-
1
-
-
24344493908
-
Computer-assisted verification of a protocol for certified email
-
M. Abadi and B. Blanchet. Computer-assisted Verification of a Protocol for Certified Email. Sci. Comput. Program., 58(1-2):3-27, 2005.
-
(2005)
Sci. Comput. Program.
, vol.58
, Issue.1-2
, pp. 3-27
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
0035035153
-
Mobile values, new names, and secure communication
-
ACM
-
M. Abadi and C. Fournet. Mobile Values, New Names, and Secure Communication. In POPL 2001, p. 104-115, ACM.
-
POPL 2001
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
3
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
IEEE Computer Society
-
N. Asokan, V. Shoup, and M. Waidner. Asynchronous Protocols for Optimistic Fair Exchange. In S&P 1998, p. 86-99, IEEE Computer Society.
-
S&P 1998
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
4
-
-
38049082907
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
TCC 2007, Springer
-
Y. Aumann and Y. Lindell. Security against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In TCC 2007, vol. 4392 of LNCS, p. 137-156. Springer.
-
LNCS
, vol.4392
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
5
-
-
33748318017
-
Accountability protocols: Formalized and verified
-
G. Bella and L. Paulson. Accountability Protocols: Formalized and Verified. ACM Trans. Inf. Syst. Secur., 9(2):138-161, 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.2
, pp. 138-161
-
-
Bella, G.1
Paulson, L.2
-
6
-
-
38549086047
-
Bingo voting: Secure and coercion-free voting using a trusted random number generator
-
VOTE-ID 2007. Springer
-
J.-M. Bohli, J. Müller-Quade, and S. Röhrich. Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator. In VOTE-ID 2007, vol. 4896 of LNCS, p. 111-124. Springer.
-
LNCS
, vol.4896
, pp. 111-124
-
-
Bohli, J.-M.1
Müller-Quade, J.2
Röhrich, S.3
-
7
-
-
80052018605
-
Scantegrity II: End-to-end verifiability for optical scan election systems using invisible ink confirmation codes
-
USENIX Association
-
D. Chaum, R. Carback, J. Clark, A. Essex, S. Popoveniuc, R. L. Rivest, P. Ryan, E. Shen, and A. Sherman. Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. In EVT 2008, USENIX Association.
-
EVT 2008
-
-
Chaum, D.1
Carback, R.2
Clark, J.3
Essex, A.4
Popoveniuc, S.5
Rivest, R.L.6
Ryan, P.7
Shen, E.8
Sherman, A.9
-
8
-
-
33646028830
-
A practical, voter-verifiable election scheme
-
ESORICS 2005, Springer
-
D. Chaum, P. Ryan, and S. Schneider. A Practical, Voter-verifiable Election Scheme. In ESORICS 2005, vol. 3679 of LNCS, p. 118-139, Springer.
-
LNCS
, vol.3679
, pp. 118-139
-
-
Chaum, D.1
Ryan, P.2
Schneider, S.3
-
10
-
-
84957060126
-
Abuse-free optimistic contract signing
-
CRYPTO 1999, Springer
-
J.A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free Optimistic Contract Signing. In CRYPTO 1999, vol. 1666 of LNCS, p. 449-466, Springer.
-
LNCS
, vol.1666
, pp. 449-466
-
-
Garay, J.A.1
Jakobsson, M.2
MacKenzie, P.3
-
11
-
-
70349289356
-
Black-box accountable authority identity-based encryption
-
ACM
-
Vipul Goyal, Steve Lu, Amit Sahai, and Brent Waters. Black-box Accountable Authority Identity-based Encryption. In CCS 2008, p. 427-436, ACM.
-
CCS 2008
, pp. 427-436
-
-
Goyal, V.1
Lu, S.2
Sahai, A.3
Waters, B.4
-
12
-
-
70350353223
-
Reliable evidence: Auditability by typing
-
Springer
-
N. Guts, C. Fournet, and F. Nardelli. Reliable Evidence: Auditability by Typing. In ESORICS 2009, p. 168-183, Springer.
-
ESORICS 2009
, pp. 168-183
-
-
Guts, N.1
Fournet, C.2
Nardelli, F.3
-
13
-
-
70350381139
-
Towards a theory of accountability and audit
-
Springer
-
R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely. Towards a Theory of Accountability and Audit. In ESORICS 2009, p. 152-167, Springer.
