-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathpulp.bib
5374 lines (4752 loc) · 206 KB
/
pulp.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
%% This BibTeX bibliography file was created using BibDesk.
%% https://bibdesk.sourceforge.io/
%% Created for Jeremy Clark at 2025-02-03 14:15:20 -0500
%% Saved with string encoding Unicode (UTF-8)
@techreport{+CCES,
author = {Stephen Ansolabehere},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
institution = {M.I.T.},
title = {Guide to the 2008 Cooperative Congressional Election Survey},
year = {2009}}
@misc{+EDS,
author = {{Election Data Services Inc.}},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Voting Equipment Summary By Type as of 11/07/2006},
year = {2006}}
@misc{+FIPR,
author = {FIPR},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
howpublished = {FIPR Response to the Home Office},
title = {Consultation on the Draft Code of Practice for the Investigation of Protected Electronic Information -- Part {III} of the Regulation of Investigatory Powers Act 2000},
year = {2006}}
@misc{+German,
author = {{Federal constitutional court of Germany (Bundesverfassungsgericht)}},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {{Judgement of 3 March 2009 -- 2 BvC 3/07, 2 BvC 4/07 -- Verfahren \"{u}ber die Wahlpr\"{u}fungsbeschwerden}},
year = {2009}}
@misc{+OASIS,
author = {{Organization for the Advancement of Structured Information Standards (OASIS)}},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
month = {February},
note = {http://docs.oasis-open.org/office/v1.1/OS/OpenDocument-v1.1.pdf},
title = {Open Document Format for Office Applications (OpenDocument) v1.1},
year = {2007}}
@misc{+PKCS,
author = {B. Kaliski},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
howpublished = {RFC 2898},
note = {http://tools.ietf.org/html/rfc2898},
title = {PKCS \#5: Password-Based Cryptography Specification},
year = {2000}}
@misc{+Pat1,
author = {Leemon C. Baird and Mance E. Harmon and R. Reed Young and James E. Armstrong},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
howpublished = {United States Patent, 6732278},
title = {Apparatus and method for authenticating access to a network resource},
year = {2004}}
@misc{+Pat2,
author = {Ronald J. Massa and Theodore R. Ellis and Robert G. LePage},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
howpublished = {United States Patent, 4589081},
title = {Intelligent surveillance alarm system and method},
year = {1986}}
@misc{+Pat3,
author = {A Munje and T Plestid},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
howpublished = {United States Patent (Pending), 11181522},
title = {Password methods and systems for use on a mobile device},
year = {2007}}
@misc{+Pat4,
author = {Ronald K. Russikoff},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
howpublished = {United States Patent, 6871288},
title = {Computerized password verification system and method for ATM transactions},
year = {2005}}
@misc{+Rick,
author = {Richard T Carback},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
howpublished = {Private Communications},
year = {2008}}
@misc{+VVSG,
author = {{United States Election Assistance Commission}},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {The 2008 Voluntary Voting System Guidelines, v1.1)},
year = {2009}}
@inproceedings{AB96,
author = {Ross J Anderson and E Biham},
booktitle = {FSE},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Two Practical and Provably Secure Block Ciphers: {BEARS} and {LION}},
year = {1996}}
@techreport{ABCS14,
author = {Robleh Ali and John Barrdear and Roger Clews and James Southgate},
date-added = {2020-06-03 11:35:38 -0400},
date-modified = {2020-06-03 11:39:39 -0400},
institution = {Bank of England},
title = {Innovations in Payment Technologies and the Emergence of Digital Currencies},
type = {Quarterly Bulletin},
year = {2014}}
@inproceedings{ABDV03,
author = {Riza Aditya and Colin Boyd and Ed Dawson and Kapali Viswanathan},
booktitle = {EGOV},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Secure e-voting for preferential elections},
year = {2003}}
@inproceedings{ABHL03,
author = {L. {von} Ahn and M. Blum and N. Hopper and J. Langford},
booktitle = {EUROCRYPT},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {{CAPTCHA}: Using hard {AI} problems for security},
year = {2003}}
@inproceedings{ABHO06,
author = {L. {von} Ahn and A. Bortz and N. J. Hopper and K. O'Neill},
booktitle = {PET},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Selectively traceable anonymity},
