Cast-as-Intended: A Formal Definition and Case Studies
暂无分享,去创建一个
[1] Ben Smyth. Surveying global verifiability , 2020, IACR Cryptol. ePrint Arch..
[2] Peter Y. A. Ryan,et al. Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme , 2020, Financial Cryptography Workshops.
[3] Ben Smyth,et al. A critique of game-based definitions of receipt-freeness for voting , 2019, IACR Cryptol. ePrint Arch..
[4] Peter Y. A. Ryan,et al. Security - Visible, Yet Unseen? , 2019, CHI.
[5] Damian Kurpiewski,et al. Model Checking the SELENE E-Voting Protocol in Multi-agent Logics , 2018, E-Vote-ID.
[6] Vincenzo Iovino,et al. Using Selene to Verify Your Vote in JCJ , 2017, Financial Cryptography Workshops.
[7] Ben Smyth,et al. Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).
[8] Vanessa Teague,et al. Strategies for Voter-Initiated Election Audits , 2016, GameSec.
[9] Vincenzo Iovino,et al. Selene: Voting with Transparent Verifiability and Coercion-Mitigation , 2016, Financial Cryptography Workshops.
[10] Aggelos Kiayias,et al. End-to-End Verifiable Elections in the Standard Model , 2015, EUROCRYPT.
[11] Ben Smyth,et al. Ballot Secrecy and Ballot Independence Coincide , 2013, ESORICS.
[12] Ralf Küsters,et al. A Game-Based Definition of Coercion-Resistance and Its Applications , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[13] Ralf Küsters,et al. Accountability: definition and relationship to verifiability , 2010, CCS '10.
[14] Mark Ryan,et al. Election Verifiability in Electronic Voting Protocols , 2010, ESORICS.
[15] Mark Ryan,et al. Towards Automatic Analysis of Election Verifiability Properties , 2010, ARSPA-WITS.
[16] Jörn Müller-Quade,et al. Universally Composable Incoercibility , 2009, IACR Cryptol. ePrint Arch..
[17] Mark Ryan,et al. Verifying privacy-type properties of electronic voting protocols , 2009, J. Comput. Secur..
[18] Brian Randell,et al. Voting Technologies and Trust , 2006, IEEE Security & Privacy.
[19] Moni Naor,et al. Receipt-Free Universally-Verifiable Voting with Everlasting Privacy , 2006, CRYPTO.
[20] David Chaum,et al. A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.
[21] David Chaum,et al. Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.