Login / Signup
Cryptographic Security Analysis of E-voting Systems: Achievements, Misconceptions, and Limitations.
Ralf Küsters
Johannes Müller
Published in:
E-VOTE-ID (2017)
Keyphrases
</>
security analysis
smart card
security properties
elliptic curve cryptography
image quality
high security
peer to peer
computer systems
security requirements
image encryption