How Could Snowden Attack an Election?
暂无分享,去创建一个
Robert Krimmer | Carsten Schürmann | Sven Heiberg | Jordi Barrat | Douglas Wikström | R. Krimmer | C. Schürmann | Jordi Barrat | Douglas Wikström | S. Heiberg
[1] Shahram Khazaei,et al. Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet , 2012, EVT/WOTE.
[2] Vanessa Teague,et al. The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election , 2015, VoteID.
[3] Lee Naish,et al. Shuffle-Sum: Coercion-Resistant Verifiable Tallying for STV Voting , 2009, IEEE Transactions on Information Forensics and Security.
[4] Jan Willemson,et al. The Application of I-Voting for Estonian Parliamentary Elections of 2011 , 2011, VoteID.
[5] 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '10, Washington, D.C., USA, August 9-10, 2010 , 2010, EVT/WOTE.