Skip to main content
USENIX
  • Conferences
  • Students
Sign in

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home ยป Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example
Tweet

connect with us

Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example

Abstract: 

Saghar Estehghari, University College London

Yvo Desmedt, University College London

BibTeX
@inproceedings {267306,
author = {Saghar Estehghari and Yvo Desmedt},
title = {Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example},
booktitle = {2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10)},
year = {2010},
address = {Washington, DC},
url = {https://www.usenix.org/conference/evtwote-10/exploiting-client-vulnerabilities-internet-e-voting-systems-hacking-helios-20},
publisher = {USENIX Association},
month = aug,
}
Download

Links

Paper: 
http://www.usenix.org/events/evtwote10/tech/full_papers/Estehghari.pdf
Paper (HTML): 
Slides: 
  • Log in or    Register to post comments

© USENIX

  • Privacy Policy
  • Contact Us