How to secure network application systems using cryptographic protocols - Electronic voting systems case

被引:0
|
作者
Sako, Kazue
机构
来源
NEC Research and Development | 2002年 / 43卷 / 03期
关键词
Cryptographic protocols - Electronic voting systems;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:191 / 194
相关论文
共 50 条
  • [31] Secure and private search protocols for RFID systems
    Zuo, Yanjun
    INFORMATION SYSTEMS FRONTIERS, 2010, 12 (05) : 507 - 519
  • [32] Secure ubiquitous authentication protocols for RFID systems
    Md Monzur Morshed
    Anthony Atkins
    Hongnian Yu
    EURASIP Journal on Wireless Communications and Networking, 2012
  • [33] How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif
    Mieno, Takehiko
    Okazaki, Hiroyuki
    Arai, Kenichi
    Futa, Yuichi
    IEEE ACCESS, 2024, 12 : 31605 - 31625
  • [34] Secure and fault-tolerant voting in distributed systems
    Hardekopf, B
    Kwiat, K
    Upadhyaya, S
    2001 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-7, 2001, : 1117 - 1126
  • [35] Protection Profile for Secure E-Voting Systems
    Lee, Kwangwoo
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 386 - 397
  • [36] Return Code Schemes for Electronic Voting Systems
    Khazaei, Shahram
    Wikstrom, Douglas
    ELECTRONIC VOTING (E-VOTE-ID 2017), 2017, 10615 : 198 - 209
  • [37] Electronic voting systems – from theory to implementation
    Vasilopoulos, Pavlos, 1600, Springer Verlag (441):
  • [38] Electronic voting systems security requirements engineering
    Daimi, K
    Wilson, C
    SERP '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2005, : 230 - 235
  • [39] Secret Suffrage in Remote Electronic Voting Systems
    Rodriguez-Perez, Adria
    2017 FOURTH INTERNATIONAL CONFERENCE ON EDEMOCRACY & EGOVERNMENT (ICEDEG), 2017, : 277 - 278
  • [40] An improved design scheme for electronic voting systems
    Chen, Jianping
    Yu, Bo
    Gu, Xiang
    Shi, Quan
    ICIC Express Letters, 2013, 7 (12): : 3295 - 3300