Author:
Juels Ari,Catalano Dario,Jakobsson Markus
Publisher
Springer Berlin Heidelberg
Reference53 articles.
1. Proxyvote.com: Shareholder election website (2008), Referenced 2008 at http://www.proxyvote.com
2. Vote-auction (2008), Referenced 2008 at http://www.vote-auction.net
3. Baudron, O., Fouque, P.-A., Pointcheval, D., Stern, J., Poupard, G.: Practical multi-candidate election system. In: PODC 2001, pp. 274–283. ACM Press, New York (2001)
4. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM, New York (1993)
5. Benaloh, J.C., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: 26th ACM STOC, pp. 544–553 (1994)
Cited by
83 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
2. Private Hierarchical Governance for Encrypted Messaging;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
3. Thwarting Last-Minute Voter Coercion;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
4. Deniable Encryption;Encyclopedia of Cryptography, Security and Privacy;2024
5. Coercion-Resistant Cast-as-Intended Verifiability for Computationally Limited Voters;Financial Cryptography and Data Security. FC 2023 International Workshops;2023-12-05