Author:
Delaune Stéphanie,Lallemand Joseph
Publisher
Springer International Publishing
Reference32 articles.
1. Delaune, S., Lallemand, J.: One vote is enough for analysing privacy (2022). https://hal.inria.fr/hal-03669664
2. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Hankin, C., Schmidt, D. (eds.) Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, London, UK, January 17–19, 2001, pp. 104–115. ACM (2001)
3. Adida, B.: Helios: web-based open-audit voting. In: van Oorschot, P.C. (ed.) Proceedings of the 17th USENIX Security Symposium, 28 July–1 August 2008, San Jose, CA, USA, pp. 335–348. USENIX Association (2008)
4. Lecture Notes in Computer Science;M Arapinis,2016
5. Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23–25 June 2008, pp. 195–209. IEEE Computer Society (2008)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Formal Verification and Solutions for Estonian E-Voting;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07