How to secure network application systems using cryptographic protocols - Electronic voting systems case

Research output: Contribution to journalArticlepeer-review

Fingerprint

Dive into the research topics of 'How to secure network application systems using cryptographic protocols - Electronic voting systems case'. Together they form a unique fingerprint.

Engineering & Materials Science