-
1
-
-
0028087488
-
-
J. Benaloh, D. Tuinstra, Receipt-free secret-ballot elections, in: Proc. 26th Symposium on Theory of Computing, STOC'94, 1994, pp. 544-553
-
J. Benaloh, D. Tuinstra, Receipt-free secret-ballot elections, in: Proc. 26th Symposium on Theory of Computing, STOC'94, 1994, pp. 544-553
-
-
-
-
3
-
-
52949135958
-
-
P. Ryan, The Computer Ate my Vote, Newcastle University Technical Report 988, 2006
-
P. Ryan, The Computer Ate my Vote, Newcastle University Technical Report 988, 2006
-
-
-
-
4
-
-
52949140242
-
-
D. Chaum, The voting system "PunchScan"
-
D. Chaum, The voting system "PunchScan"
-
-
-
-
5
-
-
52949131412
-
-
R. Rivest, W. Smith, Three Voting Protocols: ThreeBallot, VAV, and Twin, Electronic Voting Technology Workshop, EVT'07, 2007
-
R. Rivest, W. Smith, Three Voting Protocols: ThreeBallot, VAV, and Twin, Electronic Voting Technology Workshop, EVT'07, 2007
-
-
-
-
6
-
-
52949129898
-
-
R. Araújo, R.F. Custódio, J. van de G, A verifiable voting protocol based on farnel, in: IAVoSS Workshop on Trustworthy Elections, WOTE'07, 2007
-
R. Araújo, R.F. Custódio, J. van de G, A verifiable voting protocol based on farnel, in: IAVoSS Workshop on Trustworthy Elections, WOTE'07, 2007
-
-
-
-
7
-
-
52949117751
-
-
VHTi. http://www.votehere.net/vhti/document
-
VHTi. http://www.votehere.net/vhti/document
-
-
-
-
8
-
-
33744970314
-
An anonymous voting mechanism based on the key exchange protocol
-
Chang C.C., and Lee J.S. An anonymous voting mechanism based on the key exchange protocol. Computers & Security 25 4 (2006) 307-314
-
(2006)
Computers & Security
, vol.25
, Issue.4
, pp. 307-314
-
-
Chang, C.C.1
Lee, J.S.2
-
10
-
-
0032066843
-
Multi-recastable ticket schemes for electronic voting
-
Fan C.I., and Lei C.L. Multi-recastable ticket schemes for electronic voting. IEICE Transactions on Fundamentals E81-A 5 (1998) 940-949
-
(1998)
IEICE Transactions on Fundamentals
, vol.E81-A
, Issue.5
, pp. 940-949
-
-
Fan, C.I.1
Lei, C.L.2
-
11
-
-
0036555079
-
An unlinkably divisible and intention attachable ticket scheme for runoff elections
-
Fan C.I., and Lei C.L. An unlinkably divisible and intention attachable ticket scheme for runoff elections. Journal of Network and Computer Applications (2002) 93-107
-
(2002)
Journal of Network and Computer Applications
, pp. 93-107
-
-
Fan, C.I.1
Lei, C.L.2
-
12
-
-
84955622732
-
A multi-recastable ticket scheme for electronic elections
-
Advances in Cryptology-ASIACRYPT'96, Springer-Verlag
-
Fan C.I., and Lei C.L. A multi-recastable ticket scheme for electronic elections. Advances in Cryptology-ASIACRYPT'96. LNCS vol. 1163 (1996), Springer-Verlag 116-124
-
(1996)
LNCS
, vol.1163
, pp. 116-124
-
-
Fan, C.I.1
Lei, C.L.2
-
13
-
-
77954124943
-
A practical secret voting scheme for large scale elections
-
Advances in Cryptology-AUSCRYPT'92, Springer-Verlag
-
Fujioka A., Okamoto T., and Ohta K. A practical secret voting scheme for large scale elections. Advances in Cryptology-AUSCRYPT'92. LNCS vol. 718 (1992), Springer-Verlag 244-251
-
(1992)
LNCS
, vol.718
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
14
-
-
84948969982
-
Efficient receipt-free voting based on homomorphic encryption
-
EUROCRYPT 2000, Springer-Verlag
-
