Login / Signup
Attacking and fixing Helios: An analysis of ballot secrecy.
Véronique Cortier
Ben Smyth
Published in:
J. Comput. Secur. (2013)
Keyphrases
</>
bayesian networks
information technology
image analysis
statistical analysis
information retrieval
multi agent