Author:
Japheth Jessen,Wejin John,Misra Sanjay,Oluranti Jonathan
Publisher
Springer International Publishing
Reference25 articles.
1. Zissis, D., Lekkas, D.: Securing e-Government and e-Voting with an open cloud computing architecture. Gov. Inf. Q. 28(2), 239–251 (2011). https://doi.org/10.1016/j.giq.2010.05.010
2. Rodiana, I.M., Rahardjo, B., Aciek Ida, W.: Design of a public key infrastructure-based single ballot e-voting system. In: 2018 International Conference on Information Technology Systems and Innovation (ICITSI), pp. 6–9, October 2018. https://doi.org/10.1109/ICITSI.2018.8696083
3. Kurbatov, O., Kravchenko, P., Poluyanenko, N., Shapoval, O., Kuznetsova, T.: Using ring signatures for an anonymous e-voting system. In: 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), pp. 187–190, December 2019. https://doi.org/10.1109/ATIT49449.2019.9030447
4. Harshitha, V.N.: MyVote - an effective online voting system that can be trusted. Glob. J. Comput. Sci. Technol. (2021). https://computerresearch.org/index.php/computer/article/view/2012. Accessed 28 Feb 2022
5. “What is Hash Function? - Definition from Techopedia. Techopedia.com. http://www.techopedia.com/definition/19744/hash-function. Accessed 28 Feb 2022