共 50 条
- [32] Incentive-driven attacker for corrupting two-party protocols Soft Computing, 2018, 22 : 7733 - 7740
- [33] Is Eve nearby? Analysing protocols under the distant-attacker assumption 2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022), 2022, : 17 - 32
- [35] Discordant voting protocols for cyclically linked agents ELECTRONIC JOURNAL OF COMBINATORICS, 2020, 27 (01):
- [36] Towards Model Checking of Voting Protocols in UPPAAL ELECTRONIC VOTING, E-VOTE-ID 2020, 2020, 12455 : 129 - 146
- [37] Distributed Protocols at the Rescue for Trustworthy Online Voting ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 499 - 505
- [38] Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 224 - 229
- [39] Towards the Attacker's View of Protocol Narrations (or, How to Compile Security Protocols) 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,