An ethnocentric look at the law and technology interface
ACM SIGSOFT Software Engineering Notes
Computer forensics in forensis
ACM SIGOPS Operating Systems Review
Inside risks: U.S. election after-math
Communications of the ACM - Inspiring Women in Computing
Modeling and analysis of procedural security in (e)voting: the Trentino's approach and experiences
EVT'08 Proceedings of the conference on Electronic voting technology
Development, formal verification, and evaluation of an E-voting system with VVPAT
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Transparency versus security: early analysis of antagonistic requirements
Proceedings of the 2010 ACM Symposium on Applied Computing
E-voting and forensics: prying open the black box
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
An integrated application of security testing methodologies to e-voting systems
ePart'10 Proceedings of the 2nd IFIP WG 8.5 international conference on Electronic participation
Internet voting: structural governance principles for election cyber security in democratic nations
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies
Formal analysis of an electronic voting system: An experience report
Journal of Systems and Software
The bug that made me president a browser- and web-security case study on helios voting
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Hi-index | 48.22 |