Login / Signup
On E-Vote Integrity in the Case of Malicious Voter Computers.
Sven Heiberg
Helger Lipmaa
Filip van Laenen
Published in:
ESORICS (2010)
Keyphrases
</>
voting schemes
neural network
databases
real time
artificial intelligence
multiscale
object oriented
computer systems
cloud computing
integrity constraints