year = {2006}}
@inproceedings{ABJD10,
author = {G. Aggarwal and E. Bursztein and C. Jackson and D. Boneh},
booktitle = {USENIX Security},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {An analysis of private browsing modes in modern browsers},
year = {2010}}
@inproceedings{ACC+08,
author = {Aviv, Adam and Cerny, Pavol and Clark, Sandy and Cronin, Eric and Shah, Gaurav and Sherr, Micah and Blaze, Matt},
booktitle = {EVT},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
pages = {1--13},
title = {Security evaluation of {ES\&S} voting machines and election management system},
year = {2008}}
@inproceedings{ACG06,
author = {Roberto Araujo and Ricardo Felipe Custodio and Jeroen {van de} Graaf},
booktitle = {WOTE},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {A Verifiable Voting Protocol based on {F}arnel},
year = {2006}}
@incollection{ACG10,
author = {Roberto Araujo and Ricardo Felipe Custodio and Jeroen {van de} Graaf},
booktitle = {Towards Trustworthy Elections},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
publisher = {Springer},
series = {LNCS},
title = {A Verifiable Voting Protocol based on {F}arnel},
volume = {6000},
year = {2010}}
@article{AFGH+08,
author = {Arrow, Kenneth J. and Forsythe, Robert and Gorham, Michael and Hahn, Robert and Hanson, Robin and Ledyard, John O. and Levmore, Saul and Litan, Robert and Milgrom, Paul and Nelson, Forrest D. and Neumann, George R. and Ottaviani, Marco and Schelling, Thomas C. and Shiller, Robert J. and Smith, Vernon L. and Snowberg, Erik and Sunstein, Cass R. and Tetlock, Paul C. and Tetlock, Philip E. and Varian, Hal R. and Wolfers, Justin and Zitzewitz, Eric},
date-added = {2014-02-04 20:00:15 +0000},
date-modified = {2014-02-04 20:00:50 +0000},
journal = {Science},
number = {5878},
title = {The Promise of Prediction Markets},
volume = {320},
year = {2008},
bdsk-url-1 = {http://www.sciencemag.org/content/320/5878/877.short},
bdsk-url-2 = {http://dx.doi.org/10.1126/science.1157679}}
@inproceedings{AFT07,
abstract = {Subject},
author = {Roberto Araujo and Sebastien Foulle and Jacques Traor\'e},
booktitle = {Frontiers of Electronic Voting},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
rating = {5},
title = {A practical and secure coercion-resistant scheme for remote elections},
year = {2007}}
@article{AFT10,
author = {Roberto Araujo and Sebastien Foulle and Jacques Traor\'e},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
journal = {Toward Trustworthy Elections},
title = {A practical and secure coercion-resistant scheme for internet voting},
volume = {LNCS 6000},
year = {2010}}
@inproceedings{AGH+08,
author = {A. W. Appel and M. Ginsburg and H. Hursti and B. W. Kernighan and C. D. Richards and G. Tan and P. Venetis},
booktitle = {EVT/WOTE},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {The New Jersey Voting-machine Lawsuit and the AVC Advantage DRE Voting Machine},
year = {2009}}
@inproceedings{AGS05,
author = {Andre Adelsbach and Sebastian Gajek and Jorg Schwenk},
booktitle = {ISPEC},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Visual Spoofing of {SSL} Protected Web Sites and Effective Countermeasures},
year = {2005}}
@article{AJL04,
author = {A Ambainis and Markus Jakobsson and Helger Lipmaa},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
journal = {PKC},
title = {Cryptographic Randomized Response Techniques},
year = {2004}}
@inproceedings{AK09,
author = {M. Alicherry and A. D. Keromytis},
booktitle = {ISCC},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks},
year = {2009}}
@inproceedings{AKRSC13,
author = {Androulaki, Elli and Karame, Ghassan O and Roeschlin, Marc and Scherer, Tobias and Capkun, Srdjan},
booktitle = {Financial Cryptography},
date-added = {2014-02-28 21:19:57 +0000},
date-modified = {2014-02-28 21:20:41 +0000},
title = {{Evaluating User Privacy in Bitcoin}},
year = 2013}
@inproceedings{ALBD04,
author = {Riza Aditya and Byoungcheon Lee and Colin Boyd and Ed Dawson},
booktitle = {TrustBus},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {An efficient mixnet-based voting scheme providing receipt-freeness},
year = {2004}}
@inproceedings{AM01,
author = {G. Ateniese and S. Mangard},
booktitle = {CCS},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {A New Approach to {DNS} Security ({DNSSEC})},
year = {2001}}
@inproceedings{AMPQ09,
author = {Ben Adida and Olivier {de} Marneffe and Olivier Pereira and Jean-Jacques Quisquater},
