메뉴 건너뛰기




Volumn 5308 LNCS, Issue , 2008, Pages 403-418

Specification of electronic voting protocol properties using ADM logic: FOO case study

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CIRCUITS; FORMAL SPECIFICATION; MODEL CHECKING; NUCLEAR REACTORS; VOTING MACHINES;

EID: 57049135194     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88625-9_27     Document Type: Conference Paper
Times cited : (16)

References (21)
  • 1
    • 77954124943 scopus 로고
    • A practical secret voting scheme for large scale elections
    • Seberry, J, Zheng, Y, eds, ASIACRYPT 1992, Springer, Heidelberg
    • Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Seberry, J., Zheng, Y. (eds.) ASIACRYPT 1992. LNCS, vol. 718, pp. 244-251. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.718 , pp. 244-251
    • Fujioka, A.1    Okamoto, T.2    Ohta, K.3
  • 3
    • 84956974327 scopus 로고    scopus 로고
    • Receipt-Free Electronic Voting Schemes for Large Scale Elections
    • Christianson, B, Lomas, M, eds, Security Protocols 1997, Springer, Heidelberg
    • Okamoto, T.: Receipt-Free Electronic Voting Schemes for Large Scale Elections. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25-35. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1361 , pp. 25-35
    • Okamoto, T.1
  • 5
    • 84948969982 scopus 로고    scopus 로고
    • Efficient receipt-free voting based on homomorphic encryption
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539-556. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 539-556
    • Hirt, M.1    Sako, K.2
  • 6
    • 0037421015 scopus 로고    scopus 로고
    • A new logic for electronic commerce protocols
    • Adi, K., Debbabi, M., Mejri, M.: A new logic for electronic commerce protocols. Theoretical Computer Science 291(3), 223-283 (2003)
    • (2003) Theoretical Computer Science , vol.291 , Issue.3 , pp. 223-283
    • Adi, K.1    Debbabi, M.2    Mejri, M.3
  • 8
    • 58449096556 scopus 로고    scopus 로고
    • Baskar, A., Ramanujam, R., Suresh, S.P.: Knowledge-based modelling of voting protocols. In: Proceedings of TARK 2007, pp. 62-71. ACM, New York (2007)
    • Baskar, A., Ramanujam, R., Suresh, S.P.: Knowledge-based modelling of voting protocols. In: Proceedings of TARK 2007, pp. 62-71. ACM, New York (2007)
  • 9
    • 38349013711 scopus 로고    scopus 로고
    • Chothia, T., Orzan, S., Pang, J., Dashti, M.T.: A framework for automatically checking anonymity with μ-CRL. In: TGC, pp. 301-318 (2006)
    • Chothia, T., Orzan, S., Pang, J., Dashti, M.T.: A framework for automatically checking anonymity with μ-CRL. In: TGC, pp. 301-318 (2006)
  • 10
    • 33947622187 scopus 로고    scopus 로고
    • Coercion-resistance and receipt-freeness in electronic voting. In: Proceedings of CSFW 2006
    • Los Alamitos
    • Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: Proceedings of CSFW 2006, pp. 28-42. IEEE Computer Society, Los Alamitos (2006)
    • (2006) IEEE Computer Society , pp. 28-42
    • Delaune, S.1    Kremer, S.2    Ryan, M.3
  • 13
    • 23144432349 scopus 로고    scopus 로고
    • Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied Pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 186-200. Springer, Heidelberg (2005)
    • Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied Pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186-200. Springer, Heidelberg (2005)
  • 15
    • 0021870594 scopus 로고
    • Algebra of communicating processes with abstraction
    • Bergstra, J.A., Klop, J.W.: Algebra of communicating processes with abstraction. Theoritical Computer Science 37, 77-121 (1985)
    • (1985) Theoritical Computer Science , vol.37 , pp. 77-121
    • Bergstra, J.A.1    Klop, J.W.2
  • 16
    • 0035035153 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. ACM SIGPLAN Notices 36(3), 104-115 (2001)
    • (2001) ACM SIGPLAN Notices , vol.36 , Issue.3 , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 18
    • 22444450832 scopus 로고
    • Application of modal logic to programming
    • Pratt, V.R.: Application of modal logic to programming. Studia Logica 39(2-3), 257-274 (1980)
    • (1980) Studia Logica , vol.39 , Issue.2-3 , pp. 257-274
    • Pratt, V.R.1
  • 19
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84-90 (1981)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.1
  • 20
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6(1-2), 85-128 (1998)
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.