메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages 836-840

Secure electronic voting for mobile communications

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE COMMUNICATION ENVIRONMENTS; PORTABLE COMMUNICATION DEVICES;

EID: 34047122668     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VETECS.2005.1543422     Document Type: Conference Paper
Times cited : (3)

References (14)
  • 2
    • 0001292443 scopus 로고
    • A practical secret voting scheme for large scale elections
    • A. Fujioka, T. Okamoto, K. Ohta, "A practical secret voting scheme for large scale elections", Proceedings of AUSCRYPT'92, 1992, pp. 244-251.
    • (1992) Proceedings of AUSCRYPT'92 , pp. 244-251
    • Fujioka, A.1    Okamoto, T.2    Ohta, K.3
  • 3
    • 33745610280 scopus 로고    scopus 로고
    • The problems and potentials of voting systems: Introduction
    • Oct
    • P. G. Neumann, "The problems and potentials of voting systems: Introduction", Communications of ACM, vol. 47, no. 10, pp. 28-30, Oct 2004.
    • (2004) Communications of ACM , vol.47 , Issue.10 , pp. 28-30
    • Neumann, P.G.1
  • 4
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of ACM, vol. 24, no. 2, pp. 84-88, 1981.
    • (1981) Communications of ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 5
    • 37149020412 scopus 로고    scopus 로고
    • Client/server tradeoffs for online elections
    • I. Damgard and M. Jurik, "Client/server tradeoffs for online elections", Proceedings of PKC'02, 2002, pp. 125-140.
    • (2002) Proceedings of PKC'02 , pp. 125-140
    • Damgard, I.1    Jurik, M.2
  • 7
    • 0019080452 scopus 로고
    • A Modification of the RSA public key encryption procedure
    • Nov
    • H. C. Williams, "A Modification of the RSA public key encryption procedure", IEEE Transactions on Information Theory, vol. 26, no. 6, pp. 726-729, Nov 1980.
    • (1980) IEEE Transactions on Information Theory , vol.26 , Issue.6 , pp. 726-729
    • Williams, H.C.1
  • 10
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Oct
    • D. Chaum, "Security without identification: Transaction systems to make big brother obsolete", Communications of ACM, vol. 28, no. 10, pp. 1030-1044, Oct 1985.
    • (1985) Communications of ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 11
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Feb
    • R. L. Rivest, A. Shamir and L. M. Adleman, "A method for obtaining digital signatures and public key cryptosystems", Communications of ACM, vol. 21, no. 2, pp. 120-126, Feb 1978.
    • (1978) Communications of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 13
    • 0041619709 scopus 로고    scopus 로고
    • Integer factoring
    • Mar
    • A. K. Lenstra, "Integer factoring", Design, Code and Cryptography, vol. 19, no. 2/3, pp. 101-128, Mar 2000.
    • (2000) Design, Code and Cryptography , vol.19 , Issue.2-3 , pp. 101-128
    • Lenstra, A.K.1
  • 14
    • 84956985315 scopus 로고    scopus 로고
    • Recent progress and prospects for integer factorization algorithm
    • Sydney, Australia, July
    • R. P. Brent, "Recent progress and prospects for integer factorization algorithm", Proceedings of COCOON'2000, Sydney, Australia, July 2000, pp.3-22.
    • (2000) Proceedings of COCOON'2000 , pp. 3-22
    • Brent, R.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.