Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference46 articles.
1. Adida, B.: Helios: web-based open-audit voting. In: Proceedings of the 17th conference on Security symposium, pp. 335–348. USENIX Association, (2008)
2. Arapinis, M., Cortier, V., Kremer, S., Ryan, M.: Practical everlasting privacy. In: Principles of Security and Trust, pp. 21–40, (2013)
3. Backes, M., Kate, A., Manoharan, P., Meiser, S., Mohammadi, E.: Anoa: A framework for analyzing anonymous communication protocols. J. Priv. Confidentiality, 7(2), (2016)
4. Benaloh, J.: Verifiable Secret-Ballot Elections. PhD thesis, September (1987)
5. Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, STOC ’94, pp. 544-553, New York, NY, USA, (1994). Association for Computing Machinery