Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Leader Election in Complete Networks
SIAM Journal on Computing
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Leader election algorithms for mobile ad hoc networks
DIALM '00 Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A remote user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract)
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Security enhancement for anonymous secure e-voting over a network
Computer Standards & Interfaces
Towards a Practical, Secure, and Very Large Scale Online Election
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Sensus: A Security-Conscious Electronic Polling System for the Internet
HICSS '97 Proceedings of the 30th Hawaii International Conference on System Sciences: Information System Track-Organizational Systems and Technology - Volume 3
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Electronic voting systems: Requirements, design, and implementation
Computer Standards & Interfaces
Yet another improvement over the Mu-Varadharajan e-voting protocol
Computer Standards & Interfaces
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
New directions in cryptography
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
An efficient key predistribution scheme for ad hoc network security
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
An efficient biometrics-based remote user authentication scheme using smart cards
Journal of Network and Computer Applications
Simple and efficient hash-based verifiable mixing for remote electronic voting
Computer Communications
On the security enhancement of an efficient and secure event signature protocol for p2p MMOGs
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part I
Information Sciences: an International Journal
Hi-index | 0.24 |
In this article, we propose a deniable electronic voting authentication protocol for mobile ad hoc networks, which meets the essential requirements of a secure e-voting system. Due to the characteristics, constraints, and security requirements of mobile ad hoc networks, our protocol does not require the aid of any centralized administration and mobile nodes could cooperate with each other to securely facilitate e-voting. Finally, the proposed protocol provides the ability to deniable authentication. When a legal voter casts a vote with this voting system, he/she can deny that he/she has voted for a third party and the third party cannot judge who votes.