Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract)
暂无分享,去创建一个
[1] Guido Schryen. Security aspects of Internet voting , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[2] Josh Benaloh,et al. Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.
[3] John Paul Gibson,et al. Electronic Voting: A Safety Critical System , 2003 .
[4] Safevote. Voting System Requirements , .
[5] Patricia Heindl. E-Voting in Austria Legal requirements and First Steps , 2004, Electronic Voting in Europe.
[6] Radha Poovendran,et al. A framework and taxonomy for comparison of electronic voting schemes , 2006, Comput. Secur..
[7] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[8] Byoungcheon Lee,et al. Implementation Issues in Secure E-Voting Schemes , 2004 .
[9] Josh Benaloh,et al. Receipt-Free Secret-Ballot Elections , 1994, STOC 1994.
[10] Lorrie Faith Cranor,et al. Sensus: a security-conscious electronic polling system for the Internet , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[11] Deniz Cetinkaya,et al. Towards Secure E-Elections in Turkey: Requirements and Principles , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[12] France T́elécom,et al. Verifying Properties of Electronic Voting Protocols , 2006 .
[13] Emmanouil Magkos,et al. Towards Secure and Practical E-Elections in the New Era , 2003, Secure Electronic Voting.
[14] Lilian Mitrou,et al. Revisiting Legal and Regulatory Requirements for Secure E-Voting , 2002, SEC.