booktitle = {EVT/WOTE},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Electing a University President using Open-Audit Voting: Analysis of real-world use of {H}elios},
year = {2009}}
@inproceedings{AMU01,
author = {X. Ao and N. H. Minsky and V. Ungureanu},
booktitle = {IEEE Symposium on Security and Privacy},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Formal Treatment of Certificate Revocation Under Communal Access Control},
year = {2001}}
@inproceedings{AN06,
author = {Ben Adida and C Andrew Neff},
booktitle = {EVT},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Ballot Casting Assurance},
year = {2006}}
@inproceedings{AN09,
author = {Ben Adida and C. Andrew Neff},
booktitle = {EVT/WOTE},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Efficient Receipt-Free Ballot Casting Resistant to Covert Channels},
year = {2009}}
@inproceedings{ANC08,
author = {T. Aura and P. Nikander and G. Camarillo},
booktitle = {IEEE Symposium on Security and Privacy},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Effects of Mobility and Multihoming on Transport-Protocol Security},
year = {2004}}
@inproceedings{ANL00,
author = {T Aura and P Nikander and J Leiwo},
booktitle = {Security Protocols},
date-added = {2014-03-01 02:37:09 +0000},
date-modified = {2014-03-01 02:37:09 +0000},
title = {{DoS}-resistant authentication with client puzzles},
year = {2000}}
@inproceedings{ANS98,
author = {Ross J Anderson and Roger M Needham and Adi Shamir},
booktitle = {IH},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {The Steganographic File System},
year = {1998}}
@inproceedings{AP13,
author = {Nadhem J. AlFardan and Kenneth G. Paterson},
booktitle = {IEEE Symposium on Security and Privacy},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Lucky Thirteen: Breaking the {TLS} and {DTLS} Record Protocols},
year = {2013}}
@inproceedings{APDLF10,
author = {M. Antonakakis and R. Perdisci and D. Dagon and W. Lee and N. Feamster},
booktitle = {USENIX Security},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Building a Dynamic Reputation System for {DNS}},
year = {2010}}
@inproceedings{AR06,
author = {Ben Adida and Ronald L. Rivest},
booktitle = {ACM WPES},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
pages = {29--40},
title = {Scratch \& {V}ote: self-contained paper-based cryptographic voting},
year = {2006}}
@inproceedings{AR08,
author = {Roberto Araujo and Peter Y A Ryan},
booktitle = {EVOTE},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Improving the {F}arnel Voting Scheme},
year = {2008}}
@inproceedings{ARR+10,
author = {Roberto Araujo and Narjes Ben Rajeb and Riadh Robbana and Jacques Traor\'e and Souheib Yousfi},
booktitle = {CANS},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Towards Practical and Secure Coercion-Resistant Electronic Elections},
year = {2010}}
@inproceedings{ASK05,
author = {O. Acii\c{c}mez and W. Schindler and \c{C}. K. Ko\c{c}},
booktitle = {CCS},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Improving {B}rumley and {B}oneh Timing Attack on Unprotected {SSL} Implementations},
year = {2005}}
@inproceedings{ATO12,
author = {C. Amrutkar and P. Traynor and P.C. van Oorschot},
booktitle = {ISC},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Measuring {SSL} Indicators on Mobile Browsers: Extended Life or End of the Road?},
year = {2012}}
@techreport{AVHS12,
author = {Bernhard Amann and Matthias Vallentin and Seth Hall and Robin Sommer},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
institution = {ICSI},
title = {Revisiting {SSL}: A Large-Scale Study of the Internet's Most Trusted Protocol},
year = {2012}}
@article{AW03,
author = {R.K. Aggarwal and G. Wu},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
journal = {Journal of Business},
number = {4},
title = {Stock market manipulation---theory and evidence},
volume = {79},
year = {2003}}
@techreport{Acq04,
author = {Alessandro Acquisti},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
institution = {IACR Eprint Report 2004/105},
title = {Receipt-Free Homomorphic Elections and Write-in Ballots},
year = {2004}}
@techreport{Adh17,
author = {Moe Adham},
date-added = {2020-04-28 15:23:08 -0400},
date-modified = {2020-04-28 15:23:51 -0400},
institution = {BitAccess},
title = {GovChain: An approach to a distributed, equitable government ledger secured by its constituents},
year = {2017}}
@inproceedings{Adi08,
author = {Ben Adida},
booktitle = {USENIX Security Symposium},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
