Suggested Topics within your search.
Computer security 16 Application software 15 Cryptology 15 Data encryption (Computer science) 15 Systems and Data Security 15 Computer Communication Networks 14 Computer communication systems 14 more ...
Computer security 16 Application software 15 Cryptology 15 Data encryption (Computer science) 15 Systems and Data Security 15 Computer Communication Networks 14 Computer communication systems 14 more ...
1
Published 2013
Table of Contents: ';
“... Voting System.- A Formal Model for the Requirement of Verifiability in Electronic Voting by means of a...”Get full text
2
Published 2017
Table of Contents: ';
“... spam filters to manipulate online elections -- Return Code Schemes for Electronic Voting Systems -- Eos...”Get full text
3
4
Published 2017
Table of Contents: ';
“... -- Secure Voting Systems -- Trusted Smart Contracts -- Targeted Attacks....”Get full text
5
Published 2007
Table of Contents: ';
“...: Opportunity or Threat for Democracy? -- Evaluation of Electronic Voting Systems -- Assessing Procedural Risks...”Get full text
6
7
Table of Contents: ';
“... -- Encryption; The Hat Game -- Part V Voting -- Voting Systems -- Messing with Systems -- Electing a President...”
Get full text
Get full text
8
Published 2019
Table of Contents: ';
“... of Security Protocols -- Belenios: A Simple Private and Verifiable Electronic Voting System....”Get full text
9
Published 2019
Table of Contents: ';
“... -- The Danish Party Endorsement System -- On practical aspects of coercion-resistant voting systems....”Get full text
10
Published 2021
Table of Contents: ';
“...Decentralized Voting System using Block Chain Technology -- Factors Affecting Programming Skill...”Get full text
11
Table of Contents: ';
“... on the Proposed BC - STV Voting System -- Chapter 19. Ancient Observations on Business Ethics -- Chapter 20...”
Get full text
Get full text
12
13
14
15
16
17
Published 2007
Table of Contents: ';
“... Security Analysis of E-Voting Systems -- Fine-Grained Sticky Provenance Architecture for Office Documents...”Get full text
18
Published 2007
Table of Contents: ';
“... Enhancing Credentials -- Browser Based Agile E-Voting System -- Risk Balance in Exchange Protocols...”Get full text
19
Published 2020
Table of Contents: ';
“...S Attacks in SDN -- A Secure and Self-Tallying E-Voting System Based on Blockchain -- An Extended CTRT...”Get full text
20
Published 2019
Table of Contents: ';
“...-voting Systems -- Comparative Evaluation of Node-Link and Sankey Diagrams for the Cyber Security Domain...”Get full text