Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. M. Abe. Efficient Components for Cryptographic Applications in the Discrete-Log Setting. PhD thesis, University of Tokyo, 2002.
2. Lect Notes Comput Sci;M. Abe,2001
3. R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143–202, Winter 2000.
4. D. L. Chaum. Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM, 24:84–88, 1981.
5. Lect Notes Comput Sci;Y. Desmedt,2000
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. References;Anonymous Communication Networks;2014-04-03
2. Theory and Practice of Secure E-Voting Systems;Theory and Practice of Cryptography Solutions for Secure Information Systems;2013
3. An efficient shuffling based eVoting scheme;Journal of Systems and Software;2011-06
4. A general and efficient countermeasure to relation attacks in mix-based e-voting;International Journal of Information Security;2010-11-04
5. A Verifiable Secret Shuffle of Homomorphic Encryptions;Journal of Cryptology;2010-05-14