pages = {335--348},
title = {Helios: web-based open-audit voting},
year = {2008}}
@article{Ahm08,
author = {D. Ahmad},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
journal = {IEEE Security and Privacy},
number = {5},
title = {Two Years of Broken Crypto},
volume = {6},
year = {2008}}
@inproceedings{AnKu96,
author = {Anderson, Ross and Kuhn, Markus},
booktitle = {Proceedings of the 2nd Conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2},
date-added = {2020-06-03 22:31:16 -0400},
date-modified = {2020-06-03 22:31:35 -0400},
numpages = {1},
title = {Tamper Resistance: A Cautionary Note},
year = {1996}}
@inproceedings{BB03,
author = {D. Brumley and D. Boneh},
booktitle = {USENIX Security},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Remote Timing Attacks are Practical},
year = {2003}}
@conference{BB08,
author = {L. Bello and M. Bertachhini},
booktitle = {DEFCON 16},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Predictable {PRNG} in the Vulnerable {D}ebian {OpenSSL} package: the What and the How},
year = {2008}}
@inproceedings{BB95,
author = {M. Blaze and S. M. Bellovin},
booktitle = {USENIX Security},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Session-Layer Encryption},
year = {1995}}
@inproceedings{BBB+18,
author = {B. {B{\"u}nz} and J. {Bootle} and D. {Boneh} and A. {Poelstra} and P. {Wuille} and G. {Maxwell}},
booktitle = {{IEEE Symposium on Security and Privacy}},
date-added = {2020-04-28 23:14:49 -0400},
date-modified = {2020-04-28 23:15:09 -0400},
title = {Bulletproofs: Short Proofs for Confidential Transactions and More},
year = {2018}}
@article{BBS86,
address = {Philadelphia, PA, USA},
author = {Blum, L and Blum, M and Shub, M},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
issn = {0097-5397},
journal = {SIAM J. Comput.},
number = {2},
pages = {364--383},
publisher = {Society for Industrial and Applied Mathematics},
title = {A simple unpredictable pseudo random number generator},
volume = {15},
year = {1986},
bdsk-url-1 = {http://dx.doi.org/10.1137/0215025}}
@article{BCC88,
address = {Orlando, FL, USA},
author = {Brassard, Gilles and Chaum, David and Cr\'{e}peau, Claude},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
issn = {0022-0000},
journal = {J. Comput. Syst. Sci.},
number = {2},
pages = {156--189},
publisher = {Academic Press, Inc.},
title = {Minimum disclosure proofs of knowledge},
volume = {37},
year = {1988},
bdsk-url-1 = {http://dx.doi.org/10.1016/0022-0000(88)90005-0}}
@techreport{BCD+14,
author = {Adam Back and Matt Corallo and Luke Dashjr and Mark Friedenbach and Gregory Maxwell and Andrew Miller and Andrew Poelstra and Jorge Tim{\'o}n and Pieter Wuille},
date-added = {2020-04-26 12:14:34 -0400},
date-modified = {2020-04-26 12:15:15 -0400},
title = {Enabling Blockchain Innovations with Pegged Sidechains},
year = {2014}}
@inproceedings{BCE+07,
author = {M. Blaze and A. Cordero and S. Engle and C. Karlof and N. Sastry and M. Sherr and T. Stegers and K.-P. Yee},
booktitle = {State of California's Top to Bottom Review},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Source Code Review of the Sequoia Voting System},
year = {2007}}
@misc{BCG15,
author = {Joseph Bonneau and Jeremy Clark and Steven Goldfeder},
date-added = {2018-10-30 16:24:10 -0400},
date-modified = {2018-10-30 16:24:18 -0400},
howpublished = {Cryptology ePrint Archive, Report 2015/1015},
note = {\url{https://eprint.iacr.org/2015/1015}},
title = {On Bitcoin as a public randomness source},
year = {2015}}
@misc{BCP92,
author = {J. Bos and David Chaum and G. Purdy},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
howpublished = {Preliminary draft},
title = {A Voting scheme},
year = {1992}}
@inproceedings{BCS09,
author = {A. Barth and J. Caballero and D. Song},
booktitle = {IEEE Symposium on Security and Privacy},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves},
year = {2009}}
@inproceedings{BDJR97,
author = {Bellare, M. and Desai, A. and Jokipii, E. and Rogaway, P.},
booktitle = {FOCS},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {A concrete security treatment of symmetric encryption},
year = {1997}}
@article{BDS20,
