暂无分享,去创建一个
Alexander Schneider | Christian Meter | Philipp Hagemeister | Philipp Hagemeister | Christian Meter | Alexander Schneider
[1] Chih-Cheng Chen,et al. A Secure Anonymous E-Voting System based on Discrete Logarithm Problem , 2014 .
[2] Helger Lipmaa. Secure Electronic Voting Protocols , 2005 .
[3] Aggelos Kiayias,et al. The Vector-Ballot e-Voting Approach , 2004, Financial Cryptography.
[4] Josh Benaloh. Rethinking Voter Coercion: The Realities Imposed by Technology , 2013, EVT/WOTE.
[5] Victor K.-W. Wei,et al. Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation , 2005, ISPEC.
[6] Jörg Schwenk,et al. Code Voting with Linkable Group Signatures , 2008, Electronic Voting.
[7] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[8] Jörn Müller-Quade,et al. Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator , 2007, VOTE-ID.
[9] Josef Kittler,et al. Financial Cryptography and Data Security , 2012, Lecture Notes in Computer Science.
[10] Michael R. Clarkson,et al. Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[11] Peter Y. A. Ryan,et al. Caveat Coercitor: Coercion-Evidence in Electronic Voting , 2013, 2013 IEEE Symposium on Security and Privacy.
[12] C. Andrew Neff,et al. A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.
[13] Pascal Lafourcade,et al. Survey on Electronic Voting Schemes , 2010 .
[14] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[15] Ben Adida,et al. Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.
[16] Ida Sofie Gebhardt Stenerud,et al. When Reality Comes Knocking Norwegian Experiences with Verifiable Electronic Voting , 2012, Electronic Voting.
[17] Ülle Madise,et al. E-voting in Estonia 2005. The first Practice of Country-wide binding Internet Voting in the World , 2006, Electronic Voting.
[18] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[19] Urs Gasser,et al. Three Case Studies from Switzerland : E-Voting , 2009 .
[20] Rolf Haenni,et al. Achieving Meaningful Efficiency in Coercion-Resistant, Verifiable Internet Voting , 2012, Electronic Voting.
[21] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[22] Eric Wustrow,et al. Attacking the Washington, D.C. Internet Voting System , 2012, Financial Cryptography.
[23] Stelvio Cimato,et al. Encyclopedia of Cryptography and Security , 2005 .
[24] Adi Shamir,et al. How to share a secret , 1979, CACM.