Login / Signup

How Could Snowden Attack an Election?

Douglas WikströmJordi BarratSven HeibergRobert KrimmerCarsten Schürmann
Published in: E-VOTE-ID (2017)
Keyphrases
  • countermeasures
  • information systems
  • secret key
  • encryption algorithm
  • real time
  • information retrieval
  • optimal solution
  • wireless sensor networks
  • cyber attacks
  • malicious attacks