usenix conference policies
You are here
Home ยป Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example
Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example
Abstract:
BibTeX
@inproceedings {267306,
author = {Saghar Estehghari and Yvo Desmedt},
title = {Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example},
booktitle = {2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10)},
year = {2010},
address = {Washington, DC},
url = {https://www.usenix.org/conference/evtwote-10/exploiting-client-vulnerabilities-internet-e-voting-systems-hacking-helios-20},
publisher = {USENIX Association},
month = aug
}
author = {Saghar Estehghari and Yvo Desmedt},
title = {Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example},
booktitle = {2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10)},
year = {2010},
address = {Washington, DC},
url = {https://www.usenix.org/conference/evtwote-10/exploiting-client-vulnerabilities-internet-e-voting-systems-hacking-helios-20},
publisher = {USENIX Association},
month = aug
}
Links
Paper (HTML):
Slides:
connect with us