Login / Signup
Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker.
Gergei Bana
Rohit Chadha
Ajay Kumar Eeralla
Published in:
ESORICS (2) (2018)
Keyphrases
</>
formal analysis
privacy preserving
private information
formal methods
personal information
privacy preserving data mining
knowledge representation
voting schemes
artificial intelligence
third party
black box
sensitive information
symbolic representation
data protection