Author:
Chaum David,Das Debajyoti,Javani Farid,Kate Aniket,Krasnova Anna,De Ruiter Joeri,Sherman Alan T.
Publisher
Springer International Publishing
Reference46 articles.
1. Lecture Notes in Computer Science;B Adida,2007
2. Backes, M., Goldberg, I., Kate, A., Mohammadi, E.: Provably secure and practical onion routing. In: Proceeding of the 25th IEEE Computer Security Foundations Symposium (CSF), pp. 369–385 (2012)
3. Backes, M., Kate, A., Mohammadi, E.: Ace: an efficient key-exchange protocol for onion routing. In: Proceeding of the 11th ACM Workshop on Privacy in the Electronic Society (WPES), pp. 55–64 (2012)
4. Benaloh, J.: Simple verifiable elections. In: Proceeding of USENIX/Accurate Electronic Voting Technology Workshop (EVT), p. 5 (2006)
5. Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.Y.: High-speed high-security signatures. J. Cryptogr. Eng. 2(2), 77–89 (2012)
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献