Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
voting privacy and security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/161)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Russian Federal remote E-voting scheme of 2021 - protocol description and analysis
Vakarjuk, Jelizaveta
;
Snetkov, Nikita
;
Willemson, Jan
EICC '22: Proceedings of the 2022 European Interdisciplinary Cybersecurity Conference
2022
/
p. 29-35
https://doi.org/10.1145/3528580.3528586
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
159
1.
voting privacy and security
2.
information security and privacy
3.
security and privacy
4.
security and privacy in smart grids
5.
data privacy
6.
differential privacy
7.
human privacy
8.
posthumous privacy
9.
post-mortem privacy
10.
privacy
11.
privacy by design
12.
privacy coins
13.
privacy concerns
14.
privacy of participants
15.
privacy policy
16.
privacy-enhancing technologies
17.
Privacy-preserving
18.
user awareness of privacy threats
19.
convenience voting
20.
early voting
21.
electronic voting
22.
electronic voting protocols
23.
email voting
24.
European i-voting
25.
e-voting
26.
framework of internet voting
27.
Internet voting
28.
Internet-based voting
29.
I-voting
30.
new voting technologies
31.
open voting
32.
postal voting
33.
remote electronic voting
34.
shareholder voting
35.
Trustworthy Voting
36.
voting
37.
voting behavior
38.
voting innovations
39.
voting power
40.
ad-hoc sensor networks security
41.
Automatic Security Verification
42.
Blockchain security
43.
cache security
44.
cloud security
45.
communication system security
46.
comprehensive system of economic security
47.
computer security
48.
cooperative security dilemma
49.
cyber security
50.
cyber security education
51.
cyber security exercises
52.
cyber security monitoring
53.
cyber security strategies
54.
cyber-physical system security
55.
cyber-security
56.
data and information security
57.
data security
58.
development of security cameras
59.
digital security practices
60.
drinking water security
61.
economic security
62.
economic security of enterprise
63.
emotional security
64.
energy security
65.
energy security indicator
66.
Estonian information security standard
67.
graded security
68.
hardware security
69.
hardware security primitive
70.
high level of security
71.
Homeland security
72.
human security
73.
information security
74.
initial level of security
75.
internal security
76.
international security
77.
investment and innovation security
78.
IPv6 security
79.
IT security
80.
IT security management
81.
job security
82.
long-term security
83.
maritime cyber security
84.
maritime cyber security operations centers
85.
Maritime Security Operations Center (M-SOC)
86.
medium level of security
87.
metadata model for security measures
88.
Middle Eastern security
89.
Mobile security
90.
national cyber security strategy
91.
national security
92.
NATO. Science for Peace and Security Program
93.
network security
94.
network security monitoring
95.
OSCE (Organization for Security and Co-operation in Europe)
96.
passenger’s security
97.
policy-based routing security
98.
political and security cultures
99.
post-quantum security
100.
power system security
101.
quantitative security
102.
regional security
103.
RISC-V Security Verification
104.
Safety and Security in Sea Transportation
105.
safety and security testing
106.
security
107.
security adaptation
108.
security alert prioritization
109.
security analysis
110.
security and justice (AFSJ)
111.
Security and political science
112.
Security Assertion
113.
Security Assertion Mining
114.
security closure
115.
Security Coverage
116.
security dataset
117.
security dilemma
118.
Security evaluation
119.
security evaluation instruments
120.
Security Level Evaluation
121.
Security limitations
122.
security log analysis
123.
security management
124.
security model
125.
security monitoring
126.
security notion
127.
security objectives
128.
security of data
129.
security of supply
130.
security operation center
131.
security operations center
132.
security patterns
133.
security policy
134.
security problem definition
135.
security proof
136.
security protocols
137.
security requirements
138.
security requirements engineering
139.
security research
140.
security risk assessment
141.
security risk management
142.
security risks
143.
security science and technology
144.
security strategies
145.
security systems for military objects
146.
security testing
147.
security training
148.
security verification
149.
security-by-design
150.
social security planning
151.
societal security
152.
software security
153.
software security level
154.
software security subcharacteristics
155.
sufficient level of security
156.
system of economic security
157.
system security
158.
terrorism security
159.
transmission System Security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT