Author:
Kumar Mahender,Katti C. P.,Saxena P. C.
Publisher
Springer International Publishing
Reference34 articles.
1. Awad, M., Leiss, E.L.: The evolution of voting: analysis of conventional and electronic voting systems. Int. J. Appl. Eng. Res. 11(12), 7888–7896 (2016)
2. Cetinkaya, O., Analysis of security requirements for cryptographic voting protocols. In: Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 1451–1456 (2008)
3. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)
4. Benaloh, J.D.C.: Verifiable secret-ballot elections. Yale University. Department of Computer Science (1987)
5. López-García, L., Perez, L.J.D., Rodríguez-Henríquez, F.: A pairing-based blind signature e-voting scheme. Comput. J. 57, 1460–1471 (2013). bxt069
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献