Media Coverage of this Article
Found additional news media or blog coverage for the article? Please contact us at
submission@sciepub.com
.
More by these Authors
An Incoercible E-Voting Scheme Based on Revised Simplified Verifiable Re-encryption Mix-nets
Shinsuke Tamura, Hazim A. Haddad, Nazmul Islam, Kazi Md. Rokibul Alam
Information Security and Computer Fraud
,
Vol. 3, No. 2, 2015
, pp 32-38 | Research Article
doi:10.12691/iscf-3-2-2.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
Linear Mix-net and a Scheme for Collecting Data from Anonymous Data Holders
Shinsuke Tamura, Shuji Taniguchi
Information Security and Computer Fraud
,
Vol. 2, No. 3, 2014
, pp 39-47 | Research Article
doi:10.12691/iscf-2-3-2.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
A Scheme for Delegating Program Executions without Disclosing Secret Values
Shinsuke Tamura, Shuji Taniguchi
Information Security and Computer Fraud
,
Vol. 2, No. 2, 2014
, pp 21-27 | Research Article
doi:10.12691/iscf-2-2-1.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
Enhanced Anonymous Tag Based Credentials
Shinsuke Tamura, Shuji Taniguchi
Information Security and Computer Fraud
,
Vol. 2, No. 1, 2014
, pp 10-20 | Research Article
doi:10.12691/iscf-2-1-3.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
Simplified Verifiable Re-encryption Mix-nets
Shinsuke Tamura, Shuji Taniguchi
Information Security and Computer Fraud
,
Vol. 1, No. 1, 2013
, pp 1-7 | Research Article
doi:10.12691/iscf-1-1-1.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
An Incoercible E-Voting Scheme Based on Revised Simplified Verifiable Re-encryption Mix-nets
Shinsuke Tamura, Hazim A. Haddad, Nazmul Islam, Kazi Md. Rokibul Alam
Information Security and Computer Fraud
,
Vol. 3, No. 2, 2015
, pp 32-38 | Research Article
doi:10.12691/iscf-3-2-2.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
Related keywords
privacy
anonymous tags
anonymous credentials
linear mix-nets