J Groth - Applied Cryptography and Network Security: Second …, 2004 - Springer
In the literature, voting protocols are considered secure if they satisfy requirements such as
privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting protocol …