Protecting a Distributed Voting Schema for Anonymous and Secure Voting Against Attacks of Malicious Partners.
Sebastian ObermeierStefan BöttcherPublished in: Int. J. E Serv. Mob. Appl. (2011)
Keyphrases
- electronic voting
- malicious attacks
- peer to peer
- cooperative
- security mechanisms
- malicious users
- secure routing
- distributed systems
- multi agent
- lightweight
- computer networks
- insider attacks
- security protocols
- protection mechanisms
- countermeasures
- computing environments
- insider threat
- computer security
- multi party
- detecting malicious
- data model
- detect malicious
- digital signature scheme
- chosen plaintext