We present the traffic analysis problem and expose the most important protocols, attacks and design issues. Afterwards, we propose directions for further research. As we are mostl...
IT research is often informed by studies of the practices that new technologies are to be embedded in and which they transform in their use. The development of mixed reality, tang...
Kutylowski et al. have introduced a voter-verifiable electronic voting scheme ”a practical voting scheme with receipts”, which provides each voter with a receipt. The voter ca...
Formal methods have been advocated for the verification of digital design where correctness is proved mathematically. In contrast to digital designs, the verification of analog ...
Anonymity of ballots in electronic voting schemes usually relies on the existence of some kind of anonymous channel between voters and ballot collecting authorities. Currently, th...