Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
A secure and privacy-protecting protocol for transmitting personal information between organizations
Proceedings on Advances in cryptology---CRYPTO '86
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
On the generation of cryptographically strong pseudorandom sequences
ACM Transactions on Computer Systems (TOCS)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Cryptographic protocols
A robust and verifiable cryptographically secure election scheme
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
Blinding for unanticipated signatures
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Payment systems and credential mechanisms with provable security against abuse by individuals
CRYPTO '88 Proceedings on Advances in cryptology
Efficient anonymous channel and all/nothing election scheme
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Electronic Jury Voting Protocols
LATIN '02 Proceedings of the 5th Latin American Symposium on Theoretical Informatics
Provably Secure Partially Blind Signatures
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
A Cryptographic Scheme for Computerized Elections
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Anonymous Communication and Anonymous Cash
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
An Improvement on a Practical Secret Voting Scheme
ISW '99 Proceedings of the Second International Workshop on Information Security
ISC '01 Proceedings of the 4th International Conference on Information Security
Self-tallying Elections and Perfect Ballot Secrecy
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Security enhancement for anonymous secure e-voting over a network
Computer Standards & Interfaces
Electronic jury voting protocols
Theoretical Computer Science - Latin American theorotical informatics
Decentralized voting with unconditional privacy
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Unconditional privacy in social choice
TARK '05 Proceedings of the 10th conference on Theoretical aspects of rationality and knowledge
Data Anonymity in the FOO Voting Scheme
Electronic Notes in Theoretical Computer Science (ENTCS)
A Light-Weight e-Voting System with Distributed Trust
Electronic Notes in Theoretical Computer Science (ENTCS)
International Journal of Information and Computer Security
A secure and anonymous voter-controlled election scheme
Journal of Network and Computer Applications
Verifying privacy-type properties of electronic voting protocols
Journal of Computer Security
Identity-based threshold cryptography for electronic voting
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
A Framework for Universally Composable Non-committing Blind Signatures
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Receipt-free electronic voting scheme with a tamper-resistant randomizer
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Internet-voting: opportunity or threat for democracy?
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
Identity based threshold cryptography and blind signatures for electronic voting
WSEAS Transactions on Computers
Open research questions of privacy-enhanced event scheduling
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
Intelligent anonymous secure e-voting scheme
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
A framework for universally composable non-committing blind signatures
International Journal of Applied Cryptography
Receipt-free K-out-of-L voting based on elgamal encryption
Towards Trustworthy Elections
The vector-ballot approach for online voting procedures
Towards Trustworthy Elections
A protocol for anonymous and accurate e-polling
TCGOV'05 Proceedings of the 2005 international conference on E-Government: towards Electronic Democracy
A framework for universally composable non-committing blind signatures
International Journal of Applied Cryptography
Beyond the limitation of prime-order bilinear groups, and round optimal blind signatures
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
A secure and practical electronic voting scheme
Computer Communications
Candidate-resolved online voting protocol using distributed ElGamal Cryptosystem
Proceedings of the CUBE International Information Technology Conference
Allowing continuous evaluation of citizen opinions through social networks
EGOVIS'12/EDEM'12 Proceedings of the 2012 Joint international conference on Electronic Government and the Information Systems Perspective and Electronic Democracy, and Proceedings of the 2012 Joint international conference on Advancing Democracy, Government and Governance
Boardroom voting scheme with unconditionally secret ballots based on DC-Net
NSS'12 Proceedings of the 6th international conference on Network and System Security
Hi-index | 0.00 |