Search Results - (( java election based algorithm ) OR ( program visualisation mining algorithm ))
Search alternatives:
- program visualisation »
- visualisation mining »
- mining algorithm »
- election based »
- java »
-
1
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item
