Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example
Saghar Estehghari1 Yvo Desmedt1,2
1 Department of Computer Science
University College London, UK
2 Research Center for Information Security (RCIS)
AIST, Japan August 9, 2010
c Yvo Desmedt