The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election.
J. Alex HaldermanVanessa TeaguePublished in: CoRR (2015)
Keyphrases
- high security
- real time
- online learning
- cryptographic protocols
- java card
- access control
- information security
- failure detection
- security policies
- static analysis
- computer security
- integrity verification
- security level
- security model
- security mechanisms
- security requirements
- security issues
- intrusion detection
- social media