|
[AMI] T.Asano,T. Matsumoto, and H. Imai,”A Study on Some Schemes for Fair Electronic Secrete Voting”,Proceeding of the 1991 Symposium on Crytptography and Information Security,Japanese,SCI91-12A,February,1991. [Bo1] C.Boyd,”Some Application of Multiple Key Ciphers”,Advances in Cryptology-EUROCRYPT’88 Proceedings,Springer-Verlag,1989,pp.455-467. [Bo2] C.Boyd,”A New Multiple Key Cipher and an Improved Voting Scheme”,Advances in Cryptology-EUROCRYPT’89 Proceedings,1990,pp.617-625. [BR] J.Borrel and J Rifa,”An Implementable Secure Voting Scheme”,Computers&Security,Vol.15,No.4,1996,pp.327-338. [BT] J. Benaloh and D. Tuinstra,”Receipt Free Secret Ballot Elections”,Preceedings of the 26th Annual ACM Symposium on the Theory of Computing,1994,pp.544-553. [BY] J. Benaloh and M Yung, “Distribute the Power of a Government to Enhance the Privacy of Voters”,Proceeding [Ch1] D.Chaum,”Untraceable Electronic Mail,Return Address and Digital Pseudonyms” Communications of the ACM , Vol.24 ,No.2, February, 1981,pp.84-88. [Ch2] D.Chaum,”Blind Signature for Untraceable Payments”,Advances in Cryptology-CRYPTO’82 Proceedings,1983,pp.199-203 [Ch3] D.Chaum,”Security without Identification:Transaction Systems to Make Big Brother Obsolete”,Communications of the ACM, Vol.28, No.10, October,1985,pp1030-1044. [Ch4] D.Chaum,”Blinding for Unanticipated Signatures”,Advances in Cryptology-EUROCRYPTO’87 Proceedings,Springer-Verlag,1988,pp227-233. [Ch5] D.Chaum ,”Privacy Protected Payments:Unconditional Payer and/or Payee Untraceability”,Smart Card 2000,Norht-Holland,1988. [Ch6] D.Chaum,”Election with Unconditionally —Secrete Ballots and Disruption Equivalent to Breaking RSA”,Advances in Cryptology-EUROCRYPTO’88 Proceedings,Springer-Verlag,1989,pp.177-182. [Co1] J.D.Cohen,”Improving Privacy in Cryptographic Elections”,Yale University Computer Scinence Department Technical Report YALEU/DCS/TR-454,February,1986. [CCD] D.Chaum,C.Crepeau, and I. B. Damgrad, “Multiparty Unconditionally Secure Protocols”, Proceedings of the 20tth ACM Symposium on Theory of Computing,1988 [CDG] D.Chaum,I. B. Damgrad, and J. van de Graaf, “Multiparty Computation Ensuring Privacy of Each Paryt’s Input and Correctness of the Result “, Advances in Crytptology-CRYPTO’87 Proceedings,1988,pp.87-119 [CE] D.Chaum and J. H. Evertse, “A secure and Privacy protecting Protocol for Transmitting Personal Information Between Organizations”,Advances in Cryptology. CRYPTO’86 Proceedings Springer-Verlag,1987, pp118-167 [CF] J.D. Cohen and M.J. Fisher,” A Robust and Verifiable Cryptographically Secure Election Scheme “ , Proceedings of the 26th IEEE Symposium on Foundations of Computer Science,1985, pp. 372-382 [CFSY] R. Cramer, M. Franklin, B. Schoenmakers, and M. Yung,” Multi-Authority Secret-Ballot Elections with Linear Work” Advance in Cryptology- EUROCRYPT’96 Proceedings Springer-Verlag,1997,pp.72-83. [CJ] Y.Y. Chen and J. K. Jan,”Paramita Wisdom” Password Authenication Scheme without Verification Tables”,ti appear in The Journal of System and Software,1997 [DA] W. R. Delone and E. R. Alexander “Techology Supported Anonymous Voting and Large Group Participation: An Examperimental Study”Journal of Information Techology Management,Vol.2 No3.,1991 [FL] C. I. Fan and C. L. Lei,”A Multi-Recastable Ticket Scheme for Electronic Elections”, Advance in Cryptology. ASIACRYPTO’96 Proceedings, Springer —Verlag,1997,pp.116-124. [FOO] A.Fujioka, T. Okamoto, and K. Ohta ,”A Practical Secure Voting for Electronic Elections”,Advance in Cryptology-ASIACRYPT’96 Proceedings,Springer-Verling ,1997,pp.116-124. [HK] L.Harn and T.Kiesler,” How to Hold an Election over Computer Network”,Workshop on Information Security& Modern Cryptography, Taiwain, R.O.C.,1991,pp.129-138. [HY] J.J Hwang and C. Yang,”An Anonymous Electronic Voting System on the Computer Network”,Proceeding of the 4th National Information Security Conference Taiwan R.O.C,1994,pp.113-120. [HYLN] J.J. Hwang,C. Yang, M. H. Lin, J.L. Neih, and K. C. Wu,”Extension &Discussion of an Anonymous Voting System”,Proceeding