-
2
-
-
2342466750
-
Hack-a-vote: Security issues with electronic voting systems
-
Jan
-
J. Bannet, D. W. Price, A. Rudys, J. Singer, and D. S. Wallach. Hack-a-vote: Security issues with electronic voting systems. IEEE Security & Privacy, 2(1):32-37, Jan. 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.1
, pp. 32-37
-
-
Bannet, J.1
Price, D.W.2
Rudys, A.3
Singer, J.4
Wallach, D.S.5
-
3
-
-
77953904148
-
Recommendation for key management
-
Mar
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid. Recommendation for key management. NIST Special Publication 800-57 Part 1, Mar. 2007.
-
(2007)
NIST Special Publication
, vol.800 -57
, Issue.PART 1
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
4
-
-
0034771832
-
Practical multi-candidate election system
-
Aug
-
O. Baudron, P.-A. Fouque, D. Pointcheval, G. Poupard, and J. Stern. Practical multi-candidate election system. In Proc. of ACM Symposium on Principles of Distributed Computing, pages 274-283, Aug. 2001.
-
(2001)
Proc. of ACM Symposium on Principles of Distributed Computing
, pp. 274-283
-
-
Baudron, O.1
Fouque, P.-A.2
Pointcheval, D.3
Poupard, G.4
Stern, J.5
-
11
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
12
-
-
50249155702
-
-
D. Chaum. SureVote. http://www.surevote.com, 2007. International patent WO 01/55940 A1, 02 August 2001
-
D. Chaum. SureVote. http://www.surevote.com, 2007. International patent WO 01/55940 A1, 02 August 2001.
-
-
-
-
15
-
-
50249095473
-
-
S. Chong and A. C. Myers. End-to-end enforcement of erasure. In submission
-
S. Chong and A. C. Myers. End-to-end enforcement of erasure. In submission.
-
-
-
-
17
-
-
50249178944
-
-
City of New York Board of Elections
-
City of New York Board of Elections. General election results. http://www.vote.nyc.ny.us/results.html, 2004.
-
(2004)
General election results
-
-
-
18
-
-
50249179500
-
-
M. R. Clarkson, S. Chong, and A. C. Myers. Civitas: Toward a secure remote voting system. Technical Report 2007-2081, Cornell University, May 2007. Revised Mar. 2008. http://hdl.handle.net/1813/7875.
-
M. R. Clarkson, S. Chong, and A. C. Myers. Civitas: Toward a secure remote voting system. Technical Report 2007-2081, Cornell University, May 2007. Revised Mar. 2008. http://hdl.handle.net/1813/7875.
-
-
-
-
19
-
-
77951106449
-
Multi-authority secret-ballot elections with linear work
-
May
-
R. Cramer, M. Franklin, B. Schoenmakers, and M. Yung. Multi-authority secret-ballot elections with linear work. In Proc. of International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pages 72-83, May 1996.
-
(1996)
Proc. of International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)
, pp. 72-83
-
-
Cramer, R.1
Franklin, M.2
Schoenmakers, B.3
Yung, M.4
-
24
-
-
50249092518
-
-
Diebold Election Systems. New York City BOE voting system, Cost response: Lever replacement solution: Optical scan pollsite system, October 20, 2006. http://www.vote.nyc.ny.us/rfi.html.
-
Diebold Election Systems. New York City BOE voting system, Cost response: Lever replacement solution: Optical scan pollsite system, October 20, 2006. http://www.vote.nyc.ny.us/rfi.html.
-
-
-
-
25
-
-
4243198166
-
Voting and technology: Who gets to count your vote?
-
Aug
-
D. L. Dill, B. Schneier, and B. Simons. Voting and technology: Who gets to count your vote? Communications of the ACM, 46(8):29-31, Aug. 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 29-31
-
-
Dill, D.L.1
Schneier, B.2
Simons, B.3
-
28
-
-
2342559896
-
Election security: Perception and reality
-
Jan
-
D. Evans and N. Paul. Election security: Perception and reality. IEEE Security & Privacy, 2(1):24-31, Jan. 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.1
, pp. 24-31
-
-
Evans, D.1
Paul, N.2
-
29
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Aug
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. of International Cryptology Conference (CRYPTO), pages 186-194, Aug. 1986.
-
(1986)
Proc. of International Cryptology Conference (CRYPTO)
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
35
-
-
38849091602
-
-
Brookings Institution Press
-
P. S. Herrnson, R. G. Niemi, M. J. Hanmer, B. B. Bederson, and F. C. Conrad. Voting Technology: The Not-So-Simple Act of Casting a Ballot. Brookings Institution Press, 2008.
-
(2008)
Voting Technology: The Not-So-Simple Act of Casting a Ballot
-
-
Herrnson, P.S.1
Niemi, R.G.2
Hanmer, M.J.3
Bederson, B.B.4
Conrad, F.C.5
-
40
-
-
85084162002
-
Making mix nets robust for electronic voting by randomized partial checking
-
Aug
-
M. Jakobsson, A. Juels, and R. L. Rivest. Making mix nets robust for electronic voting by randomized partial checking. In Proc. of USENIX Security Symposium, pages 339-353, Aug. 2002.