Hirt M., and Sako K. Efficient receipt-free voting based on homomorphic encryption. EUROCRYPT 2000. LNCS vol. 1807 (2000), Springer-Verlag 539-556
-
(2000)
LNCS
, vol.1807
, pp. 539-556
-
-
Hirt, M.1
Sako, K.2
-
15
-
-
0031281744
-
A secure electronic voting protocol with IC cards
-
Jan J.K., and Tai C.C. A secure electronic voting protocol with IC cards. Journal of Systems and Software 39 2 (1997) 93-101
-
(1997)
Journal of Systems and Software
, vol.39
, Issue.2
, pp. 93-101
-
-
Jan, J.K.1
Tai, C.C.2
-
16
-
-
0030410935
-
A collision-free secret ballot protocol for computerized general elections
-
Juang W.S., and Lei C.L. A collision-free secret ballot protocol for computerized general elections. Computers & Security 15 4 (1996) 339-348
-
(1996)
Computers & Security
, vol.15
, Issue.4
, pp. 339-348
-
-
Juang, W.S.1
Lei, C.L.2
-
17
-
-
0033077761
-
A secure and practical electronic voting scheme
-
Ku W.C., and Wang S.D. A secure and practical electronic voting scheme. Computer Communications 22 3 (1999) 279-286
-
(1999)
Computer Communications
, vol.22
, Issue.3
, pp. 279-286
-
-
Ku, W.C.1
Wang, S.D.2
-
18
-
-
1542275320
-
A secure electronic voting protocol for general elections
-
Liaw H.T. A secure electronic voting protocol for general elections. Computers & Security 23 2 (2004) 107-119
-
(2004)
Computers & Security
, vol.23
, Issue.2
, pp. 107-119
-
-
Liaw, H.T.1
-
19
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
Fan C.I., Chan Y.C., and Zhang Z.K. Robust remote authentication scheme with smart cards. Computers & Security 24 8 (2005) 619-628
-
(2005)
Computers & Security
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.I.1
Chan, Y.C.2
Zhang, Z.K.3
-
20
-
-
50949129086
-
Remote password authentication scheme with smart cards and biometrics
-
Fan C.I., Lin Y.H., and Hsu R.H. Remote password authentication scheme with smart cards and biometrics. IEEE GLOBECOM (2006)
-
(2006)
IEEE GLOBECOM
-
-
Fan, C.I.1
Lin, Y.H.2
Hsu, R.H.3
-
21
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of ACM 24 (1981) 28-30
-
(1981)
Communications of ACM
, vol.24
, pp. 28-30
-
-
Lamport, L.1
-
22
-
-
0020915882
-
Blind signatures for untraceable payments
-
Springer-Verlag
-
Chaum D. Blind signatures for untraceable payments. Advances in Cryptology-CRYPTO'82 (1983), Springer-Verlag 199-203
-
(1983)
Advances in Cryptology-CRYPTO'82
, pp. 199-203
-
-
Chaum, D.1
-
23
-
-
0043023439
-
Improved low-computation partially blind signatures
-
Fan C.I. Improved low-computation partially blind signatures. Applied Mathematics and Computation 145 2-3 (2003) 853-867
-
(2003)
Applied Mathematics and Computation
, vol.145
, Issue.2-3
, pp. 853-867
-
-
Fan, C.I.1
-
24
-
-
0032021944
-
User efficient blind signatures
-
Fan C.I., and Lei C.L. User efficient blind signatures. Electronics Letters 34 6 (1998) 544-546
-
(1998)
Electronics Letters
, vol.34
, Issue.6
, pp. 544-546
-
-
Fan, C.I.1
Lei, C.L.2
-
26
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 2 (1981) 84-88
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
27
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum D. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1 1 (1988) 65-75
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
28
-
-
78651590497
-
-
