A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
Rüdiger GrimmKatharina HupfMelanie VolkamerPublished in: Electronic Voting (2010)
Keyphrases
- security model
- electronic voting
- blind signature
- public key
- provably secure
- blind signature scheme
- access control
- security analysis
- response time
- security requirements
- digital signature
- signature scheme
- secret sharing
- encryption scheme
- intrusion detection
- standard model
- security mechanisms
- key management
- secret sharing scheme
- formal model