Analysis of an electronic voting system
暂无分享,去创建一个
Dan S. Wallach | Tadayoshi Kohno | Aviel D. Rubin | Adam Stubblefield | D. Wallach | A. Rubin | A. Stubblefield | Tadayoshi Kohno
[1] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[2] John Gilmore,et al. Cracking DES - secrets of encryption research, wiretap politics and chip design: how federal agencies subvert privacy , 1998 .
[3] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[4] Elaine B. Barker,et al. Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.
[5] Aviel D. Rubin,et al. Security considerations for remote electronic voting , 2002, CACM.
[6] Hugo Krawczyk,et al. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) , 2001, CRYPTO.
[7] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[8] D RubinAviel. Security considerations for remote electronic voting , 2002 .
[9] David Chaum,et al. Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.
[10] Bruce Schneier,et al. Secrets and Lies , 2004 .
[11] Rebecca T. Mercuri,et al. Electronic vote tabulation checks and balances , 2001 .
[12] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[13] Ralph Howard,et al. Data encryption standard , 1987 .
[14] Dimitris Gritzalis,et al. Secure Electronic Voting , 2003, Advances in Information Security.
[15] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[16] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.