The technical feasibility and security of e-voting
暂无分享,去创建一个
[1] A. El-Sisi. Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database , 2008, Int. Arab J. Inf. Technol..
[2] Ronald Leenes,et al. Adopting E-voting in Europe: context matters , 2002 .
[3] Nik Thompson. Analysis of an Electronic Voting System , 2014 .
[4] Aviel D. Rubin,et al. Security Considerations for Remote Electronic Voting over the Internet , 2001, ArXiv.
[5] D. Jefferson,et al. Security analysis of SERVE 1 A Security Analysis of the Secure Electronic Registration and Voting Experiment ( SERVE ) , 2004 .
[6] Howard Falk. Computer intrusions and attacks , 1999, Electron. Libr..
[7] Rudolf Schmid,et al. Organization for the advancement of structured information standards , 2002 .
[8] C. D. Mote,et al. Report of the national workshop on internet voting: issues and research agenda , 2000, DG.O.
[9] Dan S. Wallach,et al. Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[10] Steven Furnell,et al. Internet-based security incidents and the potential for false alarms , 2000, Internet Res..
[11] Indrajit Ray,et al. An anonymous electronic voting protocol for voting over the Internet , 2001, Proceedings Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2001.
[12] Ahto Buldas,et al. Practical Security Analysis of E-Voting Systems , 2007, IWSEC.
[13] Ken Thompson,et al. Reflections on trusting trust , 1984, CACM.
[14] David A. Wagner,et al. Analyzing internet voting security , 2004, CACM.
[15] Hung-Min Sun,et al. An efficient remote use authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[16] Herman T. Tavani,et al. Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace , 2000, CSOC.
[17] Lorrie Faith Cranor,et al. Design and Implementation of a Practical Security-Conscious Electronic Polling System , 1996 .
[18] Subhash C. Kak,et al. How to improve security in electronic voting? , 2007, UBIQ.
[19] L. Lanza-Kaduce,et al. THE PROCESS OF CRIMINALIZATION: THE CASE OF COMPUTER CRIME LAWS* , 1988 .