An experiment on the security of the Norwegian electronic voting protocol
暂无分享,去创建一个
[1] Zhe Xia,et al. Focus group views on Prêt à Voter 1.0 , 2011, 2011 International Workshop on Requirements Engineering for Electronic Voting Systems.
[2] Michael D. Byrne,et al. Straight-Party Voting: What Do Voters Think? , 2009, IEEE Transactions on Information Forensics and Security.
[3] Kristian Gjøsteen,et al. The Norwegian Internet Voting Protocol: A new Instantiation , 2015, IACR Cryptol. ePrint Arch..
[4] Jeremy Clark,et al. Scantegrity Mock Election at Takoma Park , 2010, Electronic Voting.
[5] Melanie Volkamer,et al. User study of the improved Helios voting system interfaces , 2011, 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST).
[6] Melanie Volkamer,et al. Mental Models of Verifiability in Voting , 2013, VoteID.
[7] Debbie Stone,et al. User Interface Design and Evaluation , 2005 .
[8] Kristian Gjøsteen,et al. The Norwegian Internet Voting Protocol , 2011, VoteID.
[9] Rolf Haenni,et al. Attacking the Verification Code Mechanism in the Norwegian Internet Voting System , 2013, VoteID.
[10] Kai A. Olsen,et al. Internet elections: unsafe in any home? , 2012, CACM.
[11] Yurong Yao,et al. Remote electronic voting systems: an exploration of voters' perceptions and intention to use , 2007, Eur. J. Inf. Syst..
[12] Kristian Gjøsteen,et al. Analysis of an internet voting protocol , 2010, IACR Cryptol. ePrint Arch..
[13] Melanie Volkamer,et al. Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System , 2011, EVT/WOTE.