Author:
Sanyasi Naidu P.,Kharat Reena
Reference19 articles.
1. Gritzalis, D. A.: Principles and requirements for a secure e-voting system. Computers & Security, Elsevier, Vol. 21, No. 6, (2002): pp. 539–556. doi: 10.1016/S0167-4048(02)01014-3 .
2. Hastings, N., Peralta, R., Popoveniuc, S., Regenscheid, A.: Security Considerations for Remote Electronic UOCAVA Voting. National Institute of Standards and Technology, Feb 2011. doi:10.1.1.204.5483.
3. Rivest, R., A. Shamir, L. Adleman. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, Volume-21, Issue-2, Feb-1978, pp. 120–126. doi: 10.1145/359340.359342 .
4. Abd-alrazzq, H.K., Ibrahim, M.S., Dawood, O.A.: Secure internet voting system based on public key kerberos. IJCSI Int. J. Comput. Sci. Issues 9(2), 428–435 (2012). No 3.
5. Al-Anie, H.K., Alia, M.A., Hnaif, A.A.: e-Voting protocol based on public key cryptography. Int. J. Netw. Secur. Appl. (IJNSA) 3(4), 87–98 (2011). doi: 10.5121/ijnsa.2011.3408 .
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献