Procedural security analysis of electronic voting.
Alexandros XenakisAnn MacintoshPublished in: ICEC (2004)
Keyphrases
- security analysis
- electronic voting
- blind signature
- public key
- smart card
- secret sharing
- blind signature scheme
- encryption scheme
- security requirements
- security model
- digital signature
- security properties
- signature scheme
- authentication protocol
- secret sharing scheme
- object oriented
- information systems
- computer networks
- information security
- data management
- distributed systems