Login / Signup

Attacking and fixing Helios: An analysis of ballot secrecy.

Véronique CortierBen Smyth
Published in: J. Comput. Secur. (2013)
Keyphrases
  • bayesian networks
  • information technology
  • image analysis
  • statistical analysis
  • information retrieval
  • multi agent