Login / Signup
Coercion-resistant proxy voting.
Oksana Kulyk
Stephan Neumann
Karola Marky
Jurlind Budurushi
Melanie Volkamer
Published in:
Comput. Secur. (2017)
Keyphrases
</>
voting method
real time
caching scheme
databases
image sequences
voting schemes
neural network
artificial intelligence
social networks
majority voting
social choice
proxy re encryption
proxy signature scheme
privacy enhancing