Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example.

Saghar EstehghariYvo Desmedt
Published in: EVT/WOTE (2010)