Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios
暂无分享,去创建一个
[1] Andrew C. Myers,et al. Civitas: A Secure Remote Voting System , 2007, Frontiers of Electronic Voting.
[2] Ben Adida,et al. Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.
[3] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[4] Mark Ryan,et al. Towards Automatic Analysis of Election Verifiability Properties , 2010, ARSPA-WITS.
[5] Gavin Lowe,et al. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security , 2010, Lecture Notes in Computer Science.
[6] Javier Herranz,et al. A Generic Construction for Token-Controlled Public Key Encryption , 2006, Financial Cryptography.
[7] Jean-Jacques Quisquater,et al. Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios , 2009, EVT/WOTE.
[8] Ben Smyth. Replay attacks that violate ballot secrecy in Helios , 2012, IACR Cryptol. ePrint Arch..
[9] Joonsang Baek,et al. Token-Controlled Public Key Encryption , 2005, ISPEC.
[10] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[11] Jeremy Clark,et al. Cobra: Toward Concurrent Ballot Authorization for Internet Voting , 2012, EVT/WOTE.
[12] Ben Smyth,et al. Attacking and Fixing Helios: An Analysis of Ballot Secrecy , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[13] Josh Benaloh,et al. Simple Verifiable Elections , 2006, EVT.