Login / Signup
How Could Snowden Attack an Election?
Douglas Wikström
Jordi Barrat
Sven Heiberg
Robert Krimmer
Carsten Schürmann
Published in:
E-VOTE-ID (2017)
Keyphrases
</>
countermeasures
information systems
secret key
encryption algorithm
real time
information retrieval
optimal solution
wireless sensor networks
cyber attacks
malicious attacks