共 47 条
[1]
Achenbach D., 2015, USENIX J ELECTION TE, V3, P26
[2]
Adida B., 2008, USENIX, P335
[3]
Arnaud Mathilde, 2013, E-Voting and Identify. 4th International Conference, Vote-ID 2013. Proceedings: LNCS 7985, P109, DOI 10.1007/978-3-642-39185-9_7
[4]
Asokan N, 1998, LECT NOTES COMPUT SC, V1403, P591, DOI 10.1007/BFb0054156
[5]
Automated verification of remote electronic voting protocols in the applied pi-calculus
[J].
CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS,
2008,
:195-209
[6]
Benaloh Josh, 1987, PhD Thesis
[7]
Benaloh JoshC., 1986, Proceedings of the fifth annual ACM symposium on Principles of distributed computing, P52
[8]
SoK: A comprehensive analysis of game-based ballot privacy definitions
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:499-516
[9]
Bernhard D, 2012, LECT NOTES COMPUT SC, V7658, P626, DOI 10.1007/978-3-642-34961-4_38
[10]
Bernhard Melanie Volkamer David, 2017, 2016431 CRYPT EPRINT