Remodelling the Attacker in Voting Protocols

被引:0
|
作者
Ryan, Peter Y. A. [1 ]
机构
[1] Univ Luxembourg, Luxembourg, Luxembourg
来源
SECURITY PROTOCOLS XVI | 2011年 / 6615卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:232 / 234
页数:3
相关论文
共 50 条
  • [31] Incentive-driven attacker for corrupting two-party protocols
    Wang, Yilei
    Metere, Roberto
    Zhou, Huiyu
    Cui, Guanghai
    Li, Tao
    SOFT COMPUTING, 2018, 22 (23) : 7733 - 7740
  • [32] Incentive-driven attacker for corrupting two-party protocols
    Yilei Wang
    Roberto Metere
    Huiyu Zhou
    Guanghai Cui
    Tao Li
    Soft Computing, 2018, 22 : 7733 - 7740
  • [33] Is Eve nearby? Analysing protocols under the distant-attacker assumption
    Gil-Pons, Reynaldo
    Horne, Ross
    Mauw, Sjouke
    Tiu, Alwen
    Trujillo-Rasua, Rolando
    2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022), 2022, : 17 - 32
  • [34] Broadcast distributed voting algorithm in population protocols
    Bandealinaeini, Hamidreza
    Salehkaleybar, Saber
    IET SIGNAL PROCESSING, 2020, 14 (10) : 846 - 853
  • [35] Discordant voting protocols for cyclically linked agents
    Pongracz, Andras
    ELECTRONIC JOURNAL OF COMBINATORICS, 2020, 27 (01):
  • [36] Towards Model Checking of Voting Protocols in UPPAAL
    Jamroga, Wojciech
    Kim, Yan
    Kurpiewski, Damian
    Ryan, Peter Y. A.
    ELECTRONIC VOTING, E-VOTE-ID 2020, 2020, 12455 : 129 - 146
  • [37] Distributed Protocols at the Rescue for Trustworthy Online Voting
    Riemann, Robert
    Grumbach, Stephane
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 499 - 505
  • [38] Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
    Kulyk, Oksana
    Neumann, Stephan
    Budurushi, Jurlind
    Volkamer, Melanie
    Haenni, Rolf
    Koenig, Reto
    von Bergen, Philemon
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 224 - 229
  • [39] Towards the Attacker's View of Protocol Narrations (or, How to Compile Security Protocols)
    Li, Zhiwei
    Wang, Weichao
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [40] Efficient Card-Based Majority Voting Protocols
    Abe, Yoshiki
    Nakai, Takeshi
    Kuroki, Yoshihisa
    Suzuki, Shinnosuke
    Koga, Yuta
    Watanabe, Yohei
    Iwamoto, Mitsugu
    Ohta, Kazuo
    NEW GENERATION COMPUTING, 2022, 40 (01) : 173 - 198