Independent Computations for Safe Remote Electronic Voting
暂无分享,去创建一个
[1] D. Jefferson,et al. Security analysis of SERVE 1 A Security Analysis of the Secure Electronic Registration and Voting Experiment ( SERVE ) , 2004 .
[2] Ralf Küsters,et al. An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[3] Michael J. Fischer,et al. A robust and verifiable cryptographically secure election scheme , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[4] Markus Jakobsson,et al. Towards Trustworthy Elections, New Directions in Electronic Voting , 2010, Towards Trustworthy Elections.
[5] L. V. Doorn,et al. SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.
[6] Alec Yasinsac,et al. The Dynamics of Counting and Recounting Votes , 2008, IEEE Security & Privacy.
[7] Mark Ryan,et al. Coercion-resistance and receipt-freeness in electronic voting , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[8] Ronald L. Rivest,et al. A Modular Voting Architecture ("Frog Voting") , 2010, Towards Trustworthy Elections.
[9] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[10] Elaine Shi,et al. BIND: a fine-grained attestation service for secure distributed systems , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[11] M. F.,et al. Bibliography , 1985, Experimental Gerontology.
[12] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[13] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[14] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[15] Kazue Sako,et al. Secure Voting Using Partially Compatible Homomorphisms , 1994, CRYPTO.
[16] Jonathan K. Millen,et al. Principles of remote attestation , 2011, International Journal of Information Security.
[17] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[18] David A. Wagner,et al. Analyzing internet voting security , 2004, CACM.
[19] Michael R. Clarkson,et al. Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[20] Ben Adida,et al. Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.