Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4955682 | Journal of Information Security and Applications | 2017 | 7 Pages |
Abstract
Furthermore, if there is a three valued situation “yes” - “no” - “abstention” present, then, depending on the concept of vote privacy, a breach of it becomes considerably more probable even if the probability of approval remains within the boundaries mentioned above.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Peter Ullrich,