How to secure network application systems using cryptographic protocols - Electronic voting systems case

被引:0
|
作者
Sako, Kazue
机构
来源
NEC Research and Development | 2002年 / 43卷 / 03期
关键词
Cryptographic protocols - Electronic voting systems;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:191 / 194
相关论文
共 50 条
  • [21] Blind Signatures in Electronic Voting Systems
    Kucharczyk, Marcin
    COMPUTER NETWORKS, 2010, 79 : 349 - 358
  • [22] Requirement Specifications for Electronic Voting Systems
    Pesado, Patricia M.
    Feierherd, Guillermo E.
    Pasini, Ariel C.
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2005, 5 (04): : 312 - 319
  • [23] CRYPTOGRAPHIC SYSTEMS USING REDUNDANCY
    AGNEW, GB
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1990, 36 (01) : 31 - 39
  • [24] Secure Communication Protocols for SCADA Systems: Analysis and Comparisons of Different Secure Communication Protocols
    Aboulsamh, Rana Mohammed
    Albugaey, Maryam Tariq
    Alghamdi, Dana Omar
    Abujaid, Fatima Hussain
    Alsubaie, Sarah Nasser
    Saqib, Nazar Abbas
    PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 209 - 214
  • [25] Secure and transparent electronic voting system using blockchain
    Sangeetha, Manoharan
    Pal, Shreeja
    Roshan, Jayraj
    ELECTRONIC GOVERNMENT- AN INTERNATIONAL JOURNAL, 2022, 18 (03) : 381 - 398
  • [26] Blockchain-based electronic voting systems: A case study in Morocco
    Chafiq T.
    Azmi R.
    Mohammed O.
    International Journal of Intelligent Networks, 2024, 5 : 38 - 48
  • [27] Use case of Paillier Homomorphic Algorithm for Electronic-Voting Systems
    Roopa, K.
    Gokul, B. S.
    Arakalgud, S. Kaushik
    2021 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER TECHNOLOGIES AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2021, : 273 - 278
  • [28] Secure ubiquitous authentication protocols for RFID systems
    Morshed, Md Monzur
    Atkins, Anthony
    Yu, Hongnian
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [29] Secure and private search protocols for RFID systems
    Yanjun Zuo
    Information Systems Frontiers, 2010, 12 : 507 - 519
  • [30] Matching Data Representation to Application Needs Case Study: Cryptographic Systems
    Stouraitis, Thanos
    2015 IEEE 18TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS 2015), 2015, : XIV - XIV