-
ESORICS 2009
, pp. 152-167
-
-
Jagadeesan, R.1
Jeffrey, A.2
Pitcher, C.3
Riely, J.4
-
14
-
-
39749130001
-
Transforming semi-honest protocols to ensure accountability
-
W. Jiang, C. Clifton, and M. Kantarcioglu. Transforming Semi-honest Protocols to Ensure Accountability. Data Knowl. Eng., 65(1):57-74, 2008.
-
(2008)
Data Knowl. Eng.
, vol.65
, Issue.1
, pp. 57-74
-
-
Jiang, W.1
Clifton, C.2
Kantarcioglu, M.3
-
15
-
-
33749009810
-
Coercion-resistant electronic elections
-
ACM Press
-
A. Juels, D. Catalano, and M. Jakobsson. Coercion-resistant Electronic Elections. In WPES 2005, p. 61-70, ACM Press.
-
WPES 2005
, pp. 61-70
-
-
Juels, A.1
Catalano, D.2
Jakobsson, M.3
-
16
-
-
33746368726
-
A dolev-yao-based definition of abuse-free protocols
-
ICALP 2006, Springer
-
D. Kähler, R. Küsters, and Th. Wilke. A Dolev-Yao-based Definition of Abuse-free Protocols. In ICALP 2006, vol. 4052 of LNCS, p. 95-106, Springer.
-
LNCS
, vol.4052
, pp. 95-106
-
-
Kähler, D.1
Küsters, R.2
Wilke, Th.3
-
18
-
-
77952345661
-
Split-ballot voting: Everlasting privacy with distributed trust
-
ACM
-
T. Moran and M. Naor. Split-ballot Voting: Everlasting Privacy with Distributed Trust. In CCS 2007, p. 246-255. ACM.
-
CCS 2007
, pp. 246-255
-
-
Moran, T.1
Naor, M.2
-
19
-
-
70450210406
-
Practical secrecy-preserving, verifiably correct and trustworthy auctions
-
D. Parkes, M. Rabin, S. Shieber, and C. Thorpe. Practical Secrecy-preserving, Verifiably Correct and Trustworthy Auctions. In ICEC 2006, p. 70-81.
-
ICEC 2006
, pp. 70-81
-
-
Parkes, D.1
Rabin, M.2
Shieber, S.3
Thorpe, C.4
-
20
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
CRYPTO 1991, Springer
-
T. Pedersen. Non-interactive and Information-theoretic Secure Verifiable Secret Sharing. In CRYPTO 1991, vol. 576 of LNCS, p. 129-140, Springer.
-
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.1
-
21
-
-
84957356080
-
Receipt-free mix-type voting scheme - A practical solution to the implementation of a voting booth
-
EUROCRYPT 1999, Springer
-
K. Sako and J. Kilian. Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth. In EUROCRYPT 1999, vol. 921 of LNCS, p. 393-403, Springer.
-
LNCS
, vol.921
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
-
23
-
-
57049135194
-
Specification of electronic voting protocol properties using ADM logic: Foo case study
-
ICICS 2008, Springer
-
M. Talbi, B. Morin, V. Tong, A. Bouhoula, and M. Mejri. Specification of Electronic Voting Protocol Properties using ADM Logic: Foo Case Study. In ICICS 2008, vol. 5308 of LNCS, p. 403-418, Springer.
-
LNCS
, vol.5308
, pp. 403-418
-
-
Talbi, M.1
Morin, B.2
Tong, V.3
Bouhoula, A.4
Mejri, M.5
-
24
-
-
62949151388
-
Accountability of perfect concurrent signature
-
Li Yunfeng, He Dake, and Lu Xianhui. Accountability of Perfect Concurrent Signature. ICCEE 2008, p. 773-777.
-
ICCEE 2008
, pp. 773-777
-
-
Yunfeng, L.1
Dake, H.2
Xianhui, L.3
-
25
-
-
0029724319
-
A fair non-repudiation protocol
-
IEEE Computer Society Press
-
J. Zhou and D. Gollmann. A Fair Non-repudiation Protocol. In S&P 1996, p. 55-61, IEEE Computer Society Press.
-
S&P 1996
, pp. 55-61
-
-
Zhou, J.1
Gollmann, D.2
|