메뉴 건너뛰기




Volumn , Issue , 2008, Pages 195-209

Automated verification of remote electronic voting protocols in the applied pi-calculus

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; DIFFERENTIATION (CALCULUS); ERROR ANALYSIS; FOUNDATIONS; MATHEMATICAL TECHNIQUES; REUSABILITY; SECURITY SYSTEMS; VOTING MACHINES;

EID: 51749097575     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2008.26     Document Type: Conference Paper
Times cited : (128)

References (31)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • Proc. 4th International Conference on Foundations of Software Science and Computation Structures FOSSACS, of, Springer-Verlag
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In Proc. 4th International Conference on Foundations of Software Science and Computation Structures (FOSSACS), volume 2030 of Lecture Notes in Computer Science, pages 25-41. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2030 , pp. 25-41
    • Abadi, M.1    Blanchet, B.2
  • 6
    • 33644785297 scopus 로고    scopus 로고
    • Receipt-free homomorphic elections and write-in ballots. Cryptology ePrint Archive
    • Report 2004/105
    • A. Acquisti. Receipt-free homomorphic elections and write-in ballots. Cryptology ePrint Archive, Report 2004/105, 2004. http://eprint.iacr.org/.
    • (2004)
    • Acquisti, A.1
  • 9
    • 50249164303 scopus 로고    scopus 로고
    • Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
    • To appear in
    • M. Backes, M. Maffei, and D. Unruh. Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. To appear in IEEE Symposium on Security and Privacy, 2008.
    • (2008) IEEE Symposium on Security and Privacy
    • Backes, M.1    Maffei, M.2    Unruh, D.3
  • 12
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE Computer Society Press
    • B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pages 82-96. IEEE Computer Society Press, 2001.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop (CSFW) , pp. 82-96
    • Blanchet, B.1
  • 18
    • 38349000896 scopus 로고    scopus 로고
    • Symbolic bisimulation for the applied pi calculus. In In Proc. of Foundations of Software Technology and Theoretical Computer Science
    • 27th International Conference FSTTCS, Springer-Verlag
    • S. Delaune, S. Kremer, and M. Ryan. Symbolic bisimulation for the applied pi calculus. In In Proc. of Foundations of Software Technology and Theoretical Computer Science, 27th International Conference (FSTTCS 2007), Lecture Notes in Computer Science, pages 133-145. Springer-Verlag, 2007.
    • (2007) Lecture Notes in Computer Science , pp. 133-145
    • Delaune, S.1    Kremer, S.2    Ryan, M.3
  • 19
    • 51749093902 scopus 로고    scopus 로고
    • S. Delaune, S. Kremer, and M. Ryan. Verifying privacytype properties of electronic voting protocols. Research Report LSV-08-01, Laboratoire Spécification et Vérification, ENS Cachan, France, 2008.
    • S. Delaune, S. Kremer, and M. Ryan. Verifying privacytype properties of electronic voting protocols. Research Report LSV-08-01, Laboratoire Spécification et Vérification, ENS Cachan, France, 2008.
  • 21
    • 4243198166 scopus 로고    scopus 로고
    • Voting and technology: Who gets to count your vote?
    • D. L. Dill, B. Schneier, and B. Simons. Voting and technology: who gets to count your vote? Communications of the ACM, 46(8):29-31, 2003.
    • (2003) Communications of the ACM , vol.46 , Issue.8 , pp. 29-31
    • Dill, D.L.1    Schneier, B.2    Simons, B.3
  • 22
    • 35048899619 scopus 로고    scopus 로고
    • Searching for shapes in cryptographic protocols
    • Proc. 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems TACAS, Springer-Verlag
    • S. Doghmi, J. Guttman, and F. Thayer. Searching for shapes in cryptographic protocols. In Proc. 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Lecture Notes in Computer Science, pages 523-538. Springer-Verlag, 2007.
    • (2007) Lecture Notes in Computer Science , pp. 523-538
    • Doghmi, S.1    Guttman, J.2    Thayer, F.3
  • 23
    • 2342559896 scopus 로고    scopus 로고
    • Election security: Perception and reality
    • D. Evans and N. Paul. Election security: Perception and reality. IEEE Security & Privacy, 2(1):24-31, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.1 , pp. 24-31
    • Evans, D.1    Paul, N.2
  • 24
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A. D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3):435-484, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.3 , pp. 435-484
    • Gordon, A.D.1    Jeffrey, A.2
  • 27
    • 74049150589 scopus 로고    scopus 로고
    • Robust coercion-resistant registration for remote e-voting
    • June 2007. Available at
    • T. Krivoruchko. Robust coercion-resistant registration for remote e-voting. IAVoSS Workshop On Trustworthy Elections (WOTE 2007), June 2007. Available at: http://research.microsoft.com/conferences/WOTE2007/papers/09.pdf.
    • (2007) IAVoSS Workshop On Trustworthy Elections (WOTE
    • Krivoruchko, T.1
  • 28
    • 23144444779 scopus 로고    scopus 로고
    • Static validation of a voting protocol
    • Automated Reasoning for Security Protocol Analysis ARSPA 2005, of, Elsevier Science Publishers Ltd
    • C. R. Nielsen, E. H. Andersen, and H. R. Nielson. Static validation of a voting protocol. In Automated Reasoning for Security Protocol Analysis (ARSPA 2005), volume 135 of Electronic Notes on Theoretical Computer Science, pages 115-134. Elsevier Science Publishers Ltd., 2005.
    • (2005) Electronic Notes on Theoretical Computer Science , vol.135 , pp. 115-134
    • Nielsen, C.R.1    Andersen, E.H.2    Nielson, H.R.3
  • 29
    • 0041375490 scopus 로고    scopus 로고
    • Security considerations for remote electronic voting
    • A. D. Rubin. Security considerations for remote electronic voting. Communications of the ACM, 45(12):39-44, 2002.
    • (2002) Communications of the ACM , vol.45 , Issue.12 , pp. 39-44
    • Rubin, A.D.1
  • 31
    • 0027205880 scopus 로고
    • A semantic model for authentication protocols
    • IEEE Computer Society Press
    • T. Y. C. Woo and S. S. Lam. A semantic model for authentication protocols. In Proc. 14th IEEE Symposium on Security & Privacy, pages 178-194. IEEE Computer Society Press, 1993.
    • (1993) Proc. 14th IEEE Symposium on Security & Privacy , pp. 178-194
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.