共 46 条
[31]
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking
[J].
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014),
2014,
:343-358
[33]
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:538-553
[34]
A Game-Based Definition of Coercion-Resistance and its Applications
[J].
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2010,
:122-136
[35]
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols
[J].
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2009,
:251-266
[36]
Extending Helios Towards Private Eligibility Verifiability
[J].
E-VOTING AND IDENTITY, VOTEID 2015,
2015, 9269
:57-73
[37]
Kutylowski M, 2007, LECT NOTES COMPUT SC, V4752, P199
[38]
Liedtke J., 2020, IEEE 5 EUR S SEC PRI
[39]
Lueks W, 2019, PROCEEDINGS OF THE 18TH ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY, WPES 2019, P50, DOI 10.1145/3338498.3358653
[40]
Lueks W, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1553