Author:
Cooke Richard,Anane Rachid
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Management Information Systems,Software
Reference30 articles.
1. Kremer S, Ryan MD, Smyth B (2010) Election verifiability in electronic voting protocols. In: Proceedings of the fifteenth European symposium on research in computer security (ESORICS’10). LNCS, Springer, vol 6345, pp 389–404
2. Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2): 84–88
3. Sampigethaya K, Poovendran R (2006) A survey on mix networks and their secure applications. Proc IEEE 94(12): 2142–2181
4. Syverson PF, Goldschlag DM, Reed MG (1997) Anonymous connections and onion routing. IEEE symposium on security and privacy, IEEE, pp 44–54
5. Cranor L, Cytron RK (1997) Sensus: a security-conscious electronic polling system for the internet. In: Proceedings of HICSS’97, IEEE, pp 561–570
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献