1
Published 2013
Table of Contents: '; ... Voting System.- A Formal Model for the Requirement of Verifiability in Electronic Voting by means of a...
Get full text
2
Published 2017
Table of Contents: '; ... spam filters to manipulate online elections -- Return Code Schemes for Electronic Voting Systems -- Eos...
Get full text
3
Published 2015
Table of Contents: '; ... reasoning -- E-voting system in court....
Get full text
4
Published 2017
Table of Contents: '; ... -- Secure Voting Systems -- Trusted Smart Contracts -- Targeted Attacks....
Get full text
5
Published 2007
Table of Contents: '; ...: Opportunity or Threat for Democracy? -- Evaluation of Electronic Voting Systems -- Assessing Procedural Risks...
Get full text
6
7
by Wallis, W.D., Wallis, W.D.
Published 2013
Table of Contents: '; ... -- Encryption; The Hat Game -- Part V Voting -- Voting Systems -- Messing with Systems -- Electing a President...
Get full text
8
Published 2019
Table of Contents: '; ... of Security Protocols -- Belenios: A Simple Private and Verifiable Electronic Voting System....
Get full text
9
Published 2019
Table of Contents: '; ... -- The Danish Party Endorsement System -- On practical aspects of coercion-resistant voting systems....
Get full text
10
Published 2021
Table of Contents: '; ...Decentralized Voting System using Block Chain Technology -- Factors Affecting Programming Skill...
Get full text
11
Table of Contents: '; ... on the Proposed BC - STV Voting System -- Chapter 19. Ancient Observations on Business Ethics -- Chapter 20...
Get full text
12
13
14
15
16
17
Published 2007
Table of Contents: '; ... Security Analysis of E-Voting Systems -- Fine-Grained Sticky Provenance Architecture for Office Documents...
Get full text
18
Published 2007
Table of Contents: '; ... Enhancing Credentials -- Browser Based Agile E-Voting System -- Risk Balance in Exchange Protocols...
Get full text
19
Published 2020
Table of Contents: '; ...S Attacks in SDN -- A Secure and Self-Tallying E-Voting System Based on Blockchain -- An Extended CTRT...
Get full text
20
Published 2019
Table of Contents: '; ...-voting Systems -- Comparative Evaluation of Node-Link and Sankey Diagrams for the Cyber Security Domain...
Get full text