共 30 条
[1]
Andrew Neff C., 2001, P 8 ACM C COMP COMM, P116, DOI DOI 10.1145/501983.502000
[2]
[Anonymous], 1995, LNCS, DOI DOI 10.1007/3-540-49264-X
[3]
[Anonymous], 1997, LECT NOTES COMPUTER
[4]
Benaloh J., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P544, DOI 10.1145/195058.195407
[5]
Boyd C., 1988, Advances in Cryptology - EUROCRYPT '88. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P455
[6]
CHAUM D, 1987, LNCS, V304, P227
[7]
Chaum D., 1983, ADV CRYPTOLOGY CRYPT, P153
[9]
Coleman S., 2002, ELECTIONS 21 CENTURY
[10]
Cranor LF, 1997, P ANN HICSS, P561, DOI 10.1109/HICSS.1997.661700