Search
Now showing items 1-1 of 1
Machine-aided analysis of vote privacy using computationally complete symbolic attacker
(University of Missouri--Columbia, 2019)
Security protocols employ cryptographic primitives such as encryption and digital signatures to provide security guarantees of confidentiality and authenticity in the presence of malicious attackers. Due to the complexities ...