How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
IEEE Security and Privacy
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Are your votes really counted?: testing the security of real-world electronic voting systems
ISSTA '08 Proceedings of the 2008 international symposium on Software testing and analysis
HICCUPS: health information collaborative collection using privacy and security
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
The KOA remote voting system: a summary of work to date
TGC'06 Proceedings of the 2nd international conference on Trustworthy global computing
Acceptance of voting technology: between confidence and trust
iTrust'06 Proceedings of the 4th international conference on Trust Management
Engineering a distributed e-voting system architecture: meeting critical requirements
ISARCS'10 Proceedings of the First international conference on Architecting Critical Systems
The impact of trust and relative advantage on internet voting diffusion
Journal of Theoretical and Applied Electronic Commerce Research
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Secure internet voting protocol for overseas military voters
SP'12 Proceedings of the 20th international conference on Security Protocols
Internet Voting Usefulness: An Empirical Analysis of Trust, Convenience and Accessibility
Journal of Organizational and End User Computing
Hi-index | 0.00 |
An extensive assessment of a proposed Internet-based voting system.