Electronic Voting Systems for European Union Countries
暂无分享,去创建一个
Mojtaba Alizadeh | Saman Shojae Chaeikar | Mazdak Zamani | Christian Sunday Chukwuekezie | M. Alizadeh | M. Zamani | C. S. Chukwuekezie
[1] Mazdak Zamani,et al. A trust based model for federated identity architecture to mitigate identity theft , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[2] Mazdak Zamani,et al. A survey for prevention of black hole attacks in wireless mobile adhoc networks using cryptographic techniques , 2013 .
[3] Hossein Rouhani Zeidanloo,et al. A proposed framework for P2P botnet detection , 2010 .
[4] Harihodin Selamat,et al. An overview of success factors for CRM , 2010, 2010 2nd IEEE International Conference on Information and Financial Engineering.
[5] Mazdak Zamani,et al. A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[6] Hossein Rouhani Zeidanloo,et al. A taxonomy of Botnet detection techniques , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[7] Mazdak Zamani,et al. Redirecting outgoing DNS requests toward a fake DNS server in a LAN , 2010, 2010 IEEE International Conference on Software Engineering and Service Sciences.
[8] M. Janbeglou,et al. Redirecting network traffic toward a fake DNS server on a LAN , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[9] Tarmo Kalvet,et al. Management of Technology: The Case of e-Voting in Estonia , 2009, 2009 International Conference on Computer Technology and Development.
[10] Mazdak Zamani,et al. A confidential RFID model to prevent unauthorized access , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).
[11] Melanie Volkamer,et al. New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness , 2006 .
[12] A. Stutzer,et al. The impact of postal voting on participation : evidence for Switzerland , 2007 .
[13] Mazdak Zamani,et al. A survey for prevention of black hole attacks in wireless mobile adhoc networks using trusted neighbor nodes , 2013 .
[14] Hossein Rouhani Zeidanloo,et al. Interpretative Key Management (IKM), A Novel Framework , 2010, 2010 Second International Conference on Computer Research and Development.
[15] Sarah Birch,et al. Remote Electronic Voting: Free, Fair and Secret? , 2004 .
[16] Hossein Rouhani Zeidanloo,et al. Node Based Interpretative Key Management Framework , 2010, Security and Management.
[17] Mazdak Zamani,et al. Improving the security of protected wireless internet access from insider attacks , 2012 .
[18] Mazdak Zamani,et al. A survey on security issues of federated identity in the cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[19] Mazdak Zamani,et al. A survey for prevention of black hole attacks in wireless mobile adhoc networks using IDS agents , 2013 .
[20] Saman Shojae Chaeikar,et al. IKM-based Security Usability Enhancement Model , 2012 .
[21] Guido Schryen,et al. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland , 2009, IEEE Transactions on Information Forensics and Security.
[22] Saman Shojae Chaeikar,et al. Definitions and Criteria of CIA Security Triangle in Electronic Voting System , 2013 .
[23] M. Zamani,et al. A Survey of Success Factors for CRM , 2010 .
[24] Mojtaba Alizadeh,et al. Implementation and evaluation of lightweight encryption algorithms suitable for RFID , 2013 .
[25] Hossein Rouhani Zeidanloo,et al. Botnet detection based on traffic monitoring , 2010, 2010 International Conference on Networking and Information Technology.
[26] Ülle Madise,et al. E-voting in Estonia 2005. The first Practice of Country-wide binding Internet Voting in the World , 2006, Electronic Voting.
[27] Mojtaba Alizadeh,et al. A Survey on Attacks in RFID Networks , 2012 .
[28] M. Zamani,et al. Code analysis of lightweight encryption algorithms using in RFID systems to improve cipher performance , 2012, 2012 IEEE Conference on Open Systems.
[29] Stuart Wilks-Heeg. Treating Voters as an Afterthought? The Legacies of a Decade of Electoral Modernisation in the United Kingdom , 2009 .
[30] Xiaoping Lou,et al. Quantum Ballot Scheme Based on Hyper-Entanglement States , 2013 .