Author:
Delaune Stéphanie,Kremer Steve,Ryan Mark
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Lecture Notes in Computer Science;M. Abadi,2004
2. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proc. 28th ACM Symposium on Principles of Programming Languages (POPL 2001), London, UK, pp. 104–115. ACM, New York (2001)
3. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. In: Proc. 4th ACM Conference on Computer and Communications Security (CCS 1997), pp. 36–47. ACM Press, New York (1997)
4. Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proc. 26th Symposium on Theory of Computing (STOC 1994), pp. 544–553. ACM Press, New York (1994)
5. Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proc. 14th IEEE Computer Security Foundations Workshop (CSFW 2001), pp. 82–96. IEEE Comp. Soc. Press, Los Alamitos (2001)
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. From Centralized to Decentralized Remote Electronic Voting;Advances in Information Security;2023-08-10
2. Tornado Vote: Anonymous Blockchain-Based Voting;2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC);2023-05-01
3. Automated Verification of Star-Vote in the Applied Pi Calculus;VFAST Transactions on Software Engineering;2022-12-31
4. BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device;2019 IEEE 32nd Computer Security Foundations Symposium (CSF);2019-06
5. Risk-Limiting Tallies;Electronic Voting;2019