abstract = {FastPay allows a set of distributed authorities, some of which are Byzantine, to maintain a high-integrity and availability settlement system for pre-funded payments. It can be used to settle payments in a native unit of value (crypto-currency), or as a financial side-infrastructure to support retail payments in fiat currencies. FastPay is based on Byzantine Consistent Broadcast as its core primitive, foregoing the expenses of full atomic commit channels (consensus). The resulting system has lowlatency for both confirmation and payment finality. Remarkably, each authority can be sharded across many machines to allow unbounded horizontal scalability. Our experiments demonstrate intra-continental confirmation latency of less than 100ms, making FastPay applicable to point of sale payments. In laboratory environments, we achieve over 80,000 transactions per second with 20 authorities\textemdash surpassing the requirements of current retail card payment networks, while significantly increasing their robustness.},
author = {Baudet, Mathieu and Danezis, George and Sonnino, Alberto},
date-added = {2020-06-08 14:22:51 -0400},
date-modified = {2020-06-08 14:23:21 -0400},
journal = {arXiv:2003.11506 [cs]},
title = {FastPay: High-Performance Byzantine Fault Tolerant Settlement},
year = {2020}}
@inproceedings{BDTW01,
author = {D. Boneh and X. Ding and G. Tsudik and C. M. Wong},
booktitle = {USENIX Security},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {A Method for Fast Revocation of Public Key Certificates and Security Capabilities},
year = {2001}}
@inproceedings{BEH+08,
author = {Kevin Butler and William Enck and Harri Hursti and Stephen McLaughlin and Patrick Traynor and Patrick McDaniel},
booktitle = {EVT},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST},
year = {2008}}
@inproceedings{BESW00,
author = {P. Buhler and T. Eirich and M. Steiner and M. Waidner},
booktitle = {NDSS},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Secure Password-Based Cipher Suite for {TLS}},
year = {2000}}
@inproceedings{BF01,
author = {Dan Boneh and Matthew Franklin},
booktitle = {CRYPTO},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Identity-based encryption from the Weil pairing},
year = {2005}}
@inproceedings{BFCZ08,
author = {K. Bhargavan and C. Fournet and R. Corin and E. Zalinescu},
booktitle = {CCS},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Cryptographically Verified Implementations for {TLS}},
year = {2008}}
@article{BFCZ12,
author = {Bhargavan, Karthikeyan and Fournet, C{\'e}dric and Corin, Ricardo and Z\u{a}linescu, Eugen},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
journal = {ACM TISSEC},
number = {1},
title = {Verified Cryptographic Implementations for {TLS}},
volume = {15},
year = {2012},
bdsk-url-1 = {http://doi.acm.org/10.1145/2133375.2133378},
bdsk-url-2 = {http://dx.doi.org/10.1145/2133375.2133378}}
@inproceedings{BFP+01,
author = {Olivier Baudron and Pierre-Alain Fouque and David Pointcheval and Guillaume Poupard and Jacques Stern},
booktitle = {ACM PODC},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Practical multi-candidate election system},
year = {2001}}
@inproceedings{BG02,
author = {Dan Boneh and Philippe Golle},
booktitle = {ACM CCS},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Almost Entirely Correct Mixing With Applications to Voting},
year = {2002}}
@inproceedings{BGN05,
author = {Dan Boneh and E-J Goh and K Nissam},
booktitle = {TCC},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Evaluating {2-DNF} formulas on ciphertexts},
year = {2005}}
@inproceedings{BH05,
author = {Boaz Barak and Shai Halevi},
booktitle = {ACM CCS},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {A model and architecture for pseudo-random generation and applications to \texttt{/dev/random}},
year = {2005}}
@inproceedings{BHOS12,
author = {Bonneau, J and Herley, C and van Oorschot, P C and Stajano, F},
booktitle = {IEEE Symp. Security \& Privacy},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {The quest to replace passwords: a framework for comparative evaluation of web authentication schemes},
year = {2012}}
@techreport{BHW20,
author = {Codruta Boar and Henry Holden and Amber Wadsworth},
date-added = {2020-06-07 21:35:51 -0400},
date-modified = {2020-06-07 21:37:01 -0400},
institution = {Bank for International Settlements},
number = {107},
title = {Impending arrival -- a sequel to the survey on central bank digital currency},
type = {BIS Papers},
year = {2020}}
@inproceedings{BIK01,
author = {M. Blaze and J. Ioannidis and A. D. Keromytis},
booktitle = {NDSS},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Trust Management for {IPsec}},
year = {2001}}
@article{BIK02,
author = {M. Blaze and J. Ioannidis and A. D. Keromytis},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
journal = {ACM TISSEC},
