Knowledge-based modelling of voting protocols
暂无分享,去创建一个
[1] John C. Mitchell,et al. A meta-notation for protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[2] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[3] Joseph Y. Halpern,et al. Modeling Adversaries in a Logic for Security Protocol Analysis , 2006, FASec.
[4] Joseph Y. Halpern,et al. Anonymity and information hiding in multiagent systems , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[5] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[6] Mark Ryan,et al. Coercion-resistance and receipt-freeness in electronic voting , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[7] John C. Mitchell,et al. Relating strands and multiset rewriting for security protocol analysis , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[8] Ramaswamy Ramanujam,et al. Decidability of context-explicit security protocols , 2005, J. Comput. Secur..
[9] Paul Syverson,et al. Dolev-Yao is no better than Machiavelli , 2000 .
[10] Ramaswamy Ramanujam,et al. A (restricted) quantifier elimination for security protocols , 2006, Theor. Comput. Sci..
[11] Josh Benaloh,et al. Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.
[12] Kazue Sako. Electronic Voting Schemes , 2005, Encyclopedia of Cryptography and Security.
[13] Sergei N. Artëmov,et al. TR-2005004: Basic Systems of Epistemic Logic with Justification , 2005 .
[14] Ronald Fagin,et al. Reasoning about knowledge , 1995 .
[15] Mark Ryan,et al. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.
[16] Sergei N. Artëmov,et al. On epistemic logic with justification , 2005, TARK.
[17] Wolter Pieters,et al. Receipt-freeness as a special case of anonymity in epistemic logic , 2006 .
[18] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[19] Erik P. de Vink,et al. Formalising Receipt-Freeness , 2006, ISC.
[20] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2001, Journal of Cryptology.
[21] Ramaswamy Ramanujam,et al. Distributed Processes and the Logic of Knowledge , 1985, Logic of Programs.
[22] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).