Keyphrases
- electronic voting
- secret sharing
- voting method
- security issues
- multi armed bandits
- voting protocols
- multi party
- covert channel
- user authentication
- database
- social choice
- key exchange
- voting schemes
- security level
- combining multiple clusterings
- data encryption
- security protocols
- security requirements
- intrusion detection
- lightweight
- data sets