-
1
-
-
35048861871
-
Just fast keying in the pi calculus
-
Proc. 13th European Symposium On Programming ESOP'04, of, Barcelona, Spain, Springer
-
M. Abadi, B. Blanchet, and C. Fournet. Just fast keying in the pi calculus. In Proc. 13th European Symposium On Programming (ESOP'04), volume 2986 of LNCS, pages 340-354, Barcelona, Spain, 2004. Springer.
-
(2004)
LNCS
, vol.2986
, pp. 340-354
-
-
Abadi, M.1
Blanchet, B.2
Fournet, C.3
-
2
-
-
17644411480
-
Mobile values, new names, and secure communication
-
London, UK, ACM
-
M. Abadi and C. Fournet. Mobile values, new names, and secure communication. In Proc. 28th ACM Symposium on Principles of Programming Languages (POPL'01), pages 104-115, London, UK, 2001. ACM.
-
(2001)
Proc. 28th ACM Symposium on Principles of Programming Languages (POPL'01)
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
6
-
-
85034632918
-
Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA
-
Proc. of Advances in Cryptology Eurocrypt'88, of, Davos, Switzerland, Springer
-
D. Chaum. Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA. In Proc. of Advances in Cryptology (Eurocrypt'88), volume 330 of LNCS, pages 177-182, Davos, Switzerland, 1988. Springer.
-
(1988)
LNCS
, vol.330
, pp. 177-182
-
-
Chaum, D.1
-
7
-
-
33646028830
-
A practical, voter-verifiable election scheme
-
Proc. 10th European Symposium On Research In Computer Security ESORICS'05, of, Milan, Italy, Springer
-
D. Chaum, P. Y. A. Ryan, and S. Schneider. A practical, voter-verifiable election scheme. In Proc. 10th European Symposium On Research In Computer Security (ESORICS'05), volume 3679 of LNCS, pages 118-139, Milan, Italy, 2005. Springer.
-
(2005)
LNCS
, vol.3679
, pp. 118-139
-
-
Chaum, D.1
Ryan, P.Y.A.2
Schneider, S.3
-
8
-
-
33947646417
-
-
S. Delaune, S. Kremer, and M. D. Ryan. Coercion-resistance and receipt-freeness in electronic voting. Research Report LSV-06-08, Laboratoire Spécification et Vérification, ENS Cachan, France, Apr. 2006. 17 pages.
-
S. Delaune, S. Kremer, and M. D. Ryan. Coercion-resistance and receipt-freeness in electronic voting. Research Report LSV-06-08, Laboratoire Spécification et Vérification, ENS Cachan, France, Apr. 2006. 17 pages.
-
-
-
-
9
-
-
35248847052
-
Hiding names: Private authentication in the applied pi calculus
-
Proc. of Int. Symposium on Software Security ISSS'02, of, Tokyo, Japan, Springer
-
C. Fournet and M. Abadi. Hiding names: Private authentication in the applied pi calculus. In Proc. of Int. Symposium on Software Security (ISSS'02), volume 2609 of LNCS, pages 317-338, Tokyo, Japan, 2003. Springer.
-
(2003)
LNCS
, vol.2609
, pp. 317-338
-
-
Fournet, C.1
Abadi, M.2
-
10
-
-
77954124943
-
A practical secret voting scheme for large scale elections
-
Proc. of Advances in Cryptology Asiacrypt'92, of, Gold Coast, Queensland, Australia, Springer
-
A. Fujioka, T. Okamoto, and K. Ohta. A practical secret voting scheme for large scale elections. In Proc. of Advances in Cryptology (Asiacrypt'92), volume 718 of LNCS, pages 244-251, Gold Coast, Queensland, Australia, 1992. Springer.
-
(1992)
LNCS
, vol.718
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
11
-
-
84948969982
-
Efficient receipt-free voting based on homomorphic encryption
-
Proc. of Advances in Cryptography Eurocrypt'00, of, Bruges, Belgium, Springer
-
M. Hirt and K. Sako. Efficient receipt-free voting based on homomorphic encryption. In Proc. of Advances in Cryptography (Eurocrypt'00), volume 1807 of LNCS, pages 539-556, Bruges, Belgium, 2000. Springer.
-
(2000)
LNCS
, vol.1807
, pp. 539-556
-
-
Hirt, M.1
Sako, K.2
-
13
-
-
33749009810
-
Coercion-resistant electronic elections
-
Alexandria, USA, ACM Press
-
A. Juels, D. Catalano, and M. Jakobsson. Coercion-resistant electronic elections. In Proc. of Workshop on Privacy in the Electronic Society (WPES'05), Alexandria, USA, 2005. ACM Press.
-
(2005)
Proc. of Workshop on Privacy in the Electronic Society (WPES'05)
-
-
Juels, A.1
Catalano, D.2
Jakobsson, M.3
-
14
-
-
23144432349
-
Analysis of an electronic voting protocol in the applied pi-calculus
-
Proc. 14th European Symposium On Programming ESOP'05, of, Edinburgh, U.K, Springer
-
S. Kremer and M. D. Ryan. Analysis of an electronic voting protocol in the applied pi-calculus. In Proc. 14th European Symposium On Programming (ESOP'05), volume 3444 of LNCS, pages 186-200, Edinburgh, U.K., 2005. Springer.
-
(2005)
LNCS
, vol.3444
, pp. 186-200
-
-
Kremer, S.1
Ryan, M.D.2
-
15
-
-
33750248003
-
Providing receipt-freeness in mixnet-based voting protocols
-
Proc. of Information Security and Cryptology ICISC'03, of, Seoul, Korea, Springer
-
B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo. Providing receipt-freeness in mixnet-based voting protocols. In Proc. of Information Security and Cryptology (ICISC'03), volume 2971 of LNCS, pages 245-258, Seoul, Korea, 2004. Springer.
-
(2004)
LNCS
, vol.2971
, pp. 245-258
-
-
Lee, B.1
Boyd, C.2
Dawson, E.3
Kim, K.4
Yang, J.5
Yoo, S.6
-
16
-
-
0042999681
-
An electronic voting scheme
-
Canberra, Australia
-
T. Okamoto. An electronic voting scheme. In IFIP World Conference on IT Tools, pages 21-30, Canberra, Australia, 1996.
-
(1996)
IFIP World Conference on IT Tools
, pp. 21-30
-
-
Okamoto, T.1
-
17
-
-
84956974327
-
Receipt-free electronic voting schemes for large scale elections
-
Proc. 5th Int. Security Protocols Workshop, of, Paris, France, Springer
-
T. Okamoto. Receipt-free electronic voting schemes for large scale elections. In Proc. 5th Int. Security Protocols Workshop, volume 1361 of LNCS, pages 25-35, Paris, France, 1997. Springer.
-
(1997)
LNCS
, vol.1361
, pp. 25-35
-
-
Okamoto, T.1
-
18
-
-
84949756689
-
CSP and anonymity
-
Proc. 4th European Symposium On Research In Computer Security ESORICS'96, of, Roma, Italy, Springer
-
S. Schneider and A. Sidiropoulos. CSP and anonymity. In Proc. 4th European Symposium On Research In Computer Security (ESORICS'96), volume 1146 of LNCS, pages 198-218, Roma, Italy, 1996. Springer.
-
(1996)
LNCS
, vol.1146
, pp. 198-218
-
-
Schneider, S.1
Sidiropoulos, A.2
|