Research Article

Citations for "A Critical Review of Receipt-Freeness and Coercion-Resistance"


Citation to this article as recorded by ASCI logo


Huang, W. and B. Meng, 2011. Automated proof of resistance of denial of service attacks in remote internet voting protocol with extended applied Pi calculus. Inform. Technol. J., 10: 1468-1483.
CrossRef  |  

Meng, B., 2011. A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model. Inform. Technol. J., 10: 1068-1091.
CrossRef  |  Direct Link  |  

Meng, B., 2011. Refinement of mechanized proof of security properties of remote internet voting protocol in applied PI calculus with proverif. Inform. Technol. J., 10: 293-334.
CrossRef  |  Direct Link  |  

Meng, B., 2012. Automatic formal framework of coercion-resistance in internet voting protocols with CryptoVerif in computational model. Inform. Technol. J., 11: 741-750.
CrossRef  |  Direct Link  |  

Meng, B., W. Huang and J. Qin, 2010. Automatic verification of security properties of remote internet voting protocol in symbolic model. Inform. Technol. J., 9: 1521-1556.
CrossRef  |  Direct Link  |  


Citations in impact factor journal as recorded by Crossref logo


The adsorption of dibenzothiophene using activated carbon loaded with cerium
Journal of Porous Materials Vol. 19, Issue 5, 713, 2012

Effect of particle morphology and pore size on the release kinetics of ephedrine from mesoporous MCM-41 materials
Journal of Porous Materials Vol. 19, Issue 5, 825, 2012

Effects of functionalization conditions of sulfonic acid grafted SBA-15 on catalytic activity in the esterification of glycerol to monoglyceride: a factorial design approach
Journal of Porous Materials Vol. 19, Issue 5, 835, 2012

An Effective Approach to Long-Term Optimal Operation of Large-Scale Reservoir Systems: Case Study of the Three Gorges System
Water Resources Management

Effective microbes for simultaneous bio-oxidation of ammonia and manganese in biological aerated filter system
Bioresource Technology

Production of chitin from shrimp shell powders using Serratia marcescens B742 and Lactobacillus plantarum ATCC 8014 successive two-step fermentation
Carbohydrate Research

Temperature induced changes in ZnO–water nanofluid: Zeta potential, size distribution and viscosity profiles
International Journal of Heat and Mass Transfer

New fossil bryophytes from the Triassic Madygen Lagerstätte (SW Kyrgyzstan)
Review of Palaeobotany and Palynology


Citation to this article as recorded by Crossref logo


Electronic Voting
Lecture Notes in Computer Science

A Generic Approach to Prevent Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes
Computers & Security

Automatic verification of security properties of remote internet voting protocol in symbolic model.
Information Technology Journal Vol. 9, Issue 8, 1521, 2010

A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model
Information Technology Journal Vol. 10, Issue 6, 1068, 2011

Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus
Information Technology Journal Vol. 10, Issue 8, 1468, 2011

Refinement of mechanized proof of security properties of remote internet voting protocol in applied PI calculus with proverif.
Information Technology Journal Vol. 10, Issue 2, 293, 2011

Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif
Journal of Computers Vol. 7, Issue 4, , 2012

Services
Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

 
©  2023 Science Alert. All Rights Reserved