y.A. Ryan and T. Peacock. Prêt à voter: a systems perspective. Technical Report CS-TR-929, University of Newcastle upon Tyne, 2005.
-
(2005)
Technical Report
, vol.CS-TR-929
-
-
Ryan, P.Y.A.1
Peacock, T.2
-
11
-
-
84891856082
-
Putting the human back in voting protocols
-
[Rya06], Lecture Notes in Computer Science. Springer-Verlag. To appear
-
[Rya06] P.Y.A. Ryan. Putting the human back in voting protocols. In Fourteenth International Workshop on Security Protocols, Lecture Notes in Computer Science. Springer-Verlag, 2006. To appear.
-
(2006)
Fourteenth International Workshop on Security Protocols
-
-
Ryan, P.Y.A.1
-
12
-
-
84955586344
-
The dark side of black-box cryptography, or: Should we trust capstone?
-
[YY96], Lecture Notes in Computer Science. Springer-Verlag
-
[YY96] A. Young and M. Yung. The dark side of black-box cryptography, or: Should we trust capstone? In Crypto'96, Lecture Notes in Computer Science, pages 89-103. Springer-Verlag, 1996.
-
(1996)
Crypto'96
, pp. 89-103
-
-
Young, A.1
Yung, M.2
-
13
-
-
12344290414
-
Distributed blinding for elgamal re-encryption
-
[ZMSR04], Cornell University, January
-
[ZMSR04] L. Zhou, M. Marsh, F. Schneider, and A. Redz. Distributed blinding for elgamal re-encryption. Technical Report TR 2004-1920, Cornell University, January 2004.
-
(2004)
Technical Report
, vol.TR 2004-1920
-
-
Zhou, L.1
Marsh, M.2
Schneider, F.3
Redz, A.4
|