-
1
-
-
77954124943
-
A practical secret voting scheme for large scale elections
-
Seberry, J, Zheng, Y, eds, ASIACRYPT 1992, Springer, Heidelberg
-
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Seberry, J., Zheng, Y. (eds.) ASIACRYPT 1992. LNCS, vol. 718, pp. 244-251. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.718
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
3
-
-
84956974327
-
Receipt-Free Electronic Voting Schemes for Large Scale Elections
-
Christianson, B, Lomas, M, eds, Security Protocols 1997, Springer, Heidelberg
-
Okamoto, T.: Receipt-Free Electronic Voting Schemes for Large Scale Elections. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25-35. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1361
, pp. 25-35
-
-
Okamoto, T.1
-
5
-
-
84948969982
-
Efficient receipt-free voting based on homomorphic encryption
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539-556. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 539-556
-
-
Hirt, M.1
Sako, K.2
-
6
-
-
0037421015
-
A new logic for electronic commerce protocols
-
Adi, K., Debbabi, M., Mejri, M.: A new logic for electronic commerce protocols. Theoretical Computer Science 291(3), 223-283 (2003)
-
(2003)
Theoretical Computer Science
, vol.291
, Issue.3
, pp. 223-283
-
-
Adi, K.1
Debbabi, M.2
Mejri, M.3
-
8
-
-
58449096556
-
-
Baskar, A., Ramanujam, R., Suresh, S.P.: Knowledge-based modelling of voting protocols. In: Proceedings of TARK 2007, pp. 62-71. ACM, New York (2007)
-
Baskar, A., Ramanujam, R., Suresh, S.P.: Knowledge-based modelling of voting protocols. In: Proceedings of TARK 2007, pp. 62-71. ACM, New York (2007)
-
-
-
-
9
-
-
38349013711
-
-
Chothia, T., Orzan, S., Pang, J., Dashti, M.T.: A framework for automatically checking anonymity with μ-CRL. In: TGC, pp. 301-318 (2006)
-
Chothia, T., Orzan, S., Pang, J., Dashti, M.T.: A framework for automatically checking anonymity with μ-CRL. In: TGC, pp. 301-318 (2006)
-
-
-
-
10
-
-
33947622187
-
Coercion-resistance and receipt-freeness in electronic voting. In: Proceedings of CSFW 2006
-
Los Alamitos
-
Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: Proceedings of CSFW 2006, pp. 28-42. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
IEEE Computer Society
, pp. 28-42
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.3
-
13
-
-
23144432349
-
-
Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied Pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 186-200. Springer, Heidelberg (2005)
-
Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied Pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186-200. Springer, Heidelberg (2005)
-
-
-
-
14
-
-
33846571461
-
Data anonymity in the FOO voting scheme
-
Mauw, S., Verschuren, J., de Vink, E.P.: Data anonymity in the FOO voting scheme. Electronic Notes in Theoretical Computer Science 168, 5-28 (2007)
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.168
, pp. 5-28
-
-
Mauw, S.1
Verschuren, J.2
de Vink, E.P.3
-
15
-
-
0021870594
-
Algebra of communicating processes with abstraction
-
Bergstra, J.A., Klop, J.W.: Algebra of communicating processes with abstraction. Theoritical Computer Science 37, 77-121 (1985)
-
(1985)
Theoritical Computer Science
, vol.37
, pp. 77-121
-
-
Bergstra, J.A.1
Klop, J.W.2
-
16
-
-
0035035153
-
Mobile values, new names, and secure communication
-
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. ACM SIGPLAN Notices 36(3), 104-115 (2001)
-
(2001)
ACM SIGPLAN Notices
, vol.36
, Issue.3
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
18
-
-
22444450832
-
Application of modal logic to programming
-
Pratt, V.R.: Application of modal logic to programming. Studia Logica 39(2-3), 257-274 (1980)
-
(1980)
Studia Logica
, vol.39
, Issue.2-3
, pp. 257-274
-
-
Pratt, V.R.1
-
19
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84-90 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
20
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6(1-2), 85-128 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
|