Pretty Good Democracy
暂无分享,去创建一个
[1] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[2] Andrew C. Myers,et al. Civitas: A Secure Remote Voting System , 2007, Frontiers of Electronic Voting.
[3] Pei-Yih Ting,et al. Distributed Paillier Plaintext Equivalence Test , 2008, Int. J. Netw. Secur..
[4] Jean-Jacques Quisquater,et al. Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios , 2009, EVT/WOTE.
[5] Markus Jakobsson,et al. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking , 2002, USENIX Security Symposium.
[6] C. Andrew Neff,et al. A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.
[7] Jeremy Clark,et al. Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes , 2008, EVT.
[8] Jörg Schwenk,et al. Code Voting with Linkable Group Signatures , 2008, Electronic Voting.
[9] Hugo Krawczyk,et al. Adaptive Security for Threshold Cryptosystems , 1999, CRYPTO.
[10] Ben Adida,et al. Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.
[11] Ben Adida,et al. Advances in cryptographic voting systems , 2006 .
[12] P. Ryan. The Computer Ate My Vote , 2010 .
[13] Taisya Krivoruchko. Robust Coercion-Resistant Registration for Remote E-voting ( Extended Abstract ) , 2007 .
[14] David Chaum,et al. A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.
[15] Peter Y. A. Ryan,et al. Computing Science Pret a Voter with Paillier Encryption Pret a Voter with Paillier Encryption Bibliographical Details Pret a Voter with Paillier Encryption Suggested Keywords Prêtà Voter with Paillier Encryption , 2007 .
[16] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[17] Josh Benaloh,et al. Simple Verifiable Elections , 2006, EVT.
[18] Rolf Oppliger,et al. Protecting Code Voting Against Vote Selling , 2008, Sicherheit.
[19] Peter Y. A. Ryan,et al. Ballot permutations in prêt à voter , 2009 .
[20] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[21] Bev Littlewood,et al. E-voting: dependability requirements and design for dependability , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[22] Markus Jakobsson,et al. Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.
[23] Peter Y. A. Ryan,et al. Prêt à Voter with Re-encryption Mixes , 2006, ESORICS.
[24] Jeremy Clark,et al. How to print a secret , 2009 .
[25] Melanie Volkamer,et al. Multiple Casts in Online Voting: Analyzing Chances , 2006, Electronic Voting.