Citation to this article as recorded by
Meng, B., 2009. A critical review of receipt-freeness and coercion-resistance. Inform. Technol. J., 8: 934-964. CrossRefDirect Link |
Meng, B., 2009. A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on Internet voting protocol. Inform. Technol. J., 8: 302-309. CrossRefDirect Link |
Meng, B., 2009. Formalizing deniability. Inform. Technol. J., 8: 625-642. CrossRefDirect Link |
Meng, B., 2011. A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model. Inform. Technol. J., 10: 1068-1091. CrossRefDirect Link |
Meng, B., 2011. Refinement of mechanized proof of security properties of remote internet voting protocol in applied PI calculus with proverif. Inform. Technol. J., 10: 293-334. CrossRefDirect Link |
Meng, B., 2012. Automatic formal framework of coercion-resistance in internet voting protocols with CryptoVerif in computational model. Inform. Technol. J., 11: 741-750. CrossRefDirect Link |
Meng, B., W. Huang and J. Qin, 2010. Automatic verification of security properties of remote internet voting protocol in symbolic model. Inform. Technol. J., 9: 1521-1556. CrossRefDirect Link |
Citation to this article as recorded by
A New Method of Isolation of Isoflavones from Glycine max
(Soya Beans) by Complexation Technique Asian Journal of Scientific Research Vol. 1, Issue 2, 176, 2008 |
A Secure Non-Interactive Deniable Authentication Protocol with Strong Deniability Based on Discrete Logarithm Problem and its Application on Internet Voting Protocol Information Technology Journal Vol. 8, Issue 3, 302, 2009 |
Formalizing Deniability Information Technology Journal Vol. 8, Issue 5, 625, 2009 |
A Critical Review of Receipt-Freeness and Coercion-Resistance Information Technology Journal Vol. 8, Issue 7, 934, 2009 |
Automatic verification of security properties of remote internet voting protocol in symbolic model. Information Technology Journal Vol. 9, Issue 8, 1521, 2010 |
A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model Information Technology Journal Vol. 10, Issue 6, 1068, 2011 |
Refinement of mechanized proof of security properties of remote internet voting protocol in applied PI calculus with proverif. Information Technology Journal Vol. 10, Issue 2, 293, 2011 |
How to cite this article
Bo Meng , 2008. Formal Analysis of Key Properties in the Internet Voting Protocol Using Applied Pi Calculus. Information Technology Journal, 7: 1133-1140.
DOI: 10.3923/itj.2008.1133.1140
URL: https://scialert.net/abstract/?doi=itj.2008.1133.1140
DOI: 10.3923/itj.2008.1133.1140
URL: https://scialert.net/abstract/?doi=itj.2008.1133.1140