Article ID Journal Published Year Pages File Type
4955682 Journal of Information Security and Applications 2017 7 Pages PDF
Abstract
Furthermore, if there is a three valued situation “yes” - “no” - “abstention” present, then, depending on the concept of vote privacy, a breach of it becomes considerably more probable even if the probability of approval remains within the boundaries mentioned above.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
,