메뉴 건너뛰기




Volumn 4189 LNCS, Issue , 2006, Pages 313-326

Prêt à voter with re-encryption mixes

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; DISTRIBUTED COMPUTER SYSTEMS; SECURITY SYSTEMS;

EID: 33750230633     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11863908_20     Document Type: Conference Paper
Times cited : (75)

References (13)
  • 2
    • 33646028830 scopus 로고    scopus 로고
    • A practical, voter-verifiable election scheme
    • [CRS05], number 3679 in Lecture Notes in Computer Science. Springer-Verlag
    • [CRS05] D. Chaum, P.Y.A. Ryan, and S. Schneider. A practical, voter-verifiable election scheme. In European Symposium on Research in Computer Security, number 3679 in Lecture Notes in Computer Science. Springer-Verlag, 2005.
    • (2005) European Symposium on Research in Computer Security
    • Chaum, D.1    Ryan, P.Y.A.2    Schneider, S.3
  • 6
    • 85084162002 scopus 로고    scopus 로고
    • Making mix nets robust for electronic voting by randomized partial checking
    • [JJR02]
    • [JJR02] A. Jakobsson, A. Juels, and R. Rivest. Making mix nets robust for electronic voting by randomized partial checking. In USENIX Security '02, 2002.
    • (2002) USENIX Security '02
    • Jakobsson, A.1    Juels, A.2    Rivest, R.3
  • 7
    • 85077591735 scopus 로고    scopus 로고
    • Cryptographic voting protocols: A systems perspective
    • [KSW05], number 3444 in Lecture Notes in Computer Science. Springer-Verlag
    • [KSW05] C. Karlof, N. Sastry, and D. Wagner. Cryptographic voting protocols: A systems perspective. In USENIX Security Symposium, number 3444 in Lecture Notes in Computer Science, pages 186-200. Springer-Verlag, 2005.
    • (2005) USENIX Security Symposium , pp. 186-200
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 10
    • 34748853423 scopus 로고    scopus 로고
    • Prêt à voter: A systems perspective
    • [RP05], University of Newcastle upon Tyne
    • [RP05] P.Y.A. Ryan and T. Peacock. Prêt à voter: a systems perspective. Technical Report CS-TR-929, University of Newcastle upon Tyne, 2005.
    • (2005) Technical Report , vol.CS-TR-929
    • Ryan, P.Y.A.1    Peacock, T.2
  • 11
    • 84891856082 scopus 로고    scopus 로고
    • Putting the human back in voting protocols
    • [Rya06], Lecture Notes in Computer Science. Springer-Verlag. To appear
    • [Rya06] P.Y.A. Ryan. Putting the human back in voting protocols. In Fourteenth International Workshop on Security Protocols, Lecture Notes in Computer Science. Springer-Verlag, 2006. To appear.
    • (2006) Fourteenth International Workshop on Security Protocols
    • Ryan, P.Y.A.1
  • 12
    • 84955586344 scopus 로고    scopus 로고
    • The dark side of black-box cryptography, or: Should we trust capstone?
    • [YY96], Lecture Notes in Computer Science. Springer-Verlag
    • [YY96] A. Young and M. Yung. The dark side of black-box cryptography, or: Should we trust capstone? In Crypto'96, Lecture Notes in Computer Science, pages 89-103. Springer-Verlag, 1996.
    • (1996) Crypto'96 , pp. 89-103
    • Young, A.1    Yung, M.2
  • 13
    • 12344290414 scopus 로고    scopus 로고
    • Distributed blinding for elgamal re-encryption
    • [ZMSR04], Cornell University, January
    • [ZMSR04] L. Zhou, M. Marsh, F. Schneider, and A. Redz. Distributed blinding for elgamal re-encryption. Technical Report TR 2004-1920, Cornell University, January 2004.
    • (2004) Technical Report , vol.TR 2004-1920
    • Zhou, L.1    Marsh, M.2    Schneider, F.3    Redz, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.