Login / Signup
End-to-End cryptographic voting: Potentials and limitations.
Mohammed Awad
Ernst L. Leiss
Published in:
ICITST (2013)
Keyphrases
</>
end to end
congestion control
high bandwidth
smart card
ad hoc networks
multipath
admission control
content delivery
service delivery
application layer
packet loss rate
real world
internet protocol
rate allocation
multi hop
hash functions
motion estimation
computational complexity