Verifying privacy-type properties of electronic voting protocols: a taster
From MaRDI portal
Publication:3569110
Recommendations
Cited in
(19)- Relations between privacy, verifiability, accountability and coercion-resistance in voting protocols
- On Communication Models When Verifying Equivalence Properties
- Trace equivalence and epistemic logic to express security properties
- To know or not to know: Epistemic approaches to security protocol verification
- Computing knowledge in security protocols under convergent equational theories
- Programming Languages and Systems
- Decidability of equivalence of symbolic derivations
- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols
- Deciding knowledge in security protocols under some e-voting theories
- Efficiently deciding equivalence for standard primitives and phases
- Formalizing and proving privacy properties of voting protocols using alpha-beta privacy
- YAPA: A Generic Tool for Computing Intruder Knowledge
- Static validation of a voting protocol
- Computing Knowledge in Security Protocols under Convergent Equational Theories
- On compositional reasoning about anonymity and privacy in epistemic logic
- One vote is enough for analysing privacy
- When are three voters enough for privacy properties?
- Modular verification of protocol equivalence in the presence of randomness
- POR for security protocol equivalences. Beyond action-determinism
This page was built for publication: Verifying privacy-type properties of electronic voting protocols: a taster
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3569110)