Now showing items 1-1 of 1
System Usability and User Mental Models of Three Verifiable, End-to-end Voting Methods: Helios, Prêt à Voter, and Scantegrity II
There are many ways voting systems can be maliciously attacked so that election outcomes are altered. In response, voting security experts developed end-to-end (e2e), verifiable voting methods. These systems were intended ...