Helios Voting

Results: 14



#Item
1Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1  INRIA Paris-Rocquencourt, France

Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1 INRIA Paris-Rocquencourt, France

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-15 11:15:19
    2Helios: Web-based Open-Audit Voting Ben Adida ben  Harvard University  Abstract

    Helios: Web-based Open-Audit Voting Ben Adida ben Harvard University Abstract

    Add to Reading List

    Source URL: www.usenix.org

    - Date: 2008-07-14 18:15:32
      3Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1  INRIA Paris-Rocquencourt, France

      Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1 INRIA Paris-Rocquencourt, France

      Add to Reading List

      Source URL: bensmyth.com

      Language: English - Date: 2014-05-14 02:07:07
        4Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1  INRIA Paris-Rocquencourt, France

        Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1 INRIA Paris-Rocquencourt, France

        Add to Reading List

        Source URL: www.bensmyth.com

        Language: English - Date: 2014-03-31 03:42:07
          5Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1  INRIA Paris-Rocquencourt, France

          Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1 INRIA Paris-Rocquencourt, France

          Add to Reading List

          Source URL: www.bensmyth.com

          Language: English - Date: 2014-05-14 02:07:07
            6Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios Ben Adida Harvard University ben

            Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios Ben Adida Harvard University ben

            Add to Reading List

            Source URL: www.uclouvain.be

            Language: English - Date: 2011-12-14 05:30:42
              7Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1  INRIA Paris-Rocquencourt, France

              Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Adam McCarthy1 , Ben Smyth1 , and Elizabeth A. Quaglia2 1 INRIA Paris-Rocquencourt, France

              Add to Reading List

              Source URL: bensmyth.com

              Language: English - Date: 2014-03-31 03:42:07
                8Helios web-based open-audit voting Ben Adida Harvard University Usenix Security – San Jose, CA 1 August 2008

                Helios web-based open-audit voting Ben Adida Harvard University Usenix Security – San Jose, CA 1 August 2008

                Add to Reading List

                Source URL: assets.adida.net

                Language: English - Date: 2011-04-11 17:36:39
                9Helios web-based open-audit voting Ben Adida Harvard University IACR Voting System Session 19 August 2008

                Helios web-based open-audit voting Ben Adida Harvard University IACR Voting System Session 19 August 2008

                Add to Reading List

                Source URL: assets.adida.net

                Language: English - Date: 2011-04-11 17:36:41
                10Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example Saghar Estehghari University College London

                Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example Saghar Estehghari University College London

                Add to Reading List

                Source URL: www.usenix.org

                Language: English - Date: 2010-07-01 11:29:05