메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Casting votes in the auditorium

Author keywords

[No Author keywords available]

Indexed keywords

AUDITORIUMS; DISTRIBUTED DATABASE SYSTEMS; NETWORK SECURITY; TURING MACHINES; VOTING MACHINES;

EID: 50849091110     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (45)
  • 1
    • 85092119325 scopus 로고    scopus 로고
    • How to shuffle in public
    • (February), Lecture Notes in Computer Science, Springer-Verlag, 555â
    • ADIDA, B., AND WIKSTR¨OM, D. How to shuffle in public. In Theory of Cryptography, Proceedings of TCC 2007 (February 2007), Lecture Notes in Computer Science, Springer-Verlag, pp. 555–574.
    • (2007) Theory of Cryptography, Proceedings of TCC 2007
    • ADIDA, B.1    WIKSTR¨OM, D.2
  • 5
    • 0038223020 scopus 로고    scopus 로고
    • Tech. rep., UC at San Diego, Dept. of Computer Science and Engineering, Nov
    • BELLARE, M., AND YEE, B. Forward integrity for secure audit logs. Tech. rep., UC at San Diego, Dept. of Computer Science and Engineering, Nov. 1997.
    • (1997) Forward integrity for secure audit logs
    • BELLARE, M.1    YEE, B.2
  • 7
    • 84883938043 scopus 로고
    • Distributing the power of a government to enhance the privacy of voters
    • (Calgary, Alberta, Canada), 52–62
    • BENALOH, J., AND YUNG, M. Distributing the power of a government to enhance the privacy of voters. In 5th ACM Symposium on Principles of Distributed Computing (PODC) (Calgary, Alberta, Canada, 1986), pp. 52–62.
    • (1986) 5th ACM Symposium on Principles of Distributed Computing (PODC)
    • BENALOH, J.1    YUNG, M.2
  • 11
    • 35649018867 scopus 로고    scopus 로고
    • BRENNAN CENTER TASK FORCE ON VOTING SYSTEM SECURITY. June [12] CHAUM, D. Untraceable electronic mail, return addresses and digital pseudo-nyms. Communications of the ACM 24, 2 (1981), 84–88
    • BRENNAN CENTER TASK FORCE ON VOTING SYSTEM SECURITY. The Machinery of Democracy: Protecting Elections in an Electronic World, June 2006. http://www.brennancenter.org/dynamic/subpages/download file 36343.pdf. [12] CHAUM, D. Untraceable electronic mail, return addresses and digital pseudo-nyms. Communications of the ACM 24, 2 (1981), 84–88.
    • (2006) The Machinery of Democracy: Protecting Elections in an Electronic World
  • 12
    • 2342617507 scopus 로고    scopus 로고
    • Secret-ballot receipts: True voter-verifiable elections
    • (Jan), “47
    • CHAUM, D. Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy 2, 1 (Jan. 2004), 38–47.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.1 , pp. 38â
    • CHAUM, D.1
  • 13
    • 33646028830 scopus 로고    scopus 로고
    • A practical, voter-verifiable election scheme
    • (Milan, Italy), €“139
    • CHAUM, D., RYAN, P. Y. A., AND SCHNEIDER, S. A. A practical, voter-verifiable election scheme. In ESORICS ’05 (Milan, Italy, 2005), pp. 118–139.
    • (2005) ESORICS ’05 , pp. 118â
    • CHAUM, D.1    RYAN, P. Y. A.2    SCHNEIDER, S. A.3
  • 22
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • 565
    • LAMPORT, L. Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21, 7 (1978), 558–565.
    • (1978) Commun. ACM , vol.21 , Issue.7 , pp. 558â
    • LAMPORT, L.1
  • 25
    • 33751038992 scopus 로고    scopus 로고
    • Tamperevident, history-independent, subliminal-free data structures on PROM storage -or- How to store ballots on a voting machine (extended abstract)
    • (Oakland, CA, May)
    • MOLNAR, D., KOHNO, T., SASTRY, N., AND WAGNER, D. Tamperevident, history-independent, subliminal-free data structures on PROM storage -or- How to store ballots on a voting machine (extended abstract). In IEEE Symposium on Security and Privacy (Oakland, CA, May 2006).
    • (2006) IEEE Symposium on Security and Privacy
    • MOLNAR, D.1    KOHNO, T.2    SASTRY, N.3    WAGNER, D.4
  • 30
    • 85048559101 scopus 로고    scopus 로고
    • On New Voting Machine, the Same Old Fraud
    • (April 27)
    • ROHDE, D. On New Voting Machine, the Same Old Fraud. The New York Times (April 27, 2004). http://www.nytimes.com/2004/04/27/international/asia/27indi.html.
    • (2004) The New York Times
    • ROHDE, D.1
  • 34
    • 85084161255 scopus 로고    scopus 로고
    • Cryptographic support for secure logs on untrusted machines
    • (San Antonio, TX, Jan)
    • SCHNEIER, B., AND KELSEY, J. Cryptographic support for secure logs on untrusted machines. In USENIX Security Symposium (San Antonio, TX, Jan. 1998), pp. 53–62.
    • (1998) USENIX Security Symposium , pp. 53â-62
    • SCHNEIER, B.1    KELSEY, J.2
  • 37
    • 0018545449 scopus 로고
    • How to share a secret
    • 612–613
    • SHAMIR, A. How to share a secret. Communications of the ACM 22, 11 (1979), 612–613.
    • (1979) Communications of the ACM , vol.22 , Issue.11
    • SHAMIR, A.1
  • 39
    • 34547205365 scopus 로고    scopus 로고
    • TRUSTED COMPUTING GROUP. Oct
    • TRUSTED COMPUTING GROUP. TPM v1.2 Specification Changes, Oct. 2003. https://www.trustedcomputinggroup.org/downloads/ TPM 1 2 Changes final.pdf.
    • (2003) TPM v1.2 Specification Changes
  • 40
    • 77954394047 scopus 로고    scopus 로고
    • California Secretary of State’s Voting Systems Technology Assessment Advisory Board (VSTAAB), Feb
    • WAGNER, D., JEFFERSON, D., BISHOP, M., KARLOF, C., AND SASTRY, N. Security analysis of the Diebold AccuBasic interpreter. California Secretary of State’s Voting Systems Technology Assessment Advisory Board (VSTAAB), Feb. 2006. http://www.ss.ca.gov/elections/voting systems/security analysis of the diebold accubasic interpreter.pdf.
    • (2006) Security analysis of the Diebold AccuBasic interpreter
    • WAGNER, D.1    JEFFERSON, D.2    BISHOP, M.3    KARLOF, C.4    SASTRY, N.5
  • 45
    • 85080649770 scopus 로고    scopus 로고
    • E-voting undermined by sloppiness
    • (Dec. 17)
    • ZETTER, K. E-voting undermined by sloppiness. Wired News (Dec. 17, 2003). http://wired.com/news/politics/evote/0,61637-0. html.
    • (2003) Wired News
    • ZETTER, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.