Electoral fraud

Results: 1619



#Item
91DECEMBERelectionline.org Briefing The 2004 Election

DECEMBERelectionline.org Briefing The 2004 Election

Add to Reading List

Source URL: www.electionline.org

Language: English - Date: 2015-09-08 11:55:49
92N OV E M B E RBriefing The Associated Press, 2006  The 2006 Election

N OV E M B E RBriefing The Associated Press, 2006 The 2006 Election

Add to Reading List

Source URL: www.electionline.org

Language: English - Date: 2015-09-08 12:01:21
93Mixnets in Electronic Voting Ben Adida Cryptography and Information Security Group MIT Computer Science and Artificial Intelligence Laboratory

Mixnets in Electronic Voting Ben Adida Cryptography and Information Security Group MIT Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: assets.adida.net

Language: English - Date: 2011-04-11 17:38:58
94

PDF Document

Add to Reading List

Source URL: dos.myflorida.com

Language: English - Date: 2016-02-03 13:06:13
95Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley

Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:46
96The Promise of Cryptographic Voting Protocols Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu June 6, 2005 Electronic voting has a credibility gap: many experts have sharply criticized current

The Promise of Cryptographic Voting Protocols Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu June 6, 2005 Electronic voting has a credibility gap: many experts have sharply criticized current

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:46
97An overview of cyber-crime in 2002 Acts of malicious intent: A few examples  An overview of cyber-crime in 2002

An overview of cyber-crime in 2002 Acts of malicious intent: A few examples An overview of cyber-crime in 2002

Add to Reading List

Source URL: www.clusif.fr

Language: English - Date: 2003-11-14 10:04:45
98Alarm Bells from Silenced Voters by Isela Gutierrez and Bob Hall* “I have voted at this library in every election, but today I was told to vote somewhere else. I’ve already waited in line for 30 minutes and I don’t

Alarm Bells from Silenced Voters by Isela Gutierrez and Bob Hall* “I have voted at this library in every election, but today I was told to vote somewhere else. I’ve already waited in line for 30 minutes and I don’t

Add to Reading List

Source URL: democracy-nc.org

Language: English - Date: 2015-06-16 09:00:54
99Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -orHow to Store Ballots on a Voting Machine (Extended Abstract) David Molnar UC Berkeley

Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -orHow to Store Ballots on a Voting Machine (Extended Abstract) David Molnar UC Berkeley

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:56
100Coercion Resistant End-to-end Voting  Ryan W. Gardner Sujata Garera

Coercion Resistant End-to-end Voting Ryan W. Gardner Sujata Garera

Add to Reading List

Source URL: www.ifca.ai

Language: English - Date: 2009-03-05 11:07:09