共 18 条
[1]
Chaum D(1981)Untraceable electronic mail, return addresses, and digital pseudonyms Commun. ACM 24 84-88
[2]
Delaune S(2009)Verifying privacy-type properties of electronic voting protocols J. Comput. Secur. 17 435-487
[3]
Kremer S(1983)On the security of public key protocols IEEE Trans. Inf. Theory 29 198-207
[4]
Ryan M(1985)A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inf. Theory 31 469-472
[5]
Dolev D(1995)An attack on the Needham–Schroeder public-key authentication protocol Inf. Process. Lett. 56 131-133
[6]
Yao AC-C(1982)The Byzantine generals problem ACM Trans. Program. Lang. Syst. 4 382-401
[7]
Gamal TE(1978)Using encryption for authentication in large networks of computers Commun. ACM 21 993-999
[8]
Lowe G(2009)Prêt à voter: a voter-verifiable voting system IEEE Trans. Inf. Forensics Secur. 4 662-673
[9]
Lamport L(undefined)undefined undefined undefined undefined-undefined
[10]
Shostak RE(undefined)undefined undefined undefined undefined-undefined