of the 6th National Inforamtion Security Conference,Taiwan, R.O.C.,1996,pp.161-170. [IV] K. R. Iversen, “A Cryptographic Scheme for Computerized General Elections”,Advance in Cryptographic —CRYPTO’91 Proceedings Springer-Verlag,1992,pp.405-419 [JC] J.K. Jan,Y.Y. Chen,”網路社會之密碼學應用之研究”,國立中興大學,博士論文,民國87年 [JL1] W. S. Juang and C. L. Lei,” A Collision-Free Secret Ballot Protocol for Computerized General Elections” Computers& Security,Vol.15,NO.4, 1996,pp339-348. [JL2] W. S. Juang and C. L. Lei, “A Collision Free Secret Ballot Procotol for Computerized General Elections” Computers& Security,Vol.15, No.4,1996,pp339-348. [JLF1] W. S. Juang, C. L Lei and C. I. Fon,”A Collision Free Secret Ballot Protocol for Computerized Gerneral Elections”,International Conputer Symposium,Taiwan. R.O.C,1994,pp.309-314. [JLF2] W. S. Juang, C. L. Lei and C. I. Fan.”A Secure and Pratical Electronic Voting Scheme for Real World Environments”, Proceeding of the 6th National Inforamtion Security Conference, Taiwain R.O.C 1996. pp.158-160 [JT] J.K.Jan and C.C. Tai,”A Secure Electronic Voting Protocol with IC Cards” to appear in The Journal of Systems and Software,1997. [K] J.S.A.Kapp,”RSAEURO”,April 22,1995, ftp://ftp.dsi.unimi.it/pub/security/crypto/rsaeuro.zip [KLH] C.J.Kuo, C.F. Lee,and J.J Hwang,”An Anonymous-Voting Protocol with Electronic Bulletin Board”,Proceedings of the 4 th National Information Security Conference, Taiwan , R.O.C,1994, pp25-37. [LH] M.H Lin, J.J Hwang,”網際網路秘密投票之研究”,國立交通大學,博士論文,民國87年 [Me] M.Merrit,” Cryptographic Protocols”,Ph. D. diss Georia Indtitute of Technology, GIT-ICS-83/6,February,1983. [MH] M.Michels and P Horster,”Some Remark on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme”,Advance in Cryptology-ASIACRYPT’94 Proceedings, Springer-Verlag,1995,pp.164-170. [NHY] J.L Nieh,J.J.Hwang,C.Yang,”應用於群體決策的無記名投票系統” ,國立交通大學,碩士論文,民國85年 [NSS] H. Nurmi,A Salomaa,and L. Santean,”Secret Ballto Elections in Computer Networks”,Computers&Security,Vol.10,No.6,1991, pp.553-560. [ODBC] http://www.rdec.gov.tw/secr/ipcs-h1/3.htm [Oh] K Ohta, “A Electrical Voting Scheme Using a Single Administrator”, 1988 Spring National Convention Record,IEICE,Japanese,A-294,March,1988. [PCLL] S.F.Pon, T. Chang, E. H. Lu, and J. Y. Lee,”An Anonymous Electronic Voting Protocol”, Proceedings of the 6th National Information Security Conference, Taiwan. R.O.C.,1996. pp . 171-177. [PIK] C.Park, K Itoh, and K. Kurosawa, “Efficient Anonymous Channel and All /Nothing Election Schene”,Advances in Cryptology-EUROCRYPT’93 Proceedings,Springer-Verlag,1994,pp.248-259. [RBR] A. Riera, J. Borrell , and J Rifa,”Large Scale Elections by Coordinating Electoral Colleges”,IFIP SEC’97 Proceedings,Chapman&Hall,1997,pp.349-362. [S] Salomaa, A. Verifying and recasting secret ballots in computer networks. In New Results and New Trends in Computer Science Springer-Verlag, Berlin. 1991, pp. 283-289. [Sa1] K.Sako, “Electronic Voting Scheme Allowing Open Objection to The Tally”,IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences ,Vol.E77-A,No.1,Jan,1994, pp.24-30. [Sa2] R.Saltman,” Accuracy Integrity and Security in Computerized Vote-tallying”,Communications of the ACM,Vol.31,No.10,1988,pp1184-1191. [Sl] P.H. Slessenger,”Socially Secure Cryptograophic Election Scheme”,Electronics Letters,Vol.27,No.11,May,1991,pp.955-957. [SK1] K. Sako and J. Kilian, “Secure Voting Using Partially Compatible Homomorphisms”, Advances in Cryptology CRYPTO’94 Proceeding,Springer-Verlag,1995,pp.411-424. [SK2] K. Sako and J. Kilian,” Receipt-Free Mix-Type Voting Scheme”, Advances in Cryptology-EUROCRYPT’95 Proceedings,Springer-Verlag,1996,pp.393-403. [SS] A. Salomaa and L. Santean,” Secret Selling of Secrets with Many Buyers”,EATCS Bull, Vol.10,1990,pp178-186. [WC] W.B.Wu and C.C.Chang,” A Secure Voting System on a Public Network”,M.S. thesis, National Chung Cheng Unviersity Taiwan,ROC,1994. [W] J. M Wing ”Electronic Election and Auction”15-827 Security and cryptography Lecture 8 http: //www.cs.cmu.edu/afs/cs/academic/class/15827-f98/ www / lectures.html.
|