E. Magkos, M. Burmester, V. Chrissikopoulos, Receipt-freeness in large-scale elections without untappable channels, in: Proc. 1st IFIP Conference on E-Commerce/E-business/E-Government, 2001, pp. 683-693
-
E. Magkos, M. Burmester, V. Chrissikopoulos, Receipt-freeness in large-scale elections without untappable channels, in: Proc. 1st IFIP Conference on E-Commerce/E-business/E-Government, 2001, pp. 683-693
-
-
-
-
29
-
-
84929273746
-
Untraceable electronic cash
-
Advances in Cryptology-CRYPTO'88, Springer-Verlag
-
Chaum D., Fiat A., and Naor M. Untraceable electronic cash. Advances in Cryptology-CRYPTO'88. LNCS vol. 403 (1990), Springer-Verlag 319-327
-
(1990)
LNCS
, vol.403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
31
-
-
52949147198
-
-
M.O. Rabin, Digitalized signatures and public-key functions as intractable as factorization, Technical Report, MIT/LCS/TR212, MIT Lab. Computer Science, Cambridge, Mass. 1979
-
M.O. Rabin, Digitalized signatures and public-key functions as intractable as factorization, Technical Report, MIT/LCS/TR212, MIT Lab. Computer Science, Cambridge, Mass. 1979
-
-
-
-
33
-
-
84974652864
-
Provably secure partially blind signatures
-
Advances in Cryptology-Crypto'00, Springer, Berlin
-
Abe M., and Okamto T. Provably secure partially blind signatures. Advances in Cryptology-Crypto'00. Lecture Notes in Computer Science vol. 1880 (2000), Springer, Berlin 271-286
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 271-286
-
-
Abe, M.1
Okamto, T.2
-
34
-
-
84958591696
-
Security of blind digital signatures
-
Advances in Cryptology-Crypto'97, Springer-Verlag
-
Juels A., Luby M., and Ostrovsky R. Security of blind digital signatures. Advances in Cryptology-Crypto'97. LNCS vol. 1294 (1997), Springer-Verlag 150-164
-
(1997)
LNCS
, vol.1294
, pp. 150-164
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
35
-
-
84955579666
-
Provably secure blind signature schemes
-
Advances in Cryptology-ASIACRYPT'96, Springer-Verlag
-
Pointcheval D., and Stern J. Provably secure blind signature schemes. Advances in Cryptology-ASIACRYPT'96. LNCS vol. 1163 (1996), Springer-Verlag 252-265
-
(1996)
LNCS
, vol.1163
, pp. 252-265
-
-
Pointcheval, D.1
Stern, J.2
-
36
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval D., and Stern J. Security arguments for digital signatures and blind signatures. Journal of Cryptology 13 3 (2000) 361-396
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
37
-
-
84927727752
-
Security proofs for signature schemes
-
Advances in Cryptology-EUROCRYPT'96, Springer-Verlag
-
Pointcheval D., and Setrn J. Security proofs for signature schemes. Advances in Cryptology-EUROCRYPT'96. LNCS vol. 1070 (1996), Springer-Verlag 387-398
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Setrn, J.2
-
38
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of ACM 21 (1978) 120-126
-
(1978)
Communications of ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
40
-
-
0030110285
-
Hybrid method for modular exponentiation with precomputation
-
Chen C.Y., Chang C.C., and Yang W.P. Hybrid method for modular exponentiation with precomputation. Electronics Letters 32 6 (1996) 540-541
-
(1996)
Electronics Letters
, vol.32
, Issue.6
, pp. 540-541
-
-
Chen, C.Y.1
Chang, C.C.2
Yang, W.P.3
-
41
-
-
52949152460
-
-
RFC 3766. http://rfc.net/rfc3766.html
-
RFC 3766. http://rfc.net/rfc3766.html
-
-
-
|