Author:
Alotaibi Mohammed,Thomas Nigel
Publisher
Springer International Publishing
Reference19 articles.
1. Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: 2008 21st IEEE Computer Security Foundations Symposium. IEEE (2008)
2. Bradley, J.T., Gilmore, S.T.: Stochastic simulation methods applied to a secure electronic voting model. Electron. Notes Theor. Comput. Sci. 151(3), 5–25 (2006)
3. Lecture Notes in Computer Science;A Fujioka,1993
4. Gritzalis, D.A.: Principles and requirements for a secure e-voting system. Comput. Secur. 21(6), 539–556 (2002)
5. Hao, F., Kreeger, M., Randell, B., Clarke, D., Shahandashti, S., Lee, P.J.: Every vote counts: ensuring integrity in large-scale electronic voting. In: 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 2014), vol. 2, pp. 1–25 (2014)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Performance Impact of Misbehaving Voters;Computer Performance Engineering;2018