Suchergebnisse

22 Ergebnisse

Sortierung:

Open Access#12011

A formal analysis of the Norwegian e-voting protocol

BASE

Open Access#22011

A formal analysis of the Norwegian e-voting protocol

BASE

Open Access#32011

A formal analysis of the Norwegian e-voting protocol

BASE

Open Access#42021

A privacy attack on the Swiss Post e-voting system

BASE

Open Access#52021

A privacy attack on the Swiss Post e-voting system

BASE

Open Access#62019

BeleniosVS: Secrecy and Verifiability against a Corrupted Voting Device

BASE

Open Access#72019

BeleniosVS: Secrecy and Verifiability against a Corrupted Voting Device

BASE

Open Access#82019

BeleniosVS: Secrecy and Verifiability against a Corrupted Voting Device

BASE

Open Access#92019

BeleniosVS: Secrecy and Verifiability against a Corrupted Voting Device

BASE

Open Access#102018

A formal analysis of the Neuchâtel e-voting protocol

BASE

Open Access#112018

A formal analysis of the Neuchâtel e-voting protocol

BASE

Open Access#122017

A formal analysis of the Neuchâtel e-voting protocol

BASE

Open Access#132017

A formal analysis of the Neuchâtel e-voting protocol

BASE

Open Access#142012

Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices

BASE

Open Access#152012

Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices

BASE