Login / Signup
Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example.
Saghar Estehghari
Yvo Desmedt
Published in:
EVT/WOTE (2010)
Keyphrases
</>
building blocks
management system
computer systems
learning systems
distributed object
expert systems
complex systems
search engine
operating system
retrieval systems
computer networks
file sharing