Bridging the Gap between Vulnerabilities and Threats in Electronic Voting (Transcript of Discussion).
Matt BlazePublished in: Security Protocols Workshop (2008)
Keyphrases
- electronic voting
- information security
- countermeasures
- security vulnerabilities
- security issues
- security risks
- buffer overflow
- secret sharing
- blind signature
- voting protocols
- data corruption
- attack scenarios
- security properties
- information systems
- network security
- end to end
- blind signature scheme
- secret sharing scheme
- smart card
- intrusion detection