<--- Back to Details
First PageDocument Content
Computer security / Politics / Technology / Premier Election Solutions / Vulnerability / Penetration test / Diebold / Hacking Democracy / Hursti Hack / Electronic voting / Software testing / Computer network security
Date: 2007-08-10 17:32:49
Computer security
Politics
Technology
Premier Election Solutions
Vulnerability
Penetration test
Diebold
Hacking Democracy
Hursti Hack
Electronic voting
Software testing
Computer network security

Add to Reading List

Source URL: election.dos.state.fl.us

Download Document from Source Website

File Size: 2,17 MB

Share Document on Facebook

Similar Documents

Analysis of an Electronic Voting Protocol in the Applied Pi Calculus Steve Kremer1 and Mark Ryan2 1 Laboratoire Sp´ecification et V´erification

DocID: 1vquv - View Document

Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus Michael Backes1,2 , C˘at˘alin Hri¸tcu1 , and Matteo Maffei1 1 Saarland University, Saarbrücken, Germany

DocID: 1vpxM - View Document

Cryptography / RSA / Encryption / Cipher / David Chaum / Mix network

Mix-Nets Lecture 21 Some tools for electronic-voting (and other things) Mix-Nets

DocID: 1uXVu - View Document

Verifying Properties of Electronic Voting Protocols ∗ St´ephanie Delaune LSV, France T´el´ecom R&D ENS Cachan, CNRS, France

DocID: 1uGhm - View Document

Type-Based Verification of Electronic Voting Protocols Véronique Cortier1 , Fabienne Eigner2 , Steve Kremer1 , Matteo Maffei2 , and Cyrille Wiedling3 1 LORIA, CNRS & INRIA & University of Lorraine, France

DocID: 1uE9A - View Document