Towards A Practical JCJ / Civitas Implementation
暂无分享,去创建一个
Melanie Volkamer | Reto E. Koenig | Stephan Neumann | Christian Feier | M. Volkamer | Stephan Neumann | C. Feier
[1] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[2] Michael R. Clarkson,et al. Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[3] Stephan Neumann,et al. Pretty Understandable Democracy 2.0 , 2014, IACR Cryptol. ePrint Arch..
[4] Melanie Volkamer,et al. Robust electronic voting: Introducing robustness in Civitas , 2011, 2011 International Workshop on Requirements Engineering for Electronic Voting Systems.
[5] Rolf Haenni,et al. Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes , 2011, SEC.
[6] Cormac Herley,et al. A large-scale study of web password habits , 2007, WWW '07.
[7] Rolf Haenni,et al. A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes , 2013, Comput. Secur..
[8] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[9] Rolf Haenni,et al. How to Store some Secrets , 2012, IACR Cryptol. ePrint Arch..
[10] Melanie Volkamer,et al. Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme , 2013, 2013 International Conference on Availability, Reliability and Security.
[11] João Mendes. Trusted Civitas: Client Trust in CIVITAS Electronic Voting Protocol , 2011 .
[12] S.J. Aboud,et al. Baghdad method for calculating multiplicative inverse , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[13] Mark Ryan,et al. Towards Automatic Analysis of Election Verifiability Properties , 2010, ARSPA-WITS.
[14] Johannes A. Buchmann,et al. On Coercion-Resistant Electronic Elections with Linear Work , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[15] Michael Backes,et al. Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[16] Josh Benaloh,et al. Simple Verifiable Elections , 2006, EVT.
[17] Ralf Küsters,et al. An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[18] Jan Camenisch,et al. Anonymous credentials on a standard java card , 2009, CCS.
[19] Mark Ryan,et al. Trivitas: Voters Directly Verifying Votes , 2011, VoteID.
[20] Melanie Volkamer,et al. Civitas and the Real World: Problems and Solutions from a Practical Point of View , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[21] Warren D. Smith. New cryptographic election protocol with best-known theoretical properties , 2005 .
[22] Rolf Haenni,et al. A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time , 2011, Financial Cryptography.
[23] Jacques Traoré,et al. A Practical and Secure Coercion-Resistant Scheme for Internet Voting , 2010, Towards Trustworthy Elections.
[24] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..