Return to Article Details
Analysis of the Security of Two E-Voting Systems
ver 2.0