Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme
暂无分享,去创建一个
[1] Birgit Pfitzmann,et al. Computational probabilistic noninterference , 2002, International Journal of Information Security.
[2] Mihir Bellare,et al. Randomness Re-use in Multi-recipient Encryption Schemeas , 2003, Public Key Cryptography.
[3] James W. Gray,et al. Probabilistic interference , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Birgit Pfitzmann,et al. A composable cryptographic library with nested operations , 2003, CCS '03.
[5] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[6] Emmanuel Bresson,et al. A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.
[7] Yassine Lakhnech,et al. Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries , 2005, ESOP.
[8] Martín Abadi,et al. Formal Eavesdropping and Its Computational Interpretation , 2001, TACS.
[9] David Chaum,et al. A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.
[10] David Chaum,et al. Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.
[11] Véronique Cortier,et al. Computationally Sound, Automated Proofs for Security Protocols , 2005, ESOP.
[12] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[13] Steve A. Schneider,et al. CSP and Anonymity , 1996, ESORICS.
[14] Peter Y. A. Ryan,et al. Mathematical Models of Computer Security , 2000, FOSAD.
[15] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) , 2007, Journal of Cryptology.
[16] Marek Klonowski,et al. Rapid Mixing and Security of Chaum's Visual Electronic Voting , 2003, ESORICS.
[17] Peeter Laud,et al. Symmetric encryption in automatic analyses for confidentiality against active adversaries , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[18] Roberto Gorrieri,et al. A taxonomy of trace-based security properties for CCS , 1994, Proceedings The Computer Security Foundations Workshop VII.
[19] Yassine Lakhnech,et al. (De)Compositions of Cryptographic Schemes and their Applications to Protocols , 2005, IACR Cryptol. ePrint Arch..
[20] Peeter Laud. Semantics and Program Analysis of Computationally Secure Information Flow , 2001, ESOP.