Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios.
Sevdenur BalogluSergiu BursucSjouke MauwJun PangPublished in: CSF (2021)
Keyphrases
- security threats
- security properties
- security protocols
- security mechanisms
- security problems
- security vulnerabilities
- computer security
- security breaches
- security measures
- cyber attacks
- java card
- cryptographic protocols
- security issues
- information security
- denial of service attacks
- countermeasures
- security risks
- security requirements
- security flaws
- network security
- automated theorem provers
- stream cipher
- insider attacks
- malicious users
- intrusion prevention
- malicious attacks
- fault injection
- intrusion detection
- chosen plaintext
- human operators
- access control
- secure routing
- identity theft
- unauthorized access
- intrusion detection and prevention
- security policies
- cryptographic algorithms
- smart card
- buffer overflow
- key management
- biometric template
- security analysis
- advanced encryption standard
- computer algebra
- cyber security
- computer networks
- ddos attacks
- security management
- attack detection