Security enhancement for anonymous secure e-voting over a network.
Iuon-Chang LinMin-Shiang HwangChin-Chen ChangPublished in: Comput. Stand. Interfaces (2003)
Keyphrases
- security measures
- digital signature scheme
- electronic voting
- security issues
- security threats
- security mechanisms
- security requirements
- peer to peer
- security architecture
- security management
- key management
- application level
- electronic transactions
- security policies
- electronic payment
- network security
- security analysis
- data security
- electronic commerce
- security level
- stream cipher
- security patterns
- access control
- network traffic
- network management
- key agreement protocol
- advanced metering infrastructure
- wireless sensor networks
- trusted platform module
- computer networks
- intrusion detection
- trust relationships
- authentication scheme
- blind signature
- key distribution
- data encryption
- authentication protocol
- key exchange protocol
- security protocols
- single point of failure
- encryption scheme
- signature scheme