Login / Signup
Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections.
Roland Wen
Annabelle McIver
Carroll Morgan
Published in:
FM (2014)
Keyphrases
</>
formal analysis
information leakage
personal information
secret information
formal methods
sensitive information
signature scheme
frequency domain
privacy preserving
agent model
third party
copyright protection