Electronic Voting Systems for European Union Countries

[1]  Mazdak Zamani,et al.  A trust based model for federated identity architecture to mitigate identity theft , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[2]  Mazdak Zamani,et al.  A survey for prevention of black hole attacks in wireless mobile adhoc networks using cryptographic techniques , 2013 .

[3]  Hossein Rouhani Zeidanloo,et al.  A proposed framework for P2P botnet detection , 2010 .

[4]  Harihodin Selamat,et al.  An overview of success factors for CRM , 2010, 2010 2nd IEEE International Conference on Information and Financial Engineering.

[5]  Mazdak Zamani,et al.  A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[6]  Hossein Rouhani Zeidanloo,et al.  A taxonomy of Botnet detection techniques , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[7]  Mazdak Zamani,et al.  Redirecting outgoing DNS requests toward a fake DNS server in a LAN , 2010, 2010 IEEE International Conference on Software Engineering and Service Sciences.

[8]  M. Janbeglou,et al.  Redirecting network traffic toward a fake DNS server on a LAN , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[9]  Tarmo Kalvet,et al.  Management of Technology: The Case of e-Voting in Estonia , 2009, 2009 International Conference on Computer Technology and Development.

[10]  Mazdak Zamani,et al.  A confidential RFID model to prevent unauthorized access , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).

[11]  Melanie Volkamer,et al.  New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness , 2006 .

[12]  A. Stutzer,et al.  The impact of postal voting on participation : evidence for Switzerland , 2007 .

[13]  Mazdak Zamani,et al.  A survey for prevention of black hole attacks in wireless mobile adhoc networks using trusted neighbor nodes , 2013 .

[14]  Hossein Rouhani Zeidanloo,et al.  Interpretative Key Management (IKM), A Novel Framework , 2010, 2010 Second International Conference on Computer Research and Development.

[15]  Sarah Birch,et al.  Remote Electronic Voting: Free, Fair and Secret? , 2004 .

[16]  Hossein Rouhani Zeidanloo,et al.  Node Based Interpretative Key Management Framework , 2010, Security and Management.

[17]  Mazdak Zamani,et al.  Improving the security of protected wireless internet access from insider attacks , 2012 .

[18]  Mazdak Zamani,et al.  A survey on security issues of federated identity in the cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[19]  Mazdak Zamani,et al.  A survey for prevention of black hole attacks in wireless mobile adhoc networks using IDS agents , 2013 .

[20]  Saman Shojae Chaeikar,et al.  IKM-based Security Usability Enhancement Model , 2012 .

[21]  Guido Schryen,et al.  Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland , 2009, IEEE Transactions on Information Forensics and Security.

[22]  Saman Shojae Chaeikar,et al.  Definitions and Criteria of CIA Security Triangle in Electronic Voting System , 2013 .

[23]  M. Zamani,et al.  A Survey of Success Factors for CRM , 2010 .

[24]  Mojtaba Alizadeh,et al.  Implementation and evaluation of lightweight encryption algorithms suitable for RFID , 2013 .

[25]  Hossein Rouhani Zeidanloo,et al.  Botnet detection based on traffic monitoring , 2010, 2010 International Conference on Networking and Information Technology.

[26]  Ülle Madise,et al.  E-voting in Estonia 2005. The first Practice of Country-wide binding Internet Voting in the World , 2006, Electronic Voting.

[27]  Mojtaba Alizadeh,et al.  A Survey on Attacks in RFID Networks , 2012 .

[28]  M. Zamani,et al.  Code analysis of lightweight encryption algorithms using in RFID systems to improve cipher performance , 2012, 2012 IEEE Conference on Open Systems.

[29]  Stuart Wilks-Heeg Treating Voters as an Afterthought? The Legacies of a Decade of Electoral Modernisation in the United Kingdom , 2009 .

[30]  Xiaoping Lou,et al.  Quantum Ballot Scheme Based on Hyper-Entanglement States , 2013 .