|
[Bo]C.Boyd, “A New Multiple Key Cipher and an Improved Voting Scheme”, Advances in Cryptology — EUROCRYPT’89 Proceedings, 1990, pp617-625. [BR]J.Borrell and J.Rifa, “An Implementable Secure Voting Scheme”, Computers & Security, Vol.15, No.4, 1996, pp.327-338. [BS]B.Schneier, Applied Cryptography, J. Wiley, 1993. [Bw]Brandon William DuRette, “Multiple Administrators for Electronic Voting”, Cryptography and Information Security Group at the Massachusetts Institute of Technology, May 19, 1999. [Ch1]D.Chaum, “Untraceable Electronic Mail, Return Address and Digital Pseudonyms”, Communications of the ACM, Vol.24, No.2, February 1981, pp.84-88. [Ch2]D.Chaum, “Blind signatures for Untraceable Payments”, Advances in Cryptology — CRYPTO’82 Proceedings, 1983, pp.199-203. [Ch3]D.Chaum, “Security without Identification: Transaction Systems to Make Big Brother Obsolete”, Communications of the ACM, Vol.28, No.10, October 1985, pp.1030-1044. [Ch4]D.Chaum, “Blinding for Unanticipated Signatures”, Advances in Cryptology — EUROCRYPT’87 Proceedings, Springer-Verlag, 1988, pp.227-233. [Ch5]D.Chaum, “Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA”, Advances in Cryptology — EUROCRYPT’88 Proceedings, Springer-Verlag, 1989, pp.177-182. [Co]J.D.Cohen, “Improving Privacy in Cryptographic Elections”, Yale University Computer Science Department Technical Report YALEU/DCS/TR-454, February 1986. [CCD]D.Chaum, C.Crepeau, and I.B.Damgrad, “Multiparty Unconditionally Secure Protocols”, Proceedings of the 20th ACM Symposium on Theory of Computing, 1988, pp.87-119. [CDG]D.Chaum, I.B.Damgrad, and J.van de Graaf, “Multiparty Computation Ensuring Privacy of Each Party’s Input and Correctness of the Result”, Advances in Cryptology — CRYPTO’87 Proceedings, 1988, pp.87-119. [CFSY]R.Cramer, M. Franklin, B.Schoenmakers, and M.Yumg, “Multi-Authority Secret-Ballot Elections with Linear Work”, Advances in Cryptology — EUROCRYPT’96 Proceedings, Springer-Verlag, 1997, pp.72-83. [DC1]D.Chaum, “Blind Signature Systems”, Advances in Cryptology, Crypto’83, Plenum, p.153. [DC2]D.Chaum, A. Fiat, M.Naor, “Untraceable Electronic Cash”, Advances in Cryptology, Crypto’88, LNCS 403, Springer-Verlag, pp.319-327. [FL]C.I.Fan and C.L.Lei, “A multi-Recastable Ticket Scheme for Electronic Elections”, Advances in Cryptology — ASIACRYPT’96 Proceedings, Springer-Verlag, 1997, pp.116-124. [FOO]Fujioka, T.Okamoto, and K.Ohta, “A practical Secret Voting Scheme for Large Scale Elections”, Advances in Cryptology — AUCRYPT’92 Proceedings, Springer-Verlag, 1993, pp.6.15-6.19. [HK]L.Harn and T.Kiesler, “How to Hold an Election over Computer Network”, Workshop on Information Security & Modern Cryptography, Taiwan, R.O.C., 1991, pp.129-138. [Iv]K.R.Iversen, “A Cryptographic Scheme for Computerized General Elections”, Advances in Cryptology — CRYPTO’91 Proceedings, Springer-Verlag, 1992, pp.405-419. [JJ]Jan L.Camenisch, Jean-Marc Piveteau, Markus A.Stadler, “Blind Signatures Based on the Discrete Logarithm Problem”, Springer-Verlag, 1998. [JL1]J.K.Jan and R.H.Lin, “A Secure Anonymous Voting by Employing Diffie-Hellman PKD Concept”, IEEE International Carnahan Conference on Security Technology, England, Oct. 1995, pp.252-258. [JL2]W.S.Juang and C.L.Lei, “A Collision-Free Secret Ballot Protocol for Computerized General Elections”, Computers & Security, Vol.15, No.4, 1996, pp.339-348. [JT]J.K.Jan and C.C.Tai, “A Secure Electronic Voting Protocol with IC Cards”, Journal of Systems and Software, U.S.A. Vol.39, Dec. 1997, PP.93-101. [KW]J.Karro and J.Wang, “Towards a Practical, Secure, and Very Large Scale Online Election”, Computer Security Applications Conference, 1999. (ACSAC’99) Proceedings. 15th Annual, 1999, pp.161-169. [LR]L.F.Cranor and R.K.Crtron, “Sensus: A Security-Conscious Electronic Polling System for the Internet”, System Sciences, 1997, Proceedings of the 30th Hawaii International Conference on Vol.3, 1997, pp.561-570. [MV]Yi Mu and Vijay Varadharajan, “Anonymous Secure E-Voting over a Network”, Computer Security Applications Conference, 1998. Proceedings. 14th Annual, 1998, pp.293-299. [NR]V.Niemi and A.Renvall, “How to Prevent of Votes in Computer Elections”, Advances in Cryptology — ASIACRYPT’94 Proceedings, Springer-Verlag, 1995, pp.164-170. [NSS]H.Nurmi, A.Salomaa, and L.Santean, “Secret Ballot Elections in Computer Networks”, Computers & Security, Vol.10, No.6, 1991, pp.553-560. [S]P.H.Slessenger, “Socially Secure Cryptographic Election Scheme”, Electronics Letters, Vol.27, No.11, May 1991, pp.955-957. [Sa]R.Saltman, “Accuracy, Integrity and Security in Computerized Vote-tallying”, Communications of the ACM, Vol.31, No10, 1998, pp.1181-1191. [VS]http://www.verisign.com [YY]Y.Y.Cheng, “The Study of Employing the Cryptography in the Network Society”, Ph. D. diss., National Chung Hsing University, Taiwan, R.O.C, 1998.
|