To search, Click below search items.
All Published Papers Search Service
Title
1-out-of-L Electronic Voting with Ballot-Cancellation Property Using Double Encryption
Author
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai
Vol. 6 No. 1 pp. 217~226
Keywords
Electronic voting, Privacy, Security, Ballot-cancellation, Cryptography
Architectures for Self-Healing Databases under Cyber Attacks
Peng Liu, Jiwu Jing
Vol. 6 No. 1 pp. 204~216
Self-Healing Databases, Cyber Security, Architectures
Timed Weak Simulation Verification and its application to Stepwise Refinement of Real-Time Software
Satoshi Yamane
Vol. 6 No. 1 pp. 192~203
Refinement Design Method, Real-Time Software, Timed Weak Simulation Relation, Verification, Real-Time Scheduling
Security Extension for Bresson-Chevassut-Pointcheval's model
Chunjie Cao, Jianfeng Ma, Sangjae Moon
Vol. 6 No. 1 pp. 184~191
Provable security, Distributed computing, Formal model, Multicast security