Sign in

How to measure usable security: Natural strategies in voting protocols.

Wojciech JamrogaDamian KurpiewskiVadim Malvone
Published in: J. Comput. Secur. (2022)
Keyphrases
  • voting protocols
  • electronic voting
  • similarity measure
  • information security
  • intrusion detection
  • network security
  • access control
  • security requirements
  • security issues