Citations in impact factor journals
The adsorption of dibenzothiophene using activated carbon loaded with cerium Journal of Porous Materials Vol. 19, Issue 5, 713, 2012 |
Effect of particle morphology and pore size on the release kinetics of ephedrine from mesoporous MCM-41 materials Journal of Porous Materials Vol. 19, Issue 5, 825, 2012 |
Effects of functionalization conditions of sulfonic acid grafted SBA-15 on catalytic activity in the esterification of glycerol to monoglyceride: a factorial design approach Journal of Porous Materials Vol. 19, Issue 5, 835, 2012 |
An Effective Approach to Long-Term Optimal Operation of Large-Scale Reservoir Systems: Case Study of the Three Gorges System Water Resources Management |
Effective microbes for simultaneous bio-oxidation of ammonia and manganese in biological aerated filter system Bioresource Technology |
Production of chitin from shrimp shell powders using Serratia marcescens B742 and Lactobacillus plantarum ATCC 8014 successive two-step fermentation Carbohydrate Research |
Temperature induced changes in ZnO–water nanofluid: Zeta potential, size distribution and viscosity profiles International Journal of Heat and Mass Transfer |
New fossil bryophytes from the Triassic Madygen Lagerstätte (SW Kyrgyzstan) Review of Palaeobotany and Palynology |
Citation to this article as recorded by
Huang, W. and B. Meng, 2011. Automated proof of resistance of denial of service attacks in remote internet voting protocol with extended applied Pi calculus. Inform. Technol. J., 10: 1468-1483. CrossRef |
Meng, B., 2011. A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model. Inform. Technol. J., 10: 1068-1091. CrossRefDirect Link |
Meng, B., 2011. Refinement of mechanized proof of security properties of remote internet voting protocol in applied PI calculus with proverif. Inform. Technol. J., 10: 293-334. CrossRefDirect Link |
Meng, B., 2012. Automatic formal framework of coercion-resistance in internet voting protocols with CryptoVerif in computational model. Inform. Technol. J., 11: 741-750. CrossRefDirect Link |
Meng, B., W. Huang and J. Qin, 2010. Automatic verification of security properties of remote internet voting protocol in symbolic model. Inform. Technol. J., 9: 1521-1556. CrossRefDirect Link |
Citation to this article as recorded by
Electronic Voting Lecture Notes in Computer Science |
A Generic Approach to Prevent Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes Computers & Security |
Automatic verification of security properties of remote internet voting protocol in symbolic model. Information Technology Journal Vol. 9, Issue 8, 1521, 2010 |
A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model Information Technology Journal Vol. 10, Issue 6, 1068, 2011 |
Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus Information Technology Journal Vol. 10, Issue 8, 1468, 2011 |
Refinement of mechanized proof of security properties of remote internet voting protocol in applied PI calculus with proverif. Information Technology Journal Vol. 10, Issue 2, 293, 2011 |
Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif Journal of Computers Vol. 7, Issue 4, , 2012 |
How to cite this article
Bo Meng , 2009. A Critical Review of Receipt-Freeness and Coercion-Resistance. Information Technology Journal, 8: 934-964.
DOI: 10.3923/itj.2009.934.964
URL: https://scialert.net/abstract/?doi=itj.2009.934.964
DOI: 10.3923/itj.2009.934.964
URL: https://scialert.net/abstract/?doi=itj.2009.934.964