number = {2},
title = {Trust Management for {IPsec}},
volume = {5},
year = {2002}}
@techreport{BIS15,
abstract = {Digital currencies, and especially those which have an embedded decentralised transfer mechanism based on the use of a distributed ledger, are an innovation that could have a range of impacts on various aspects of financial markets and the wider economy. These could include potential disruption to business models and systems, as well as facilitating new economic interactions and linkages. Currently, such schemes are not widely used or accepted, and they face a series of challenges that could limit their future growth. However, some digital currency schemes have demonstrated that their underlying technology could feasibly be used for peer-to-peer transactions in the absence of a trusted third party. Such technology may have potential to improve some aspects of the efficiency of payment services and financial market infrastructures (FMIs) in general. In particular, these improvements might arise in circumstances where intermediation through a central party is not currently cost-effective. This report considers the possible implications of interest to central banks arising from these innovations.},
date-added = {2020-05-10 10:05:22 -0400},
date-modified = {2020-06-07 21:37:26 -0400},
institution = {{Bank for International Settlements} and {Committee on Payments and Market Infrastructures}},
key = {Bank for International Settlement},
title = {Digital currencies},
year = {2015},
bdsk-url-1 = {http://www.bis.org/cpmi/publ/d137.htm}}
@techreport{BIS19,
author = {Christian Barontini and Henry Holden},
date-added = {2020-04-12 10:37:26 -0400},
date-modified = {2020-04-12 10:38:11 -0400},
institution = {Bank for International Settlements},
title = {Proceeding with Caution: A Survey on Central Bank Digital Currency},
year = {2019}}
@techreport{BIS96,
abstract = {Digital currencies, and especially those which have an embedded decentralised transfer mechanism based on the use of a distributed ledger, are an innovation that could have a range of impacts on various aspects of financial markets and the wider economy. These could include potential disruption to business models and systems, as well as facilitating new economic interactions and linkages. Currently, such schemes are not widely used or accepted, and they face a series of challenges that could limit their future growth. However, some digital currency schemes have demonstrated that their underlying technology could feasibly be used for peer-to-peer transactions in the absence of a trusted third party. Such technology may have potential to improve some aspects of the efficiency of payment services and financial market infrastructures (FMIs) in general. In particular, these improvements might arise in circumstances where intermediation through a central party is not currently cost-effective. This report considers the possible implications of interest to central banks arising from these innovations.},
date-added = {2020-10-25 18:07:35 -0400},
date-modified = {2020-10-25 18:07:35 -0400},
institution = {Bank for International Settlements},
key = {Bank for International Settlement},
title = {Implications for central banks of the development of electronic money},
year = {1996},
bdsk-url-1 = {http://www.bis.org/cpmi/publ/d137.htm}}
@inproceedings{BKT17,
abstract = {Blockchain-based smart contracts are considered a promising technology for handling financial agreements securely. In order to realize this vision, we need a formal language to unambiguously describe contract clauses. We introduce Findel -- a purely declarative financial domain-specific language (DSL) well suited for implementation in blockchain networks. We implement an Ethereum smart contract that acts as a marketplace for Findel contracts and measure the cost of its operation. We analyze challenges in modeling financial agreements in decentralized networks and outline directions for future work (See the author's post-print at https://orbilu.uni.lu/handle/10993/30975and the related source code at https://github.com/cryptolu/findel).},
address = {Cham},
author = {Biryukov, Alex and Khovratovich, Dmitry and Tikhomirov, Sergei},
booktitle = {WTSC},
date-added = {2018-10-30 16:09:37 -0400},
date-modified = {2018-10-30 16:09:52 -0400},
isbn = {978-3-319-70278-0},
publisher = {Springer International Publishing},
title = {Findel: Secure Derivative Contracts for Ethereum},
year = {2017}}
@inproceedings{BKT18,