-
(2002)
Proc. of USENIX Security Symposium
, pp. 339-353
-
-
Jakobsson, M.1
Juels, A.2
Rivest, R.L.3
-
41
-
-
11844282730
-
Analyzing Internet voting security
-
Oct
-
D. Jefferson, A. D. Rubin, B. Simons, and D. Wagner. Analyzing Internet voting security. Communications of the ACM, 47(10):59-64, Oct. 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.10
, pp. 59-64
-
-
Jefferson, D.1
Rubin, A.D.2
Simons, B.3
Wagner, D.4
-
42
-
-
50249118859
-
-
D. Jefferson, A. D. Rubin, B. Simons, and D. Wagner. A security analysis of the secure electronic registration and voting experiment (SERVE). http://www.servesecurityreport.org/paper.pdf, Jan. 2004.
-
D. Jefferson, A. D. Rubin, B. Simons, and D. Wagner. A security analysis of the secure electronic registration and voting experiment (SERVE). http://www.servesecurityreport.org/paper.pdf, Jan. 2004.
-
-
-
-
48
-
-
3543102147
-
Analysis of an electronic voting system
-
May
-
T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach. Analysis of an electronic voting system. In Proc. of IEEE Symposium on Security and Privacy, pages 27-42, May 2004.
-
(2004)
Proc. of IEEE Symposium on Security and Privacy
, pp. 27-42
-
-
Kohno, T.1
Stubblefield, A.2
Rubin, A.D.3
Wallach, D.S.4
-
51
-
-
28144456308
-
An attack on the Needham-Schroeder public key authentication protocol
-
Nov
-
G. Lowe. An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters, 56(3):131-136, Nov. 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-136
-
-
Lowe, G.1
-
52
-
-
78651590497
-
Receipt-freeness in large-scale elections without untappable channels
-
Oct
-
E. Magkos, M. Burmester, and V. Chrissikopoulos. Receipt-freeness in large-scale elections without untappable channels. In Proc. of IFIP Conference on E-Commerce, E-Business, E-Government, pages 683-694, Oct. 2001.
-
(2001)
Proc. of IFIP Conference on E-Commerce, E-Business, E-Government
, pp. 683-694
-
-
Magkos, E.1
Burmester, M.2
Chrissikopoulos, V.3
-
56
-
-
50249107259
-
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow (software release). http://www.cs.cornell.edu/jif, July 2001.
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow (software release). http://www.cs.cornell.edu/jif, July 2001.
-
-
-
-
58
-
-
84948123363
-
An improvement on a practical secret voting scheme
-
Nov
-
M. Ohkubo, F. Miura, M. Abe, A. Fujioka, and T. Okamoto. An improvement on a practical secret voting scheme. In Proc. of Information Security Workshop, pages 225-234, Nov. 1999.
-
(1999)
Proc. of Information Security Workshop
, pp. 225-234
-
-
Ohkubo, M.1
Miura, F.2
Abe, M.3
Fujioka, A.4
Okamoto, T.5
-
59
-
-
0011828723
-
Receipt-free electronic voting schemes for large scale elections
-
Apr
-
T. Okamoto. Receipt-free electronic voting schemes for large scale elections. In Proc. of Security Protocols Workshop, pages 25-35, Apr. 1997.
-
(1997)
Proc. of Security Protocols Workshop
, pp. 25-35
-
-
Okamoto, T.1
-
60
-
-
50249097906
-
-
Master's thesis, Technische Universiteit Eindhoven, June
-
R. A. Peters. A secure bulletin board. Master's thesis, Technische Universiteit Eindhoven, June 2005.
-
(2005)
A secure bulletin board
-
-
Peters, R.A.1
-
63
-
-
0041375490
-
Security considerations for remote electronic voting
-
Dec
-
A. D. Rubin. Security considerations for remote electronic voting. Communications of the ACM, 45(12):39-44, Dec. 2002.
-
(2002)
Communications of the ACM
, vol.45
, Issue.12
, pp. 39-44
-
-
Rubin, A.D.1
-
67
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.-P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.-P.1
-
69
-
-
50249182033
-
Design and prototype of a coercion-resistant, voter verifiable electronic voting system
-
Oct
-
A. M. Shubina and S.W. Smith. Design and prototype of a coercion-resistant, voter verifiable electronic voting system. In Proc. of Conference on Privacy, Security and Trust, pages 29-39, Oct. 2004.
-
(2004)
Proc. of Conference on Privacy, Security and Trust
, pp. 29-39
-
-
Shubina, A.M.1
Smith, S.W.2
-
74
-
-
84978371883
-
An integrated experimental environment for distributed systems and networks
-
Dec
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. In Proc. of Symposium on Operating System Design and Implementation, pages 255-270, Dec. 2002.
-
(2002)
Proc. of Symposium on Operating System Design and Implementation
, pp. 255-270
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
|