Login / Signup
How to measure usable security: Natural strategies in voting protocols.
Wojciech Jamroga
Damian Kurpiewski
Vadim Malvone
Published in:
J. Comput. Secur. (2022)
Keyphrases
</>
voting protocols
electronic voting
similarity measure
information security
intrusion detection
network security
access control
security requirements
security issues