Author:
Haenni Rolf,Koenig Reto E.,Locher Philipp
Publisher
Springer Nature Switzerland
Reference13 articles.
1. Aumann, Y., Lindell, Y.: Security against covert adversaries: efficient protocols for realistic adversaries. J. Cryptol. 23(2), 281–343 (2010)
2. Lecture Notes in Computer Science;S Bayer,2012
3. Chaum, D.: SureVote: technical overview. In: WOTE 2001, 1st Workshop On Trustworthy Elections. Tomales Bay, USA (2001)
4. Haenni, R., Koenig, R.E., Locher, P., Dubuis, E.: CHVote protocol specification - version 3.4. IACR Cryptology ePrint Archive 2017/325 (2022)
5. Joaquim, R., Ribeiro, C., Ferreira, P.: VeryVote: a voter verifiable code voting system. In: 2nd International Conference on E-Voting and Identity, VoteID 2009, Luxembourg, pp. 106–121 (2009)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献