Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4955458 | Computers & Security | 2017 | 12 Pages |
Abstract
In this paper we propose an end-to-end verifiable Internet voting scheme, which to the best of our knowledge is the first scheme to address voter coercion in the proxy voting setting.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer,