Login / Signup

Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract).

Orhan Cetinkaya
Published in: ARES (2008)
Keyphrases
  • extended abstract
  • security requirements
  • smart card
  • security properties
  • software architecture
  • artificial intelligence
  • special case
  • software engineering
  • security analysis