其他1. | 李青峰,黃景彰,王丕承(1993)。應用密碼技術於可驗證之無記名投票。 延伸查詢![new window](/gs32/images/newin.png) |
2. | 郭至容,李青峰,黃景彰(1994)。一個使用公佈欄的無記名投票系統。 延伸查詢![new window](/gs32/images/newin.png) |
3. | ANSI X9.17(1985)。American National Standard for Financial Institution Key Management (Wholesale)。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
4. | J. Benaloh and M. Yung(198608)。Distributing the Power of the Government to Enhance the Privacy of Votes。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
5. | J. Benaloh(198709)。Verifiable Secret-Ballot Elections。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
6. | J. Benaloh and Dwight Tuinstra(1994)。Receipt-Free Secret-Ballot Elections。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
7. | J. Borrell and J. Rifa(1966)。An Implementable Secure Voting Scheme。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
8. | C. Boyd(1989)。A New Multiple Key Cipher and an Improved Voting Scheme。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
9. | D. Chaum(198102)。Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
10. | D. Chaum(1988)。Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
11. | Chin-Chen Chang and Wen-Bin Wu(1994)。A Secure Voting System on a Public Network。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
12. | J. D. Cohen and M. H. Fisher(1885)。A Robust and Verifiable Cryptographically Secure Election Scheme。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
13. | J. D. Cohen(198604)。Improving Privacy in Cryptographic Elections。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
14. | R. Cramer, R. Gennaro, B. Schoenmakers and M. Yung(1996)。Multi-Authority Secret-Ballot Elections with Linear Work。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
15. | R. Cramer, R. Gennaro and B. Schoenmakers(1997)。A Secure and Optimally Efficient Multi-Authority Election Scheme。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
16. | L. F. Cranor and R. K. Cytron(1996)。Design and Implementation of a Security-Conscious Electronic Polling System。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
17. | L. F. Cranor(199604)。Electronic Voting:Computerized Polls May Save Money, Protect Privacy。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
18. | B. Davenport, A. Newberger and J. Woodard(1995)。Creating a Secure Digital Voting Protocol for Campus Elections。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
19. | A. Fiate and A. Shamir(1986)。How to Prove Yourself: Practical Solutions to Identification and Signature Problems。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
20. | A. Fujioka, T. Okamoto and K. Ohta(1992)。A Practical Secret Voting Scheme for Large Scale Elections。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
21. | Jing-Jang Hwang(1996)。A Conventional Approach to Secret Balloting in Computer Networks。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
22. | Jing-Jang Hwang, ChyanYang, Min-Hui Lin, Jong Liang Neih and Kou Chen Wu(1996)。Extension & Discussion of an Anonymous Voting System。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
23. | K. R. Iversen(1992)。A Cryptographic Scheme for Computerized General Elections。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
24. | Jinn-Ke Jan and Chih-Chang Tai(1997)。A Secure Electronic Voting Protocol with IC Cards。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
25. | Wen-Shenq Juang and Chin-Laung Lei(1996)。A Collision-Free Secret Ballot Protocol for Computerized General Elections。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
26. | Min-Hui Lin, Jong Liang Neih, Jing-Jang Hwang, Chyan Yang(1997)。Developing a System for Secret Balloting over the Internet with an Emphasis on the System’s Merits for Social Acceptance。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
27. | Jong Liang Neih(1996)。An Anonymous Voting System Applied to Group Decisions。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
28. | H. Nurmi, A. Salomaa and L. Santean(1991)。Secret Ballot Elections in Computer Networks。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
29. | Park, K. Itoh and Kaoru Kurosawa(1993)。Efficient Anonymous Channel and All/Nothing Election Scheme。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
30. | Shun-Fu Pon, To Chang, Erl-Huei Lu and Jau-Yien Lee(1996)。An Anonymous Electronic Voting Protocol。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
31. | Kazue Sako(199401)。Electronic Voting Scheme Allowing Open Objection to the Tally。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
32. | Kazue Sako, Joe Kilian(1994)。Secure Voting Using Partially Compatible Homomorphism。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
33. | Kazue Sako, Joe Kilian(1995)。Receipt-Free Mix -Type Voting Scheme-A Practical Solution to the Implementation。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
34. | P. H. Slessenger(199105)。Socially Secure Cryptographic Election Scheme。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |