On the security enhancement for anonymous secure e-voting over computer network.
Sheng-Yu HwangHsiang-An WenTzonelih HwangPublished in: Comput. Stand. Interfaces (2005)
Keyphrases
- computer networks
- digital signature scheme
- security problems
- electronic voting
- network security
- security measures
- intrusion detection system
- security requirements
- security issues
- security mechanisms
- network management
- key management
- security level
- intrusion detection
- electronic transactions
- blind signature
- trusted platform module
- signature scheme
- payment systems
- access control
- sensitive data
- data security
- security analysis
- cryptographic protocols
- digital signature
- digital copyright protection
- information security
- computer network security
- communication networks
- network traffic
- computer systems
- security policies
- trusted computing
- electronic payment
- key agreement protocol
- authentication protocol
- user authentication
- diffie hellman
- computer networking
- provably secure
- databases
- information systems
- public key infrastructure
- application level
- encryption scheme
- anomaly detection
- cyber security
- data management
- data analysis
- public key
- real world