메뉴 건너뛰기




Volumn , Issue , 2007, Pages 62-71

Knowledge-based modelling of voting protocols

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC VOTING PROTOCOLS; REASONING ABOUT KNOWLEDGE; VOTING PROTOCOLS;

EID: 58449096556     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1324249.1324261     Document Type: Conference Paper
Times cited : (43)

References (21)
  • 1
    • 29144460434 scopus 로고    scopus 로고
    • On epistemic logic with justification
    • Singapore, July
    • S. Artemov and E. Nogina. On epistemic logic with justification. In Proceedings of TARK X, pages 279-294, Singapore, July 2005.
    • (2005) Proceedings of TARK X , pp. 279-294
    • Artemov, S.1    Nogina, E.2
  • 2
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Proceedings of the IFIP International Conference on TCS (IFIP TCS2000)
    • Martin Abadi and Phillip Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In Proceedings of the IFIP International Conference on TCS (IFIP TCS2000), volume 1872 of Lecture Notes in Computer Science, pages 3-22, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 5
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • Springer-Verlag
    • D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology - Crypto '82, pages 199-203. Springer-Verlag, 1983.
    • (1983) Advances in Cryptology - Crypto '82 , pp. 199-203
    • Chaum, D.1
  • 6
    • 0022145479 scopus 로고
    • SECURITY WITHOUT IDENTIFICATION: TRANSACTION SYSTEMS TO MAKE BIG BROTHER OBSOLETE.
    • DOI 10.1145/4372.4373
    • D. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, 1985. (Pubitemid 15587967)
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 8
    • 0012013903 scopus 로고    scopus 로고
    • Dolev-Yao is no better than Machiavelli
    • P. Degano, editor, July
    • Iliano Cervesato, Catherine A. Meadows, and Paul F. Syverson. Dolev-Yao is no better than Machiavelli. In P. Degano, editor, Proceedings of WITS'00, pages 87-92, July 2000.
    • (2000) Proceedings of WITS'00 , pp. 87-92
    • Cervesato, I.1    Meadows, C.A.2    Syverson, P.F.3
  • 9
    • 33947622187 scopus 로고    scopus 로고
    • Coercion-Resistance and Receipt-Freeness in Electronic Voting
    • IEEE Computer Society
    • Stephanie Delaune, Steve Kremer, and Mark Ryan. Coercion-Resistance and Receipt-Freeness in Electronic Voting. In 19th Computer Security Foundations Workshop, pages 28-42. IEEE Computer Society, 2006.
    • (2006) 19th Computer Security Foundations Workshop , pp. 28-42
    • Delaune, S.1    Kremer, S.2    Ryan, M.3
  • 12
    • 0001292443 scopus 로고
    • A practical secret voting scheme for large scale elections
    • Atsushi Fujioka, Tatsuaki Okamoto, and Kaazuo Ohta. A practical secret voting scheme for large scale elections. In ASIACRYPT, pages 244-251, 1992.
    • (1992) ASIACRYPT , pp. 244-251
    • Fujioka, A.1    Okamoto, T.2    Ohta, K.3
  • 13
    • 24144492346 scopus 로고    scopus 로고
    • Anonymity and Information Hiding in Multiagent Systems
    • Joseph Y. Halpern and Kevin R. O'Neil. Anonymity and Information Hiding in Multiagent Systems. Journal of Computer Security, 13(3):483-512, 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 483-512
    • Halpern, J.Y.1    O'Neil, K.R.2
  • 14
    • 35248868917 scopus 로고    scopus 로고
    • Modeling adversaries in a logic for security protocol analysis
    • Formal Aspects of Security, First International Conference, FASec 2002
    • Joseph Y. Halpern and Riccardo Pucella. Modeling adversaries in a logic for security protocol analysis. In Formal Aspects of Security, First International Conference, FASec 2002, volume 2629 of Lecture Notes in Computer Science, pages 115-132, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2629 , pp. 115-132
    • Halpern, J.Y.1    Pucella, R.2
  • 15
    • 33750257357 scopus 로고    scopus 로고
    • Formalising Receipt-Freeness
    • Information Security Conference, Springer
    • Hugo Jonker and E.P. de Vink. Formalising Receipt-Freeness. In Information Security Conference, volume 4176 of Lecture Notes in Computer Science, pages 476-488. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4176 , pp. 476-488
    • Jonker, H.1    De Vink, E.P.2
  • 17
    • 23144432349 scopus 로고    scopus 로고
    • Analysis of an Electronic Voting Protocol in the Applied Pi Calculus
    • Proceedings of the European Symposium on Programming, Springer
    • Steve Kremer and Mark Ryan. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. In Proceedings of the European Symposium on Programming, volume 3444 of Lecture Notes in Computer Science, pages 186-200. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3444 , pp. 186-200
    • Kremer, S.1    Ryan, M.2
  • 18
    • 85007180552 scopus 로고
    • Distributed Processes and the Logic of Knowledge
    • Rohit Parikh and R. Ramanujam. Distributed Processes and the Logic of Knowledge. In Logic of Programs, pages 256-268, 1985.
    • (1985) Logic of Programs , pp. 256-268
    • Parikh, R.1    Ramanujam, R.2
  • 20
    • 11944251803 scopus 로고    scopus 로고
    • Decidability of context-explicit security protocols
    • R. Ramanujam and S. P. Suresh. Decidability of context-explicit security protocols. Journal of Computer Security, 13(1):135-165, 2005. (Pubitemid 40099762)
    • (2005) Journal of Computer Security , vol.13 , Issue.1 , pp. 135-165
    • Ramanujam, R.1    Suresh, S.P.2
  • 21
    • 33751045375 scopus 로고    scopus 로고
    • A (restricted) quantifier elimination for security protocols
    • DOI 10.1016/j.tcs.2006.08.037, PII S0304397506005809
    • R. Ramanujam and S. P. Suresh. A (restricted) quantifier elimination for security protocols. Theoretical Computer Science, 367:228-256, 2006. (Pubitemid 44755017)
    • (2006) Theoretical Computer Science , vol.367 , Issue.1-2 , pp. 228-256
    • Ramanujam, R.1    Suresh, S.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.