Type-based verification of electronic voting protocols

被引:15
|
作者
Cortier, Véronique [1 ]
Eigner, Fabienne [2 ]
Kremer, Steve [1 ]
Maffei, Matteo [2 ]
Wiedling, Cyrille [3 ]
机构
[1] LORIA, CNRS and INRIA and University of Lorraine, France
[2] CISPA, Saarland University, Germany
[3] Université Catholique de Louvain, Belgium
关键词
D O I
10.1007/978-3-662-46666-7_16
中图分类号
学科分类号
摘要
引用
收藏
页码:303 / 323
相关论文
共 50 条
  • [1] Type-Based Automated Verification of Authenticity in Cryptographic Protocols
    Kikuchi, Daisuke
    Kobayashi, Naoki
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2009, 5502 : 222 - 236
  • [2] Type-based verification of correspondence assertions for communication protocols
    Kikuchi, Daisuke
    Kobayashi, Naoki
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2007, 4807 : 191 - 205
  • [3] Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols
    Dahl, Morten
    Kobayashi, Naoki
    Sun, Yunde
    Huttel, Hans
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, 2011, 6996 : 75 - +
  • [4] Type-based Data Structure Verification
    Kawaguchi, Ming
    Rondon, Patrick
    Jhala, Ranjit
    PLDI'09 PROCEEDINGS OF THE 2009 ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION, 2009, : 304 - 315
  • [5] Type-based Data Structure Verification
    Kawaguchi, Ming
    Rondon, Patrick
    Jhala, Ranjit
    ACM SIGPLAN NOTICES, 2009, 44 (06) : 304 - 315
  • [6] Cryptographic Protocols Implementation Security Verification Of The Electronic Voting System Based On Blind Intermediaries
    Babenko, Liudmila
    Pisarev, Ilya
    Popova, Elena
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [7] ADsafety: Type-based verification of javascript sandboxing
    Politz, Joe Gibbs
    Eliopoulos, Spiridon Aristides
    Guha, Arjun
    Krishnamurthi, Shriram
    Proceedings of the 20th USENIX Security Symposium, 2011, : 171 - 186
  • [8] Type-Based Verification of Connectivity Constraints in Lattice Surgery
    Wakizaka, Ryo
    Suzuki, Yasunari
    Igarashi, Atsushi
    PROGRAMMING LANGUAGES AND SYSTEMS, APLAS 2024, 2025, 15194 : 216 - 237
  • [9] Automated verification of remote electronic voting protocols in the applied pi-calculus
    Backes, Michael
    Hritcu, Catalin
    Maffei, Matteo
    CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, : 195 - 209
  • [10] Verifying privacy-type properties of electronic voting protocols
    Delaune, Stephanie
    Kremer, Steve
    Ryan, Mark
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (04) : 435 - 487