Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract.
Matt BlazeSandy ClarkPublished in: Security Protocols Workshop (2008)
Keyphrases
- electronic voting
- information security
- countermeasures
- security vulnerabilities
- security issues
- secret sharing
- security risks
- buffer overflow
- blind signature
- attack scenarios
- security mechanisms
- voting protocols
- data corruption
- security properties
- blind signature scheme
- information systems
- security requirements
- intrusion detection system
- intrusion detection
- digital images