共 29 条
[11]
DRIMER S, 2009, P 15 INT WORKSH REC, V5992, P50
[13]
Everett S., 2008, CHI 2008
[14]
Fauzia Naznin, 2007, 2007 10th International Conference on Computer and Information Technology (ICCIT 2007), P1, DOI 10.1109/ICCITECHN.2007.4579420
[15]
Electronic Voting: A Review and Taxonomy
[J].
2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE),
2012,
:912-917
[16]
Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049
[17]
Kohno T, 2004, P IEEE S SECUR PRIV, P27
[18]
Kumar D. A., 2012, Proceedings of the 2012 International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME), P41, DOI 10.1109/ICPRIME.2012.6208285
[19]
Lesea Austin, 2007, IP SECURITY IN FPGAS
[20]
Oksuzoglu E., 2009, P 2009 USENIX ACC EL