author = {Alex Biryukov and Dmitry Khovratovich and Sergei Tikhomirov},
booktitle = {ERCIM Blockchain Workshop},
date-added = {2020-06-05 17:53:07 -0400},
date-modified = {2020-06-05 17:53:30 -0400},
title = {Privacy-preserving KYC on Ethereum},
year = {2018}}
@techreport{BLST20,
author = {Matthieu Bouchaud and Tom Lyons and Matthieu Saint Olive and Ken Timsit},
date-added = {2020-06-05 18:50:10 -0400},
date-modified = {2020-06-05 18:57:28 -0400},
institution = {ConsenSys Solutions},
title = {Central banks and the future of digital money},
year = {2020}}
@inproceedings{BM10,
author = {J. Bau and J. Mitchell},
booktitle = {NDSS},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {A Security Evaluation of {DNSSEC} with {NSEC3}},
year = {2010}}
@inproceedings{BMC+15,
author = {J Bonneau and A Miller and J Clark and A Narayanan and J Kroll and E Felten},
booktitle = {{IEEE Symposium on Security and Privacy}},
date-added = {2015-02-10 18:25:02 +0000},
date-modified = {2015-02-10 18:25:42 +0000},
title = {Bitcoin and Second-generation Cryptocurrencies},
year = {2015}}
@article{BMR+10,
author = {Josh Benaloh and Tal Moran and Lee Naish and Kim Ramchen and Vanessa Teague},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
journal = {IEEE TIFS},
number = {4},
pages = {684--698},
title = {Shuffle-Sum: Coercion-Resistant Verifiable Tallying for STV Voting},
volume = {4},
year = {2009}}
@inproceedings{BMR07,
author = {Jens Matthias Bohli and Joern {Mueller-Quade} and Stefan Roehrich},
booktitle = {VOTE-ID},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
pages = {111--124},
title = {Bingo Voting: Secure and coercion-free voting using a trusted random number generator},
year = {2007}}
@inproceedings{BMR17,
abstract = {We consider a prediction market in which all aspects are controlled by market forces, in particular the correct outcomes of events are decided by the market itself rather than by trusted arbiters. This kind of a decentralized prediction market can sustain betting on events whose outcome may remain unresolved for a long or even unlimited time period, and can facilitate trades among participants who are spread across diverse geographical locations, may wish to remain anonymous and/or avoid burdensome identification procedures, and are distrustful of each other. We describe how a cryptocurrency such as Bitcoin can be enhanced to accommodate a truly decentralized prediction market, by employing an innovative variant of the Colored Coins concept. We examine the game-theoretic properties of our design, and offer extensions that enable other financial instruments as well as real-time exchange.},
address = {Cham},
author = {Bentov, Iddo and Mizrahi, Alex and Rosenfeld, Meni},
booktitle = {BITCOIN},
date-added = {2018-10-30 16:08:22 -0400},
date-modified = {2018-10-30 16:08:39 -0400},
isbn = {978-3-319-70278-0},
pages = {199--217},
publisher = {Springer International Publishing},
title = {Decentralized Prediction Market Without Arbiters},
year = {2017}}
@inproceedings{BNMC+14,
author = {Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten},
booktitle = {Financial Cryptography},
date-added = {2014-03-01 03:24:15 +0000},
date-modified = {2014-03-01 03:25:19 +0000},
title = {Mixcoin: Anonymity for Bitcoin with Accountable Mixes},
year = {2014}}
@article{BO91,
author = {John J. Bartholdi and James B. Orlin},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
journal = {Social Choice and Welfare},
pages = {341--354},
title = {Single transferable vote resists strategic voting},
volume = {8},
year = {1991}}
@inproceedings{BPS94,
author = {Ahmad {Baraani-Dastjerdi} and Josef Pieprzyk and Reihaneh {Safavi-Naini}},
booktitle = {ACSAC},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {A Practical Electronic Voting Protocol using Threshold Schemes},
year = {1995}}
@inproceedings{BR06,
author = {S. M. Bellovin and E. Rescorla},
booktitle = {NDSS},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Deploying a New Hash Algorithm},
year = {2006}}
@techreport{BR11,
author = {E. Barker and A. Roginsky},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
institution = {NIST},
number = {800-131A},
title = {Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths},
type = {Special Publication},
year = {2011}}
@inproceedings{BRS18,
author = {D. {Basin} and S. {Radomirovic} and L. {Schmid}},
booktitle = {IEEE CSF},
date-added = {2021-03-23 10:14:29 -0400},
date-modified = {2021-03-23 10:14:29 -0400},
