-
1
-
-
0034543450
-
The Italian academic community's electronic voting system
-
December
-
P. Bonetti, S. Ravaioli, and S. Piergallini. The Italian academic community's electronic voting system. Computer Networks, 34(6):851-860, December 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.6
, pp. 851-860
-
-
Bonetti, P.1
Ravaioli, S.2
Piergallini, S.3
-
2
-
-
33744970314
-
An anonymous voting mechanism based on the key exchange protocol
-
DOI 10.1016/j.cose.2006.02.004, PII S0167404806000320
-
C. C. Chang and J. S. Lee. An anonymous voting mechanism based on the key exchange protocol. Computers & Security, 25(4):307-314, 2006. (Pubitemid 43866955)
-
(2006)
Computers and Security
, vol.25
, Issue.4
, pp. 307-314
-
-
Chang, C.-C.1
Lee, J.-S.2
-
3
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology, CRYPTO'82, pages 199-203, 1982.
-
(1982)
Advances in Cryptology, CRYPTO'82
, pp. 199-203
-
-
Chaum, D.1
-
5
-
-
77951106449
-
Multi-authority secret bollat elections with linear work
-
Advances in Cryptology, EUROCRYPT'96, pages 72-83
-
R. Cramer, M. Franklin, B. Schoenmakers, and M. Yung. Multi-authority secret bollat elections with linear work. In Advances in Cryptology, EUROCRYPT'96, pages 72-83, Lecture Notes in Computer Science, 1070, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
-
-
Cramer, R.1
Franklin, M.2
Schoenmakers, B.3
Yung, M.4
-
6
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
Advances in Cryptology, EUROCRYPT'97, pages 103-117
-
R. Cramer, R. Gennaro, and J. Borrell. A secure and optimally efficient multi-authority election scheme. In Advances in Cryptology, EUROCRYPT'97, pages 103-117, Lecture Notes in Computer Science, 1233, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
-
-
Cramer, R.1
Gennaro, R.2
Borrell, J.3
-
7
-
-
77951122582
-
Formal specification and verification of a secure micropayment protocol
-
M. G. Gouda and A. X. Liu. Formal specification and verification of a secure micropayment protocol. International Journal of Network Security, 7(1):81-87, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.1
, pp. 81-87
-
-
Gouda, M.G.1
Liu, A.X.2
-
8
-
-
0035149278
-
A simple micro-payment scheme
-
M.-S. Hwang, I.-C. Lin, and L.-H. Li. A simple micro-payment scheme. Journal of Systems and Software, 55(3):221-229, 2001.
-
(2001)
Journal of Systems and Software
, vol.55
, Issue.3
, pp. 221-229
-
-
Hwang, M.-S.1
Lin, I.-C.2
Li, L.-H.3
-
9
-
-
0036466678
-
Adding timestamps to the secure electronic auction protocol
-
DOI 10.1016/S0169-023X(01)00048-9, PII S0169023X01000489
-
M.-S. Hwang, E. J.-L. Lu, and I.-C. Lin. Adding timestamps to the secure electronic auction protocol. Data & Knowledge Engineering, 40(2):155-162, 2002. (Pubitemid 33107287)
-
(2002)
Data and Knowledge Engineering
, vol.40
, Issue.2
, pp. 155-162
-
-
Hwang, M.-S.1
Lu, E.J.-L.2
Lin, I.-C.3
-
11
-
-
0035167495
-
The design of protocol for e-voting on the Internet
-
London, England, October
-
J.-K. Jan, Y.-Y. Chen, and Yi-Lin. The design of protocol for e-voting on the Internet. In Proceedings of the IEEE International Carnahan Conference on Security Technology, pages 180-189, London, England, October 2001.
-
(2001)
Proceedings of the IEEE International Carnahan Conference on Security Technology
, pp. 180-189
-
-
Jan, J.-K.1
Chen, Y.-Y.2
Yi-Lin3
-
12
-
-
0031281744
-
A secure electronic voting protocol with IC cards
-
November
-
J.-K. Jan and C.-C. Tai. A secure electronic voting protocol with IC cards. Journal of Systems and Software, 39(2):93-101, November 1997.
-
(1997)
Journal of Systems and Software
, vol.39
, Issue.2
, pp. 93-101
-
-
Jan, J.-K.1
Tai, C.-C.2
-
13
-
-
73149093942
-
Efficient user authentication and key agreement with user privacy protection
-
W.-S. Juang and J.-L. Wu. Efficient user authentication and key agreement with user privacy protection. International Journal of Network Security, 7(1):120-129, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.1
, pp. 120-129
-
-
Juang, W.-S.1
Wu, J.-L.2
-
14
-
-
77951135883
-
Vulnerabilities in the Adachi-Aoki- Komano-Ohta micropayment scheme
-
M. Kim and C. K. Koc. Vulnerabilities in the Adachi-Aoki- Komano-Ohta micropayment scheme. International Journal of Network Security, 4(2):235-239, 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 235-239
-
-
Kim, M.1
Koc, C.K.2
-
15
-
-
0033077761
-
A secure and practical electronic voting scheme
-
W.-C. Ku and S.-D.Wang. A secure and practical electronic voting scheme. Computer Communicarions, 22(3):279-286, 1999.
-
(1999)
Computer Communicarions
, vol.22
, Issue.3
, pp. 279-286
-
-
Ku, W.-C.1
Wang, S.-D.2
-
16
-
-
0032182084
-
A universal single-authority election system
-
C. L. Lei and C. I. Fan. A universal single-authority election system. IEICE Transactions on Fundamentals, E81-A(10):2186-2193, 1998.
-
(1998)
IEICE Transactions on Fundamentals
, vol.10 E81-A
, pp. 2186-2193
-
-
Lei, C.L.1
Fan, C.I.2
-
17
-
-
1542275320
-
A secure electronic voting protocol for general elections
-
H. T. Liaw. A secure electronic voting protocol for general elections. Computers & Security, 23(2):107-119, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.2
, pp. 107-119
-
-
Liaw, H.T.1
-
19
-
-
67549145552
-
A novel peer-to-peer payment protocol
-
D. Palaka, P. Daras, K. Petridis, and M. G. Strintzis. A novel peer-to-peer payment protocol. International Journal of Network Security, 4(1):107-120, 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.1
, pp. 107-120
-
-
Palaka, D.1
Daras, P.2
Petridis, K.3
Strintzis, M.G.4
-
20
-
-
0034299716
-
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
-
October
-
A. Riera, J. Rifà, and J. Borrell. Efficient construction of vote-tags to allow open objection to the tally in electronic elections. Information Processing Letters, 75(5):211-215, October 2000.
-
(2000)
Information Processing Letters
, vol.75
, Issue.5
, pp. 211-215
-
-
Riera, A.1
Rifà, J.2
Borrell, J.3
-
21
-
-
77951106968
-
Privacy-preserving data mining in electronic surveys
-
J. Zhan and S. Matwin. Privacy-preserving data mining in electronic surveys. International Journal of Network Security, 4(3):318-327, 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.3
, pp. 318-327
-
-
Zhan, J.1
Matwin, S.2
-
22
-
-
77951095504
-
Anonymizing geographic ad hoc routing for preserving location privacy
-
Z. Zhou and K. C. Yow. Anonymizing geographic ad hoc routing for preserving location privacy. International Journal of Network Security, 2(3):210-218, 2006.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.3
, pp. 210-218
-
-
Zhou, Z.1
Yow, K.C.2
|