Putting the Human Back in Voting Protocols
暂无分享,去创建一个
[1] Dieter Gollmann,et al. Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings , 2005, ESORICS.
[2] David Chaum,et al. A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.
[3] David A. Wagner,et al. Cryptographic Voting Protocols: A Systems Perspective , 2005, USENIX Security Symposium.
[4] David Chaum,et al. Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.
[5] C. Andrew Neff,et al. A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.
[6] Ross J. Anderson. Why cryptosystems fail , 1993, CCS '93.