title = {Alethea: A Provably Secure Random Sample Voting Protocol},
year = {2018}}
@article{BS73,
author = {F. Black and M. Scholes},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
journal = {Journal of Political Economy},
number = {3},
title = {The pricing of options and corporate liabilities},
volume = {81},
year = {1973}}
@inproceedings{BT08,
author = {A. Broadbent and A. Tapp},
booktitle = {WOTE},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Information-theoretically secure voting without an honest majority},
year = {2008}}
@inproceedings{BT11,
author = {Brumley, Billy Bob and Tuveri, Nicola},
booktitle = {ESORICS},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {Remote timing attacks are still practical},
year = {2011},
bdsk-url-1 = {http://dl.acm.org/citation.cfm?id=2041225.2041252}}
@inproceedings{BT94,
author = {Josh Benaloh and Dwight Tuinstra},
booktitle = {ACM STOC},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Receipt-free secret-ballot elections},
year = {1994}}
@inproceedings{BY86,
author = {Josh Benaloh and Moti Yung},
booktitle = {ACM PODC},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Distributing the Power of a Government to Enhance the Privacy of Voters},
year = {1986}}
@inproceedings{Bab85,
author = {L Babai},
booktitle = {ACM STOC},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Trading group theory for randomness},
year = {1985}}
@article{Bab88,
address = {Orlando, FL, USA},
author = {Babai, L\'{a}szl\'{o} and Moran, Shlomo},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
issn = {0022-0000},
journal = {J. Comput. Syst. Sci.},
number = {2},
pages = {254--276},
publisher = {Academic Press, Inc.},
title = {Arthur-Merlin games: a randomized proof system, and a hierarchy of complexity class},
volume = {36},
year = {1988},
bdsk-url-1 = {http://dx.doi.org/10.1016/0022-0000(88)90028-1}}
@misc{Back02,
author = {A Back},
date-added = {2011-09-07 17:53:48 -0400},
date-modified = {2011-09-07 17:59:25 -0400},
title = {Hashcash: a denial of service counter-measure},
year = {2002}}
@techreport{Bar04,
author = {G. Bard},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
institution = {IACR ePrint},
number = {2004/111},
title = {The vulnerability of {SSL} to chosen-plaintext attack},
year = {2004}}
@inproceedings{Bar06,
author = {G. V. Bard},
booktitle = {SECRYPT},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
title = {A Challenging but feasible blockwise-adaptive chosen-plaintext attack on {SSL}},
year = {2006}}
@inproceedings{Bar07,
author = {Gregory V. Bard},
booktitle = {AISW},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Spelling-Error Tolerant, Order-Independent Pass-Phrases via the {D}amerau-{L}evenshtein String-Edit Distance Metric},
year = {2007}}
@article{BeGa17,
author = {Morten L. Bech and Rodney Garratt},
date-added = {2020-04-12 10:26:58 -0400},
date-modified = {2020-04-12 10:30:06 -0400},
journal = {{BIS} Quarterly Review},
month = {September},
title = {Central Bank Cryptocurrencies},
year = {2017}}
@article{Beh17,
author = {Jan Behrens},
date-added = {2021-03-23 10:14:29 -0400},
date-modified = {2021-03-23 10:14:29 -0400},
journal = {The Liquid Democracy Journal},
title = {The Origins of Liquid Democracy},
volume = {5},
year = {2017}}
@incollection{Bel98,
author = {Mihir Bellare},
booktitle = {Lectures on Data Security},
date-added = {2018-10-24 12:39:48 -0400},
date-modified = {2018-10-24 12:39:48 -0400},
publisher = {LNCS 1561},
title = {Practice-Oriented Provable Security},
year = {1999}}
@inproceedings{Ben06,
author = {Josh Benaloh},
booktitle = {EVT},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Simple Verifiable Elections},
year = {2006}}
@inproceedings{Ben07,
author = {Josh Benaloh},
booktitle = {EVT},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Ballot Casting Assurance via Voter-Initiated Poll Station Auditing},
year = {2007}}
@inproceedings{Ben86,
author = {Josh Benaloh},
booktitle = {CRYPTO},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Cryptographic Capsules: A Disjunctive Primitive for Interactive Protocols},
year = {1986}}
@inproceedings{Ben86b,
author = {Josh Benaloh},
booktitle = {EUROCRYPT},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
title = {Secret sharing homomorphisms: Keeping a secret secret},
year = {1986}}
@phdthesis{Ben87,
author = {Josh Benaloh},
date-added = {2018-10-24 12:41:50 -0400},
date-modified = {2018-10-24 12:41:50 -0400},
school = {Yale University},
title = {Verifiable secret-ballot elections},