Keyphrases
Risk-limiting Audit
100%
Electoral Outcomes
66%
Voting Technology
57%
Ceremony
55%
Calculus
55%
Vote Counting
55%
Session Types
50%
Voting Protocols
48%
Polling Places
44%
Multiparty Session Types
44%
Distributed Systems
44%
Waiting Time
44%
Voter Perceptions
44%
Perceived Trust
44%
Time of Arrival
44%
Voter Behavior
44%
Political Decision-making
44%
Automated Data Collection
44%
Data Collection Methods
44%
White-box
44%
Reasoning about Programs
44%
Choreographic Programming
44%
Decision-making Process
44%
Proof Theory
44%
Resource Distribution
44%
Process Implementation
44%
Distributed Language
44%
Projection Procedure
44%
Denmark
44%
Polling Stations
44%
Voting System
44%
Making Decisions
44%
Socio-technical
44%
Logical Frameworks
42%
Elected Officials
42%
First-order Logic
40%
Linear Logic
37%
Electronic Voting
36%
Classical Linear Logic
33%
Security Properties
33%
Election Technologies
32%
Intuitionistic
29%
Return System
29%
Single Transferable Vote
29%
Mechanized Proof
27%
Proof Search
26%
Public Confidence
24%
Parliamentary Elections
22%
Electronic Election
22%
Technical Framework
22%
Computer Science
Soundness
66%
Communicating Process
66%
Logical Framework
62%
Election Official
55%
Distributed Language
44%
Process Implementation
44%
Deadlock Freedom
44%
Formalization
44%
Distributed Systems
44%
Cybersecurity
44%
Reasoning about Programs
44%
Voting Behavior
44%
Security Properties
35%
Election Result
33%
Case Study
33%
Model Checking
33%
Concurrent System
33%
Deadlock
33%
Data Collection Technique
22%
Political Decision
22%
Automated Data
22%
Decision-Making
22%
Bulletin Board
22%
Sensitive Informations
22%
Security Awareness Training
22%
Security Education
22%
Awareness Training
22%
Security Policy
22%
Hardware Design
22%
Arbitrary Number
22%
Centralized Control
22%
Technical Framework
22%
Formal Verification
22%
Comparative Analysis
22%
Sequent Calculus
22%
Correctness Proofs
22%
Security Breach
22%
Hardware Requirement
22%
Evaluation Report
22%
Diffie-Hellman-Merkle key exchange
22%
Programming Error
22%
Design Requirement
22%
Related Document
22%
Operational Context
22%
Control Process
22%
Relational Database
22%
Security protocols
22%
Equational Theory
22%
Decryption
22%
Attackers
22%